Academic literature on the topic 'Computer networks, law and legislation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks, law and legislation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer networks, law and legislation"

1

Qin, Di, Zhaonan Mu, and Sijialu Yue. "The Value Orientation of Electronic Commerce Law Based on Computer Network." MATEC Web of Conferences 365 (2022): 01030. http://dx.doi.org/10.1051/matecconf/202236501030.

Full text
Abstract:
In the era of legal globalization, e-commerce platform increasingly mature environment, in order to better meet the practical requirements of e-commerce activities, in the process of e-commerce legislation, practice, should always adhere to the value orientation of fair and equitable legal benefits, and by respecting the existing legal framework, integrate the operation and development environment of computer networks, and formulate e-commerce law in line with the modern e-commerce environment, effectively safeguard the order of e-commerce activities. Based on the analysis of the current situa
APA, Harvard, Vancouver, ISO, and other styles
2

Walden, Ian. "Harmonising Computer Crime Laws in Europe." European Journal of Crime, Criminal Law and Criminal Justice 12, no. 4 (2004): 321–36. http://dx.doi.org/10.1163/1571817042523095.

Full text
Abstract:
AbstractAs the ‘Information Society’ emerges, the European economy and its citizens have become dependent on computers and communication networks. However, with the ravages of the viruses MyDoom and MS Blaster still being felt around the world, the vulnerability of computer systems and networks to criminal crime, as well as potentially terrorist activity, is still fresh in our minds. There is no agreed definition of what constitutes a ‘computer crime’. A computer may constitute the instrument of the crime, such as in murder and fraud; the object of the crime, such as the theft of processor chi
APA, Harvard, Vancouver, ISO, and other styles
3

ZONTOVA, Daria. "Foreign experience in regulating criminal liability for interfering in the activities of judicial bodies and institutions of justice of Ukraine." Economics. Finances. Law 9/1, no. - (2022): 23–26. http://dx.doi.org/10.37634/efp.2022.9(1).5.

Full text
Abstract:
The paper examines the peculiarities of the application of the positive experience of legislative activity of foreign countries in regulating criminal liability for interference in the activities of judicial bodies and judicial institutions of Ukraine. Various approaches to the legal regulation of criminal liability for interfering in the activities of judicial bodies (judicial authorities) are analyzed. It is stated that the criminalization of the act in the national legislation is due to a number of different factors, including the peculiarities of certain branches of law and legal culture.
APA, Harvard, Vancouver, ISO, and other styles
4

Maile, A. D. "Legislation on Administrative Procedures: The German Experience." Siberian Law Review 18, no. 2 (2021): 204–15. http://dx.doi.org/10.19073/2658-7602-2021-18-2-204-215.

Full text
Abstract:
This article provides an overview of the main provisions of German administrative procedural law. It outlines in a systematic way the particularities of administrative procedures and the possibilities for a citizen to seek administrative remedy. The essence of the basic principles of administrative procedural law as well as the particularities of temporary legal protection and the possibilities for an extrajudicial appeal against an administrative act are explained to the reader. The Author points out that administrative proceedings in Germany are, in a broad sense, any decision-making activit
APA, Harvard, Vancouver, ISO, and other styles
5

BloomBecker, J. J. Buck. "US computer security legislation H.R. 145: A step toward greater computer security?" Computer Law & Security Review 3, no. 5 (1988): 30–31. http://dx.doi.org/10.1016/0267-3649(88)90115-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zamakhin, A. L. "Object and Subject of Cri¬minal Offenses in the Field of Use of Electronic Computers, Systems and Computer Networks and Telecommunication Networks." Analytical and Comparative Jurisprudence, no. 6 (December 27, 2023): 576–81. http://dx.doi.org/10.24144/2788-6018.2023.06.101.

Full text
Abstract:
The article deals with the object and subject matter of computer criminal offenses. The purpose of the article is to study the object and subject matter of computer criminal offenses, to analyze the current state of legal regulation of computer criminal offenses, and to provide suggestions and comments to the legislation.
 It is proved that due to the development of scientific and technological progress at the end of the twentieth century, a new type of social relations in the field of computer information circulation emerged in the State, which were subsequently taken under the protectio
APA, Harvard, Vancouver, ISO, and other styles
7

Thorne, Clive D. "Copyright legislation." Computer Law & Security Review 3, no. 4 (1987): 12. http://dx.doi.org/10.1016/0267-3649(87)90053-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sterling, J. A. L. "Legislation update." Computer Law & Security Review 4, no. 1 (1988): 42–43. http://dx.doi.org/10.1016/0267-3649(88)90103-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sterling, J. A. L. "Copyright legislation." Computer Law & Security Review 3, no. 5 (1988): 2–9. http://dx.doi.org/10.1016/0267-3649(88)90106-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

López Jiménez, David, Patricia Vargas Portillo, and Eduardo Carlos Dittmar. "SAFEGUARDING PRIVACY IN SOCIAL NETWORKS." Law, State and Telecommunications Review 12, no. 1 (2020): 58–76. http://dx.doi.org/10.26512/lstr.v12i1.31238.

Full text
Abstract:
Purpose ”“ The purpose is to examine the degree of privacy protection in the social networking field. In this sense, we analyze the benefits of the self-regulation of the industry as a complement to the regulations.
 Methodology/approach/design ”“ We study the Spanish and the European regulations regarding personal data protection with respect to social networks.
 Findings ”“ The legislative regulations on this subject are insufficient due to their intrinsic limitations in the field. Therefore, we should encourage the approval of good legislation that complements and fills the gaps.&
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer networks, law and legislation"

1

Mik, Eliza. "Contract formation in open electronic networks." Phd thesis, Faculty of Law, 2007. http://hdl.handle.net/2123/4995.

Full text
Abstract:
Thesis (Ph. D.)--University of Sydney, 2007.<br>Title from title screen (viewed 28 May 2009) Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy to the Faculty of Law. Degree awarded 2007. Includes bibliography references. Also available in print format.
APA, Harvard, Vancouver, ISO, and other styles
2

Ital, Eric Guy. "Copyright law and the Internet : in modern South African law." Thesis, Stellenbosch : Stellenbosch University, 2000. http://hdl.handle.net/10019.1/51666.

Full text
Abstract:
Thesis (LLM)--University of Stellenbosch, 2000.<br>ENGLISH ABSTRACT: The Internet is coming more and more into focus of national and international legislation. Especially with regard to copyright law, the rapid growth of the Internet, its global character, its novel technical applications and its private and commercial use by millions of people makes the control over a work complicated and raises copyright problems all over the world. Present legislation is therefore challenged to avoid gaps in the law. Considering the rapid growth of online providers and users in South Africa, it is li
APA, Harvard, Vancouver, ISO, and other styles
3

Desai, Mohammed Reza. "An integrated approach for information security compliance in a financial services organisation." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2396.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2016.<br>The aim of this research is to identify and explore the factors affecting information security compliance of information security policies and regulations, in a financial services organisation. The organisation has to comply with information security regulations and legislations by righteousness of its operations in light of the fact that any wrong doing together with misuse of data, are continually expanding. Corporate embarrassments comes about due to rupture of security, results in expanded thoughtful
APA, Harvard, Vancouver, ISO, and other styles
4

O'Brien, N. D. "The liability of Internet service providers for unlawful content posted by third parties." Thesis, Nelson Mandela Metropolitan University, 2010. http://hdl.handle.net/10948/1149.

Full text
Abstract:
Internet Service Providers (ISP’s) are crucial to the operation and development of the Internet. However, through the performance of their basic functions, they faced the great risk of civil and criminal liability for unlawful content posted by third parties. As this risk threatened the potential of the Internet, various jurisdictions opted to promulgate legislation that granted ISP’s safe harbours from liability. The South African (RSA) response is Chapter XI of the Electronic Communications and Transactions Act (ECTA). The protection it provides is however not absolute. It is limited to ISP’
APA, Harvard, Vancouver, ISO, and other styles
5

Gottschalk, Jason Howard. "Towards an evaluation and protection strategy for critical infrastructure." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018793.

Full text
Abstract:
Critical Infrastructure is often overlooked from an Information Security perspective as being of high importance to protect which may result in Critical Infrastructure being at risk to Cyber related attacks with potential dire consequences. Furthermore, what is considered Critical Infrastructure is often a complex discussion, with varying opinions across audiences. Traditional Critical Infrastructure included power stations, water, sewage pump stations, gas pipe lines, power grids and a new entrant, the “internet of things”. This list is not complete and a constant challenge exists in identify
APA, Harvard, Vancouver, ISO, and other styles
6

Andre, Edward E. "Investigating information management weaknesses in a local government organisation: A critical hermeneutic ethnographic case study of internet documents from information warfare and legal perspective(s)." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2005. https://ro.ecu.edu.au/theses/633.

Full text
Abstract:
In this thesis I develop an approach to analyse and interpret internet documents belonging to a particular organisation in a State of Australia. My intention in the research is to find ways to protect a local government organisation from litigation and other threats due to weaknesses in information management on the internet. Based on Gadamer's (1985) approach to the interpretation of text discourse, this thesis is a critical hermeneutic ethnographic case study of one local government organisation investigating internet docunents from information warfare and legal perspective(s).
APA, Harvard, Vancouver, ISO, and other styles
7

孫陸陽. "暗網絡犯罪的刑法問題研究 =Research on criminal law of dark network crime". Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Harte, David. "Internet content control in Australia : data topology, topography and the data deficit." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2001. https://ro.ecu.edu.au/theses/1073.

Full text
Abstract:
The success of the online adult industry has provoked a public policy controversy over the need for internet censorship, and in recent times there has emerged desire to protect minors from possibly unsuitable content. On January 1st 2000, the Broadcasting Services Amendment (Online Services) Act (Cwlth, 1999) (BSA) was proclaimed. The Act purports to regulate and control Internet content in Australia. Operating in tandem with the Act is the Internet Industry Association Code of Practice, giving Australia a co-regulatory approach to Internet content control. The Australian Broadcasting Authorit
APA, Harvard, Vancouver, ISO, and other styles
9

Sundstrom, Linda-Marie. "Internet radio: Identifying administrative and regulatory gaps in a cyberspace world without borders." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2137.

Full text
Abstract:
The purpose of this paper is to identify gaps in regulatory policies resulting from the emergence of Internet radio. To accomplish this purpose, the paper seeks to: 1) provide insights into agencies that may have direct involvement in potentially regulating Internet radio; 2) explore the concepts of jurisdiction in cyberspace; and 3) address the regulatory challenges that exist when traditional country borders no longer apply.
APA, Harvard, Vancouver, ISO, and other styles
10

Spencer, Logan Lemuella C. "Changing from the silo model to the horizontal layers model in public policy regulations : the implications and potential for the telecommunications industry /." Thesis, Available online, Georgia Institute of Technology, 2005, 2005. http://etd.gatech.edu/theses/available/etd-11282005-192311/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer networks, law and legislation"

1

H, Smith Graham J., and Bird & Bird (Firm), eds. Internet law and regulation. 2nd ed. Sweet & Maxwell, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1950-, Dumortier Jos, ed. Cyber law. Kluwer Law International, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Grigello, Raymond S. Computer networks: Legal policies, programs and issues. Nova Science, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Spang-Hanssen, H. Stakemann. Public international computer network law issues. DJØF Pub., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

H, Chang Jesse T., Qu Philip, and Wan Isabelle I. H, eds. China's internet policy & legislation. TransAsia Pub., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Guadamuz, Andrés. Networks, complexity and internet regulation: Scale-free law. Edward Elgar, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Teubner, Gunther. Networks as connected contracts. Hart Pub., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

1957-, Matsuura Jeffrey H., ed. Law of the Internet. 3rd ed. Aspen Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1957-, Matsuura Jeffrey H., ed. Law of the Internet. Aspen Law & Business, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Imparl, Steven D. Internet law: The complete guide. Specialty Technical Publishers, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer networks, law and legislation"

1

Dreier, Thomas. "Projecting Images of Families into the Law—the Example of Internet-Related Cases Decided by the German Courts." In Families and New Media. Springer Fachmedien Wiesbaden, 2023. http://dx.doi.org/10.1007/978-3-658-39664-0_7.

Full text
Abstract:
AbstractFamily and Internet may appear to be an “unlikely combination,” since technology is generally considered to be neutral and thus not gender-related, even if a clear gender imbalance can be observed among computer science students and professionals who are largely male. From the point of view of the networked structures of the Internet, and hence from the point of view of Internet law, no fundamental distinction is made between family and non-family relationships and connections. Despite this, it may be worthwhile to search legislation and case law for existing rules and decisions that discuss issues of families and their members who use the Internet.
APA, Harvard, Vancouver, ISO, and other styles
2

Radoniewicz, Filip. "Cybercrime and Cyberterrorism in Polish Law." In Cybersecurity in Poland. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78551-2_24.

Full text
Abstract:
AbstractThe aim of the paper is to analyze the provisions criminalizing the phenomenon of “computer crimes” (“cybercrimes”) in the strict sense, i.e. acts in which a computer or network is the target of a crime (“a victim”). The paper consists of two parts—the main part in which analysis of articles 267-269c of the Penal Code of 1997 (Chapter XXXIII, entitled “Offenses against the protection of information”)—in which the Polish legislator defined these offenses—is carried out. The second part refers to the “cyberterrorist offense” which is an “ordinary” computer crime carried out with a “terrorist purpose”.
APA, Harvard, Vancouver, ISO, and other styles
3

Raj P. M., Krishna, Ankith Mohan, and K. G. Srinivasa. "Power Law." In Computer Communications and Networks. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96746-2_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

McNealy, Jasmine, and Angelyn Flowers. "Privacy Law and Regulation: Technologies, Implications, and Solutions." In Computer Communications and Networks. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-08470-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Walden, Ian. "Accessing Data in the Cloud: The Long Arm of the Law Enforcement Agent." In Computer Communications and Networks. Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4189-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Elsässer, Robert. "On Randomized Broadcasting in Power Law Networks." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11864219_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shen, Yilin, Nam P. Nguyen, and My T. Thai. "Exploiting the Robustness on Power-Law Networks." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22685-4_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Makarov, Valery, Vladimir Gaponenko, Boris Toropov, and Alexander Kupriyanov. "Theoretical and Applied Aspects of Orthogonal Coding in Computer Networks Technologies." In Big Data-driven World: Legislation Issues and Control Technologies. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01358-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Elsässer, Robert, and Adrian Ogierman. "Efficient Broadcasting in Random Power Law Networks." In Graph Theoretic Concepts in Computer Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16926-7_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tang, Mingdong, Jianxun Liu, and Guoqing Zhang. "Improved Compact Routing Schemes for Power-Law Networks." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24403-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer networks, law and legislation"

1

TROFIMOV, Egor, and Oleg METSKER. "Computer Techniques and Indicators in the Policy of Optimization of Legislation and Law Enforcement." In Proceedings of the International Conference Digital Age: Traditions, Modernity and Innovations (ICDATMI 2020). Atlantis Press, 2020. http://dx.doi.org/10.2991/assehr.k.201212.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Xin, Qiangwei, and Wei Zhang. "Research on Law of RSSI Fluctuation of Wireless Sensor Networks." In 2022 3rd International Conference on Computer Vision, Image and Deep Learning & International Conference on Computer Engineering and Applications (CVIDL & ICCEA). IEEE, 2022. http://dx.doi.org/10.1109/cvidliccea56201.2022.9825114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ghadge, Shilpa, Timothy Killingback, Bala Sundaram, and Duc A. Tran. "A Parsimonious Statistical Protocol for Generating Power-Law Networks." In 2009 Proceedings of 18th International Conference on Computer Communications and Networks - ICCCN 2009. IEEE, 2009. http://dx.doi.org/10.1109/icccn.2009.5235257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mandl, Peter, Pirmin Pezzei, David Veit, and Erich Leitgeb. "Selected health and law issues regarding mobile communications." In 2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2017. http://dx.doi.org/10.23919/softcom.2017.8115581.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shi, Yi, Canming Jiang, Y. Thomas Hou, and Sastry Kompella. "On Capacity Scaling Law of Cognitive Radio Ad Hoc Networks." In 2011 20th International Conference on Computer Communications and Networks - ICCCN 2011. IEEE, 2011. http://dx.doi.org/10.1109/icccn.2011.6006062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xingzhao, Peng, and Yao Hong. "Power-law-alterable SF networks' cascading invulnerability under intentional attack." In 2012 2nd International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2012. http://dx.doi.org/10.1109/iccsnt.2012.6525989.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ribeiro, Bruno, Prithwish Basu, and Don Towsley. "Multiple random walks to uncover short paths in power law networks." In IEEE INFOCOM 2012 - IEEE Conference on Computer Communications Workshops. IEEE, 2012. http://dx.doi.org/10.1109/infcomw.2012.6193500.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Puljiz, Z., and M. Mikuc. "A hierarchical approach to generating power law Internet-like topologies." In 2007 15th International Conference on Software, Telecommunications and Computer Networks. IEEE, 2007. http://dx.doi.org/10.1109/softcom.2007.4446097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kun Zhao, Zhendong Niu, Yumin Zhao, and Jun Yang. "Search with index replication in power-law like peer-to-peer networks." In 2010 2nd International Conference on Computer Engineering and Technology. IEEE, 2010. http://dx.doi.org/10.1109/iccet.2010.5485466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gumzej, Nina, and Drazen Dragicevic. "Cloud computing data protection aspects under Croatian and European union law." In 2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2014. http://dx.doi.org/10.1109/softcom.2014.7039084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!