Academic literature on the topic 'Computer networks, law and legislation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks, law and legislation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer networks, law and legislation"
Qin, Di, Zhaonan Mu, and Sijialu Yue. "The Value Orientation of Electronic Commerce Law Based on Computer Network." MATEC Web of Conferences 365 (2022): 01030. http://dx.doi.org/10.1051/matecconf/202236501030.
Full textWalden, Ian. "Harmonising Computer Crime Laws in Europe." European Journal of Crime, Criminal Law and Criminal Justice 12, no. 4 (2004): 321–36. http://dx.doi.org/10.1163/1571817042523095.
Full textZONTOVA, Daria. "Foreign experience in regulating criminal liability for interfering in the activities of judicial bodies and institutions of justice of Ukraine." Economics. Finances. Law 9/1, no. - (2022): 23–26. http://dx.doi.org/10.37634/efp.2022.9(1).5.
Full textMaile, A. D. "Legislation on Administrative Procedures: The German Experience." Siberian Law Review 18, no. 2 (2021): 204–15. http://dx.doi.org/10.19073/2658-7602-2021-18-2-204-215.
Full textBloomBecker, J. J. Buck. "US computer security legislation H.R. 145: A step toward greater computer security?" Computer Law & Security Review 3, no. 5 (1988): 30–31. http://dx.doi.org/10.1016/0267-3649(88)90115-x.
Full textZamakhin, A. L. "Object and Subject of Cri¬minal Offenses in the Field of Use of Electronic Computers, Systems and Computer Networks and Telecommunication Networks." Analytical and Comparative Jurisprudence, no. 6 (December 27, 2023): 576–81. http://dx.doi.org/10.24144/2788-6018.2023.06.101.
Full textThorne, Clive D. "Copyright legislation." Computer Law & Security Review 3, no. 4 (1987): 12. http://dx.doi.org/10.1016/0267-3649(87)90053-7.
Full textSterling, J. A. L. "Legislation update." Computer Law & Security Review 4, no. 1 (1988): 42–43. http://dx.doi.org/10.1016/0267-3649(88)90103-3.
Full textSterling, J. A. L. "Copyright legislation." Computer Law & Security Review 3, no. 5 (1988): 2–9. http://dx.doi.org/10.1016/0267-3649(88)90106-9.
Full textLópez Jiménez, David, Patricia Vargas Portillo, and Eduardo Carlos Dittmar. "SAFEGUARDING PRIVACY IN SOCIAL NETWORKS." Law, State and Telecommunications Review 12, no. 1 (2020): 58–76. http://dx.doi.org/10.26512/lstr.v12i1.31238.
Full textDissertations / Theses on the topic "Computer networks, law and legislation"
Mik, Eliza. "Contract formation in open electronic networks." Phd thesis, Faculty of Law, 2007. http://hdl.handle.net/2123/4995.
Full textItal, Eric Guy. "Copyright law and the Internet : in modern South African law." Thesis, Stellenbosch : Stellenbosch University, 2000. http://hdl.handle.net/10019.1/51666.
Full textDesai, Mohammed Reza. "An integrated approach for information security compliance in a financial services organisation." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2396.
Full textO'Brien, N. D. "The liability of Internet service providers for unlawful content posted by third parties." Thesis, Nelson Mandela Metropolitan University, 2010. http://hdl.handle.net/10948/1149.
Full textGottschalk, Jason Howard. "Towards an evaluation and protection strategy for critical infrastructure." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018793.
Full textAndre, Edward E. "Investigating information management weaknesses in a local government organisation: A critical hermeneutic ethnographic case study of internet documents from information warfare and legal perspective(s)." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2005. https://ro.ecu.edu.au/theses/633.
Full text孫陸陽. "暗網絡犯罪的刑法問題研究 =Research on criminal law of dark network crime". Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950654.
Full textHarte, David. "Internet content control in Australia : data topology, topography and the data deficit." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2001. https://ro.ecu.edu.au/theses/1073.
Full textSundstrom, Linda-Marie. "Internet radio: Identifying administrative and regulatory gaps in a cyberspace world without borders." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2137.
Full textSpencer, Logan Lemuella C. "Changing from the silo model to the horizontal layers model in public policy regulations : the implications and potential for the telecommunications industry /." Thesis, Available online, Georgia Institute of Technology, 2005, 2005. http://etd.gatech.edu/theses/available/etd-11282005-192311/.
Full textBooks on the topic "Computer networks, law and legislation"
H, Smith Graham J., and Bird & Bird (Firm), eds. Internet law and regulation. 2nd ed. Sweet & Maxwell, 1999.
Find full textGrigello, Raymond S. Computer networks: Legal policies, programs and issues. Nova Science, 2011.
Find full textSpang-Hanssen, H. Stakemann. Public international computer network law issues. DJØF Pub., 2006.
Find full textH, Chang Jesse T., Qu Philip, and Wan Isabelle I. H, eds. China's internet policy & legislation. TransAsia Pub., 1999.
Find full textGuadamuz, Andrés. Networks, complexity and internet regulation: Scale-free law. Edward Elgar, 2011.
Find full text1957-, Matsuura Jeffrey H., ed. Law of the Internet. 3rd ed. Aspen Publishers, 2009.
Find full textImparl, Steven D. Internet law: The complete guide. Specialty Technical Publishers, 1998.
Find full textBook chapters on the topic "Computer networks, law and legislation"
Dreier, Thomas. "Projecting Images of Families into the Law—the Example of Internet-Related Cases Decided by the German Courts." In Families and New Media. Springer Fachmedien Wiesbaden, 2023. http://dx.doi.org/10.1007/978-3-658-39664-0_7.
Full textRadoniewicz, Filip. "Cybercrime and Cyberterrorism in Polish Law." In Cybersecurity in Poland. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78551-2_24.
Full textRaj P. M., Krishna, Ankith Mohan, and K. G. Srinivasa. "Power Law." In Computer Communications and Networks. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96746-2_11.
Full textMcNealy, Jasmine, and Angelyn Flowers. "Privacy Law and Regulation: Technologies, Implications, and Solutions." In Computer Communications and Networks. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-08470-1_9.
Full textWalden, Ian. "Accessing Data in the Cloud: The Long Arm of the Law Enforcement Agent." In Computer Communications and Networks. Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4189-1_2.
Full textElsässer, Robert. "On Randomized Broadcasting in Power Law Networks." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11864219_26.
Full textShen, Yilin, Nam P. Nguyen, and My T. Thai. "Exploiting the Robustness on Power-Law Networks." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22685-4_34.
Full textMakarov, Valery, Vladimir Gaponenko, Boris Toropov, and Alexander Kupriyanov. "Theoretical and Applied Aspects of Orthogonal Coding in Computer Networks Technologies." In Big Data-driven World: Legislation Issues and Control Technologies. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01358-5_5.
Full textElsässer, Robert, and Adrian Ogierman. "Efficient Broadcasting in Random Power Law Networks." In Graph Theoretic Concepts in Computer Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16926-7_26.
Full textTang, Mingdong, Jianxun Liu, and Guoqing Zhang. "Improved Compact Routing Schemes for Power-Law Networks." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24403-2_4.
Full textConference papers on the topic "Computer networks, law and legislation"
TROFIMOV, Egor, and Oleg METSKER. "Computer Techniques and Indicators in the Policy of Optimization of Legislation and Law Enforcement." In Proceedings of the International Conference Digital Age: Traditions, Modernity and Innovations (ICDATMI 2020). Atlantis Press, 2020. http://dx.doi.org/10.2991/assehr.k.201212.012.
Full textXin, Qiangwei, and Wei Zhang. "Research on Law of RSSI Fluctuation of Wireless Sensor Networks." In 2022 3rd International Conference on Computer Vision, Image and Deep Learning & International Conference on Computer Engineering and Applications (CVIDL & ICCEA). IEEE, 2022. http://dx.doi.org/10.1109/cvidliccea56201.2022.9825114.
Full textGhadge, Shilpa, Timothy Killingback, Bala Sundaram, and Duc A. Tran. "A Parsimonious Statistical Protocol for Generating Power-Law Networks." In 2009 Proceedings of 18th International Conference on Computer Communications and Networks - ICCCN 2009. IEEE, 2009. http://dx.doi.org/10.1109/icccn.2009.5235257.
Full textMandl, Peter, Pirmin Pezzei, David Veit, and Erich Leitgeb. "Selected health and law issues regarding mobile communications." In 2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2017. http://dx.doi.org/10.23919/softcom.2017.8115581.
Full textShi, Yi, Canming Jiang, Y. Thomas Hou, and Sastry Kompella. "On Capacity Scaling Law of Cognitive Radio Ad Hoc Networks." In 2011 20th International Conference on Computer Communications and Networks - ICCCN 2011. IEEE, 2011. http://dx.doi.org/10.1109/icccn.2011.6006062.
Full textXingzhao, Peng, and Yao Hong. "Power-law-alterable SF networks' cascading invulnerability under intentional attack." In 2012 2nd International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2012. http://dx.doi.org/10.1109/iccsnt.2012.6525989.
Full textRibeiro, Bruno, Prithwish Basu, and Don Towsley. "Multiple random walks to uncover short paths in power law networks." In IEEE INFOCOM 2012 - IEEE Conference on Computer Communications Workshops. IEEE, 2012. http://dx.doi.org/10.1109/infcomw.2012.6193500.
Full textPuljiz, Z., and M. Mikuc. "A hierarchical approach to generating power law Internet-like topologies." In 2007 15th International Conference on Software, Telecommunications and Computer Networks. IEEE, 2007. http://dx.doi.org/10.1109/softcom.2007.4446097.
Full textKun Zhao, Zhendong Niu, Yumin Zhao, and Jun Yang. "Search with index replication in power-law like peer-to-peer networks." In 2010 2nd International Conference on Computer Engineering and Technology. IEEE, 2010. http://dx.doi.org/10.1109/iccet.2010.5485466.
Full textGumzej, Nina, and Drazen Dragicevic. "Cloud computing data protection aspects under Croatian and European union law." In 2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2014. http://dx.doi.org/10.1109/softcom.2014.7039084.
Full text