Academic literature on the topic 'Computer networks, law and legislation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks, law and legislation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer networks, law and legislation"
Qin, Di, Zhaonan Mu, and Sijialu Yue. "The Value Orientation of Electronic Commerce Law Based on Computer Network." MATEC Web of Conferences 365 (2022): 01030. http://dx.doi.org/10.1051/matecconf/202236501030.
Full textWalden, Ian. "Harmonising Computer Crime Laws in Europe." European Journal of Crime, Criminal Law and Criminal Justice 12, no. 4 (2004): 321–36. http://dx.doi.org/10.1163/1571817042523095.
Full textZONTOVA, Daria. "Foreign experience in regulating criminal liability for interfering in the activities of judicial bodies and institutions of justice of Ukraine." Economics. Finances. Law 9/1, no. - (September 16, 2022): 23–26. http://dx.doi.org/10.37634/efp.2022.9(1).5.
Full textMaile, A. D. "Legislation on Administrative Procedures: The German Experience." Siberian Law Review 18, no. 2 (October 20, 2021): 204–15. http://dx.doi.org/10.19073/2658-7602-2021-18-2-204-215.
Full textBloomBecker, J. J. Buck. "US computer security legislation H.R. 145: A step toward greater computer security?" Computer Law & Security Review 3, no. 5 (January 1988): 30–31. http://dx.doi.org/10.1016/0267-3649(88)90115-x.
Full textZamakhin, A. L. "Object and Subject of Cri¬minal Offenses in the Field of Use of Electronic Computers, Systems and Computer Networks and Telecommunication Networks." Analytical and Comparative Jurisprudence, no. 6 (December 27, 2023): 576–81. http://dx.doi.org/10.24144/2788-6018.2023.06.101.
Full textThorne, Clive D. "Copyright legislation." Computer Law & Security Review 3, no. 4 (November 1987): 12. http://dx.doi.org/10.1016/0267-3649(87)90053-7.
Full textSterling, J. A. L. "Legislation update." Computer Law & Security Review 4, no. 1 (May 1988): 42–43. http://dx.doi.org/10.1016/0267-3649(88)90103-3.
Full textSterling, J. A. L. "Copyright legislation." Computer Law & Security Review 3, no. 5 (January 1988): 2–9. http://dx.doi.org/10.1016/0267-3649(88)90106-9.
Full textLópez Jiménez, David, Patricia Vargas Portillo, and Eduardo Carlos Dittmar. "SAFEGUARDING PRIVACY IN SOCIAL NETWORKS." Law, State and Telecommunications Review 12, no. 1 (April 21, 2020): 58–76. http://dx.doi.org/10.26512/lstr.v12i1.31238.
Full textDissertations / Theses on the topic "Computer networks, law and legislation"
Mik, Eliza. "Contract formation in open electronic networks." Phd thesis, Faculty of Law, 2007. http://hdl.handle.net/2123/4995.
Full textTitle from title screen (viewed 28 May 2009) Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy to the Faculty of Law. Degree awarded 2007. Includes bibliography references. Also available in print format.
Ital, Eric Guy. "Copyright law and the Internet : in modern South African law." Thesis, Stellenbosch : Stellenbosch University, 2000. http://hdl.handle.net/10019.1/51666.
Full textENGLISH ABSTRACT: The Internet is coming more and more into focus of national and international legislation. Especially with regard to copyright law, the rapid growth of the Internet, its global character, its novel technical applications and its private and commercial use by millions of people makes the control over a work complicated and raises copyright problems all over the world. Present legislation is therefore challenged to avoid gaps in the law. Considering the rapid growth of online providers and users in South Africa, it is likely that copyright disputes with regard to the Internet will evolve here soon. In this dissertation, the "world" of the Internet and its lawfulness with regard to existing South African copyright law will be examined. The examination tries to establish whether South African copyright law is able to cope with the present Internet problems and whether it leads to reasonable results. The first chapter of this dissertation will give an overview of the basic principles of the Internet, including the history, development and function of the Internet. Furthermore the changing aspects by means of diqital technology will be discussed. Because the global character of the Internet lead to "international" infringements, governments are considering the prospect of reaching international accord on the protection of intellectual property in the digital era. In chapter two, the present international harmonisation of copyright law will be introduced. Especially the quick adoption of the World Intellectual Property Organisation Treaties in December 1996 demonstrated that an international realisation for a call for action is existing. In chapter three, the application of South African copyright law with regard to the Internet will be discussed. First, it will be examined if a digital work on the Internet is protected in the same way as a "traditional" work. Second, the various rights of the copyright holder are discussed in connection with the use of a work on the Internet. Third, the potential application of the exclusive rights of the copyright holder to various actions on the Internet, such as caching, Web linking and operating an online service will be discussed. The Internet is a worldwide entity, and, as such, copyright infringement on this system is an international problem. The scenario of global, simultaneous exploitation of works on the Internet conflicts sharply with the current system of international copyright protection, which is firmly based on national copyright laws with territorial effects. Section four provides therefore an overview of the applicable law on an international net and analyses the necessity and borders of protection.
AFRIKAANSE OPSOMMING: Nasionale en internasionale wetgewing fokus in In toenemende mate op die Internet. Die versnelde groei van die Internet, sy wêreldkarakter, sy nuwe tegnologiese aanwendings en sy private en kommersiële gebruik deur miljoene mense maak beheer oor In werk baie gekompliseerd en skep veral outeursregprobleme regoor die wêreld. Wetgewing soos dit tans is, word dus uitgedaag om die leemtes in die reg te ondervang. Gegewe die vinnige groei van gekoppelde verskaffers en gebruikers in Suid-Afrika, is dit waarskynlik dat - outeursreggeskille met betrekking tot die Internet binnekort ook hier gaan ontwikkel. In hierdie verhandeling gaan die "wêreld" van die Internet en sy wettigheid onder bestaande Suid-Afrikaanse outeursregwetgewing ondersoek word. In die ondersoek word gepoog om vas te stelof Suid-Afrikaanse outeursregwetgewing geskik is om die Internetprobieme wat tans bestaan te hanteer en of dit lei tot aanvaarbare resultate. Die eerste hoofstuk van die verhandeling sal In oorsig gee van die basiese beginsels van die Internet, insluitende die geskiedenis, ontwikkeling en funksie van die Internet. Verder sal die veranderende aspekte as gevolg van digitale tegnologie bespreek word. Die wêreldkarakter van die Internet gee aanleiding tot "internasionale" inbreukmakings en om hierdie rede oorweeg regerings die moontlikheid van internasionale ooreenkomste oor die beskerming van intellektuele eiendom in die digitale era. In hoofstuk twee word die bestaande internasionale harmonisering van outeursreg bespreek. Veral die vinnige aanname van die World Intellectual Property Organisation se verdrae in Desember 1996, illustreer dat daar In internasionale bewustheid is dat iets in die verband gedoen moet word. In die derde hoofstuk word die aanwending van die Suid-Afrikaanse outeursreg met betrekking tot die Internet bespreek. Eerstens word ondersoek of a digitale werk op die Internet op dieselfde wyse as 'n "tradisionele" werk beskerm kan word. Tweedens word die verskillende regte van die outeursreghebbende in verband met die gebruik van 'n werk op die Internet, bespreek. Derdens word die potensiële aanwending van die eksklusiewe regte van die outeursreghebbende op verskillende aksies op die Internet, soos byvoorbeeld kasberging, web koppeling en die werking van 'n gekoppelde diens, bespreek. Die Internet is 'n wêreldwye verskynsel en sodanig is outeursreginbreukmaking op hierdie stelsel 'n internasionale probleem. Die scenario van 'n wêreldwye, gelyktydige uitbuiting van werke op die Internet is in skerp konflik met die huidige stelsel van internasionale outeursregbeskerming wat stewig gegrond is op nasionale wetgewing met territoriale werking. Hoofstuk vier bied daarom 'n oorsig oor die toepaslike reg op 'n internasionale netwerk en analiseer die nodigheid en ook grense van beskerming.
Desai, Mohammed Reza. "An integrated approach for information security compliance in a financial services organisation." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2396.
Full textThe aim of this research is to identify and explore the factors affecting information security compliance of information security policies and regulations, in a financial services organisation. The organisation has to comply with information security regulations and legislations by righteousness of its operations in light of the fact that any wrong doing together with misuse of data, are continually expanding. Corporate embarrassments comes about due to rupture of security, results in expanded thoughtfulness regarding corporate consistency. Legislature and policies have been set up to counter information security issues. This legislature and policies are not adequately addressing the compliance issues that arise, but are needed within organisations. Compliance targets are not met due to inconsistent guidelines that turns out to be significant in diminishing the financial position, reputation and security of information. This research further aims to explore whether employees comply with laws and regulations regarding information in an organisation. This is done in order to confirm whether governance and human factors play any significant part in compliance. The research is an exploratory study and specifically analyses the governance function and which stakeholders influence its operations in information compliance. The research investigates certain questions on organisational culture and the human factor, do influence employee’s compliance to laws and regulations. The objectives of the research are to investigate which factors, and how such factors influence compliance of information security policies and compliance with the goal of designing an integrated framework to assist in counteracting these findings. The research is underpinned by the Neo-institutional theory, Agency Theory and Rational choice theory. The Denison organisational cultural model and a framework proposed by von Solms are used as lenses to interpret the data of the research.
O'Brien, N. D. "The liability of Internet service providers for unlawful content posted by third parties." Thesis, Nelson Mandela Metropolitan University, 2010. http://hdl.handle.net/10948/1149.
Full textGottschalk, Jason Howard. "Towards an evaluation and protection strategy for critical infrastructure." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018793.
Full textAndre, Edward E. "Investigating information management weaknesses in a local government organisation: A critical hermeneutic ethnographic case study of internet documents from information warfare and legal perspective(s)." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2005. https://ro.ecu.edu.au/theses/633.
Full text孫陸陽. "暗網絡犯罪的刑法問題研究 =Research on criminal law of dark network crime." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950654.
Full textHarte, David. "Internet content control in Australia : data topology, topography and the data deficit." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2001. https://ro.ecu.edu.au/theses/1073.
Full textSundstrom, Linda-Marie. "Internet radio: Identifying administrative and regulatory gaps in a cyberspace world without borders." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2137.
Full textSpencer, Logan Lemuella C. "Changing from the silo model to the horizontal layers model in public policy regulations : the implications and potential for the telecommunications industry /." Thesis, Available online, Georgia Institute of Technology, 2005, 2005. http://etd.gatech.edu/theses/available/etd-11282005-192311/.
Full textBooks on the topic "Computer networks, law and legislation"
H, Smith Graham J., and Bird & Bird (Firm), eds. Internet law and regulation. 2nd ed. London: Sweet & Maxwell, 1999.
Find full textGrigello, Raymond S. Computer networks: Legal policies, programs and issues. Hauppauge, N.Y: Nova Science, 2011.
Find full textSpang-Hanssen, H. Stakemann. Public international computer network law issues. Copenhagen, Denmark: DJØF Pub., 2006.
Find full textH, Chang Jesse T., Qu Philip, and Wan Isabelle I. H, eds. China's internet policy & legislation. Hong Kong: TransAsia Pub., 1999.
Find full textGuadamuz, Andrés. Networks, complexity and internet regulation: Scale-free law. Cheltenham, UK: Edward Elgar, 2011.
Find full textTeubner, Gunther. Networks as connected contracts. Oxford, [England]: Hart Pub., 2011.
Find full text1957-, Matsuura Jeffrey H., ed. Law of the Internet. 3rd ed. Frederick, MD: Aspen Publishers, 2009.
Find full text1957-, Matsuura Jeffrey H., ed. Law of the Internet. New York: Aspen Law & Business, 1998.
Find full textImparl, Steven D. Internet law: The complete guide. North Vancouver, B.C., Canada: Specialty Technical Publishers, 1998.
Find full textBook chapters on the topic "Computer networks, law and legislation"
Dreier, Thomas. "Projecting Images of Families into the Law—the Example of Internet-Related Cases Decided by the German Courts." In Families and New Media, 151–72. Wiesbaden: Springer Fachmedien Wiesbaden, 2023. http://dx.doi.org/10.1007/978-3-658-39664-0_7.
Full textRadoniewicz, Filip. "Cybercrime and Cyberterrorism in Polish Law." In Cybersecurity in Poland, 405–18. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78551-2_24.
Full textRaj P. M., Krishna, Ankith Mohan, and K. G. Srinivasa. "Power Law." In Computer Communications and Networks, 203–32. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96746-2_11.
Full textMcNealy, Jasmine, and Angelyn Flowers. "Privacy Law and Regulation: Technologies, Implications, and Solutions." In Computer Communications and Networks, 189–205. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-08470-1_9.
Full textWalden, Ian. "Accessing Data in the Cloud: The Long Arm of the Law Enforcement Agent." In Computer Communications and Networks, 45–71. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4189-1_2.
Full textElsässer, Robert. "On Randomized Broadcasting in Power Law Networks." In Lecture Notes in Computer Science, 370–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11864219_26.
Full textShen, Yilin, Nam P. Nguyen, and My T. Thai. "Exploiting the Robustness on Power-Law Networks." In Lecture Notes in Computer Science, 379–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22685-4_34.
Full textMakarov, Valery, Vladimir Gaponenko, Boris Toropov, and Alexander Kupriyanov. "Theoretical and Applied Aspects of Orthogonal Coding in Computer Networks Technologies." In Big Data-driven World: Legislation Issues and Control Technologies, 47–58. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01358-5_5.
Full textElsässer, Robert, and Adrian Ogierman. "Efficient Broadcasting in Random Power Law Networks." In Graph Theoretic Concepts in Computer Science, 279–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16926-7_26.
Full textTang, Mingdong, Jianxun Liu, and Guoqing Zhang. "Improved Compact Routing Schemes for Power-Law Networks." In Lecture Notes in Computer Science, 44–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24403-2_4.
Full textConference papers on the topic "Computer networks, law and legislation"
TROFIMOV, Egor, and Oleg METSKER. "Computer Techniques and Indicators in the Policy of Optimization of Legislation and Law Enforcement." In Proceedings of the International Conference Digital Age: Traditions, Modernity and Innovations (ICDATMI 2020). Paris, France: Atlantis Press, 2020. http://dx.doi.org/10.2991/assehr.k.201212.012.
Full textXin, Qiangwei, and Wei Zhang. "Research on Law of RSSI Fluctuation of Wireless Sensor Networks." In 2022 3rd International Conference on Computer Vision, Image and Deep Learning & International Conference on Computer Engineering and Applications (CVIDL & ICCEA). IEEE, 2022. http://dx.doi.org/10.1109/cvidliccea56201.2022.9825114.
Full textGhadge, Shilpa, Timothy Killingback, Bala Sundaram, and Duc A. Tran. "A Parsimonious Statistical Protocol for Generating Power-Law Networks." In 2009 Proceedings of 18th International Conference on Computer Communications and Networks - ICCCN 2009. IEEE, 2009. http://dx.doi.org/10.1109/icccn.2009.5235257.
Full textMandl, Peter, Pirmin Pezzei, David Veit, and Erich Leitgeb. "Selected health and law issues regarding mobile communications." In 2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2017. http://dx.doi.org/10.23919/softcom.2017.8115581.
Full textShi, Yi, Canming Jiang, Y. Thomas Hou, and Sastry Kompella. "On Capacity Scaling Law of Cognitive Radio Ad Hoc Networks." In 2011 20th International Conference on Computer Communications and Networks - ICCCN 2011. IEEE, 2011. http://dx.doi.org/10.1109/icccn.2011.6006062.
Full textXingzhao, Peng, and Yao Hong. "Power-law-alterable SF networks' cascading invulnerability under intentional attack." In 2012 2nd International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2012. http://dx.doi.org/10.1109/iccsnt.2012.6525989.
Full textRibeiro, Bruno, Prithwish Basu, and Don Towsley. "Multiple random walks to uncover short paths in power law networks." In IEEE INFOCOM 2012 - IEEE Conference on Computer Communications Workshops. IEEE, 2012. http://dx.doi.org/10.1109/infcomw.2012.6193500.
Full textPuljiz, Z., and M. Mikuc. "A hierarchical approach to generating power law Internet-like topologies." In 2007 15th International Conference on Software, Telecommunications and Computer Networks. IEEE, 2007. http://dx.doi.org/10.1109/softcom.2007.4446097.
Full textKun Zhao, Zhendong Niu, Yumin Zhao, and Jun Yang. "Search with index replication in power-law like peer-to-peer networks." In 2010 2nd International Conference on Computer Engineering and Technology. IEEE, 2010. http://dx.doi.org/10.1109/iccet.2010.5485466.
Full textGumzej, Nina, and Drazen Dragicevic. "Cloud computing data protection aspects under Croatian and European union law." In 2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2014. http://dx.doi.org/10.1109/softcom.2014.7039084.
Full text