Dissertations / Theses on the topic 'Computer networks, law and legislation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Computer networks, law and legislation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Mik, Eliza. "Contract formation in open electronic networks." Phd thesis, Faculty of Law, 2007. http://hdl.handle.net/2123/4995.
Full textItal, Eric Guy. "Copyright law and the Internet : in modern South African law." Thesis, Stellenbosch : Stellenbosch University, 2000. http://hdl.handle.net/10019.1/51666.
Full textDesai, Mohammed Reza. "An integrated approach for information security compliance in a financial services organisation." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2396.
Full textO'Brien, N. D. "The liability of Internet service providers for unlawful content posted by third parties." Thesis, Nelson Mandela Metropolitan University, 2010. http://hdl.handle.net/10948/1149.
Full textGottschalk, Jason Howard. "Towards an evaluation and protection strategy for critical infrastructure." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018793.
Full textAndre, Edward E. "Investigating information management weaknesses in a local government organisation: A critical hermeneutic ethnographic case study of internet documents from information warfare and legal perspective(s)." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2005. https://ro.ecu.edu.au/theses/633.
Full text孫陸陽. "暗網絡犯罪的刑法問題研究 =Research on criminal law of dark network crime". Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950654.
Full textHarte, David. "Internet content control in Australia : data topology, topography and the data deficit." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2001. https://ro.ecu.edu.au/theses/1073.
Full textSundstrom, Linda-Marie. "Internet radio: Identifying administrative and regulatory gaps in a cyberspace world without borders." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2137.
Full textSpencer, Logan Lemuella C. "Changing from the silo model to the horizontal layers model in public policy regulations : the implications and potential for the telecommunications industry /." Thesis, Available online, Georgia Institute of Technology, 2005, 2005. http://etd.gatech.edu/theses/available/etd-11282005-192311/.
Full textWeinstein, Lee. "Scale free networks and their power law distribution." Diss., Connect to the thesis, 2005. http://hdl.handle.net/10066/3880.
Full textTemur, Nuri. "Computer Crime as a Barrier to Electronic Commerce: New Solutions for Public Law Enforcement." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3171/.
Full textMabeka, Nombulelo Queen. "When does the conduct of an employer infringe on an employee's constitutional right to privacy when intercepting or monitoring electronic communications?" Thesis, University of the Western Cape, 2008. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_5883_1253850534.
Full textFrantz, Courtney Siler. "An electronic storage and access system for special education legislation." W&M ScholarWorks, 1995. https://scholarworks.wm.edu/etd/1539618425.
Full textCorradi, Marco Claudio. "A law and economics analysis of corporate opportunities doctrines from a comparative perspective." Thesis, University of Oxford, 2015. http://ora.ox.ac.uk/objects/uuid:f9469cef-a68f-4657-8275-d0eefb005faf.
Full textLundström, Justus, Jonas Widriksson, and Viktor Zaunders. "Changes in media consumption and file sharing : The impact of legislation and new digital media services." Thesis, Jönköping University, JIBS, Business Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-12534.
Full textKarjiker, Sadulla. "Open-source software and the rationale for copyright protection of computer programs." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/80044.
Full textBac, Joanna Ewa. "Software intelligence (SI), dependent legal personhood & SI-human amalgamation : an evolutionary step for US patent law and SI." Thesis, University of Aberdeen, 2018. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=237873.
Full textSteh, Stephen R. "Unauthorized Access Crimes." Youngstown State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.
Full textNichols, Kenneth Nolan. "Technical-legal aspects of software patents." CSUSB ScholarWorks, 1996. https://scholarworks.lib.csusb.edu/etd-project/1249.
Full textQutieshat, Enas M. "Traditional contract law in the electronic environment : evolution or revolution?" Thesis, University of Aberdeen, 2010. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=158831.
Full textUpton, Oren K. "Asserting national sovereignty in cyberspace : the case for Internet border inspection." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FUpton.pdf.
Full textFunk, Antje Elisabeth Margarete. "Criminal liability of Internet providers in Germany and other jurisdictions." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/70134.
Full textHodge, Dominic Shaughn. "The income tax consequences of the in-house development of software." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1013550.
Full textHUANG, YANMU. "TRAFFIC EFFECT OF BROADCAST ON LARGE PEER-TO-PEER NETWORKS-A CASE STUDY OF THE GNUTELLA." University of Cincinnati / OhioLINK, 2002. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1012927157.
Full textSaganich, Robert Lee. "An investigation of electronic Protected Health Information (e-PHI) privacy policy legislation in California for seniors using in-home health monitoring systems." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1075.
Full textScharneck, Justin William. "A framework for the governance of social media in the workplace." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1020180.
Full textMostert, Charl. "The benefits of contractual causes in mitigating project failures using business system projects." Thesis, Cape Peninsula University of Technology, 2014. http://hdl.handle.net/20.500.11838/1778.
Full textStevens, Irena. "Policy implications of municipal investment in Georgia's wireline broadband networks." Thesis, Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/49081.
Full textSchlenkrich, Lara. "An investigation of social computing." Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1006194.
Full textBasilio, Bernardo I. "Knowledge-based classification scheme for regulating the flow of hazardous materials through tunnels." Thesis, Virginia Polytechnic Institute and State University, 1987. http://hdl.handle.net/10919/91097.
Full textBalan, Júnior Osvaldo [UNESP]. "O estabelecimento virtual na sociedade técnica: a necessária busca de segurança jurídica nas transações comerciais." Universidade Estadual Paulista (UNESP), 2011. http://hdl.handle.net/11449/98930.
Full textBalan, Júnior Osvaldo. "O estabelecimento virtual na sociedade técnica : a necessária busca de segurança jurídica nas transações comerciais /." Franca : [s.n.], 2011. http://hdl.handle.net/11449/98930.
Full text劉漢傑. "電腦犯罪若干問題研究 =Research into the some question of computer crime". Thesis, University of Macau, 2016. http://umaclib3.umac.mo/record=b3570914.
Full textJeppson, Jonas. "The OECD cryptography policy guidelines and their implementation /." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=31164.
Full textHargreaves, C. J. "Assessing the Reliability of Digital Evidence from Live Investigations Involving Encryption." Thesis, Department of Informatics and Sensors, 2009. http://hdl.handle.net/1826/4007.
Full textHargreaves, Christopher James. "Assessing the reliability of digital evidence from live investigations involving encryption." Thesis, Cranfield University, 2009. http://dspace.lib.cranfield.ac.uk/handle/1826/4007.
Full textLouw, Sanelda. "Die belastingaftrekbaarheid van sagteware." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/20434.
Full textAsubiaro, Omowumi Modupe. "www.crimesagainstchildren.com : addressing child pornography via the Internet in Africa." Thesis, University of the Western Cape, 2004. http://etd.uwc.ac.za/index.php?module=etd&.
Full textIacovino, Livia. "Recordkeeping, ethics and law : regulatory models, participant relationships and rights and responsibilities in the online world /." Dordrecht : Springer, 2006. http://www.gbv.de/dms/spk/sbb/recht/toc/511999585.pdf.
Full textHomem, Irvin. "LEIA: The Live Evidence Information Aggregator : A Scalable Distributed Hypervisor‐based Peer‐2‐Peer Aggregator of Information for Cyber‐Law Enforcement I." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177902.
Full textSouza, Ricardo Vieira de. "O ciberespaço e a jurisdição transnacional: necessidade de regulação." Pontifícia Universidade Católica de São Paulo, 2018. https://tede2.pucsp.br/handle/handle/21438.
Full textBreindl, Yana. "Hacking the law: an analysis of internet-based campaigning on digital rights in the European Union." Doctoral thesis, Universite Libre de Bruxelles, 2011. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/209836.
Full textGuimarães, Lourenço da Rocha. "Previsão de inadimplência e redes neurais artificiais." Universidade do Estado do Rio de Janeiro, 2006. http://www.bdtd.uerj.br/tde_busca/arquivo.php?codArquivo=383.
Full textPeterson, Sarahfina Aubrey. "The Effect of Social Media on Public Awareness and Extra-Judicial Effects: The Gay Marriage Cases and Litigating for New Rights." PDXScholar, 2014. https://pdxscholar.library.pdx.edu/open_access_etds/2086.
Full textDostál, Otto. "Právní aspekty boje proti počítačové trestné činnosti." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-433079.
Full textJunior, Nilton Alves. "Caracterização de redes complexas: aplicação à modelagem relacional entre sistemas autônomos da Internet." Universidade do Estado do Rio de Janeiro, 2007. http://www.bdtd.uerj.br/tde_busca/arquivo.php?codArquivo=607.
Full text蔣東霖. "P2P 網絡借貸的法律風險與規制 =Legal risk and regulation of P2P lending". Thesis, University of Macau, 2016. http://umaclib3.umac.mo/record=b3570019.
Full textLenormand, Maxime. "Initialiser et calibrer un modèle de microsimulation dynamique stochastique : application au modèle SimVillages." Phd thesis, Université Blaise Pascal - Clermont-Ferrand II, 2012. http://tel.archives-ouvertes.fr/tel-00822114.
Full textJamalkhan, Nasserkhan. "What is the impact of the Cyber Crime Act on the business community in Mauritius." Thesis, 2004. http://hdl.handle.net/10413/1503.
Full text