Journal articles on the topic 'Computer software / Law and legislation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer software / Law and legislation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Suslina, Irina, and Valeriya Tarasova. "Law Protection of Computer Programs in the State of Israel." Tirosh. Jewish, Slavic & Oriental Studies 18 (2018): 206–18. http://dx.doi.org/10.31168/2658-3380.2018.18.4.2.
Full textLeonov, Borys, and Valerii Serohin. "Issues of Legal and Expert Support of Law Enforcement Activities in the Field of Cybercrime Counteraction." Information Security of the Person, Society and State, no. 27 (2019): 6–15. http://dx.doi.org/10.51369/2707-7276-2019-3-1.
Full textBorking, John. "Software copyright part II: The new German legislation." Computer Law & Security Review 2, no. 2 (July 1986): 6. http://dx.doi.org/10.1016/0267-3649(86)90060-9.
Full textAryamov, A. A., and Yu V. Gracheva. "DIGITALIZATION: CRIMINAL LAW RISKS IN THE ECONOMY." Actual Problems of Russian Law, no. 6 (July 18, 2019): 108–16. http://dx.doi.org/10.17803/1994-1471.2019.103.6.108-116.
Full textAkhtar, Zia. "Digital Technology, Internet Research and Benefits of a Virtual Library." International Journal of Legal Information 48, no. 3 (2020): 110–21. http://dx.doi.org/10.1017/jli.2020.30.
Full textMilash, V. S. "OBJECTS OF INTERNET LEGAL RELATIONS IN CONDITIONS DIGITALIZATION OF ECONOMY." Economics and Law, no. 2 (September 9, 2021): 16–24. http://dx.doi.org/10.15407/econlaw.2021.02.016.
Full textDolganin, A. A. "Software Distribution in E-Form: the Problem of Choosing a Contractual Model." Lex Russica, no. 1 (January 19, 2021): 9–17. http://dx.doi.org/10.17803/1729-5920.2021.170.1.009-017.
Full textZerov, Konstiantyn. "Copyright protection for computer programs." Theory and Practice of Intellectual Property, no. 6 (June 16, 2021): 5–14. http://dx.doi.org/10.33731/62020.233854.
Full textKlynina, Tetiana. "Rogers Act 1924: establishment of a professional USA Foreign Service." American History & Politics Scientific edition, no. 10 (2020): 35–42. http://dx.doi.org/10.17721/2521-1706.2020.10.3.
Full textShine Thompson, Mary, and Ann-Katrin Lena Svaerd. "Unintended consequences of special-needs law in Ireland and Sweden." Kybernetes 48, no. 2 (February 4, 2019): 333–47. http://dx.doi.org/10.1108/k-06-2018-0307.
Full textKulynych, Pavlo. "Digitalization of land relations and law in Ukraine: methodological and theoretical aspects." Yearly journal of scientific articles “Pravova derzhava”, no. 32 (2021): 257–67. http://dx.doi.org/10.33663/0869-2491-2021-32-257-267.
Full textGilmanov, Eduard, and Danila Kirpichnikov. "On the need to develop a methodology for investigating crimes in the field of digital information circulation." Current Issues of the State and Law, no. 14 (2020): 262–77. http://dx.doi.org/10.20310/2587-9340-2020-4-14-262-277.
Full textRomaniv, Khrystyna. "Information and communication technologies as a means to increase the professional skills of law students." Law and innovations, no. 4 (32) (December 15, 2020): 55–61. http://dx.doi.org/10.37772/2518-1718-2020-4(32)-8.
Full textRomaniv, Khrystyna. "Information and communication technologies as a means to increase the professional skills of law students." Law and innovations, no. 4 (32) (December 15, 2020): 55–61. http://dx.doi.org/10.37772/2518-1718-2020-4(32)-8.
Full textДашковская, Ольга, Olga Dashkovskaya, Инна Мельникова, and Inna Melnikova. "The use of legal-reference systems for professional training in tourism." Services in Russia and abroad 10, no. 2 (June 16, 2016): 205–14. http://dx.doi.org/10.12737/19734.
Full textKlymenko, Nina. "THEORY OF FORENSIC EXPERTOLOGY IN THE SYSTEM OF LAW." Criminalistics and Forensics, no. 64 (May 7, 2019): 48–57. http://dx.doi.org/10.33994/kndise.2019.64.02.
Full textRusnak, Ivan, and Marina Vasylyk. "Modern Technological Approaches in English Teaching of Future Teachers-Philologists at Ukrainian Universities." Studia Gdańskie. Wizje i rzeczywistość XVII (May 1, 2021): 253–65. http://dx.doi.org/10.5604/01.3001.0014.9109.
Full textRay, Argha, and Anjali Kaushik. "State transgression on electronic expression: is it for real?" Information & Computer Security 25, no. 4 (October 9, 2017): 382–401. http://dx.doi.org/10.1108/ics-03-2016-0024.
Full textOlaya, Camilo, Juliana Gomez-Quintero, and Andrea Catalina Navarrete. "Crime and punishment as a social system: the case of prison overcrowding." Kybernetes 47, no. 2 (February 5, 2018): 369–91. http://dx.doi.org/10.1108/k-05-2017-0190.
Full textBlume, Peter. "Computer crime legislation in Denmark." International Review of Law, Computers & Technology 3, no. 1 (January 1987): 153–57. http://dx.doi.org/10.1080/13600869.1987.9966261.
Full textNycum, Susan H. "Computer Crime Legislation in the United States." Israel Law Review 21, no. 1 (1986): 64–89. http://dx.doi.org/10.1017/s0021223700008906.
Full textAl Sharari, Saleh. "Intellectual Property Rights Legislation and Computer Software Piracy in Jordan." Journal of Social Sciences 2, no. 1 (January 1, 2006): 7–13. http://dx.doi.org/10.3844/jssp.2006.7.13.
Full textKaiser, Stefan A. "Legal Challenges of Automated and Autonomous Systems." Volume 60 · 2017 60, no. 1 (January 1, 2018): 173–201. http://dx.doi.org/10.3790/gyil.60.1.173.
Full textGreaves, D. W. "Computer software — Protection/liability/law/forms." Computer Law & Security Review 4, no. 3 (September 1988): 5. http://dx.doi.org/10.1016/0267-3649(88)90026-x.
Full textSkelly, Stephen J. "Data protection legislation in Canada." International Review of Law, Computers & Technology 3, no. 1 (January 1987): 79–96. http://dx.doi.org/10.1080/13600869.1987.9966255.
Full textMerigoux, Denis, Nicolas Chataing, and Jonathan Protzenko. "Catala: a programming language for the law." Proceedings of the ACM on Programming Languages 5, ICFP (August 22, 2021): 1–29. http://dx.doi.org/10.1145/3473582.
Full textCoe, Douglas. "Computer Software Reviews. Henry's Law Constant Program." Journal of Chemical Information and Modeling 35, no. 1 (January 1, 1995): 168–69. http://dx.doi.org/10.1021/ci00023a600.
Full textAbate, Mark J. "Patentability of Computer Software under U.S. Law." Journal of World Intellectual Property 3, no. 5 (November 1, 2005): 697–704. http://dx.doi.org/10.1111/j.1747-1796.2000.tb00149.x.
Full textSchmitt, Michael N. "Computer Network Attack: The Normative Software." Yearbook of International Humanitarian Law 4 (December 2001): 53–85. http://dx.doi.org/10.1017/s1389135900000829.
Full textGong, Yiwei, and Marijn Janssen. "From Software-Based To Knowledge-Based Policy Implementation and Compliance." International Journal of Public Administration in the Digital Age 1, no. 1 (January 2014): 108–27. http://dx.doi.org/10.4018/ijpada.2014010107.
Full textSamuelson, Pamela. "Software compatibility and the law." Communications of the ACM 38, no. 8 (August 1995): 15–22. http://dx.doi.org/10.1145/208344.208373.
Full textBundy, A., and H. MacQueen. "The New Software Copyright Law." Computer Journal 37, no. 2 (January 1, 1994): 79–82. http://dx.doi.org/10.1093/comjnl/37.2.79.
Full textThorne, Clive D. "Copyright legislation." Computer Law & Security Review 3, no. 4 (November 1987): 12. http://dx.doi.org/10.1016/0267-3649(87)90053-7.
Full textSterling, J. A. L. "Legislation update." Computer Law & Security Review 4, no. 1 (May 1988): 42–43. http://dx.doi.org/10.1016/0267-3649(88)90103-3.
Full textSterling, J. A. L. "Copyright legislation." Computer Law & Security Review 3, no. 5 (January 1988): 2–9. http://dx.doi.org/10.1016/0267-3649(88)90106-9.
Full textBar-Sela, Yoram. "Computer Legislation in Israel: A Proposal Being Developed by the Ministry of Justice." Israel Law Review 21, no. 1 (1986): 58–63. http://dx.doi.org/10.1017/s002122370000889x.
Full textHancock, Bill. "New internet legislation attempts in the US." Computers & Security 18, no. 4 (January 1999): 282. http://dx.doi.org/10.1016/s0167-4048(99)90699-5.
Full textBainbridge, David I. "The Copyright (Computer Software) Amendment Act (1985)*." Modern Law Review 49, no. 2 (March 1986): 214–24. http://dx.doi.org/10.1111/j.1468-2230.1986.tb01685.x.
Full textGemignani, Michael. "Copyright Law as It Applies to Computer Software." College Mathematics Journal 20, no. 4 (September 1989): 332. http://dx.doi.org/10.2307/2686858.
Full textGemignani, Michael. "Copyright Law As It Applies to Computer Software." College Mathematics Journal 20, no. 4 (September 1989): 332–38. http://dx.doi.org/10.1080/07468342.1989.11973255.
Full textFrow, J. "Repetition and Limitation: Computer Software and Copyright Law." Screen 29, no. 1 (March 1, 1988): 4–21. http://dx.doi.org/10.1093/screen/29.1.4.
Full textConley, John M., and Robert M. Bryan. "A survey of computer crime legislation in the United States." Information & Communications Technology Law 8, no. 1 (March 1999): 35–57. http://dx.doi.org/10.1080/13600834.1999.9965797.
Full textKimball, Mary C. "Central computer facility software directory." Computers & Security 7, no. 5 (October 1988): 515. http://dx.doi.org/10.1016/0167-4048(88)90244-1.
Full textCollinson, Helen. "What's copyrightable in computer software?" Computers & Security 14, no. 2 (January 1995): 118. http://dx.doi.org/10.1016/0167-4048(95)90057-8.
Full textBloomBecker, J. J. Buck. "US computer security legislation H.R. 145: A step toward greater computer security?" Computer Law & Security Review 3, no. 5 (January 1988): 30–31. http://dx.doi.org/10.1016/0267-3649(88)90115-x.
Full textLoiacono, Eleanor T., and Soussan Djamasbi. "Corporate website accessibility: does legislation matter?" Universal Access in the Information Society 12, no. 1 (December 3, 2011): 115–24. http://dx.doi.org/10.1007/s10209-011-0269-1.
Full textHarris, Matthew R. "Copyright, Computer Software, and Work Made for Hire." Michigan Law Review 89, no. 3 (December 1990): 661. http://dx.doi.org/10.2307/1289387.
Full textRees, Frank. "Software firms are testing Australian law." Computer Fraud & Security 1997, no. 7 (July 1997): 19. http://dx.doi.org/10.1016/s1361-3723(97)89551-6.
Full textCarvalho, João Vidal, Sandro Carvalho, and Álvaro Rocha. "European strategy and legislation for cybersecurity: implications for Portugal." Cluster Computing 23, no. 3 (January 22, 2020): 1845–54. http://dx.doi.org/10.1007/s10586-020-03052-y.
Full textWehlau, Andreas. "Software protection under European community law." Information & Communications Technology Law 2, no. 1 (January 1993): 3–19. http://dx.doi.org/10.1080/13600834.1993.9965665.
Full text