Gauging the effectiveness of computer misuse act in dealing with cybercrimes
暂无分享,去创建一个
Reza Montasari | Pekka Peltola | Victoria Carpenter | R. Montasari | Victoria Carpenter | Pekka Peltola
[1] Nf Macewan,et al. The Computer Misuse Act 1990: lessons from its past and predictions for its future , 2008 .
[2] Stefan Fafinski. Police and Justice Act: The security ramifications of the Police and Justice Act 2006 , 2007 .
[3] Richard Walton. The Computer Misuse Act , 2006, Inf. Secur. Tech. Rep..
[4] Stefan Fafinski,et al. Access Denied: Computer Misuse in an Era of Technological Change , 2006 .
[5] Orin S. Kerrt. Who Controls the Internet ? : Illusions of a Borderless World , 2017 .
[6] Stuart Hannabuss,et al. Who Controls the Internet? Illusions of a Borderless World , 2007 .
[7] Hacked off. , 1988, Nursing standard (Royal College of Nursing (Great Britain) : 1987).
[8] Martin Wasik. Computer misuse , 1992, Comput. Law Secur. Rev..
[9] Wojciech Mazurczyk,et al. Cyber Crime , 2016, Secur. Commun. Networks.