Cyberspace

Results: 2446



#Item
671Electronic warfare / Computer crimes / Hacking / Military technology / United States Cyber Command / Cyberterrorism / Cooperative Cyber Defence Centre of Excellence / Cyber Operations / Cyberspace / Military science / Cyberwarfare / Military

THE LAW OF CYBER WARFARE: QUO VADIS? Michael N. Schmitt* INTRODUCTION ....................................................................................................... 269   I.   NORMATIVE EVOLUTION..........

Add to Reading List

Source URL: journals.law.stanford.edu

Language: English - Date: 2014-06-29 15:47:46
672Human cloning / British Science Association / Café / Somatic-cell nuclear transfer / Internet café / Biology / Cloning / Café Scientifique

Dialogue in cyberspace By Gert Balling and Lone Frank Abstract In recent years Café Scientifique in Denmark has demonstrated that direct contact between researchers and the broad population is a most rewarding platform

Add to Reading List

Source URL: www.gertballing.dk

Language: English - Date: 2007-11-04 14:58:44
673Biometrics / Information privacy / Radio-frequency identification / Surveillance / Internet privacy / Cyberspace Law and Policy Centre / Medical privacy / Identity theft / Biometrics Institute / Privacy / Ethics / Security

Distinguishing PETs from PITs: Developing technology with privacy in mind Submission to the Australian Law Reform Commission on the Review of Australian Privacy Laws Discussion Paper 72 (DP72)

Add to Reading List

Source URL: cyberlawcentre.org

Language: English - Date: 2008-03-11 21:18:48
674Electronic warfare / Hacking / Military technology / Cyberwarfare / National security / Military organization / United States Cyber Command / Department of Defense Cyber Crime Center / U.S. Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Military science / Department of Defense Strategy for Operating in Cyberspace

Department of Defense Cyberspace Policy Report A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 November 2011

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 20:17:00
675Electronic warfare / Hacking / Military technology / Military science / Computer security / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Security / Cyberwarfare / National security

REPUBLIC OF TURKEY Ministry of Transport, Maritime Affairs and Communications National Cyber Security Strategy and

Add to Reading List

Source URL: ccdcoe.org

Language: English - Date: 2015-05-27 05:43:08
676Health and social services access card / Healthcare in Australia / Human rights / Identity document / Privacy / Credit card / National identity card / Identity Cards Act / Internet privacy / Government / Security / Ethics

Australian ID Taskforce Report: A sheep in wolf’s clothing Graham Greenleaf Professor of Law, UNSW Co-Director, Cyberspace Law & Policy Centre 11 November 2006

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English - Date: 2013-12-09 02:33:29
677Military technology / War / Military science / Computer crimes / Military / Industrial espionage / Internet-related prefixes / Cyberspace / Cyber / Cyberwarfare / Hacking / Electronic warfare

Cyber War and Competition in the China-U.S. Relationship1 James A. Lewis May 2010 The U.S. and China are in the process of redefining their bilateral relationship, as China’s new strengths means it has a new position a

Add to Reading List

Source URL: csis.org

Language: English - Date: 2010-06-01 08:21:55
678Information society / P3P / World Wide Web / Code and Other Laws of Cyberspace / Privacy / Internet privacy / E-democracy / Ambient intelligence / Social informatics / Technology / Computing / Sociology

PDF Document

Add to Reading List

Source URL: www.governingwithcode.org

Language: English - Date: 2004-09-29 15:42:30
679Internet activism / E-democracy / Cyberspace / Community / Internet / Virtual community / Geert Lovink / Invocational media / Technology / Information society / Virtual reality

PDF Document

Add to Reading List

Source URL: ses.library.usyd.edu.au

Language: English - Date: 2010-02-11 06:34:47
680Information technology audit / Criminal law / Computer crimes / Cyberspace / Legal aspects of computing / Abuse / Fraud / Computer fraud / Computer Fraud and Abuse Act / Computer law / Law / Crimes

PDF Document

Add to Reading List

Source URL: www.lgt.polyu.edu.hk

Language: English - Date: 2014-07-16 02:47:23
UPDATE