Language
English
German
^M
Dutch
Spanish
Title:
Synthetic data, privacy, and the law
Source:
Science [0036-8075] Wible, B yr:2019
Basic
Sorry, no full text available...
Please use the document delivery service (see below)
Holding information
Holdings in library search engine
ALBERT
Document delivery
Request document via
Library/Bibliothek
Users interested in this article also expressed an interest in the following:
description
1.
Gritzalis, D.
"Cybercrime in the Digital Economy - Editorial."
Computers & security
38 (2013): 1-2.
description
2.
Hong, William e.
"Cybercrime and Punishment."
The Journal of Legal Studies
49.2 (2020): 431-466.
description
3.
Herley, C.
"Security, cybercrime, and scale."
Communications of the ACM
57.9 (2014): 64-71.
description
4.
Dearden, Thomas E.
"Institutional Anomie Theory and Cybercrime—Cybercrime and the American Dream, Now Available Online."
Journal of contemporary criminal justice.
37.3: 104398622110015-332.
description
5.
Alfredo, N.
Revue internationale de droit pénal
83.1 (2012): 289-296.
description
6.
Hyman, P.
"Cybercrime: it's serious, but exactly how serious?(News / Society)."
Communications of the ACM
56.3 (2013): 18-.
description
7.
Hyman, P.
Communications of the ACM
56.3 (2013): 18-20.
description
8.
Hilbert, EJ.
"Living with cybercrime."
Network security
2013.11 (2013): 15-17.
description
9.
Waldrop, M. Mitchell M.
"How to hack the hackers: The human side of cybercrime."
Nature
533.7602 (2016): 164-167.
description
10.
Dupont, B.
"The Human Factor of Cybercrime."
Social science computer review
40.4: 89443932110115-864.
description
11.
Gritzalis, D.
Computers & security
38 (2013): 1-2.
description
12.
Runciman, B.
"Focusing on Cybercrime."
ITNOW
55.4 (2013): 40-41.
description
13.
HUA, J.
"The economic impact of cyber terrorism."
Journal of strategic information systems
22.2 (2012): 175-186.
description
14.
"Measuring the black web; cybercrime.(How big is criminality on the web?)."
The Economist
401.8755 (2011): 69-.
description
15.
Hunton, P.
"Cyber Crime and Security: A New Model of Law Enforcement Investigation."
Policing: A Journal of Policy and Practice
4.4 (2010): 385-395.
description
16.
"The Art of Cybercrime Community Research."
ACM computing surveys
56.6: 1-26.
description
17.
"Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User’s Dual Vulnerability Model of Cybercrime Victimization."
International journal of environmental research and public health.
18.3763: 3763-.
description
18.
van de Weijer, Steve G A A.
"Big Five Personality Traits of Cybercrime Victims."
Cyberpsychology, behavior and social networking
20.7 (2017): 407-412.
description
19.
Leukfeldt, Anita R.
"Organised Cybercrime or Cybercrime that is Organised? An Assessment of the Conceptualisation of Financial Cybercrime as Organised Crime."
European Journal on Criminal Policy and Research
23.3 (2016): 1-14.
description
20.
Griffin, Ronald C.
Journal of international commercial law and technology
7.2 (2012): 136-153.
View More...
View Less...
Select All
Clear All
Save Citations
Select Format
EndNote
Reference Manager
RefWorks
ProCite
Submit citation export
Advanced
Author
Other articles by this author? -- in
GeoRef
author:
Wible, B
last name
initials
Other articles by this author? -- in
Online Contents Geosciences
author:
Wible, B
last name
initials
Other articles by this author? -- using
Web of Science
author:
Wible, B
last name
initials
Web Search
Find related information in
a Web Search Engine
Excite
Google
HotBot
Ixquick
ZOO
Ask
Yahoo!
Bing
Naver
Search Terms:
Search for related information in
Google Scholar
Article Title
Author Name
Journal Title
Other Search
Search Terms:
A service provided by the
Library of the Wissenschaftspark Albert Einstein
, Potsdam, Germany.
© 2005 SFX by Ex Libris Inc.