computer misuse
The Computer Misuse Act 1990: lessons from its past and predictions for its future
10
Responding to victimisation in a digital world: a case study of fraud and computer misuse reported in Wales
12
THE COMPUTER MISUSE AND CYBERCRIME ACT I assent ARRANGEMENT OF SECTIONS
15
Avoiding the internet of insecure industrial things
25
The Regulation of Cyber Crime in Albania in the Framework of Harmonization of Internal Legislation with the European Legislation
6
KerWhizz.ppt
31
Information Warfare and Ethics
5
Developments in South London and Maudsley NHS Foundation Trust (SLaM) Dr Cheryl Kipping Crisis Collaborative South West Strategic Clinical Network
24
Justin Brookman and G.S. Hans *
6
A New Role for Tortious Interference in the Digital Age: A Model to Enforce End User License Agreements
26
A Hybrid Approach for Intrusion Detection Using Data Mining
8
Prescription Opioid Abuse in Prison Settings: A Systematic Review of Prevalence, Practice and Treatment Responses
34
Economic fluctuations in 2013-14: Review on Indian Economic Conditions
7
Misuse of Drugs and Alcohol
12
Americans' Misuse of "Internment"
42
Prescribing in alcohol misuse
9
Articles | British Journal of Community Justice
13
Cough syrup misuse in children
13
Addiction - Neurobiology, Prevention, and Treatment
395
Intrusion Detection Using Data Mining Techniques
5