Search Results for Legal Aspects of Computing. - Narrowed by: 2009SirsiDynix Enterprisehttp://librarycatalog.yyu.edu.tr/client/en_US/default/default/qu$003dLegal$002bAspects$002bof$002bComputing.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092009$0025092009$0026ps$003d300$0026isd$003dtrue?dt=list2025-02-15T05:14:42ZOnline Communities and Social Computing Third International Conference, OCSC 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009, Proceedingsent://SD_ILS/0/SD_ILS:1711192025-02-15T05:14:42Z2025-02-15T05:14:42Zby Ozok, A. Ant. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02774-1">https://doi.org/10.1007/978-3-642-02774-1</a><br/>Format: Electronic Resources<br/>Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:1725692025-02-15T05:14:42Z2025-02-15T05:14:42Zby Gal, Cecilia S. editor.<br/><a href="https://doi.org/10.1007/978-3-642-10233-2">https://doi.org/10.1007/978-3-642-10233-2</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics V Fifth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 26-28, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1745152025-02-15T05:14:42Z2025-02-15T05:14:42Zby Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04155-6">https://doi.org/10.1007/978-3-642-04155-6</a><br/>Format: Electronic Resources<br/>Computational Forensics Third International Workshop, IWCF 2009, The Hague, The Netherlands, August 13-14, 2009, Proceedingsent://SD_ILS/0/SD_ILS:1750012025-02-15T05:14:42Z2025-02-15T05:14:42Zby Geradts, Zeno J. M. H. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03521-0">https://doi.org/10.1007/978-3-642-03521-0</a><br/>Format: Electronic Resources<br/>Privacy in Location-Based Applications Research Issues and Emerging Trendsent://SD_ILS/0/SD_ILS:1478882025-02-15T05:14:42Z2025-02-15T05:14:42Zby Bettini, Claudio. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03511-1">https://doi.org/10.1007/978-3-642-03511-1</a><br/>Format: Electronic Resources<br/>The Future of Identity in the Information Society 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:1443532025-02-15T05:14:42Z2025-02-15T05:14:42Zby Matyáš, Vashek. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03315-5">https://doi.org/10.1007/978-3-642-03315-5</a><br/>Format: Electronic Resources<br/>Business Information Systems Workshops BIS 2009 International Workshops, Poznan, Poland, April 27-29, 2009, Revised Papersent://SD_ILS/0/SD_ILS:1621912025-02-15T05:14:42Z2025-02-15T05:14:42Zby Abramowicz, Witold. editor. (orcid)0000-0001-5464-9698<br/><a href="https://doi.org/10.1007/978-3-642-03424-4">https://doi.org/10.1007/978-3-642-03424-4</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1388592025-02-15T05:14:42Z2025-02-15T05:14:42Zby Chen, Hsinchun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-01393-5">https://doi.org/10.1007/978-3-642-01393-5</a><br/>Format: Electronic Resources<br/>Forensics in Telecommunications, Information and Multimedia Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1393942025-02-15T05:14:42Z2025-02-15T05:14:42Zby Sorell, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02312-5">https://doi.org/10.1007/978-3-642-02312-5</a><br/>Format: Electronic Resources<br/>Electronic Government 8th International Conference, EGOV 2009, Linz, Austria, August 31 - September 3, 2009, Proceedingsent://SD_ILS/0/SD_ILS:1438572025-02-15T05:14:42Z2025-02-15T05:14:42Zby Wimmer, Maria A. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03516-6">https://doi.org/10.1007/978-3-642-03516-6</a><br/>Format: Electronic Resources<br/>Electronic Participation First International Conference, ePart 2009 Linz, Austria, August 31-September 4, 2009 Proceedingsent://SD_ILS/0/SD_ILS:1420412025-02-15T05:14:42Z2025-02-15T05:14:42Zby Macintosh, Ann. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03781-8">https://doi.org/10.1007/978-3-642-03781-8</a><br/>Format: Electronic Resources<br/>Privacy, Security, and Trust in KDD Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, Nevada, August 24, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:1429272025-02-15T05:14:42Z2025-02-15T05:14:42Zby Bonchi, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-642-01718-6">https://doi.org/10.1007/978-3-642-01718-6</a><br/>Format: Electronic Resources<br/>Die Beschlagnahme elektronisch gespeicherter Daten bei privaten Trägern von Berufsgeheimnissenent://SD_ILS/0/SD_ILS:1927222025-02-15T05:14:42Z2025-02-15T05:14:42Zby Korge, Tobias. author.<br/><a href="https://doi.org/10.1007/978-3-540-88749-2">https://doi.org/10.1007/978-3-540-88749-2</a><br/>Format: Electronic Resources<br/>Information Hiding 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1769812025-02-15T05:14:42Z2025-02-15T05:14:42Zby Katzenbeisser, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-04431-1">https://doi.org/10.1007/978-3-642-04431-1</a><br/>Format: Electronic Resources<br/>Privatsphäre durch die Delegation von Rechtenent://SD_ILS/0/SD_ILS:1801862025-02-15T05:14:42Z2025-02-15T05:14:42Zby Wohlgemuth, Sven. author.<br/><a href="https://doi.org/10.1007/978-3-8348-9308-6">https://doi.org/10.1007/978-3-8348-9308-6</a><br/>Format: Electronic Resources<br/>