Search Results for Legal Aspects of Computing. - Narrowed by: Electronic commerce.SirsiDynix Enterprisehttp://librarycatalog.yyu.edu.tr/client/en_US/default/default/qu$003dLegal$002bAspects$002bof$002bComputing.$0026qf$003dSUBJECT$002509Konu$002509Electronic$002bcommerce.$002509Electronic$002bcommerce.$0026ps$003d300?dt=list2025-02-14T18:00:58ZDigital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:1644802025-02-14T18:00:58Z2025-02-14T18:00:58Zby Gladyshev, Pavel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-14289-0">https://doi.org/10.1007/978-3-319-14289-0</a><br/>Format: Electronic Resources<br/>Countering Brandjacking in the Digital Age ... and Other Hidden Risks to Your Brandent://SD_ILS/0/SD_ILS:1375302025-02-14T18:00:58Z2025-02-14T18:00:58Zby Hofman, Christopher. author.<br/><a href="https://doi.org/10.1007/978-1-4471-5580-5">https://doi.org/10.1007/978-1-4471-5580-5</a><br/>Format: Electronic Resources<br/>Future Security 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1735462025-02-14T18:00:58Z2025-02-14T18:00:58Zby Aschenbruck, Nils. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33161-9">https://doi.org/10.1007/978-3-642-33161-9</a><br/>Format: Electronic Resources<br/>Auctions, Market Mechanisms and Their Applications Second International ICST Conference, AMMA 2011, New York, USA, August 22-23, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:1428912025-02-14T18:00:58Z2025-02-14T18:00:58Zby Coles, Peter. editor.<br/><a href="https://doi.org/10.1007/978-3-642-30913-7">https://doi.org/10.1007/978-3-642-30913-7</a><br/>Format: Electronic Resources<br/>Identitätsdiebstahl und Identitätsmissbrauch im Internet Rechtliche und technische Aspekteent://SD_ILS/0/SD_ILS:1786092025-02-14T18:00:58Z2025-02-14T18:00:58Zby Borges, Georg. author.<br/><a href="https://doi.org/10.1007/978-3-642-15833-9">https://doi.org/10.1007/978-3-642-15833-9</a><br/>Format: Electronic Resources<br/>The Global Cybercrime Industry Economic, Institutional and Strategic Perspectivesent://SD_ILS/0/SD_ILS:1472382025-02-14T18:00:58Z2025-02-14T18:00:58Zby Kshetri, Nir. author.<br/><a href="https://doi.org/10.1007/978-3-642-11522-6">https://doi.org/10.1007/978-3-642-11522-6</a><br/>Format: Electronic Resources<br/>The Future of Identity in the Information Society 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:1443532025-02-14T18:00:58Z2025-02-14T18:00:58Zby Matyáš, Vashek. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03315-5">https://doi.org/10.1007/978-3-642-03315-5</a><br/>Format: Electronic Resources<br/>Business Information Systems Workshops BIS 2009 International Workshops, Poznan, Poland, April 27-29, 2009, Revised Papersent://SD_ILS/0/SD_ILS:1621912025-02-14T18:00:58Z2025-02-14T18:00:58Zby Abramowicz, Witold. editor. (orcid)0000-0001-5464-9698<br/><a href="https://doi.org/10.1007/978-3-642-03424-4">https://doi.org/10.1007/978-3-642-03424-4</a><br/>Format: Electronic Resources<br/>Electronic Banking und Datenschutz Rechtsfragen und Praxisent://SD_ILS/0/SD_ILS:1892212025-02-14T18:00:58Z2025-02-14T18:00:58Zby Kahler, Thomas. author.<br/><a href="https://doi.org/10.1007/978-3-540-72224-3">https://doi.org/10.1007/978-3-540-72224-3</a><br/>Format: Electronic Resources<br/>Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1468512025-02-14T18:00:58Z2025-02-14T18:00:58Zby Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-540-75670-5">https://doi.org/10.1007/978-3-540-75670-5</a><br/>Format: Electronic Resources<br/>Recordkeeping, Ethics and Law Regulatory Models, Participant Relationships and Rights and Responsibilities in the Online Worldent://SD_ILS/0/SD_ILS:1551042025-02-14T18:00:58Z2025-02-14T18:00:58Zby Iacovino, Livia. author.<br/><a href="https://doi.org/10.1007/1-4020-4714-2">https://doi.org/10.1007/1-4020-4714-2</a><br/>Format: Electronic Resources<br/>Legal Programming Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyondent://SD_ILS/0/SD_ILS:1520672025-02-14T18:00:58Z2025-02-14T18:00:58Zby Subirana, Brian. author.<br/><a href="https://doi.org/10.1007/b101542">https://doi.org/10.1007/b101542</a><br/>Format: Electronic Resources<br/>