Information security and the law

被引:12
|
作者
机构
来源
Inf Secur Tech Rep | 2006年 / 1卷 / 2-9期
关键词
D O I
10.1016/j.istr.2005.11.003
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Information security: Technology and the law
    Marvin, CR
    Levinson, CK
    TOWARD AN ELECTRONIC PATIENT RECORD '98 CONFERENCE AND EXPOSITION, PROCEEDINGS - VOLS 1-3, 1998, : A123 - A126
  • [2] The law of information conflict: National security law in cyberspace
    Aldrich, RW
    SURVIVAL, 2001, 43 (02) : 164 - 164
  • [3] The Information Security Law of China(Abstract)
    MiaoDaoqi
    计算机工程, 1999, (S1) : 14 - 14
  • [4] Information Security and Law in Europe: Risks Checked?
    Mitrakas, Andreas
    INFORMATION & COMMUNICATIONS TECHNOLOGY LAW, 2006, 15 (01) : 33 - 53
  • [5] Information and Communication Technology (ICT) and law: The security of information in a sanitary environment
    D'Agostini, David
    Piva, Antonio
    Rampazzo, Attilio
    Mondo Digitale, 2010, 9 (02): : 59 - 66
  • [6] Information Security Law: The Emerging Standard for Corporate Compliance
    Fitz-Gerald, Stuart James
    Wiggins, Bob
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2010, 30 (01) : 98 - 98
  • [7] Cybercrime: law enforcement, security and surveillance in the information age
    Barrett, D
    JOURNAL OF SOCIAL POLICY, 2001, 30 : 177 - 179
  • [8] LAW AND PRACTICE OF CORPORATE INFORMATION SECURITY .1.
    ARNOLD, T
    MCGUIRE, D
    JOURNAL OF THE PATENT OFFICE SOCIETY, 1975, 57 (03): : 169 - &
  • [9] Computer forensics, information security and law: A case study
    Herath, A
    Herath, S
    Samarasinghe, P
    Herath, J
    Herath, S
    FIRST INTERNATIONAL WORKSHOP ON SYSTEMATIC APPROACHES TO DIGITAL FORENSIC ENGINEERING, PROCEEDINGS, 2005, : 135 - 141
  • [10] Research on the Rule of Law in Network Information Security Governance
    Pei Zhaobin
    Yu Yixiao
    INTELLIGENT COMPUTING THEORIES AND APPLICATION (ICIC 2022), PT I, 2022, 13393 : 605 - 616