Results 1 to 10 of about 1,739,326 (273)

The Value Orientation of Electronic Commerce Law Based on Computer Network [PDF]

open access: diamondMATEC Web of Conferences, 2022
In the era of legal globalization, e-commerce platform increasingly mature environment, in order to better meet the practical requirements of e-commerce activities, in the process of e-commerce legislation, practice, should always adhere to the value ...
Qin Di, Mu Zhaonan, Yue Sijialu
doaj   +2 more sources

QUALIFICATION OF COMPUTER GAMES IN COPYRIGHT LAW [PDF]

open access: yesZeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej, 2017
The aim of the paper is to discuss different options for qualification of computer games into appropriate category of copyright. The qualification is essential due to considerable differences between various protection regimes which emphasizes practical ...
Tomasz Grzegorczyk
doaj   +15 more sources

The Law Commission presumption concerning the dependability of computer evidence [PDF]

open access: diamond, 2020
We consider the condition set out in section 69(1)(b) of the Police and Criminal Evidence Act 1984 (PACE 1984) that reliance on computer evidence should be subject to proof of its correctness, and compare it to the 1997 Law Commission recommendation that
Peter B. Ladkin   +3 more
openalex   +3 more sources

Correction: A Benchmark Dataset for Radio Signal Image-based Person Re-Identification [PDF]

open access: yesScientific Data
Marco Cascio   +4 more
doaj   +2 more sources

PODSTREKAVANJE NA POLNU ZLOUPOTREBU MALOLETNIKA PUTEM RAČUNARSKIH UREĐAJA [PDF]

open access: yesRevija za kriminologiju i krivično pravo, 2022
Sexual abuse of children and minors is an old crime that has been known since ancient times, both in the world and in our country. In modern criminal law, these sexual crimes acquire new forms of manifestation, especially if they are committed ...
Dragan Jovašević
doaj   +1 more source

Computer Network Attacks and Modern International Law

open access: yesVestnik MGIMO-Universiteta, 2014
Computer network attacks (CNA) is a no doubt actual theoretical and practical topic today. Espionage, public and private computer-systems disruptions committed by states have been a real life.
Andrey L. Kozik
doaj   +5 more sources

Application of Computer Technology in Legal Practice [PDF]

open access: yesE3S Web of Conferences, 2021
Based on the practice of law, the modern technology of electronic computer means and the practice that can be accepted by everyone who has been processed by electronic means have been obtained by the scientific and technological means that are now widely
Tan Yuanyuan, Li Ying
doaj   +1 more source

Patentability of Computer Program Algorithms in the G20 States

open access: yesBRICS Law Journal, 2022
Ubiquitous computerization and digitalization are contributing to the unprecedented growth of the software market. Computer programs are protected as subject of copyright law in international law and domestic legal systems.
A. Matveev, E. Martyanova
doaj   +1 more source

Comparative study of cyber-crime in Iran and international law [PDF]

open access: yesپژوهشنامه حقوق تطبیقی, 2019
Because of human activities complexity, Willy-nilly any change in present world would have impacts and outcomes. In such a way that with invention of new device, besides its correct and legal usage there is always the possibility of its misusing. In this
Bita Dashti, Maryam Afshari
doaj   +1 more source

Machine Learning and Asylum Adjudications: From Analysis of Variations to Outcome Predictions

open access: yesIEEE Access, 2022
Individuals who demonstrate well-founded fears of persecution or face real risk of being subjected to torture, are eligible for asylum under Danish law.
Panagiota Katsikouli   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy