Computer fraud

Results: 842



#Item
291Spamming / Web scraping / Computer Fraud and Abuse Act / Trespass to chattels / CFAA / Facebook / Scraper / Authorization / Facebook /  Inc. v. Power Ventures /  Inc. / Law / Computing / World Wide Web

Portfolio Media. Inc. | 860 Broadway, 6th Floor | New York, NY 10003 | www.law360.com Phone: +[removed] | Fax: +[removed] | [removed] How Website Operators Use CFAA To Combat Data-Scraping Law3

Add to Reading List

Source URL: www.jdsupra.com

Language: English
292Paillier cryptosystem / Public-key cryptography / ElGamal encryption / Q

Information Security and Computer Fraud, 2013, Vol. 1, No. 1, 1-7 Available online at http://pubs.sciepub.com/iscf/1/1/1 © Science and Education Publishing DOI:[removed]iscf[removed]Simplified Verifiable Re-encryption Mi

Add to Reading List

Source URL: www.sciepub.com

Language: English
293Business / Electronic commerce / Marketing / Information technology management / Cryptographic protocols / Atomicity / ACID / Credit card fraud / Electronic money / Transaction processing / Payment systems / Technology

In Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, Keynote paper, May 1996, pp[removed]Atomicity in Electronic Commerce J. D. Tygar Computer Science Department

Add to Reading List

Source URL: tygar.net

Language: English - Date: 2006-03-31 18:41:30
294Computing / Cyberwarfare / Electronic voting / Information society / Election fraud / Penetration test / Software independence / Application security / Vulnerability / Software testing / Election technology / Computer security

Software Review and Security Analysis of Scytl Remote Voting Software Michael Clarkson Brian Hay

Add to Reading List

Source URL: election.dos.state.fl.us

Language: English - Date: 2008-09-24 15:22:04
295Consumer fraud / Internet fraud / Internet marketing / Computer network security / Click fraud / Online advertising / Botnet / Affiliate marketing / Click farm / Internet / Electronic commerce / Business

Characterizing Large-Scale Click Fraud in ZeroAccess †✸ †✸ ✷

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2014-09-07 19:52:36
296Computing / Cyberwarfare / Electronic voting / Information society / Election fraud / Penetration test / Software independence / Application security / Vulnerability / Software testing / Election technology / Computer security

Software Review and Security Analysis of Scytl Remote Voting Software Michael Clarkson Brian Hay

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
297Phishing / Social engineering / Spamming / Business ethics / Internet fraud / Zillow / Malware / Vishing / Ethics / Computer crimes / Crime / Fraud

PhishLabs Named to Inc[removed]List of Fastest-Growing Private Companies In its first year on the list, PhishLabs ranks No[removed]with 218% revenue growth from 2010 to[removed]Charleston, SC (PRWEB) August 21, [removed]PhishLa

Add to Reading List

Source URL: www.prweb.com

Language: English - Date: 2014-08-21 08:30:09
298CAN-SPAM Act / Criminal law / Amicus curiae / United States v. Lori Drew / Computer law / Law / Computer Fraud and Abuse Act

Case: [removed]2014 ID: [removed]

Add to Reading List

Source URL: www.eff.org

Language: English - Date: 2014-03-11 19:03:51
299Government / Computer law / Privacy / Communications Act / Mail and wire fraud / Pen register / Electronic Communications Privacy Act / United States Code / Federal Communications Commission / Privacy of telecommunications / Law / Privacy law

100 STAT[removed]PUBLIC LAW[removed]—OCT. 21, 1986 Public Law[removed]99th Congress

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2014-12-29 11:15:04
300CFAA / Law / Computing / Computer law / LVRC Holdings v. Brekka / Computer Fraud and Abuse Act

RTF Document

Add to Reading List

Source URL: www.jdsupra.com

Language: English
UPDATE