Dissertations / Theses on the topic 'Computer games – Law and legislation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Computer games – Law and legislation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Lee, Yin Harn. "Videogame modifications under copyright law." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.709009.
Full textItal, Eric Guy. "Copyright law and the Internet : in modern South African law." Thesis, Stellenbosch : Stellenbosch University, 2000. http://hdl.handle.net/10019.1/51666.
Full textENGLISH ABSTRACT: The Internet is coming more and more into focus of national and international legislation. Especially with regard to copyright law, the rapid growth of the Internet, its global character, its novel technical applications and its private and commercial use by millions of people makes the control over a work complicated and raises copyright problems all over the world. Present legislation is therefore challenged to avoid gaps in the law. Considering the rapid growth of online providers and users in South Africa, it is likely that copyright disputes with regard to the Internet will evolve here soon. In this dissertation, the "world" of the Internet and its lawfulness with regard to existing South African copyright law will be examined. The examination tries to establish whether South African copyright law is able to cope with the present Internet problems and whether it leads to reasonable results. The first chapter of this dissertation will give an overview of the basic principles of the Internet, including the history, development and function of the Internet. Furthermore the changing aspects by means of diqital technology will be discussed. Because the global character of the Internet lead to "international" infringements, governments are considering the prospect of reaching international accord on the protection of intellectual property in the digital era. In chapter two, the present international harmonisation of copyright law will be introduced. Especially the quick adoption of the World Intellectual Property Organisation Treaties in December 1996 demonstrated that an international realisation for a call for action is existing. In chapter three, the application of South African copyright law with regard to the Internet will be discussed. First, it will be examined if a digital work on the Internet is protected in the same way as a "traditional" work. Second, the various rights of the copyright holder are discussed in connection with the use of a work on the Internet. Third, the potential application of the exclusive rights of the copyright holder to various actions on the Internet, such as caching, Web linking and operating an online service will be discussed. The Internet is a worldwide entity, and, as such, copyright infringement on this system is an international problem. The scenario of global, simultaneous exploitation of works on the Internet conflicts sharply with the current system of international copyright protection, which is firmly based on national copyright laws with territorial effects. Section four provides therefore an overview of the applicable law on an international net and analyses the necessity and borders of protection.
AFRIKAANSE OPSOMMING: Nasionale en internasionale wetgewing fokus in In toenemende mate op die Internet. Die versnelde groei van die Internet, sy wêreldkarakter, sy nuwe tegnologiese aanwendings en sy private en kommersiële gebruik deur miljoene mense maak beheer oor In werk baie gekompliseerd en skep veral outeursregprobleme regoor die wêreld. Wetgewing soos dit tans is, word dus uitgedaag om die leemtes in die reg te ondervang. Gegewe die vinnige groei van gekoppelde verskaffers en gebruikers in Suid-Afrika, is dit waarskynlik dat - outeursreggeskille met betrekking tot die Internet binnekort ook hier gaan ontwikkel. In hierdie verhandeling gaan die "wêreld" van die Internet en sy wettigheid onder bestaande Suid-Afrikaanse outeursregwetgewing ondersoek word. In die ondersoek word gepoog om vas te stelof Suid-Afrikaanse outeursregwetgewing geskik is om die Internetprobieme wat tans bestaan te hanteer en of dit lei tot aanvaarbare resultate. Die eerste hoofstuk van die verhandeling sal In oorsig gee van die basiese beginsels van die Internet, insluitende die geskiedenis, ontwikkeling en funksie van die Internet. Verder sal die veranderende aspekte as gevolg van digitale tegnologie bespreek word. Die wêreldkarakter van die Internet gee aanleiding tot "internasionale" inbreukmakings en om hierdie rede oorweeg regerings die moontlikheid van internasionale ooreenkomste oor die beskerming van intellektuele eiendom in die digitale era. In hoofstuk twee word die bestaande internasionale harmonisering van outeursreg bespreek. Veral die vinnige aanname van die World Intellectual Property Organisation se verdrae in Desember 1996, illustreer dat daar In internasionale bewustheid is dat iets in die verband gedoen moet word. In die derde hoofstuk word die aanwending van die Suid-Afrikaanse outeursreg met betrekking tot die Internet bespreek. Eerstens word ondersoek of a digitale werk op die Internet op dieselfde wyse as 'n "tradisionele" werk beskerm kan word. Tweedens word die verskillende regte van die outeursreghebbende in verband met die gebruik van 'n werk op die Internet, bespreek. Derdens word die potensiële aanwending van die eksklusiewe regte van die outeursreghebbende op verskillende aksies op die Internet, soos byvoorbeeld kasberging, web koppeling en die werking van 'n gekoppelde diens, bespreek. Die Internet is 'n wêreldwye verskynsel en sodanig is outeursreginbreukmaking op hierdie stelsel 'n internasionale probleem. Die scenario van 'n wêreldwye, gelyktydige uitbuiting van werke op die Internet is in skerp konflik met die huidige stelsel van internasionale outeursregbeskerming wat stewig gegrond is op nasionale wetgewing met territoriale werking. Hoofstuk vier bied daarom 'n oorsig oor die toepaslike reg op 'n internasionale netwerk en analiseer die nodigheid en ook grense van beskerming.
Mik, Eliza. "Contract formation in open electronic networks." Phd thesis, Faculty of Law, 2007. http://hdl.handle.net/2123/4995.
Full textTitle from title screen (viewed 28 May 2009) Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy to the Faculty of Law. Degree awarded 2007. Includes bibliography references. Also available in print format.
Temur, Nuri. "Computer Crime as a Barrier to Electronic Commerce: New Solutions for Public Law Enforcement." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3171/.
Full textMabeka, Nombulelo Queen. "When does the conduct of an employer infringe on an employee's constitutional right to privacy when intercepting or monitoring electronic communications?" Thesis, University of the Western Cape, 2008. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_5883_1253850534.
Full text"
The Regulation of Interception of Communications and Provision of Communication Related Information Act 70 of 2002 (RICA) that regulates the monitoring of electronic communications has not yet been tested by our courts. This paper explores the likelihood of an infringement of an employee's right to privacy by an employer in the process of intercepting the latters electronic communications. It is argued that there is no explicit provision of the protection of the right to privacy that is provided in the LRA. It is further argued that the provisions of section 4, 5 and 6 of RICA as they stand do not necessarily provide for the protection of an employee's right to privacy, but the incorporation of these sections could be construed as meaning that the legislature or the framers of the legislation intended to limit the employers right to trade freely, at the same breath, limit the employees right to privacy. It is argued that RICA does not provide protection for the right to privacy wherein consent has been obtained under duress or based on misrepresentation of facts. It is contended that the interception of employees electronic communications in such circumstances would be regarded as an infringement of such employees right to privacy. The burden of proving duress or misrepresentation of facts rests on the employee who alleges that such consent was obtained under duress or based on misrepresentation of facts. It is also argued that RICA does not define the meaning of the words in the course of carrying on of business or reasonable steps provided in section 6 of RICA. It is argued that the meaning of in the course of carrying on of business would be determined by the type of the industry upon which the business operates, as well as the circumstances of the case. Reasonable steps would be regarded as being taken if employers notify employees that their electronic communications would be intercepted..."
Frantz, Courtney Siler. "An electronic storage and access system for special education legislation." W&M ScholarWorks, 1995. https://scholarworks.wm.edu/etd/1539618425.
Full textKarjiker, Sadulla. "Open-source software and the rationale for copyright protection of computer programs." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/80044.
Full textENGLISH ABSTRACT: The rationale for the legal protection of copyright works is based on the perceived need to encourage the creation of works which are considered to be socially beneficial. By awarding authors proprietary rights in their creations, copyright law allows authors the ability to earn direct financial returns from their efforts, and, thus, copyright law provides the required incentives for authors to create copyright works. Since the early days of commercial software development, copyright protection has been extended to computer programs; thus, by providing such protection it was assumed that their production should be encouraged, and that without such protection they will not be produced to the extent required by society. Comparatively recently, we have witnessed large-scale production of open-source software, which is licensed on generous terms, giving users the right to freely use, modify and redistribute such software. By adopting such licensing terms, the authors of open-source software are unable to charge licensees a fee for permission to use their software, which is the reward which copyright assumes authors seek to create such software. This development has made it necessary to re-evaluate the rationale for copyright protection of computer programs, and determine whether the continued protection of computer programs is justifiable. This study seeks to first establish a coherent theoretical justification for copyright protection, which it is submitted should be an economic justification, rather than a moral justification. The legal analysis in this work seeks to establish whether the copyright protection of computer programs is consistent with the economic justification for copyright protection. In particular, the analysis focuses on the current scope of copyright protection, and seeks to establish whether such protection is excessive, stifling creativity and innovation, and, thus, imposing too high a social cost. It is contended that copyright doctrine has generally sought to minimise these costs, and that current scope of copyright protection of computer programs leaves enough creative room for the production of new software. Despite the fact that the effect of open-source software licences is that authors are unable to earn the direct financial rewards which copyright enables authors to earn as an incentive to create such software, their authors continue to have financial incentives to create such software. Commercial firms who invest in open-source software do so because they seek to provide financially-rewarding related services in respect of software, or because it serves to promote sales in their complementary products. Similarly, the participation of individual computer programmers is largely consistent with the standard economic theories relating to labour markets and the private provision of public goods. Individuals are principally motivated by economic motives, such as career concerns. Copyright protection gives participants the choice to opt for the direct financial rewards which its proprietary protection enables, or the more indirect financial rewards of open-source software development. It is submitted within this research that rather than undermining the rationale for copyright protection of computer programs, the development of open-source software has illustrated that copyright protection allows for the emergence of alternative business models, which may be more economically advantageous to authors.
AFRIKAANSE OPSOMMING: Die rasionaal agter outeursregbeskerming wat deur die reg verleen word is gebasseer op 'n behoefte om die skepping van werke wat sosiaal voordelig geag word te bevorder. Outeursreg verleen aan outeurs direkte finansiële vergoeding vir hul inspanning deur die vestiging van eiendomsreg oor hul werke. Dus, outeursreg voorsien outeurs van die nodige insentiewe om sulke werke te skep. Sedert die begindae van kommersiële sagteware ontwikkeling, is outeursregbeskerming uitgebrei om aan rekenaarprogramme sulke beskerming te bied. Deur die bied van outeursregbeskerming word daar aangeneem dat die ontwikkeling van rekenaarprogramme aangemoedig word en dat sonder die genoemde beskerming programme nie geproduseer sal word tot in 'n mate benodig deur die samelewing nie. Onlangs egter, is daar 'n grootskaalse ontwikkeling van oopbronsagteware opgemerk. Hierdie sagteware word onder ruime terme gelisensieer en gee aan gebruikers die reg om die genoemde sagteware te gebruik, te wysig en vrylik te versprei. Deur sulke terme van lisensiëring aan te neem word outeurs verhoed om vanaf lisensiehouers 'n fooi te vorder vir die toestemming om die sagteware te gebruik. Outeursreg neem aan dat hierdie vergoeding die basis vorm waarom outeurs sulke sagteware ontwikkel. Hierdie ontwikkeling maak dit nodig om die rasionaal agter outeursregbeskerming van rekenaarprogramme te her-evalueer en ook om vas te stel of die volgehoue beskerming van rekenaarprogramme regverdigbaar is. Hierdie studie poog om, eerstens, 'n samehangende teoretiese regverdiging vir outeursreg te vestig. Daar word aan die hand gedoen dat hierdie beskerming 'n ekonomiese, eerder as 'n morele regverdiging as grondslag moet hê. Die regsontleding vervat in hierdie werk poog om vas te stel of die outeursregbeskerming wat aan rekenaarprogramme verleen word in lyn is met die ekonomiese regverdiging van outeursregbeskerming. Die analise fokus in besonder op die huidige bestek van outeursregbeskerming en poog om vas te stel of sodanige beskerming oormatig is, of dit kreatiwiteit en innovasie onderdruk en derhalwe te hoë sosiale koste tot gevolg het. Daar word geargumenteer dat outeursreg in die algemeen poog om sosiale koste te verlaag en dat die huidige omvang van outeursregbeskerming van rekenaarprogramme voldoende kreatiewe ruimte vir die ontwikkeling van nuwe sagteware laat. Die effek van oopbronsagteware is dat outeurs nie in staat is om direkte finansiële vergoeding te verdien, wat as insentief gesien word vir die ontwikkeling van sagteware, nie. Ten spyte hiervan is daar steeds voldoende finansiële insentiewe om sodanige sagteware te ontwikkel. Kommersiële firmas belê in oopbronsagteware om finansiëel lonende verwante dienste ten opsigte van sagteware te voorsien. Dit kan ook dien om verkope in hul onderskeie aanvullende produkte te bevorder. Eweweens is die deelname van individuele rekenaarprogrameerders oorwegend in lyn met die standaard ekonomiese teoriëe ten opsigte van die arbeidsmark en die privaat voorsiening van openbare goedere. Individue word gemotiveer deur ekonomiese motiewe, soos byvoorbeeld oorwegings wat verband hou met hul loopbane. Outeursregbeskerming bied aan deelnemers die keuse om voordeel te trek uit die direkte finansiële vergoeding wat moontlik gemaak word deur outeursregbeskerming of uit die meer indirekte finansiële vergoeding gebied deur die ontwikkeling van oopbronsagteware. In hierdie navorsing word daar geargumenteer dat die ontwikkeling van oopbronsagteware geillustreer het dat outeursregbeskerming die onstaan van alternatiewe besigheidsmodelle toelaat wat ekonomies meer voordelig is vir outeurs in plaas daarvan dat dit die rasionaal vir die outeursregbeskerming van rekenaarprogramme ondermyn.
Bac, Joanna Ewa. "Software intelligence (SI), dependent legal personhood & SI-human amalgamation : an evolutionary step for US patent law and SI." Thesis, University of Aberdeen, 2018. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=237873.
Full textSteh, Stephen R. "Unauthorized Access Crimes." Youngstown State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.
Full textNichols, Kenneth Nolan. "Technical-legal aspects of software patents." CSUSB ScholarWorks, 1996. https://scholarworks.lib.csusb.edu/etd-project/1249.
Full textAndre, Edward E. "Investigating information management weaknesses in a local government organisation: A critical hermeneutic ethnographic case study of internet documents from information warfare and legal perspective(s)." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2005. https://ro.ecu.edu.au/theses/633.
Full textO'Brien, N. D. "The liability of Internet service providers for unlawful content posted by third parties." Thesis, Nelson Mandela Metropolitan University, 2010. http://hdl.handle.net/10948/1149.
Full textUpton, Oren K. "Asserting national sovereignty in cyberspace : the case for Internet border inspection." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FUpton.pdf.
Full textFunk, Antje Elisabeth Margarete. "Criminal liability of Internet providers in Germany and other jurisdictions." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/70134.
Full textENGLISH ABSTRACT: This thesis deals with the criminal liability of Internet providers. The focus is on Germany, but the analysis is put in a wider, comparative context. This is done with reference to South Africa, as well as Europe and the American system. This thesis demonstrates and discusses the existing legal norms to regulate Internet provider liability for illegal content on the Internet and the international efforts to deal with this issue. In the introduction it is shown how the Internet has given rise to a new form of global communication and the accompanying legal problems. This is followed by an examination of the different functions Internet providers have. A survey of some of the important crimes affecting the Internet and also some Internet-specific offences put the more general issue of liability in a more specific context. Traditional and new forms of crimes are discussed. This section is followed by an analysis of Internet provider liability under German criminal law and Germany's Teleservices Act. From an international criminal law perspective some international instruments, like the Cybercrime Convention of the Council of Europe, is discussed. National legislation, especially in the context of the European Union, must always be put in the proper regional and international context. The thesis concludes with some thoughts on alternative, or perhaps complementary, methods to fight illegal and criminal conduct on the Internet. This is done not as a critique of the responses to Internet crime, but rather to strengthen the many hands trying to reduce Internet crime.
AFRIKAANSE OPSOMMING: Hierdie tesis handeloor die strafregtelike aanspreekliheid van Internet diensverskaffers. Die fokus val op Duitsland, maar die analise word ook geplaas in 'n wyer, vergelykende konteks. Dit word gedoen met verwysing na Suid-Afrika, sowel as Europa en die VSA. Die tesis demonstreer en bespreek die bestaande regsnorme wat Internet diensverskaffers reguleer met spesifieke verwysing na aanspreeklikheid vir onwettige inhoud op die Internet en internasionale pogings om hierdie probleem aan te spreek. Ter inleiding word daar aangetoon hoe die Internet aanleiding gee tot nuwe vorme van globale kommunikasie en die regsprobleme wat dit tot gevolg het. Dit word gevolg deur 'n ondersoek na die verskillende funksies van Internet verskaffers. 'n Ontleding en bespreking van Internet-spesifieke misdrywe plaas die meer algemene vraagstuk in 'n meer gefokusde konteks. Tradisionele en nuwe vorme van misdaad word bespreek. Hierdie afdeling word gevolg deur 'n ontleding van Internet diensverskaffer aanspreeklikheid ingevolge Duitse reg en die Duitse wetgewing op die terrein van telediens. Uit 'n internasionale strafreg oogpunt word sekere internasionale instrumente, soos die Cybercrime Convention van die Raad van Europa, bespreek. Nasionale wetgewing, veral in die konteks van die Europese Unie, word ook in die relevante regionale en internasionale konteks geplaas. Die tesis word afgesluit met sekere gedagtes oor alternatiewe, of moontlik komplimentêre, metodes in die stryd teen Internet-kriminaliteit. Dit moet nie gesien word as kritiek op die huidige stand van sake nie, maar eerder as 'n poging om die talle rolspelers in die stryd teen Internet misdaad se hande te sterk.
Hodge, Dominic Shaughn. "The income tax consequences of the in-house development of software." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1013550.
Full textSaganich, Robert Lee. "An investigation of electronic Protected Health Information (e-PHI) privacy policy legislation in California for seniors using in-home health monitoring systems." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1075.
Full textGottschalk, Jason Howard. "Towards an evaluation and protection strategy for critical infrastructure." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018793.
Full textMostert, Charl. "The benefits of contractual causes in mitigating project failures using business system projects." Thesis, Cape Peninsula University of Technology, 2014. http://hdl.handle.net/20.500.11838/1778.
Full textThis study evaluates the utilisation and effectiveness of contract clauses in Information Technology (IT) and Information System (IS) projects in South Africa to address and mitigate key risks associated with these types of projects. This study established whether specific clauses were being utilised to address key risks, and where clauses were being utilised, whether these clauses were effective in addressing and mitigating the impact of these key risks. The need for the study arose because the researcher had experienced on several occasions in his workplace that contracts which appeared fail-safe during the negotiation stage did not reach the proposed targets, let alone maturity of the agreement. To establish whether colleagues in similar positions in computer-based organisations experienced similar disruptions a quantitative questionnaire was distributed to organisations in the Johannesburg area to gain an insight into their risk profile. Risk could arise from the contract construction and/or wording. Reference was made to the contracts in the engineering environment where standard contracts have been in place for a number of years. Specifically the New Engineering Contract (NEC) of 2011 and the Professional Services Contract were consulted. The study concentrated on four categories of risk identified in a literature review, namely corporate management risk, project management risk, resource utilisation risk and technology risk, which resulted in 42 sub-factors examined. The population of suitable and relevant IT and IS companies could not be definitely established but the researcher made telephonic contact with known organisations and 24 participants agreed to participate in the exercise; 12 service providers and 12 clients of providers, where 78% of participants experienced one or more of the risk factors, and 53% used NEC standard contracts.
Basilio, Bernardo I. "Knowledge-based classification scheme for regulating the flow of hazardous materials through tunnels." Thesis, Virginia Polytechnic Institute and State University, 1987. http://hdl.handle.net/10919/91097.
Full textM.S.
Balan, Júnior Osvaldo [UNESP]. "O estabelecimento virtual na sociedade técnica: a necessária busca de segurança jurídica nas transações comerciais." Universidade Estadual Paulista (UNESP), 2011. http://hdl.handle.net/11449/98930.
Full textO presente trabalho buscará trazer uma profunda reflexão sobre o avanço técnico na sociedade moderna do instituto denominado estabelecimento virtual, assim como seus reflexos nas mais variadas searas. Buscar-se-á compreender este fenômeno através do estudo da técnica, tudo com base nas obras do pensador Jacques Ellul, que trilhou sobre as mais diversas áreas do conhecimento no século passado, com extremo brilhantismo, podendo, além disso, ser considerado um visionário. Mostrar-se-ão os problemas que o avanço tecnológico vem trazendo, os quais complicam o ser humano em sua vida particular, criando neuroses, fruto da adaptação deste ao mundo moderno. Para tanto e de forma mais analítica estudar-se-ão as características da técnica moderna, as quais permitem entender como se dá o desenvolvimento da técnica. Buscar-se-á compreender também o que vem a ser a informação, a principal técnica da atualidade, e as diferentes concepções sobre a sociedade contemporânea. Além disso, analisar-se-á a influência da imagem na sociedade técnica e sua predominância em relação à palavra. Necessária também se mostrou a análise do que vem a ser o comércio eletrônico, o novo modelo de realizações negociais, que se apresenta em franco crescimento. Assim, o estabelecimento virtual surge dentro deste contexto, não permitindo a criação de obstáculos, se encontrando atualmente em todo o mundo, sem enxergar as diferenças culturais e as menosprezando, trazendo uma uniformidade ao mundo, tanto pela forma de comercializar, como pelos produtos que expõe. Mas não são todas as pessoas do globo que tem acesso a este, sendo este outro grande problema apresentado pelo estabelecimento virtual: a exclusão digital. Por conseguinte, demonstrar-se-á...
The present study will try to create a profound reflexion about the technical advance in the modern society of the institute known as virtual establishment, and also its reflexes in a variety of associations. One of the objectives, is to understand this phenomenon thought the study of the technique, all based on the publications of the philosopher Jacques Ellul, who disserted about the various parts of knowledge in the last century with extreme brilliance,making him a true visionary. The problems brought by technological advances will be shown, these can complicated one´s private life, generating neurosis, a product of its adaptation to the modern world. To do so in an analytical form, the characteristics of the modern technique will be studied, permitting tounderstand the development of the technique. The meaning of information, the principal technique used in the actuality, and its different conceptions in contemporaneous society will be explained, and also, the influence of image in the technical society and its predominance in relation with words will be analyzed. The analyses of what is electronic marketing, a new model of business transactions that is in fast growth should also be done. The virtual market appears inside this context, without obstacles, spreading to the entire globe, with no eyes for cultural differences, bringing uniformity to the world, not just in the way to shop but also on the products available. But not everyone has access to it, being this a big problem presented by the virtual establishment: the digital exclusion. In this work, there will be shown the necessity of development of ways to advance in the virtual technique, ways that show be the result of a critical and reflexive posture of the man, which is rarely seen now a days. This work will be based on comparison of the traditional establishment... (Complete abstract click electronic access below)
Sundstrom, Linda-Marie. "Internet radio: Identifying administrative and regulatory gaps in a cyberspace world without borders." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2137.
Full textDesai, Mohammed Reza. "An integrated approach for information security compliance in a financial services organisation." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2396.
Full textThe aim of this research is to identify and explore the factors affecting information security compliance of information security policies and regulations, in a financial services organisation. The organisation has to comply with information security regulations and legislations by righteousness of its operations in light of the fact that any wrong doing together with misuse of data, are continually expanding. Corporate embarrassments comes about due to rupture of security, results in expanded thoughtfulness regarding corporate consistency. Legislature and policies have been set up to counter information security issues. This legislature and policies are not adequately addressing the compliance issues that arise, but are needed within organisations. Compliance targets are not met due to inconsistent guidelines that turns out to be significant in diminishing the financial position, reputation and security of information. This research further aims to explore whether employees comply with laws and regulations regarding information in an organisation. This is done in order to confirm whether governance and human factors play any significant part in compliance. The research is an exploratory study and specifically analyses the governance function and which stakeholders influence its operations in information compliance. The research investigates certain questions on organisational culture and the human factor, do influence employee’s compliance to laws and regulations. The objectives of the research are to investigate which factors, and how such factors influence compliance of information security policies and compliance with the goal of designing an integrated framework to assist in counteracting these findings. The research is underpinned by the Neo-institutional theory, Agency Theory and Rational choice theory. The Denison organisational cultural model and a framework proposed by von Solms are used as lenses to interpret the data of the research.
孫陸陽. "暗網絡犯罪的刑法問題研究 =Research on criminal law of dark network crime." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950654.
Full textBalan, Júnior Osvaldo. "O estabelecimento virtual na sociedade técnica : a necessária busca de segurança jurídica nas transações comerciais /." Franca : [s.n.], 2011. http://hdl.handle.net/11449/98930.
Full textBanca: Rui Décio Martins
Banca: Jorge Luis Mialhe
Resumo: O presente trabalho buscará trazer uma profunda reflexão sobre o avanço técnico na sociedade moderna do instituto denominado estabelecimento virtual, assim como seus reflexos nas mais variadas searas. Buscar-se-á compreender este fenômeno através do estudo da técnica, tudo com base nas obras do pensador Jacques Ellul, que trilhou sobre as mais diversas áreas do conhecimento no século passado, com extremo brilhantismo, podendo, além disso, ser considerado um visionário. Mostrar-se-ão os problemas que o avanço tecnológico vem trazendo, os quais complicam o ser humano em sua vida particular, criando neuroses, fruto da adaptação deste ao mundo moderno. Para tanto e de forma mais analítica estudar-se-ão as características da técnica moderna, as quais permitem entender como se dá o desenvolvimento da técnica. Buscar-se-á compreender também o que vem a ser a informação, a principal técnica da atualidade, e as diferentes concepções sobre a sociedade contemporânea. Além disso, analisar-se-á a influência da imagem na sociedade técnica e sua predominância em relação à palavra. Necessária também se mostrou a análise do que vem a ser o comércio eletrônico, o novo modelo de realizações negociais, que se apresenta em franco crescimento. Assim, o estabelecimento virtual surge dentro deste contexto, não permitindo a criação de obstáculos, se encontrando atualmente em todo o mundo, sem enxergar as diferenças culturais e as menosprezando, trazendo uma uniformidade ao mundo, tanto pela forma de comercializar, como pelos produtos que expõe. Mas não são todas as pessoas do globo que tem acesso a este, sendo este outro grande problema apresentado pelo estabelecimento virtual: a exclusão digital. Por conseguinte, demonstrar-se-á... (Resumo completo, clicar acesso eletrônico abaixo)
Abstract: The present study will try to create a profound reflexion about the technical advance in the modern society of the institute known as virtual establishment, and also its reflexes in a variety of associations. One of the objectives, is to understand this phenomenon thought the study of the technique, all based on the publications of the philosopher Jacques Ellul, who disserted about the various parts of knowledge in the last century with extreme brilliance,making him a true visionary. The problems brought by technological advances will be shown, these can complicated one's private life, generating neurosis, a product of its adaptation to the modern world. To do so in an analytical form, the characteristics of the modern technique will be studied, permitting tounderstand the development of the technique. The meaning of information, the principal technique used in the actuality, and its different conceptions in contemporaneous society will be explained, and also, the influence of image in the technical society and its predominance in relation with words will be analyzed. The analyses of what is electronic marketing, a new model of business transactions that is in fast growth should also be done. The virtual market appears inside this context, without obstacles, spreading to the entire globe, with no eyes for cultural differences, bringing uniformity to the world, not just in the way to shop but also on the products available. But not everyone has access to it, being this a big problem presented by the virtual establishment: the digital exclusion. In this work, there will be shown the necessity of development of ways to advance in the virtual technique, ways that show be the result of a critical and reflexive posture of the man, which is rarely seen now a days. This work will be based on comparison of the traditional establishment... (Complete abstract click electronic access below)
Mestre
劉漢傑. "電腦犯罪若干問題研究 =Research into the some question of computer crime." Thesis, University of Macau, 2016. http://umaclib3.umac.mo/record=b3570914.
Full textJeppson, Jonas. "The OECD cryptography policy guidelines and their implementation /." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=31164.
Full textHargreaves, C. J. "Assessing the Reliability of Digital Evidence from Live Investigations Involving Encryption." Thesis, Department of Informatics and Sensors, 2009. http://hdl.handle.net/1826/4007.
Full textHargreaves, Christopher James. "Assessing the reliability of digital evidence from live investigations involving encryption." Thesis, Cranfield University, 2009. http://dspace.lib.cranfield.ac.uk/handle/1826/4007.
Full textHarte, David. "Internet content control in Australia : data topology, topography and the data deficit." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2001. https://ro.ecu.edu.au/theses/1073.
Full textLouw, Sanelda. "Die belastingaftrekbaarheid van sagteware." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/20434.
Full textENGLISH ABSTRACT: The aim of this study is to determine the applicability of the various South African Income Taxation Act sections on the deduction of software costs. A distinction is made between the various deduction sections in the Income Taxation Act that are applicable to software costs. By doing this an appropriate taxation deduction is recommended for the different types of software costs that the taxpayer incurs. Software assets and expenditure can be divided into various categories based on the acquisition agreement. The rights and assets that are obtained, differ for each category of software cost. In some instances a copyright is obtained and in other instances only a right of use is obtained. Furthermore the taxpayer receives intellectual property, an intangible asset, and/or a tangible asset. A literature study and an analysis of the different types of software costs and the four concerned Income Taxation Act sections serve as background for the consideration of the applicability of each specific deduction section in the Income Taxation Act on the various categories of software costs. By using the information obtained in the literature study and the analyses, a recommendation is made of the most applicable deduction article for each category of software cost.
AFRIKAANSE OPSOMMING: Hierdie studie het ten doel om die toepaslikheid van die verskillende Suid-Afrikaanse Inkomstebelastingwetsartikels, op die aftrekking van sagtewarekoste te bepaal. 'n Onderskeid word getref tussen die verskillende aftrekkingsartikels wat van toepassing is op sagtewarekoste in die Inkomstebelastingwet. Sodoende word 'n geskikte belastingaftrekking vir die verskillende tipes sagtewarekoste voorgestel wat deur elke belastingpligtige aangegaan word. Sagtewarebates of -uitgawes kan in verskillende kategoriee verdeel word na aanleiding van die verkrygingsooreenkoms wat aangegaan is. Die regte en bates wat verkry word verskil ten opsigte van elke kategorie sagtewarekoste. In sommige gevalle word 'n outeursreg verkry en in ander gevalle slegs 'n gebruiksreg. Verder kan of intellekuele eiendom, 'n ontasbare bate, en/of 'n tasbare bate verkry word. 'n Literatuurstudie en analise van die verskillende tipes sagtewarekoste en die vIer betrokke Inkomstebelastingwetsartikels dien as agtergrond vir die oorweging van die toepaslikheid van elke spesifieke aftrekkingsartikel in die Inkomstebelastingwet op die onderskeie kategoriee sagtewarekoste. Daama word die inligting wat bekom is in die literatuurstudie en analise gebruik om die mees toepaslike aftrekkingsartikel vir elke kategorieë sagtewarekoste voor te stel.
Asubiaro, Omowumi Modupe. "www.crimesagainstchildren.com : addressing child pornography via the Internet in Africa." Thesis, University of the Western Cape, 2004. http://etd.uwc.ac.za/index.php?module=etd&.
Full textSouza, Ricardo Vieira de. "O ciberespaço e a jurisdição transnacional: necessidade de regulação." Pontifícia Universidade Católica de São Paulo, 2018. https://tede2.pucsp.br/handle/handle/21438.
Full textMade available in DSpace on 2018-09-26T10:04:28Z (GMT). No. of bitstreams: 1 Ricardo Vieira de Souza.pdf: 1123440 bytes, checksum: e5ceefcb485691ee0e19257f666d7604 (MD5) Previous issue date: 2018-08-24
This work is based on the concern about the practice of illicit at the transnational level facilitated by the incessant and always renewed improvement of communication through the world wide web. If on the one hand, the internet, an indisputable product of this network, has favored the connection between people from different parts of the world, on the other hand, has brought cyber-crime to the forefront, which at the same time challenges the establishment of a criminal guardianship for cyberspace in impunity. This is due to the phenomenon of globalization, which has shortened distances in the face of technological and social advances, and the consequences of criminal law. The present research sought to justify how it is possible before the classical concepts of sovereignty that a state effectively combats transnational cyber crime. For that, points were developed as to how the classic concept of sovereignty is found; the characteristics of cyberspace; and the concepts of jurisdiction and criminal jurisdiction. Thus, a dogmatic criminal and procedural criminal analysis will be carried out if it is possible to establish a transnational criminal jurisdiction as a way of regulating cyberspace
Este trabalho parte da preocupação com a prática de ilícitos em nível transnacional facilitada pelo aprimoramento incessante e sempre renovado da comunicação através da rede mundial de computadores. Se de um lado, a internet, produto indiscutível dessa rede, favoreceu a conexão entre as pessoas de diversas partes do mundo, de outro, trouxe à baila a criminalidade cibernética, que contemporaneamente desafia o estabelecimento de uma tutela penal para o ciberespaço no que tange a impunidade. Isso decorre do fenômeno da globalização, a qual encurtou distâncias em face dos avanços tecnológicos e sociais, e as consequências causadas ao direito penal. A presente pesquisa buscou fundamentar como é possível ante os conceitos clássicos de soberania, que um Estado combata a criminalidade cibernética transnacional de maneira efetiva. Para tanto, foram desenvolvidos pontos de como encontra-se o conceito clássico de soberania; as características do ciberespaço; e os conceitos de jurisdição e competência penal. Torna-se assim efetuar uma análise dogmática penal e processual penal se é possível se instituir uma jurisdição penal transnacional como forma de regular o ciberespaço
Breindl, Yana. "Hacking the law: an analysis of internet-based campaigning on digital rights in the European Union." Doctoral thesis, Universite Libre de Bruxelles, 2011. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/209836.
Full textThe belief in values of freedom, decentralisation, openness, creativity and progress inspires a particular type of activism, which promotes autonomy, participation and efficiency. The empirical evidence suggests that this set of principles can, at times, conflict with practices observed in the field. This has to do with the particular opportunity structure of the European Union and the characteristics of the movement. The EU favours functional integration of civil society actors who are expected to contribute technical and/or legal expertise. This configuration challenges internet-based protest networks that rely on highly independent and fluctuating engagement, and suffer from a lack of diversity and cohesion. The internet does not solve all obstacles to collective action. It provides, however, a networked infrastructure and tools for organising, coordinating and campaigning. Online and offline actions are not only supportive of each other. Internet-based campaigning can be successful once it reaches out beyond the internet, and penetrates the corridors of political institutions.
Doctorat en Information et communication
info:eu-repo/semantics/nonPublished
Spencer, Logan Lemuella C. "Changing from the silo model to the horizontal layers model in public policy regulations : the implications and potential for the telecommunications industry /." Thesis, Available online, Georgia Institute of Technology, 2005, 2005. http://etd.gatech.edu/theses/available/etd-11282005-192311/.
Full textPALKA, Przemyslaw. "Virtual property : towards a general theory." Doctoral thesis, 2017. http://hdl.handle.net/1814/49664.
Full textExamining Board: Professor Giovanni Sartor, European University Institute (Supervisor); Professor Hans-Wolfgang Micklitz, European University Institute; Professor Roger Brownsword, King’s College London; Professor Bartosz Brożek, Jagiellonian University
The primary contribution of the thesis is a theory enhancing the legal understanding of the phenomenon of virtual property, encompassing presentation of data and a new conceptual framework to interpret it. The author argues that the normative debates concerning the phenomenon have underestimated the importance of understanding and conceptualizing it first, and aims at amending this gap. The ‘virtual property phenomenon’ refers to the users of internet platforms and online computer games ‘possessing’ virtual items – digital objects that exist within these services – and getting into economic and social relations concerning these items, with other users, service providers and third parties. These relations are regulated by different types of service-specific rules – contractual and the ‘code’ – created unilaterally by the service providers, who additionally retain the ability to interpret and enforce them, using ‘digital force’, i.e. by modifying and deleting virtual items, and blocking users’ accounts. The primary challenge stems not from the fact that the phenomenon is not regulated, but from the fact that lawyers lack words – terms and concepts – to even conduct a meaningful debate about it, or how to respond to it. The thesis consists of six chapters. Firstly, the author describes the phenomenon and analyzes the theoretical and regulatory legal challenges posed by its emergence. Secondly, he critically assesses the state of the art. Thirdly, a methodology to address these challenges is proposed, which can also be used in other research projects concerning law and technology. Fourthly, the author explains how the process of digitalization has fundamentally challenged the assumptions that private law held about the structure of reality, and proposes new doctrinal tools to conceptualize it. Fifthly, the author presents a legally useful concept of virtual items, and argues that granting users property rights over them might not be the optimal means of realizing the property goals. Finally, the author proposes a normative solution, a correction of private law, responding to the new type of inequality in relations, namely a user protection law.
Chapters 3.2.2. 'The formation of legal concepts : organic and manual acquiring of meaning'; 4.2.1. 'Objects'; 5.1.2. 'The three step-method : particularization of the Idea by the features of an object'; and 5.2.3. 'The method applied' of the thesis draws upon an earlier version published as an EUI Working Paper 2016/08 'Redefining 'property' in the digital era : when online, do as the Romans did'
LIU, CHING-CHIA, and 劉景嘉. "A Study of Legislation on Computer Crimes under Criminal Law." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/63158231865708707433.
Full text國立臺北大學
法律學系一般生組
102
The propose of this thesis was to identify the meaning of computer crime, and discover the legal interest which computer crime law protects. Since the idea of a separate category of computer crime arose in Taiwan (Republic of China), the evolution of such legislation followed successive waves, reflecting establishing the Chapter 36 of Criminal Code of Republic of China (hereinafter criminal code) -“Offenses Against the Computer Security”. However, due to the prohibition against the computer crimes is new, the interpretation of computer crime law remains many problems in Taiwan. Therefore, at the first, the author tried to analyze the scope of computer crimes under criminal law by comparing the differences of jurisdiction between Taiwan and other common law countries, and those countries were the United States of America, the United Kingdom, Australia, and Canada. Second, the author tried to interpret the articles in Chapter 36 of Criminal Code by the result of observing different jurisdiction and analyzing the materials in Taiwan. The results are as follows. First, the concerns of each jurisdiction was to protect against unauthorized access to computer data or computer system, so the prohibition against the offenses were those computer misuse crimes, excluding the traditional criminal offenses facilitated by computers. Therefore, “computer misuse crime” should be equivalent to “computer crime”, and the author defined computer crime as the conduct that intentionally causes interference with the proper functioning of computers and computer networks, so that upsets user’s reliance on the rights and privileges provided by computer owners and operators. Furthermore, there could be divided into four categories of offenses under computer crime law in each jurisdiction , and those categories were Access Offenses, Impairment of Data, Interception of Data, and Misuse Devices. Consequently, as the author tried to distinguish the offenses against computer crime law by timeline, those offenses could be divided into Misuse Devices, Access Offenses, and Misuse and Impairment of Data. Second, as the concerns of each jurisdiction was to protect computer data or computer system under computer crime law, it was an inspiration for discovering the legal interest which is protected by the Chapter 36 of Criminal Code. Briefly, in the modern society, as the computer technology has improved and proliferated in our society, businesses, and personal daily lives, more and more people use computers and rely on them as part of their life, so the collapse of computer system or cyberspace on the internet might result in the collapse of society. Therefore, the reason why the concerns of each jurisdiction was to protect the computer data or computer system was because of maintaining order in cyberspace, and it was the exactly legal interest protected under Chapter 36 of Criminal Code. The author recommends that when interpreting the articles in the Chapter 36 of Criminal Code, it should be aware of the legal interest, which is protected in this chapter. Therefore, since the requirement of certain articles in this chapter provided as “…causing damages to the public or others…”, it should be interpreted as the defendant must truly damage the order in cyberspace so could he meet the requirement of those offenses against computer crimes.
Hopewell, Nicholas James. "Eligibility to participate in the Olympics : ways to improve how disputes are resolved at games time." Thesis, 2004. http://hdl.handle.net/2429/15573.
Full textZimmeck, Sebastian. "Using Machine Learning to improve Internet Privacy." Thesis, 2017. https://doi.org/10.7916/D8862N5F.
Full textDagada, Rabelani. "Legal and policy aspects to consider when providing information security in the corporate environment." Thesis, 2014. http://hdl.handle.net/10500/18839.
Full textSchool of Computing
D. Phil. (Information Systems)
Maat, Sandra Mariana. "Cyber crime: a comparative law analysis." Diss., 2004. http://hdl.handle.net/10500/2056.
Full textJurisprudence
L. L. M.
Dempsey, Gillian. "Knowledge and innovation in intellectual property : the case of computer program copyright." Phd thesis, 1998. http://hdl.handle.net/1885/109408.
Full textJamalkhan, Nasserkhan. "What is the impact of the Cyber Crime Act on the business community in Mauritius." Thesis, 2004. http://hdl.handle.net/10413/1503.
Full textThesis (MBA)-University of KwaZulu-Natal, Durban, 2004.
Ulrich, Neil. "Wetgewing teen elektroniese betreding." Diss., 1998. http://hdl.handle.net/10500/16234.
Full textParralel met die snelle groei van rekenaartegnologie en die groteiwordende rol wat rekenaars in ans alledaagse lewe speel, is daar ongelukkig 'n toename in die misbruik van rekenaars. Benewens die wyses om rekenaarmisbruik by wyse van remedies in die siviele reg aan te spreek, is dit hoofsaaklik die taak van die strafreg om sodanige misbruik te kriminaliseer en deur middel van straf sulke misbruik te voorkom en oortreders af te skrik. Uit 'n ontleding van die Suid-Afrikaanse strafreg het dit geblyk dat bestaande misdrywe, beide gemeenregtelik en statuter, nie voldoende rekenaarmisbruik kan kriminaliseer en aanspreek nie. Wetgewing blyk die mees gepaste optossing te wees. Uit 'n regsvergelykende studie van die hantering van rekenaarmisbruik in jurisdiksies waar die wetgewer verskillende benaderings toegepas het, het dit geblyk dat die mees gepaste wyse om rekenaarmisbruik te kriminaliseer sal wees om ongemagtigde rekenaarbetreding as moedermisdaad te bestraf aangesien dit die fondament is waarop enige verdere misbruik van 'n rekenaar gebaseer word. Daarbenewens moet verdere meer spesifieke misbruikshandelinge wyd omskryfword as misdrywe, ten opsigte van meer emstige misbruik na betreding van 'n rekenaar
Parallel with the growth in computer technology and increasing use of computers, there has been an increase in computer misuse. In addition to addressing different methods of computer misuse in terms of civil law remedies, it is mainly the task of the criminal law to criminalise such misuse, prevent computer misuse and deter offenders by means of punishment. It was clear from a study of South African criminal law that existing offences, both statutory and in terms of the common law, do not criminalise and address computer misuse effectively. It therefore seems that legislation would be the most appropriate solution. It appeared from a comparative study of jurisdictions where legislators approach computer misuse differently, that the most effective way of criminalising computer misuse would be to criminalise una1,1thorised computer accessing as basic offence. In addition thereto more specific further acts of serious computer misuse, defined broadly, should be criminalised
Criminal & Procedural Law
LL.M. (Criminal & Procedural Law)
Lehobye, Nafta Mokate. "Cyber-law of copyright protection and the fair-use of doctrine : a conflict theory approach for the information systems researchers." Thesis, 2011. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000686.
Full textThis is a South African case in which some kind of justified divergence on the use of cyber-digital copyright protected material of the author referred to as 'fair-use' exists. What exactly is it and to what extent fair-use should be considered fair according to the 'fair-use doctrine'? What may be the concomitant permissibility between cyber-law of copyright protection and fair-use defence? Is it treated on the basis of take-it-or-leave-it or is it a win-win situation? What does our law say about this? In order to answer these questions, this study focused on the effect of cyber-law of copyright on South African academic and research institutions. The study covered topics that include how cyber-law of copyrights has changed access to works. It will also indicate what the effect of legislation is (or the lack thereof) on fair-use vis-à-vis the copyright protection, all of these being exposed to management of cyber-copyrights at the said institutions. Apart from a short synopsis on the conflict, de minimis copying (copying small) and substantial taking, it finally, also reflects, based on this theory, the fundamental conflict theme as envisaged and propagated between both the copyrights and fair-use contradistinction. In order to realize all these, the research will also look into ways of circumventing the possibility of infringement by not only extensively examining, through hypothetical scenario, cyber-law of copyrights protection, but also examining the fair-use defence. Empirical research in the faculty of Information and Communication Technology of Universities of Technology has also been conducted. The Study thus concludes by illuminating that as the IS researchers fare with the impression that copyrights law is, to some extent, only limited to printed and not digital information, the IS researchers, as are not legal experts, need some form of legal orientation on the interpretation of copyrights law in order to promote IS scholarship.
PORCEDDA, Maria Grazia. "Cybersecurity and privacy rights in EU law : moving beyond the trade-off model to appraise the role of technology." Doctoral thesis, 2017. http://hdl.handle.net/1814/45944.
Full textExamining Board: Professor Marise Cremona, EUI (Supervisor); Professor Deirdre Curtin, EUI; Professor Anne Flanagan, Queen Mary University of London; Professor Ronald Leenes, Tilburg University
This thesis concerns a specific instance of the trade-off between security and ‘privacy rights’, namely cybersecurity, as it applies to EU Law. The research question is whether, and how, the pursuit of cybersecurity can be reconciled with the protection of personal data and respect for private and family life, which I treat as two independent rights. Classic legal argumentation is used to support a normative critique against the trade-off; an in-depth scrutiny of ‘(cyber)security’ and ‘privacy’ further shows that the trade-off is methodologically flawed: it is an inappropriate intellectual device that offers a biased understanding of the subject matter. Once the terms of discussion are reappraised, the relationship between cybersecurity and privacy appears more nuanced, and is mediated by elements otherwise overlooked, chiefly technology. If this fatally wounds the over-simplistic trade-off model, and even opens up avenues for integration between privacy and cybersecurity in EU law, on the other hand it also raises new questions. Looked at from the perspective of applicable law, technology can both protect and infringe privacy rights, which leads to the paradox of the same technology being both permissible and impermissible, resulting in a seeming impasse. I identify the problem as lying in the combination of technology neutrality, the courts’ avoidance in pronouncing on matters of technology, and the open-ended understanding of privacy rights. To appraise whether cybersecurity and privacy rights can be reconciled, I develop a method that bridges the technological and legal understandings of information security and privacy, based on the notions/methods of protection goals, attributes and core/periphery or essence, and which has the advantage of highlighting the independence of the two privacy rights. A trial run of the method discloses aspects of the ‘how’ question that were buried under the trade-off debate, viz. the re-appropriation of the political and judicial process vis-àvis technology.
Chapter 4 draws upon an article in Neue Kriminalpolitik 4/2013
Sullivan, Clare Linda. "Digital identity: an emergent legal concept; an analysis of the role and legal nature of digital identity in a transactional context." 2009. http://hdl.handle.net/2440/54148.
Full textThesis (Ph.D.) -- University of Adelaide, Law School, 2009
Lentz, Roberta G. ""Linguistic engineering" and the FCC computer inquiries, 1966-1989." 2008. http://hdl.handle.net/2152/18249.
Full texttext
Hills, Cathrine Anna. "Developing a law and policy framework to regulate cyber bullying in South African schools." Thesis, 2017. http://hdl.handle.net/10500/22794.
Full textPublic, Constitutional and International Law
LL. D.
Mtuze, Sizwe Lindelo Snail ka. "A comparative review of legislative reform of electronic contract formation in South Africa." Diss., 2015. http://hdl.handle.net/10500/22724.
Full textMercantile Law
LLM
Popoola, Olumuyiwa Oluwole. "Satutory limitation of liability of internet service providers in decentralized peer to peer file sharing." Diss., 2012. http://hdl.handle.net/10500/5618.
Full textMercentile Law
LL. M. (Mercantile Law)