Folgen
Alana Maurushat
Alana Maurushat
Professor of Cybersecurity and Behaviour
Bestätigte E-Mail-Adresse bei westernsydney.edu.au
Titel
Zitiert von
Zitiert von
Jahr
Opening up government data for Big Data analysis and public benefit
K Hardy, A Maurushat
Computer law & security review 33 (1), 30-37, 2017
1412017
Technical protection measures: tilting at copyright's windmill
IR Kerr, A Maurushat, CS Tacit
Ottawa L. Rev. 34, 7, 2002
89*2002
The role of user behaviour in improving cyber security management
AA Moustafa, A Bello, A Maurushat
Frontiers in Psychology 12, 561011, 2021
632021
Fragmented Copyright, Fragmented Management: Proposals to Defrag Copyright Management
D Gervais, A Maurushat
Canadian Journal of Law and Technology 2 (1), 2003
382003
Disclosure of security vulnerabilities: Legal and ethical issues
A Maurushat
Springer, 2013
332013
Factors affecting reputational damage to organisations due to cyberattacks
S Perera, X Jin, A Maurushat, DGJ Opoku
Informatics 9 (1), 28, 2022
272022
Ethical hacking
A Maurushat
University of Ottawa Press/Les Presses de l’Université d’Ottawa, 2019
262019
Addressing identity crime in crime management information systems: Definitions, classification, and empirics
R Jamiesona, LPW Landa, D Winchestera, G Stephensa, A Steelb, ...
Transnational Financial Crime, 399-414, 2017
262017
Incorporating psychology into cyber security education: a pedagogical approach
J Taylor-Jackson, J McAlaney, JL Foster, A Bello, A Maurushat, J Dale
Financial Cryptography and Data Security: FC 2020 International Workshops …, 2020
242020
Australia’s accession to the cybercrime convention: is the convention still relevant in combating cybercrime in the era of botnets and obfuscation crime tools?
A Maurushat
TheUNIVERSITY OF NEW SOUTH WALES LAW JOURNAL 33 (2), 431-473, 2010
202010
" Good" worms and human rights
J Aycock, A Maurushat
Acm Sigcas Computers and Society 38 (1), 28-39, 2008
192008
The Impact of Social Networks and Mobile Technologies on the Revolutions in the Arab World—A Study of Egypt and Tunisia
A Maurushat, M Chawki, H Al-Alosi, Y Shazly
Laws 3 (4), 674-692, 2014
172014
Exploring the limits of computer code as a protected form of expression: a suggested approach to encryption, computer viruses, and technological protection measures
A Colangelo, A Maurushat
McGill LJ 51, 47, 2005
172005
Technical and behavioural training and awareness solutions for mitigating ransomware attacks
A Bello, A Maurushat
Applied Informatics and Cybernetics in Intelligent Systems: Proceedings of …, 2020
162020
Using'big'metadata for criminal intelligence: understanding limitations and appropriate safeguards
A Maurushat, L Bennett-Moses, D Vaile
Proceedings of the 15th International Conference on Artificial Intelligence …, 2015
162015
Future threats
J Aycock, A Maurushat
UNSW Law Research Paper, 2009
132009
Data Breach Notification Law Across the World from California to Australia
A Maurushat
Privacy Law and Business International, February, 2009
102009
Fragmented Copyright, Fragmented Management: Proposals to Defrag Copyright Management’(2003)
D Gervais, A Maurushat
Canadian Journal of Law and Technology 2, 15, 0
10
Multi-lateral recognition of PKI certification authorities in the Asian region: Transborder data flow and information privacy issues
A Maurushat
Hong Kong LJ 35, 569, 2005
92005
The legal obligation to provide timely security patching and automatic updates
A Maurushat, K Nguyen
International cybersecurity law review 3 (2), 437-465, 2022
82022
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20