From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Regulation of State Surveillance of the Internet.. ISSE, стр. 415-425. Vieweg, (2006)Determining When Conduct in Cyberspace Constitutes Cyber Warfare in Terms of the International Law and Tallinn Manual on the International Law Applicable to Cyber Warfare: A Synopsis.. ICDF2C, том 132 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 130-143. Springer, (2013)Restricting Excessive State-on-State Cyber Espionage under International Law: A Quest of Futility?. ISSE, стр. 134-143. Springer, (2014)Governmental Control of the Internet in addressing Law Enforcement and National Security.. ISSE, стр. 108-118. Vieweg+Teubner, (2008)When does Abuse of Social Media constitute a Crime? - A South African Legal Perspective within a Global Context.. ISSE, стр. 227-238. Springer, (2013)Justifiability of State Surveillance of the Internet as E-Security Mechanism.. ISSA, стр. 1-11. ISSA, Pretoria, South Africa, (2006)The Legal Conflict between Security and Privacy in Addressing Crime and Terrorism on the Internet.. ISSE, стр. 26-37. Vieweg+Teubner, (2007)Challenges pertaining to cyber war under international law.. CyberSec, стр. 1-5. IEEE, (2014)State-on-nationals' electronic communication surveillance in South Africa: A murky legal landscape to navigate?. ISSA, стр. 1-6. IEEE, (2015)Admissibility of Electronic Evidence in Criminal Proceedings: An Outline of the South African Legal Position.. J. Inf. Law Technol., (2009)