LawCite Search |
LawCite Markup Tool |
Help |
Feedback
Law Cite |
Case Name | Citation(s) | Court | Jurisdiction | Date | Full Text † | Citation Index | |
"Endnote on Regulating Cyberspace: Architecture vs Law, An" | (1998) 21 University of New South Wales Law Journal 593 | University of New South Wales Law Journal | Australia | circa 1998 | AustLII |
|
|
"The Death Of Privacy?" |
|
Stanford Law Review | United States | circa 2000 | HeinOnline / LexisNexis |
|
|
(1999) 12 Harvard Journal of Law & Technology 513 | (1999) 12 Harvard Journal of Law & Technology 513 | Harvard Journal of Law & Technology | United States | circa 1999 | HeinOnline / LexisNexis |
|
|
"The Law of the Horse: What Cyberlaw Might Teach" |
|
Harvard Law Review | United States | circa 1999 | HeinOnline / LexisNexis |
|
|
"A Typology of Privacy" | (2017) 38 University of Pennsylvania Journal of International Law 496 | University of Pennsylvania Journal of International Law | United States | circa 2017 | HeinOnline / Westlaw |
|
|
"Surfing the Third Wave of Computing: A Framework for Research Into eObjects" | (2015) 31 (5) Computer Law & Security Review 586 | Computer Law & Security Review | Netherlands | circa 2015 |
|
||
(2014) 30 (3) Computer Law & Security Review 263 | (2014) 30 (3) Computer Law & Security Review 263 | Computer Law & Security Review | Netherlands | circa 2014 |
|
||
"Privacy Impact Assessments as a Control Mechanism for Australian National Security Initiatives" | (2016) 32 (3) Computer Law & Security Review 403 | Computer Law & Security Review | Netherlands | circa 2016 |
|
||
(2014) 30 (3) Computer Law & Security Review 286 | (2014) 30 (3) Computer Law & Security Review 286 | Computer Law & Security Review | Netherlands | circa 2014 |
|
||
"Location and Tracking of Mobile Devices: Ü berveillance Stalks the Streets" | (2013) 29 (3) Computer Law & Security Review 216 | Computer Law & Security Review | Netherlands | circa 2013 |
|