Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,237,874 papers from all fields of science
Search
Sign In
Create Free Account
Computer fraud
Known as:
Computer Fraud Case Studies
Computer fraud is the act of using a computer to take or alter electronic data, or to gain unlawful use of a computer or system. In the United States…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Computer Fraud and Abuse Act
Computer virus
Cybercrime
DarkMarket
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2012
Review
2012
Can Voter ID Laws Be Administered in a Race-Neutral Manner? Evidence from the City of Boston in 2008
R. Cobb
,
D. Greiner
,
K. Quinn
2012
Corpus ID: 28577996
Is it feasible in the current United States to administer voter identification laws in a race-neutral manner? We study this…
Expand
2012
2012
A Navel Approach to Identify Geo-Encryption with GPS and Different Parameters ( Locations And Time )
V. Rajeswari
,
V. Murali
,
A. Anil
2012
Corpus ID: 15755630
We are moving towards an era where location information will be necessary for access control. The use of location information can…
Expand
2012
2012
Making Voters Count: Evidence from Field Experiments about the Efficacy of Domestic Election Observation
Fredrik M. Sjoberg
2012
Corpus ID: 16360533
Elections are important because they hold the promise of empowering voters to hold leaders accountable. The sad reality, however…
Expand
2011
2011
The Determinates Of Selecting Accounting Software: A Proposed Model
Ahmad A. Abu-Musa
Business Information Systems
2011
Corpus ID: 56427434
Selecting the appropriate accounting software has become an important issue for many organizations. Selecting the wrong…
Expand
2011
2011
Guidelines for the creation of brain-compatible cyber security educational material in Moodle 2.0
Rayne Reid
,
J. V. Niekerk
,
R. V. Solms
Information Security for South Africa
2011
Corpus ID: 7725765
Most current approaches towards information security education do not have a sound theoretical basis. This could lead to the…
Expand
2009
2009
Detecting Voter Fraud in an Electronic Voting Context: An Analysis of the Unlimited Reelection Vote in Venezuela
Inés Levin
,
G. Cohn
,
P. Ordeshook
,
R. Alvarez
Conference on Electronic voting technology…
2009
Corpus ID: 6957327
Between December 2007 and February 2009, Venezuelans participated twice in constitutional referenda where the elimination of…
Expand
2007
2007
The long-term preservation of identifiable personal data: a comparative archival perspective on privacy regulatory models in the European Union, Australia, Canada and the United States
L. Iacovino
,
M. Todd
2007
Corpus ID: 145051821
This article analyses the extent to which archival exemptions for historical, scientific and statistical research in privacy…
Expand
2006
2006
Introduction: the contradictions and ironies of elections in Africa
K. Ninsin
2006
Corpus ID: 73701984
This introduction interrogates the popular meaning attached to elections in a liberal democracy, where they are generally…
Expand
Review
2004
Review
2004
Terrorism Offences in the 'Criminal Code': Broadening the Boundaries of Australian Criminal Laws
B. McSherry
2004
Corpus ID: 155988619
A review on the inclusion of terrorism offences in Australian domestic law from the perspective of an academic criminal lawyer is…
Expand
Highly Cited
2001
Highly Cited
2001
Democracy Assistance and Political Transition in Russia: Between Success and Failure
S. Mendelson
International Security
2001
Corpus ID: 57561731
International Security, Vol. 25, No. 4 (Spring 2001), pp. 68–106 © 2001 by the President and Fellows of Harvard College and the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE