Suivre
Alana Maurushat
Alana Maurushat
Professor of Cybersecurity and Behaviour
Adresse e-mail validée de westernsydney.edu.au
Titre
Citée par
Citée par
Année
Opening up government data for Big Data analysis and public benefit
K Hardy, A Maurushat
Computer law & security review 33 (1), 30-37, 2017
1572017
The role of user behaviour in improving cyber security management
AA Moustafa, A Bello, A Maurushat
Frontiers in Psychology 12, 561011, 2021
1022021
Technical protection measures: tilting at copyright's windmill
IR Kerr, A Maurushat, CS Tacit
Ottawa L. Rev. 34, 7, 2002
95*2002
Factors affecting reputational damage to organisations due to cyberattacks
S Perera, X Jin, A Maurushat, DGJ Opoku
Informatics 9 (1), 28, 2022
502022
Fragmented Copyright, Fragmented Management: Proposals to Defrag Copyright Management
D Gervais, A Maurushat
Canadian Journal of Law and Technology 2 (1), 2003
392003
Incorporating psychology into cyber security education: a pedagogical approach
J Taylor-Jackson, J McAlaney, JL Foster, A Bello, A Maurushat, J Dale
Financial Cryptography and Data Security: FC 2020 International Workshops …, 2020
332020
Disclosure of security vulnerabilities: Legal and ethical issues
A Maurushat
Springer, 2013
332013
Ethical hacking
A Maurushat
University of Ottawa Press/Les Presses de l’Université d’Ottawa, 2019
312019
Technical and behavioural training and awareness solutions for mitigating ransomware attacks
A Bello, A Maurushat
Applied Informatics and Cybernetics in Intelligent Systems: Proceedings of …, 2020
272020
Addressing identity crime in crime management information systems: Definitions, classification, and empirics
R Jamiesona, LPW Landa, D Winchestera, G Stephensa, A Steelb, ...
Transnational Financial Crime, 399-414, 2017
262017
Australia’s accession to the cybercrime convention: is the convention still relevant in combating cybercrime in the era of botnets and obfuscation crime tools?
A Maurushat
TheUNIVERSITY OF NEW SOUTH WALES LAW JOURNAL 33 (2), 431-473, 2010
202010
" Good" worms and human rights
J Aycock, A Maurushat
Acm Sigcas Computers and Society 38 (1), 28-39, 2008
202008
The Impact of Social Networks and Mobile Technologies on the Revolutions in the Arab World—A Study of Egypt and Tunisia
A Maurushat, M Chawki, H Al-Alosi, Y Shazly
Laws 3 (4), 674-692, 2014
182014
Exploring the limits of computer code as a protected form of expression: a suggested approach to encryption, computer viruses, and technological protection measures
A Colangelo, A Maurushat
McGill LJ 51, 47, 2005
182005
Using'big'metadata for criminal intelligence: understanding limitations and appropriate safeguards
A Maurushat, L Bennett-Moses, D Vaile
Proceedings of the 15th International Conference on Artificial Intelligence …, 2015
172015
Investigation of cryptocurrency enabled and dependent crimes
A Maurushat, D Halpin
Financial Technology and the Law: Combating Financial Crime, 235-267, 2022
162022
Security risks and user perception towards adopting wearable internet of medical things
S Thapa, A Bello, A Maurushat, F Farid
International Journal of Environmental Research and Public Health 20 (8), 5519, 2023
152023
The legal obligation to provide timely security patching and automatic updates
A Maurushat, K Nguyen
International cybersecurity law review 3 (2), 437-465, 2022
142022
Future threats
J Aycock, A Maurushat
UNSW Law Research Paper, 2009
132009
Fragmented Copyright, Fragmented Management: Proposals to Defrag Copyright Management’(2003)
D Gervais, A Maurushat
Canadian Journal of Law and Technology 2, 15, 0
12
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20