{"title":"South Korea","authors":"R. Walters, M. Novak","doi":"10.1057/978-1-349-95839-9_1406","DOIUrl":"https://doi.org/10.1057/978-1-349-95839-9_1406","url":null,"abstract":"","PeriodicalId":130072,"journal":{"name":"Cyber Security, Artificial Intelligence, Data Protection & the Law","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131526523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Security","authors":"R. Walters, M. Novak","doi":"10.1007/978-981-10-8536-9","DOIUrl":"https://doi.org/10.1007/978-981-10-8536-9","url":null,"abstract":"","PeriodicalId":130072,"journal":{"name":"Cyber Security, Artificial Intelligence, Data Protection & the Law","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126197748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Protection","authors":"R. Walters, M. Novak","doi":"10.1007/978-981-16-1665-5_4","DOIUrl":"https://doi.org/10.1007/978-981-16-1665-5_4","url":null,"abstract":"","PeriodicalId":130072,"journal":{"name":"Cyber Security, Artificial Intelligence, Data Protection & the Law","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115563592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison, Challenges and a Way Forward","authors":"R. Walters, M. Novak","doi":"10.1007/978-981-16-1665-5_15","DOIUrl":"https://doi.org/10.1007/978-981-16-1665-5_15","url":null,"abstract":"","PeriodicalId":130072,"journal":{"name":"Cyber Security, Artificial Intelligence, Data Protection & the Law","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115285842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lao","authors":"R. Walters, Marko Novak","doi":"10.4324/9780203169483-28","DOIUrl":"https://doi.org/10.4324/9780203169483-28","url":null,"abstract":"recruitment (reproduction, immigration from unaffected areas)","PeriodicalId":130072,"journal":{"name":"Cyber Security, Artificial Intelligence, Data Protection & the Law","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121746698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Problem Definition, Structure and Methodology","authors":"Robert Walters, L. Trakman, B. Zeller","doi":"10.1007/978-981-13-8110-2_1","DOIUrl":"https://doi.org/10.1007/978-981-13-8110-2_1","url":null,"abstract":"","PeriodicalId":130072,"journal":{"name":"Cyber Security, Artificial Intelligence, Data Protection & the Law","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122164028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial Intelligence and Law","authors":"R. Walters, Marko Novak","doi":"10.1007/978-981-16-1665-5_3","DOIUrl":"https://doi.org/10.1007/978-981-16-1665-5_3","url":null,"abstract":"","PeriodicalId":130072,"journal":{"name":"Cyber Security, Artificial Intelligence, Data Protection & the Law","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127172932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"China","authors":"R. Walters, Marko Novak","doi":"10.1007/978-981-16-1665-5_12","DOIUrl":"https://doi.org/10.1007/978-981-16-1665-5_12","url":null,"abstract":"","PeriodicalId":130072,"journal":{"name":"Cyber Security, Artificial Intelligence, Data Protection & the Law","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134298322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Philippines","authors":"R. Walters, M. Novak","doi":"10.1007/978-981-16-1665-5_8","DOIUrl":"https://doi.org/10.1007/978-981-16-1665-5_8","url":null,"abstract":"","PeriodicalId":130072,"journal":{"name":"Cyber Security, Artificial Intelligence, Data Protection & the Law","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129197170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}