

Author: Guinchard Audrey
Publisher: Routledge Ltd
ISSN: 1468-4462
Source: Information, Communication and Society, Vol.11, Iss.7, 2008-10, pp. : 1030-1032
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


Questioning the “Crime” in Cybercrime
The Information Society, Vol. 24, Iss. 4, 2008-07 ,pp. :





