Opening up government data for Big Data analysis and public benefit K Hardy, A Maurushat Computer law & security review 33 (1), 30-37, 2017 | 144 | 2017 |
Technical protection measures: tilting at copyright's windmill IR Kerr, A Maurushat, CS Tacit Ottawa L. Rev. 34, 7, 2002 | 89* | 2002 |
The role of user behaviour in improving cyber security management AA Moustafa, A Bello, A Maurushat Frontiers in Psychology 12, 561011, 2021 | 68 | 2021 |
Fragmented Copyright, Fragmented Management: Proposals to Defrag Copyright Management D Gervais, A Maurushat Canadian Journal of Law and Technology 2 (1), 2003 | 38 | 2003 |
Disclosure of security vulnerabilities: Legal and ethical issues A Maurushat Springer, 2013 | 33 | 2013 |
Factors affecting reputational damage to organisations due to cyberattacks S Perera, X Jin, A Maurushat, DGJ Opoku Informatics 9 (1), 28, 2022 | 27 | 2022 |
Ethical hacking A Maurushat University of Ottawa Press/Les Presses de l’Université d’Ottawa, 2019 | 26 | 2019 |
Addressing identity crime in crime management information systems: Definitions, classification, and empirics R Jamiesona, LPW Landa, D Winchestera, G Stephensa, A Steelb, ... Transnational Financial Crime, 399-414, 2017 | 26 | 2017 |
Incorporating psychology into cyber security education: a pedagogical approach J Taylor-Jackson, J McAlaney, JL Foster, A Bello, A Maurushat, J Dale Financial Cryptography and Data Security: FC 2020 International Workshops …, 2020 | 25 | 2020 |
Australia’s accession to the cybercrime convention: is the convention still relevant in combating cybercrime in the era of botnets and obfuscation crime tools? A Maurushat TheUNIVERSITY OF NEW SOUTH WALES LAW JOURNAL 33 (2), 431-473, 2010 | 20 | 2010 |
" Good" worms and human rights J Aycock, A Maurushat Acm Sigcas Computers and Society 38 (1), 28-39, 2008 | 19 | 2008 |
Technical and behavioural training and awareness solutions for mitigating ransomware attacks A Bello, A Maurushat Applied Informatics and Cybernetics in Intelligent Systems: Proceedings of …, 2020 | 18 | 2020 |
The Impact of Social Networks and Mobile Technologies on the Revolutions in the Arab World—A Study of Egypt and Tunisia A Maurushat, M Chawki, H Al-Alosi, Y Shazly Laws 3 (4), 674-692, 2014 | 17 | 2014 |
Exploring the limits of computer code as a protected form of expression: a suggested approach to encryption, computer viruses, and technological protection measures A Colangelo, A Maurushat McGill LJ 51, 47, 2005 | 17 | 2005 |
Using'big'metadata for criminal intelligence: understanding limitations and appropriate safeguards A Maurushat, L Bennett-Moses, D Vaile Proceedings of the 15th International Conference on Artificial Intelligence …, 2015 | 16 | 2015 |
Future threats J Aycock, A Maurushat UNSW Law Research Paper, 2009 | 13 | 2009 |
Data Breach Notification Law Across the World from California to Australia A Maurushat Privacy Law and Business International, February, 2009 | 10 | 2009 |
Fragmented Copyright, Fragmented Management: Proposals to Defrag Copyright Management’(2003) D Gervais, A Maurushat Canadian Journal of Law and Technology 2, 15, 0 | 10 | |
Investigation of cryptocurrency enabled and dependent crimes A Maurushat, D Halpin Financial Technology and the Law: Combating Financial Crime, 235-267, 2022 | 9 | 2022 |
Multi-lateral recognition of PKI certification authorities in the Asian region: Transborder data flow and information privacy issues A Maurushat Hong Kong LJ 35, 569, 2005 | 9 | 2005 |