Browse By Person: Georgiades, Jenny

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 9.


Pappalardo, Kylie M., Fitzgerald, Brian F., Fitzgerald, Anne M., Kiel-Chisholm, Scott D., Georgiades, Jenny, & Austin, Anthony C. (2008) Understanding Open Access in the Academic Environment : A Guide for Authors. Queensland University of Technology.
Number of full-text downloads 7,426

Book Chapter

Caelli, Bill, Raghavan, S., Bhaskar, Surinder, & Georgiades, Jenny (2011) Policy and law: Denial of Service threat. In Raghavan, S & Dawson, E (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 41-114.

Journal Article

Georgiades, Jenny (2013) Closing the gap between copyright and designs : an age of enlightnement or state of confusion? Information & Communications Technology Law, 22(1), pp. 45-59.

Georgiades, Jenny, Caelli, William, Christensen, Sharon, & Duncan, William D. (2013) Crisis on impact : responding to cyber attacks on critical information infrastructures. The John Marshall Journal of Information Technology and Privacy Law, 30(1), pp. 31-66.

Georgiades, Jenny (2011) Resolving conflicting interests: Software patents versus open source. Information and Communications Technology Law, 20(3), pp. 225-252.
Number of citations in Scopus 1

Christensen, Sharon, Duncan, William, Caelli, Bill, & Georgiades, Jenny (2010) An achilles heel: Denial of service attacks on Australian critical information infrastructures. Information and Communication Technology Law, 19(1), pp. 61-85.

Georgiades, Jenny (2010) Copyright liability for users and distribution. Information and Communication Technology Law, 19(1), pp. 1-26.
Number of citations in Scopus 1

Georgiades, Jenny (2010) Falling through the cracks: the problem of granting software patents. Script-ed: a journal of law, technology and society, 7(3), pp. 474-496.

Georgiades, Jenny (2010) When secret use is not so secret. Information and Communications Technology Law, 19(2), pp. 165-188.

This list was generated on Sun Jul 23 07:52:48 2017 AEST.