Opening up government data for Big Data analysis and public benefit K Hardy, A Maurushat Computer law & security review 33 (1), 30-37, 2017 | 155 | 2017 |
Technical protection measures: tilting at copyright's windmill IR Kerr, A Maurushat, CS Tacit Ottawa L. Rev. 34, 7, 2002 | 95* | 2002 |
The role of user behaviour in improving cyber security management AA Moustafa, A Bello, A Maurushat Frontiers in Psychology 12, 561011, 2021 | 92 | 2021 |
Factors affecting reputational damage to organisations due to cyberattacks S Perera, X Jin, A Maurushat, DGJ Opoku Informatics 9 (1), 28, 2022 | 42 | 2022 |
Fragmented Copyright, Fragmented Management: Proposals to Defrag Copyright Management D Gervais, A Maurushat Canadian Journal of Law and Technology 2 (1), 2003 | 39 | 2003 |
Disclosure of security vulnerabilities: Legal and ethical issues A Maurushat Springer, 2013 | 33 | 2013 |
Incorporating psychology into cyber security education: a pedagogical approach J Taylor-Jackson, J McAlaney, JL Foster, A Bello, A Maurushat, J Dale Financial Cryptography and Data Security: FC 2020 International Workshops …, 2020 | 31 | 2020 |
Ethical hacking A Maurushat University of Ottawa Press/Les Presses de l’Université d’Ottawa, 2019 | 31 | 2019 |
Technical and behavioural training and awareness solutions for mitigating ransomware attacks A Bello, A Maurushat Applied Informatics and Cybernetics in Intelligent Systems: Proceedings of …, 2020 | 27 | 2020 |
Addressing identity crime in crime management information systems: Definitions, classification, and empirics R Jamiesona, LPW Landa, D Winchestera, G Stephensa, A Steelb, ... Transnational Financial Crime, 399-414, 2017 | 26 | 2017 |
Australia’s accession to the cybercrime convention: is the convention still relevant in combating cybercrime in the era of botnets and obfuscation crime tools? A Maurushat TheUNIVERSITY OF NEW SOUTH WALES LAW JOURNAL 33 (2), 431-473, 2010 | 20 | 2010 |
" Good" worms and human rights J Aycock, A Maurushat Acm Sigcas Computers and Society 38 (1), 28-39, 2008 | 20 | 2008 |
The Impact of Social Networks and Mobile Technologies on the Revolutions in the Arab World—A Study of Egypt and Tunisia A Maurushat, M Chawki, H Al-Alosi, Y Shazly Laws 3 (4), 674-692, 2014 | 18 | 2014 |
Exploring the limits of computer code as a protected form of expression: a suggested approach to encryption, computer viruses, and technological protection measures A Colangelo, A Maurushat McGill LJ 51, 47, 2005 | 18 | 2005 |
Using'big'metadata for criminal intelligence: understanding limitations and appropriate safeguards A Maurushat, L Bennett-Moses, D Vaile Proceedings of the 15th International Conference on Artificial Intelligence …, 2015 | 16 | 2015 |
Security risks and user perception towards adopting wearable internet of medical things S Thapa, A Bello, A Maurushat, F Farid International Journal of Environmental Research and Public Health 20 (8), 5519, 2023 | 14 | 2023 |
Future threats J Aycock, A Maurushat UNSW Law Research Paper, 2009 | 13 | 2009 |
Investigation of cryptocurrency enabled and dependent crimes A Maurushat, D Halpin Financial Technology and the Law: Combating Financial Crime, 235-267, 2022 | 12 | 2022 |
The legal obligation to provide timely security patching and automatic updates A Maurushat, K Nguyen International cybersecurity law review 3 (2), 437-465, 2022 | 11 | 2022 |
Working from home users at risk of COVID-19 ransomware attacks AA Duong, A Bello, A Maurushat Cybersecurity and cognitive science, 51-87, 2022 | 11 | 2022 |