|
|
|
|
LEADER |
00000cas a2200000 4500 |
001 |
574353399 |
003 |
DE-627 |
005 |
20240503173659.0 |
007 |
cr ||||||||||| |
008 |
080814c20079999ii f| p|o 0 |0eng c |
016 |
7 |
|
|a 989876039
|2 DE-101
|
016 |
7 |
|
|a 2442372-5
|2 DE-600
|
022 |
|
|
|a 0974-2891
|
024 |
8 |
|
|a DOAJ-568208cbe266409b9d198e60249840c9
|q Identnummer
|
035 |
|
|
|a (DE-627)574353399
|
035 |
|
|
|a (DE-576)284928607
|
035 |
|
|
|a (DE-599)ZDB2442372-5
|
035 |
|
|
|a (OCoLC)1368957242
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XB-IN
|
082 |
0 |
4 |
|a 340
|a 004
|q DE-600
|
084 |
|
|
|a 2,1
|2 ssgn
|
245 |
1 |
0 |
|a International journal of cyber criminology
|b IJCC
|
246 |
3 |
3 |
|a IJCC
|
264 |
3 |
1 |
|a Tirunelveli
|b [Verlag nicht ermittelbar]
|c 2007-
|
300 |
|
|
|a Online-Ressource
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
362 |
0 |
|
|a 1.2007 -
|
363 |
0 |
1 |
|a 1
|i 2007
|
500 |
|
|
|a Gesehen am 27.09.22
|
506 |
0 |
|
|a Open Access
|e Controlled Vocabulary for Access Rights
|f Unrestricted online access
|q DOAJ
|u http://purl.org/coar/access_right/c_abf2
|2 coarar
|
540 |
|
|
|q DOAJ
|a Namensnennung - Nicht-kommerziell - Weitergabe unter gleichen Bedingungen 4.0 International
|f CC BY-NC-SA 4.0
|2 cc
|u https://creativecommons.org/licenses/by-nc-sa/4.0/
|
591 |
|
|
|a 355!URL-Ä(27-09-22)
|
655 |
|
7 |
|a Zeitschrift
|0 (DE-588)4067488-5
|0 (DE-627)10454466X
|0 (DE-576)20917000X
|2 gnd-content
|
856 |
4 |
0 |
|u http://www.cybercrimejournal.com/
|x Verlag
|z kostenfrei
|
856 |
4 |
0 |
|u https://ezb.ur.de/?2442372-5
|x Frontdoor-Url
|
935 |
|
|
|a mkri
|
951 |
|
|
|a JT
|
ACO |
|
|
|a 1
|
ELC |
|
|
|a 1
|
OAS |
|
|
|a 1
|
ORI |
|
|
|a SA-MARC-ixtheo_ob001.raw
|
REL |
|
|
|a 1
|
SPR |
|
|
|a 1
|t IXT
|t REL
|
SUB |
|
|
|a REL
|