Computer crimePDF电子书下载
- 电子书积分:17 积分如何计算积分?
- 作 者:edited by Indira Carr.
- 出 版 社:Ashgate
- 出版年份:2009
- ISBN:9780754628354
- 页数:576 页
PART Ⅰ THE PARAMETERS OF COMPUTER CRIME 3
1 Richard W. Downing (2005), 'Shoring Up the Weakest Link: What Lawmakers Around the World Need to Consider in Developing Comprehensive Laws to Combat Cyber Crime', Columbia Journal of Transnational Law, 43, pp. 705-62. 3
2 Brian M. Hoffstadt (2007), 'The Voyeuristic Hacker', Journal of Internet Law, 2, pp. 12-23. 61
3 Lauren L. Sullins (2006), '"Phishing" for a Solution: Domestic and International Approaches to Decreasing Online Identity Theft', Emory International Law Review, 20, pp. 397-433. 73
4 John McMullan and Aunshul Rege (2007), 'Cyberextortion at Online Gambling Sites: Criminal Organization and Legal Challenges', Gaming Law Review, 11, pp. 648-65. 111
PART Ⅱ HARMONIZATION OF COMPUTER CRIME LAWS - THE COUNCIL OF EUROPE CONVENTION ON CYBERCRIME AND THE ADDITIONAL PROTOCOL TO THE COUNCIL OF EUROPE CONVENTION 131
5 Mike Keyser (2003), 'The Council of Europe Convention on Cybercrime', Journal of Transnational Law and Policy, 12, pp. 287-326. 131
6 Miriam F. Miquelon-Weismann (2005), 'The Convention on Cybercrime: A Harmonized Implementation of International Penal Law: What Prospects for Procedural Due Process?', John Marshall Journal of Computer and Information Law, 23, pp. 329-61. 171
7 D.C. Kennedy (2002), 'In Search of a Balance Between Police Power and Privacy in the Cybercrime Treaty', Richmond Journal of Law and Technology, 9, pp. 1-59. 205
8 Adrienne N. Kitchen (2002), 'Go to Jail - Do Not Pass Go, Do Not Pay Civil Damages: The United States' Hesitation Towards the International Convention on Cybercrime's Copyright Provisions', John Marshall Review of Intellectual Property Law, 1, pp. 364-82. 265
9 Dina I. Oddis (2002), 'Combating Child Pornography on the Internet: The Council of Europe's Convention on Cybercrime', Temple International and Comparative Law Journal, 16, pp. 477-518. 285
10 Christopher D. Van Blarcum (2005), 'Internet Hate Speech: The European Framework and the Emerging American Haven', Washington and Lee Law Review, 62, pp. 781-830. 327
PART Ⅲ INVESTIGATION, JURISDICTION AND SENTENCING ISSUES 379
11 Michael A. Sussman (1999), 'The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium', Duke Journal of Comparative and International Law, 9, pp. 451-89. 379
12 Ray August (2002), 'International Cyber-Jurisdiction: A Comparative Analysis', American Business Law Journal, 39, pp. 531 -73. 419
13 Jessica Habib (2004), 'Cyber Crime and Punishment: Filtering Out Internet Felons', Fordham Intellectual Property, Media and Entertainment Law Journal, 14, pp. 1051-92. 463
PART Ⅳ CYBER SECURITY 507
14 Christopher J. Coyne and Peter T. Leeson (2005), 'Who's to Protect Cyberspace?', Journal of Law, Economics and Policy, 1, pp. 473-95. 507
15 Bruce P. Smith (2005), 'Hacking, Poaching, and Counterattacking: Digital Counterstrikes and the Contours of Self-Help', Journal of Law, Economics and Policy, l,pp. 171-95. 531
16 Orin S. Kerr (2005), 'Virtual Crime, Virtual Deterrence: A Skeptical View of Self-Help, Architecture, and Civil Liability', Journal of Law, Economics and Policy, 1, pp. 197-214. 557
Name Index 575
- 《Foundations of criminal law》[edited] by Leo Katz 1999
- 《R语言机器学习 原书第2版=MACHINE LEARNING USING R WITH TIME SERIES AND INDUSTRY-BASED USE CASES IN R》SECOND EDITION
- 《漫画半坡 英文版》Edited by Xian Banpo Museum 2015
- 《Variations I : extra materials》John Cage; C.F. Peters (Firm); Henmar Press (Firm); Edition Peters. 1960
- 《Law:its origin growth and function》by James Coolidge Carter 1907
- 《Cell death and diseases of the nervous system》edited by Vassilis E. Koliatsos,Rajiv R 1999
- 《McCracken可摘局部义齿修复学》AlanB.Carr,DavidT.Brown编;罗云,王敏,楼北雁主译;熊芳副主译;张静,自丛佳,肖力源等译 2013
- 《Cell transplantation for neurological disorders》edited by Thomas B. Freeman,Hakan Widne 1999
- 《呼啸山庄》Notes by Angela Smith著 1990
- 《了不起的盖茨比》Notes by Tang Soo Ping 1990