PART Ⅰ THE PARAMETERS OF COMPUTER CRIME 3
1 Richard W. Downing (2005), 'Shoring Up the Weakest Link: What Lawmakers Around the World Need to Consider in Developing Comprehensive Laws to Combat Cyber Crime', Columbia Journal of Transnational Law, 43, pp. 705-62. 3
2 Brian M. Hoffstadt (2007), 'The Voyeuristic Hacker', Journal of Internet Law, 2, pp. 12-23. 61
3 Lauren L. Sullins (2006), '"Phishing" for a Solution: Domestic and International Approaches to Decreasing Online Identity Theft', Emory International Law Review, 20, pp. 397-433. 73
4 John McMullan and Aunshul Rege (2007), 'Cyberextortion at Online Gambling Sites: Criminal Organization and Legal Challenges', Gaming Law Review, 11, pp. 648-65. 111
PART Ⅱ HARMONIZATION OF COMPUTER CRIME LAWS - THE COUNCIL OF EUROPE CONVENTION ON CYBERCRIME AND THE ADDITIONAL PROTOCOL TO THE COUNCIL OF EUROPE CONVENTION 131
5 Mike Keyser (2003), 'The Council of Europe Convention on Cybercrime', Journal of Transnational Law and Policy, 12, pp. 287-326. 131
6 Miriam F. Miquelon-Weismann (2005), 'The Convention on Cybercrime: A Harmonized Implementation of International Penal Law: What Prospects for Procedural Due Process?', John Marshall Journal of Computer and Information Law, 23, pp. 329-61. 171
7 D.C. Kennedy (2002), 'In Search of a Balance Between Police Power and Privacy in the Cybercrime Treaty', Richmond Journal of Law and Technology, 9, pp. 1-59. 205
8 Adrienne N. Kitchen (2002), 'Go to Jail - Do Not Pass Go, Do Not Pay Civil Damages: The United States' Hesitation Towards the International Convention on Cybercrime's Copyright Provisions', John Marshall Review of Intellectual Property Law, 1, pp. 364-82. 265
9 Dina I. Oddis (2002), 'Combating Child Pornography on the Internet: The Council of Europe's Convention on Cybercrime', Temple International and Comparative Law Journal, 16, pp. 477-518. 285
10 Christopher D. Van Blarcum (2005), 'Internet Hate Speech: The European Framework and the Emerging American Haven', Washington and Lee Law Review, 62, pp. 781-830. 327
PART Ⅲ INVESTIGATION, JURISDICTION AND SENTENCING ISSUES 379
11 Michael A. Sussman (1999), 'The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium', Duke Journal of Comparative and International Law, 9, pp. 451-89. 379
12 Ray August (2002), 'International Cyber-Jurisdiction: A Comparative Analysis', American Business Law Journal, 39, pp. 531 -73. 419
13 Jessica Habib (2004), 'Cyber Crime and Punishment: Filtering Out Internet Felons', Fordham Intellectual Property, Media and Entertainment Law Journal, 14, pp. 1051-92. 463
PART Ⅳ CYBER SECURITY 507
14 Christopher J. Coyne and Peter T. Leeson (2005), 'Who's to Protect Cyberspace?', Journal of Law, Economics and Policy, 1, pp. 473-95. 507
15 Bruce P. Smith (2005), 'Hacking, Poaching, and Counterattacking: Digital Counterstrikes and the Contours of Self-Help', Journal of Law, Economics and Policy, l,pp. 171-95. 531
16 Orin S. Kerr (2005), 'Virtual Crime, Virtual Deterrence: A Skeptical View of Self-Help, Architecture, and Civil Liability', Journal of Law, Economics and Policy, 1, pp. 197-214. 557
Name Index 575