《Computer crime》PDF下载

  • 购买积分:17 如何计算积分?
  • 作  者:edited by Indira Carr.
  • 出 版 社:Ashgate
  • 出版年份:2009
  • ISBN:9780754628354
  • 页数:576 页
图书介绍:

PART Ⅰ THE PARAMETERS OF COMPUTER CRIME 3

1 Richard W. Downing (2005), 'Shoring Up the Weakest Link: What Lawmakers Around the World Need to Consider in Developing Comprehensive Laws to Combat Cyber Crime', Columbia Journal of Transnational Law, 43, pp. 705-62. 3

2 Brian M. Hoffstadt (2007), 'The Voyeuristic Hacker', Journal of Internet Law, 2, pp. 12-23. 61

3 Lauren L. Sullins (2006), '"Phishing" for a Solution: Domestic and International Approaches to Decreasing Online Identity Theft', Emory International Law Review, 20, pp. 397-433. 73

4 John McMullan and Aunshul Rege (2007), 'Cyberextortion at Online Gambling Sites: Criminal Organization and Legal Challenges', Gaming Law Review, 11, pp. 648-65. 111

PART Ⅱ HARMONIZATION OF COMPUTER CRIME LAWS - THE COUNCIL OF EUROPE CONVENTION ON CYBERCRIME AND THE ADDITIONAL PROTOCOL TO THE COUNCIL OF EUROPE CONVENTION 131

5 Mike Keyser (2003), 'The Council of Europe Convention on Cybercrime', Journal of Transnational Law and Policy, 12, pp. 287-326. 131

6 Miriam F. Miquelon-Weismann (2005), 'The Convention on Cybercrime: A Harmonized Implementation of International Penal Law: What Prospects for Procedural Due Process?', John Marshall Journal of Computer and Information Law, 23, pp. 329-61. 171

7 D.C. Kennedy (2002), 'In Search of a Balance Between Police Power and Privacy in the Cybercrime Treaty', Richmond Journal of Law and Technology, 9, pp. 1-59. 205

8 Adrienne N. Kitchen (2002), 'Go to Jail - Do Not Pass Go, Do Not Pay Civil Damages: The United States' Hesitation Towards the International Convention on Cybercrime's Copyright Provisions', John Marshall Review of Intellectual Property Law, 1, pp. 364-82. 265

9 Dina I. Oddis (2002), 'Combating Child Pornography on the Internet: The Council of Europe's Convention on Cybercrime', Temple International and Comparative Law Journal, 16, pp. 477-518. 285

10 Christopher D. Van Blarcum (2005), 'Internet Hate Speech: The European Framework and the Emerging American Haven', Washington and Lee Law Review, 62, pp. 781-830. 327

PART Ⅲ INVESTIGATION, JURISDICTION AND SENTENCING ISSUES 379

11 Michael A. Sussman (1999), 'The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium', Duke Journal of Comparative and International Law, 9, pp. 451-89. 379

12 Ray August (2002), 'International Cyber-Jurisdiction: A Comparative Analysis', American Business Law Journal, 39, pp. 531 -73. 419

13 Jessica Habib (2004), 'Cyber Crime and Punishment: Filtering Out Internet Felons', Fordham Intellectual Property, Media and Entertainment Law Journal, 14, pp. 1051-92. 463

PART Ⅳ CYBER SECURITY 507

14 Christopher J. Coyne and Peter T. Leeson (2005), 'Who's to Protect Cyberspace?', Journal of Law, Economics and Policy, 1, pp. 473-95. 507

15 Bruce P. Smith (2005), 'Hacking, Poaching, and Counterattacking: Digital Counterstrikes and the Contours of Self-Help', Journal of Law, Economics and Policy, l,pp. 171-95. 531

16 Orin S. Kerr (2005), 'Virtual Crime, Virtual Deterrence: A Skeptical View of Self-Help, Architecture, and Civil Liability', Journal of Law, Economics and Policy, 1, pp. 197-214. 557

Name Index 575