"Alongside its positive impact of providing a global reach, the Internet is prone to a variety of abuses. In the 1990s it was unauthorised access of computers and impairment of the operation of computers through the introduction of viruses and worms that took centre stage. Since then the potential of the Internet for fraudulent activities has been realised by the criminal fraternity and, in recent years, we have seen, for instance, the rise of identity theft and the widespread distribution of offensive and illegal materials. The collection of essays in this volume, while being highly selective, provides a snapshot of the parameters of computer crime, the legal response and discussions surrounding ways to improve the security of cyberspace."--Provided by publisher.
First published 2009 by Ashgate Publishing.
Formatted Contents Note
part Part I The Parameters of Computer Crime chapter 1 Richard W. Downing (2005), 'Shoring Up the Weakest Link: What Lawmakers Around the World Need to Consider in Developing Comprehensive Laws to Combat Cyber Crime' chapter 2 Brian M. Hoffstadt (2007), 'The Voyeuristic Hacker' chapter 3 Lauren L. Sullins (2006), ' chapter 4 John McMullan and Aunshul Rege (2007), 'Cyberextortion at Online Gambling Sites: Criminal Organization and Legal Challenges' part Part II Harmonization of Computer Crime Laws - The Council of Europe Convention on Cybercrime and the Additional Protocol to the Council of Europe Convention chapter 5 Mike Keyser (2003), 'The Council of Europe Convention on Cybercrime' chapter 6 Miriam F. Miquelon-Weismann (2005), 'The Convention on Cybercrime: A Harmonized Implementation of International Penal Law: What Prospects for Procedural Due Process?' chapter 7D.C. Kennedy (2002), 'In Search of a Balance Between Police Power and Privacy in the Cybercrime Treaty' chapter 8 Adrienne N. Kitchen (2002), 'Go to Jail - Do Not Pass Go, Do Not Pay Civil Damages: The United States' Hesitation Towards the International Convention on Cybercrime's Copyright Provisions' chapter 9 Dina I. Oddis (2002), 'Combating Child Pornography on the Internet: The Council of Europe's Convention on Cybercrime' chapter 10 Christopher D. Van Blarcum (2005), 'Internet Hate Speech: The European Framework and the Emerging American Haven' part Part III Investigation, Jurisdiction and Sentencing Issues chapter 11 Michael A. Sussman (1999), 'The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium' chapter 12 Ray August (2002), 'International Cyber-Jurisdiction: A Comparative Analysis' chapter 13 Jessica Habib (2004), 'Cyber Crime and Punishment: Filtering Out Internet Felons' part Part IV Cyber Security chapter 14 Christopher J. Coyne and Peter T. Leeson (2005), 'Who's to Protect Cyberspace?' chapter 15 Bruce P. Smith (2005), 'Hacking, Poaching, and Counterattacking: Digital Counterstrikes and the Contours of Self-Help' chapter 16 Orin S. Kerr (2005), 'Virtual Crime, Virtual Deterrence: A Skeptical View of Self-Help, Architecture, and Civil Liability'.