Computer crime / edited by Indira Carr (University of Surrey, UK).
2016
Formats
Format | |
---|---|
BibTeX | |
MARCXML | |
TextMARC | |
MARC | |
DublinCore | |
EndNote | |
NLM | |
RefWorks | |
RIS |
Items
Details
Title
Computer crime / edited by Indira Carr (University of Surrey, UK).
Added Author
Imprint
London : Routledge, 2016.
Description
1 online resource (xx, 576 pages)
Formatted Contents Note
part Part I The Parameters of Computer Crime
chapter 1 Richard W. Downing (2005), 'Shoring Up the Weakest Link: What Lawmakers Around the World Need to Consider in Developing Comprehensive Laws to Combat Cyber Crime'
chapter 2 Brian M. Hoffstadt (2007), 'The Voyeuristic Hacker'
chapter 3 Lauren L. Sullins (2006), '
chapter 4 John McMullan and Aunshul Rege (2007), 'Cyberextortion at Online Gambling Sites: Criminal Organization and Legal Challenges'
part Part II Harmonization of Computer Crime Laws - The Council of Europe Convention on Cybercrime and the Additional Protocol to the Council of Europe Convention
chapter 5 Mike Keyser (2003), 'The Council of Europe Convention on Cybercrime'
chapter 6 Miriam F. Miquelon-Weismann (2005), 'The Convention on Cybercrime: A Harmonized Implementation of International Penal Law: What Prospects for Procedural Due Process?'
chapter 7D.C. Kennedy (2002), 'In Search of a Balance Between Police Power and Privacy in the Cybercrime Treaty'
chapter 8 Adrienne N. Kitchen (2002), 'Go to Jail - Do Not Pass Go, Do Not Pay Civil Damages: The United States' Hesitation Towards the International Convention on Cybercrime's Copyright Provisions'
chapter 9 Dina I. Oddis (2002), 'Combating Child Pornography on the Internet: The Council of Europe's Convention on Cybercrime'
chapter 10 Christopher D. Van Blarcum (2005), 'Internet Hate Speech: The European Framework and the Emerging American Haven'
part Part III Investigation, Jurisdiction and Sentencing Issues
chapter 11 Michael A. Sussman (1999), 'The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium'
chapter 12 Ray August (2002), 'International Cyber-Jurisdiction: A Comparative Analysis'
chapter 13 Jessica Habib (2004), 'Cyber Crime and Punishment: Filtering Out Internet Felons'
part Part IV Cyber Security
chapter 14 Christopher J. Coyne and Peter T. Leeson (2005), 'Who's to Protect Cyberspace?'
chapter 15 Bruce P. Smith (2005), 'Hacking, Poaching, and Counterattacking: Digital Counterstrikes and the Contours of Self-Help'
chapter 16 Orin S. Kerr (2005), 'Virtual Crime, Virtual Deterrence: A Skeptical View of Self-Help, Architecture, and Civil Liability'.
chapter 1 Richard W. Downing (2005), 'Shoring Up the Weakest Link: What Lawmakers Around the World Need to Consider in Developing Comprehensive Laws to Combat Cyber Crime'
chapter 2 Brian M. Hoffstadt (2007), 'The Voyeuristic Hacker'
chapter 3 Lauren L. Sullins (2006), '
chapter 4 John McMullan and Aunshul Rege (2007), 'Cyberextortion at Online Gambling Sites: Criminal Organization and Legal Challenges'
part Part II Harmonization of Computer Crime Laws - The Council of Europe Convention on Cybercrime and the Additional Protocol to the Council of Europe Convention
chapter 5 Mike Keyser (2003), 'The Council of Europe Convention on Cybercrime'
chapter 6 Miriam F. Miquelon-Weismann (2005), 'The Convention on Cybercrime: A Harmonized Implementation of International Penal Law: What Prospects for Procedural Due Process?'
chapter 7D.C. Kennedy (2002), 'In Search of a Balance Between Police Power and Privacy in the Cybercrime Treaty'
chapter 8 Adrienne N. Kitchen (2002), 'Go to Jail - Do Not Pass Go, Do Not Pay Civil Damages: The United States' Hesitation Towards the International Convention on Cybercrime's Copyright Provisions'
chapter 9 Dina I. Oddis (2002), 'Combating Child Pornography on the Internet: The Council of Europe's Convention on Cybercrime'
chapter 10 Christopher D. Van Blarcum (2005), 'Internet Hate Speech: The European Framework and the Emerging American Haven'
part Part III Investigation, Jurisdiction and Sentencing Issues
chapter 11 Michael A. Sussman (1999), 'The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium'
chapter 12 Ray August (2002), 'International Cyber-Jurisdiction: A Comparative Analysis'
chapter 13 Jessica Habib (2004), 'Cyber Crime and Punishment: Filtering Out Internet Felons'
part Part IV Cyber Security
chapter 14 Christopher J. Coyne and Peter T. Leeson (2005), 'Who's to Protect Cyberspace?'
chapter 15 Bruce P. Smith (2005), 'Hacking, Poaching, and Counterattacking: Digital Counterstrikes and the Contours of Self-Help'
chapter 16 Orin S. Kerr (2005), 'Virtual Crime, Virtual Deterrence: A Skeptical View of Self-Help, Architecture, and Civil Liability'.
Summary
"Alongside its positive impact of providing a global reach, the Internet is prone to a variety of abuses. In the 1990s it was unauthorised access of computers and impairment of the operation of computers through the introduction of viruses and worms that took centre stage. Since then the potential of the Internet for fraudulent activities has been realised by the criminal fraternity and, in recent years, we have seen, for instance, the rise of identity theft and the widespread distribution of offensive and illegal materials. The collection of essays in this volume, while being highly selective, provides a snapshot of the parameters of computer crime, the legal response and discussions surrounding ways to improve the security of cyberspace."--Provided by publisher.
Note
First published 2009 by Ashgate Publishing.
Location
www
Available in Other Form
Print version:
Linked Resources
Alternate Title
Taylor & Francis Online
Language
English
ISBN
9781315095493 (e-book : PDF)
9781351571258 (e-book: Mobi)
9780754628354 (hardback)
9781351571258 (e-book: Mobi)
9780754628354 (hardback)
Record Appears in