메뉴 건너뛰기




Volumn 38, Issue 3, 2001, Pages 481-524

Computer crimes

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0345893922     PISSN: 01640364     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (2)

References (8)
  • 1
    • 0042254545 scopus 로고
    • Effective National and International Action Against Organized Crime and Terrorist Criminal Activities
    • See M. Cherif Bassiouni, Effective National and International Action Against Organized Crime and Terrorist Criminal Activities, 4 EMORY INT'L L. REV. 9, 20 (1990) (discussing the need for international cooperation in the fight against organized crime); see also Soma, supra note 298, at 359-60 (proposing multinational treaty for dealing with extradition in computer crime cases). Nations are beginning to combine their efforts in law enforcement and prosecution of computer crimes. E.g., David Graves, The Schoolboy Computer Surfer Who Made Waves in the Pentagon, DAILY TELEGRAPH (London), Mar. 22, 1997, at 3 (reporting on British schoolboy who pleaded guilty to twelve offenses under United Kingdom's Computer Misuse Act of 1990 following arrest by New Scotland Yard's Computer Crime Unit for "hacking" into United States Air Force computers).
    • (1990) Emory Int'l L. Rev. , vol.4 , pp. 9
    • Cherif Bassiouni, M.1
  • 2
    • 0345965225 scopus 로고    scopus 로고
    • The Schoolboy Computer Surfer Who Made Waves in the Pentagon
    • (London), Mar. 22
    • See M. Cherif Bassiouni, Effective National and International Action Against Organized Crime and Terrorist Criminal Activities, 4 EMORY INT'L L. REV. 9, 20 (1990) (discussing the need for international cooperation in the fight against organized crime); see also Soma, supra note 298, at 359-60 (proposing multinational treaty for dealing with extradition in computer crime cases). Nations are beginning to combine their efforts in law enforcement and prosecution of computer crimes. E.g., David Graves, The Schoolboy Computer Surfer Who Made Waves in the Pentagon, DAILY TELEGRAPH (London), Mar. 22, 1997, at 3 (reporting on British schoolboy who pleaded guilty to twelve offenses under United Kingdom's Computer Misuse Act of 1990 following arrest by New Scotland Yard's Computer Crime Unit for "hacking" into United States Air Force computers).
    • (1997) Daily Telegraph , pp. 3
    • Graves, D.1
  • 3
    • 0345965226 scopus 로고    scopus 로고
    • Decoding OECD Guidelines for Cryptography Policy
    • See Durham, supra note 310, at 97 n.51 (citing efforts by Council of Europe, Organization for Economic Co-operation and Development (OECD), and United Nations). The OECD is an intergovernmental organization designed to encourage multilateral dialogue and cooperation on economic and social policies that have transnational effects. Although the OECD does not have legal powers, its guidelines, reports, and publications can have a significant influence on policy-making for both member and non-member countries. See Stewart A. Baker, Decoding OECD Guidelines for Cryptography Policy, 31 INT'L LAW. 729, 732-33 (1997) (providing background on OECD). As of November 2000, OECD is comprised of 29 countries: Australia, Austria, Belgium, Canada, the Czech Republic, Denmark, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Japan, Korea, Luxembourg, Mexico, The Netherlands, New Zealand, Norway, Poland, Portugal, Spain, Sweden, Switzerland, Turkey, the United Kingdom, and the United States. See OECD Online, at http://www.oecd.org/about (last visited Feb. 14, 2001).
    • (1997) Int'l Law , vol.31 , pp. 729
    • Baker, S.A.1
  • 4
    • 0346596610 scopus 로고    scopus 로고
    • To access the Business Software Alliance website, visit http://www.bsa.org (last visited Feb. 9, 2001).
  • 5
    • 0345965222 scopus 로고
    • Netherlands, Mexico Chase after Hackers
    • July 13
    • For example, the Business Software Alliance, together with the Mexican federal attorney's office, initiated a 1992 software piracy investigation that led to seizure of illegally reproduced software programs. James Daly, Netherlands, Mexico Chase After Hackers, COMPUTERWORLD, July 13, 1992, at 14.
    • (1992) Computerworld , pp. 14
    • Daly, J.1
  • 7
    • 0347226488 scopus 로고    scopus 로고
    • note
    • Id. In practical terms, this means that 36% of all business software applications existing on PCs around the world in 1999 were unauthorized, unpaid-for, illegal copies. In other words, one out of every three software applications were pirated in 1999.
  • 8
    • 0347856655 scopus 로고    scopus 로고
    • note
    • Id. A $12 billion loss in 1999 is still comparable to the loss in 1994. Id.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.