-
4
-
-
84899201130
-
International cooperation in combating cyber-crime in Asia: Existing mechanisms and new approaches
-
R. Broadhurst, & P. Grabosky Eds, Hong Kong: Hong Kong University Press
-
Bullwinkel, J. (2005). International cooperation in combating cyber-crime in Asia: Existing mechanisms and new approaches. In R. Broadhurst, & P. Grabosky (Eds.), Cyber-crime: The challenge in Asia (pp. 269-302). Hong Kong: Hong Kong University Press.
-
(2005)
Cyber-crime: The challenge in Asia
, pp. 269-302
-
-
Bullwinkel, J.1
-
5
-
-
33750320271
-
In London, islamic radicals found a haven. The
-
July 10, A01. Retrieved July 26, 2005, from
-
Coll, S., & Glasser, S. (2005). In London, islamic radicals found a haven. The Washington Post, July 10, A01. Retrieved July 26, 2005, from http://www.washingtonpost.com/wp-dyn/content/article/2005/07/09/ AR2005070901390_pf.html.
-
(2005)
Washington Post
-
-
Coll, S.1
Glasser, S.2
-
6
-
-
84872989992
-
-
Commonwealth Secretariat
-
Commonwealth Secretariat (2004). LAW Development Issues of the Commonwealth Issue 4. http://www.thecommonwealth.org/law.
-
(2004)
LAW Development Issues of the Commonwealth
, Issue.4
-
-
-
7
-
-
84872999189
-
Cyherterrorism
-
U.S. House of Representatives, May 23, Retrieved March 12, 2005, from
-
Denning, D. (2000). Cyherterrorism. Testimony before the special oversight panel on terrorism, committee on armed services, U.S. House of Representatives, May 23, 2000. Retrieved March 12, 2005, from http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html.
-
(2000)
Testimony before the special oversight panel on terrorism, committee on armed services
-
-
Denning, D.1
-
8
-
-
84872990798
-
Civil liberties and security in cyberspace
-
A. Sofaer & S. Goodman Eds, Stanford: Hoover Institution Press
-
Drozdova, E. (2001). Civil liberties and security in cyberspace. In A. Sofaer & S. Goodman (Eds.), The transnational dimension of cyber crime and terrorism (pp. 183-220). Stanford: Hoover Institution Press. http://www.hoover.org/publications/books/cybercrime.html.
-
(2001)
The transnational dimension of cyber crime and terrorism
, pp. 183-220
-
-
Drozdova, E.1
-
9
-
-
85044810037
-
The global dimension of cybercrime
-
Grabosky, P. (2004). The global dimension of cybercrime. Global Crime, 6(1), 146-157.
-
(2004)
Global Crime
, vol.6
, Issue.1
, pp. 146-157
-
-
Grabosky, P.1
-
12
-
-
84873005178
-
-
Canberra: Australian Institute of Criminology. Retrieved July 5, 2005, from
-
Krone, T. (2005). Phishing. High Tech Crime Brief No 9. Canberra: Australian Institute of Criminology. Retrieved July 5, 2005, from http://www.aic.gov.au/publications/htcb/htcb009.html.
-
(2005)
Phishing. High Tech Crime Brief No 9
-
-
Krone, T.1
-
16
-
-
84872987164
-
Analysis of Internet crime in Korea and countermeasures
-
Paper presented, Sydney, Australia, September 2-7
-
Park, E. (2001). Analysis of Internet crime in Korea and countermeasures. Paper presented to the Sixth Annual Conference of the International Association of Prosecutors, Sydney, Australia, September 2-7, 2001. http://www.iap.nl.com/speeches2/internetcrime.html.
-
(2001)
to the Sixth Annual Conference of the International Association of Prosecutors
-
-
Park, E.1
-
17
-
-
36549025492
-
International computer fraud: A paradigm for limiting national jurisdiction
-
Podgor, E. (2002). International computer fraud: A paradigm for limiting national jurisdiction. UC Davis Law Review, 35, 267-317.
-
(2002)
UC Davis Law Review
, vol.35
, pp. 267-317
-
-
Podgor, E.1
-
18
-
-
84872995938
-
-
Pollitt, M. (2003). Digital evidence in internet time. In R. Broadhurst (Ed.), Bridging the GAP: A Global Alliance on Transnational Organised Crime. Hong Kong: Hong Kong Police.
-
Pollitt, M. (2003). "Digital evidence in internet time". In R. Broadhurst (Ed.), Bridging the GAP: A Global Alliance on Transnational Organised Crime. Hong Kong: Hong Kong Police.
-
-
-
-
20
-
-
0345984397
-
Transnational extradition for computer crimes: Are new treaties and laws needed?
-
Soma, J. T., Muther, T. F. Jr., & Brisette, H. (1997). Transnational extradition for computer crimes: Are new treaties and laws needed? Harvard Journal on Legislation, 34, 317-370.
-
(1997)
Harvard Journal on Legislation
, vol.34
, pp. 317-370
-
-
Soma, J.T.1
Muther Jr., T.F.2
Brisette, H.3
-
21
-
-
84899159455
-
Prosecuting foreign based computer crime: International law and technology collide
-
Presented at the, Palermo, Italy, December 12-14
-
Tan, K. H. (2000). Prosecuting foreign based computer crime: International law and technology collide. Presented at the Symposium on the Rule of Law in the Global Village, Palermo, Italy, December 12-14, 2000. http://www.undcp.org/adhoc/palermo/convmain.html.
-
(2000)
Symposium on the Rule of Law in the Global Village
-
-
Tan, K.H.1
-
22
-
-
85048941387
-
Al Qaeda and the Internet: The danger of "cyberplanning
-
Retrieved March 12, 2005, from
-
Thomas, T. L (2003). Al Qaeda and the Internet: The danger of "cyberplanning". Parameters, 33(1), 112-123. Retrieved March 12, 2005, from http://carlisle-www.army.mil/usawc/Parameters/03spring/thomas. htm.
-
(2003)
Parameters
, vol.33
, Issue.1
, pp. 112-123
-
-
Thomas, T.L.1
-
23
-
-
84909253940
-
-
UNAFEI , Tokyo: United Nations Asia and Far East Institute for the Prevention of Crime and the Treatment of Offenders
-
UNAFEI (1995). Criminal justice profiles of Asia. Tokyo: United Nations Asia and Far East Institute for the Prevention of Crime and the Treatment of Offenders.
-
(1995)
Criminal justice profiles of Asia
-
-
-
24
-
-
14544291305
-
-
United States Department of Justice , Washington, DC: US Department of Justice. Retrieved July 6, 2005, from
-
United States Department of Justice (2002). Searching and seizing computers and obtaining electronic evidence in criminal investigations. Washington, DC: US Department of Justice. Retrieved July 6, 2005, from http://www.cybercrime.gov/s&smanual2002.htm.
-
(2002)
Searching and seizing computers and obtaining electronic evidence in criminal investigations
-
-
|