메뉴 건너뛰기




Volumn 23, Issue 4, 2012, Pages 363-391

The Council of Europe Convention on Cybercrime: Defining 'Crime' in a Digital World

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84876675786     PISSN: 10468374     EISSN: 15729850     Source Type: Journal    
DOI: 10.1007/s10609-012-9183-3     Document Type: Article
Times cited : (25)

References (165)
  • 1
    • 84876695080 scopus 로고    scopus 로고
    • Australian Bureau of Statistics, Australian Bureau of Statistics, 15 December 2011, accessed 16 May 2012
    • Australian Bureau of Statistics, 'Household Use of Information Technology, Australia, 2010-11' (Australian Bureau of Statistics, 15 December 2011) http://www.abs.gov.au/ausstats/abs@.nsf/mf/8146.0 accessed 16 May 2012.
    • Household Use of Information Technology, Australia, 2010-11
  • 2
    • 51849163501 scopus 로고    scopus 로고
    • Internet World Stats, 31 March 2011, accessed 11 May 2012
    • Internet Usage Statistics' (Internet World Stats, 31 March 2011) http://www.internetworldstats.com/stats.htm accessed 11 May 2012.
    • Internet Usage Statistics
  • 3
    • 79960765400 scopus 로고    scopus 로고
    • Facebook, accessed 11 May 2012
    • Statistics' (Facebook, 2011), http://www.facebook.com/press/info.php?statistics accessed 11 May 2012.
    • (2011) Statistics
  • 4
    • 51349137060 scopus 로고    scopus 로고
    • United States Census Bureau, 23 February 2011, accessed 11 May 2012
    • International Database' (United States Census Bureau, 23 February 2011) http://www.census.gov/ipc/www/idb/rank.php accessed 11 May 2012.
    • International Database
  • 6
    • 84860441604 scopus 로고    scopus 로고
    • International Telecommunication Union, accessed 11 May 2012
    • The World in 2011 ICT Facts and Figures' (International Telecommunication Union, 2011) http://www.itu.int/ITU-D/ict/facts/2011/material/ICTFactsFigures2011.pdf accessed 11 May 2012.
    • (2011) The World In 2011 ICT Facts and Figures
  • 7
    • 84860441604 scopus 로고    scopus 로고
    • International Telecommunication Union, accessed 11 May 2012
    • The World in 2011 ICT Facts and Figures' (International Telecommunication Union, 2011) http://www.itu.int/ITU-D/ict/facts/2011/material/ICTFactsFigures2011.pdf accessed 11 May 2012.
    • (2011) The World In 2011 ICT Facts and Figures
  • 8
    • 84876695187 scopus 로고    scopus 로고
    • Note
    • A number of terms are used synonymously and often interchangeably including 'computer crime', 'high-tech crime', 'digital crime', 'electronic crime' and 'technologyenabled' crime.
  • 11
    • 84876683590 scopus 로고    scopus 로고
    • Note
    • UN Doc. A/RES/55/63 (22 January 2001) and UN Doc. A/RES/56/121 (22 January 2002).
  • 12
    • 84876680856 scopus 로고    scopus 로고
    • Note
    • Schjolberg (n. 10 above) 9. For an overview of international and regional approaches to cybercrime see ITU-D ICT Applications and Cybersecurity Division, 'Understanding Cybercrime: A Guide for Developing Countries' (International Telecommunication Union Cybercrime Legislation Resources, April 2009) http:// Footnote 12 continued www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-understanding-cybercrime-guide.pdf, accessed 14 May 2012, 89-108.
  • 13
    • 84876686482 scopus 로고    scopus 로고
    • Note
    • Convention on Cybercrime, ETS No 185 (23 November 2001), Art 9 [hereinafter 'Convention']. Also referred to as the 'Budapest' Convention; Council of Europe, 'Contribution of the Secretary General of the Council of Europe to the Twelfth United Nations Congress on Crime Prevention and Criminal Justice' (16 February 2010) 19.
  • 14
    • 84876672176 scopus 로고    scopus 로고
    • Note
    • 'The Alternative: A UN Convention on Cybercrime' section.
  • 15
    • 85014680798 scopus 로고    scopus 로고
    • The Council of Europe's Convention on Cybercrime
    • J.M. Balkin et al. (eds), New York: New York University Press
    • S. W. Brenner, 'The Council of Europe's Convention on Cybercrime' in J.M. Balkin et al. (eds), Cybercrime: Digital Cops in a Networked Environment (New York: New York University Press, 2007) 215.
    • (2007) Cybercrime: Digital Cops In a Networked Environment , pp. 215
    • Brenner, S.W.1
  • 16
    • 10244252836 scopus 로고    scopus 로고
    • Watching the Web: Thoughts on Expanding Police Surveillance Opportunities Under the Cyber-Crime Convention
    • L. Huey and R. S. Rosenberg, 'Watching the Web: Thoughts on Expanding Police Surveillance Opportunities Under the Cyber-Crime Convention' (2004) 46:5 Canadian Journal of Criminology and Criminal Justice, 597.
    • (2004) Canadian Journal of Criminology and Criminal Justice , vol.46 , Issue.5 , pp. 597
    • Huey, L.1    Rosenberg, R.S.2
  • 17
    • 84876675319 scopus 로고    scopus 로고
    • Note
    • Brenner (n. 15 above) 210.
  • 18
    • 84876673609 scopus 로고    scopus 로고
    • Note
    • Although all 27 members of the European Union are members, the Council of Europe should not be confused with the European Council which is an institution of the European Union; Treaty of Lisbon amending the Treaty on European Union and the Treaty Establishing the European Community (2007).
  • 19
    • 84876674450 scopus 로고    scopus 로고
    • Note
    • Convention for the Protection of Human Rights and Fundamental Freedoms (1950), ETS No. 005 and the European Social Charter (1961), ETS No. 035.
  • 20
    • 84876679054 scopus 로고    scopus 로고
    • Council of Europe, accessed 14 May 2012
    • Complete List of the Council of Europe's Treaties' (Council of Europe) http://conventions.coe.int/Treaty/Commun/ListeTraites.asp?CM=8&CL=ENG, accessed 14 May 2012.
    • Complete List of the Council of Europe's Treaties
  • 21
    • 84876684030 scopus 로고    scopus 로고
    • Council of Europe External Relations, accessed 14 May 2012
    • The Council of Europe's Relations with Non-Member States' (Council of Europe External Relations) http://www.coe.int/t/der/NonMemberStates'en.asp, accessed 14 May 2012.
    • The Council of Europe's Relations With Non-Member States
  • 22
    • 84876681961 scopus 로고    scopus 로고
    • Note
    • Council of Europe Recommendation No. R (89) 9 of the Committee of Ministers to Member States on Computer-related Crime (13 September 1989) and Council of Europe Recommendation No. R (95) 13 of the Committee of Ministers to Member States Concerning Problems of Criminal Procedural Law Connected with Information Technology (1 September 1995). The Council's initiatives in the area of computer crime go back even further to 1976; Schjolberg (n. 10 above) 2.
  • 23
    • 84876672489 scopus 로고    scopus 로고
    • Council of Europe, Explanatory Report, accessed 19 August 2012
    • Council of Europe, 'Convention on Cybercrime (ETS No 185) Explanatory Report' (Explanatory Report) http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm accessed 19 August 2012.
    • Convention On Cybercrime (ETS No 185) Explanatory Report
  • 24
    • 84876669927 scopus 로고    scopus 로고
    • Note
    • Convention (n. 13 above).
  • 25
    • 84876691871 scopus 로고    scopus 로고
    • Note
    • Council of Europe, 'Project on Cybercrime Final Report' (Economic Crime Division of the Directorate General of Human Rights and Legal Affairs, 15 June 2009) 5.
  • 26
    • 84876687238 scopus 로고    scopus 로고
    • Note
    • Convention (n. 13 above) art 36(1).
  • 27
    • 84876688284 scopus 로고    scopus 로고
    • Note
    • Convention (n. 13 above) art 37(1).
  • 28
    • 84876686897 scopus 로고    scopus 로고
    • Note
    • Canada, Japan, South Africa and the United States of America.
  • 29
    • 84876692571 scopus 로고    scopus 로고
    • Council of Europe, 29 June 2011, accessed 14 May 2012 (Convention)
    • Convention on Cybercrime CETS No. 185' (Council of Europe, 29 June 2011) http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=8&DF=29/06/2011&[CL=ENG accessed 14 May 2012 (Convention).
    • Convention On Cybercrime CETS No. 185
  • 30
    • 84876682315 scopus 로고    scopus 로고
    • Note
    • The others are Andorra, Monaco and San Marino.
  • 31
    • 84876681115 scopus 로고    scopus 로고
    • Note
    • Canada, Japan and South Africa.
  • 32
  • 33
    • 84876694450 scopus 로고    scopus 로고
    • Note
    • The Convention entered into force for the United Kingdom on 1 September 2011 and entered into force for Malta on 1 August 2012; Council of Europe (n. 32 above).
  • 34
    • 84876688188 scopus 로고    scopus 로고
    • Note
    • Austria, Belgium, Czech Republic, the Republic of Georgia, Greece, Ireland, Liechtenstein, Luxembourg, Poland, Sweden, Switzerland and Turkey; Council of Europe (n. 32 above).
  • 35
    • 84876683698 scopus 로고    scopus 로고
    • Note
    • Austria, Belgium, Czech Republic, the Republic of Georgia, Greece, Ireland, Liechtenstein, Luxembourg, Poland, Sweden, Switzerland and Turkey; Council of Europe (n. 32 above).
  • 36
    • 84876668833 scopus 로고    scopus 로고
    • Note
    • Cybercrime LegislationAmendment Bill 2011, The Parliament of the Commonwealth of Australia, House of Representatives.
  • 37
    • 84876670627 scopus 로고    scopus 로고
    • Note
    • Legislative Summary of Bill C-51: Investigative Powers for the 21st Century Act, Parliament of Canada, 40th Parliament, 3rd Session, No. 40-3-C51E (3 February 2011) [1.3].
  • 38
    • 84876668112 scopus 로고    scopus 로고
    • Domestic Cyber crime Bill Passed
    • Kyodo News, Kyodo, 17 June 2011, accessed 14 May 2012
    • Kyodo News, 'Domestic Cyber crime Bill Passed' Japan Times (Kyodo, 17 June 2011) http://search.japantimes.co.jp/cgi-bin/nn20110617x3.html accessed 14 May 2012.
    • Japan Times
  • 39
    • 84876691970 scopus 로고    scopus 로고
    • Swissinfo.ch, 2 March 2011, accessed 14 May 2012
    • U. Geiser, 'Parliament Cracks Down on Cyber crime' (Swissinfo.ch, 2 March 2011) http://www.swissinfo.ch/eng/politics/Parliament'cracks'down'on'cybercrime.html?cid=29629848 accessed 14 May 2012.
    • Parliament Cracks Down On Cyber Crime
    • Geiser, U.1
  • 40
    • 84876685355 scopus 로고    scopus 로고
    • Note
    • Organisation of American States, Seventh Meeting of Ministers of Justice or other Ministers or Attorneys General of the Americas (REMJA-VII) 'Conclusions and Recommendations', Washington, D.C., 2008, http://www.oas.org/juridico/english/cybVII'CR.pdf accessed 14 May 2012.
  • 41
    • 84873810741 scopus 로고    scopus 로고
    • New Zealand Government, New Zealand Government
    • New Zealand Government, 'New Zealand's Cyber Security Strategy' (New Zealand Government, 2011) 10.
    • (2011) New Zealand's Cyber Security Strategy , pp. 10
  • 42
    • 84876669295 scopus 로고    scopus 로고
    • Note
    • Brenner (n. 15 above) 210. It is beyond the scope of this article to consider other suggested means of international enforcement, such as centralised international agencies responsible for investigating and/or prosecuting cybercrimes; Brenner (n. 15 above) 218-219.
  • 44
    • 84876679562 scopus 로고    scopus 로고
    • Note
    • Denial of Service' attacks are discussed in more detail in "Outdated Language" section.
  • 46
    • 84876677499 scopus 로고    scopus 로고
    • Note
    • Convention (n. 13 above) Title 5.
  • 47
    • 84876676858 scopus 로고    scopus 로고
    • Note
    • Explanatory Report (n. 23 above) [71].
  • 48
    • 84876692591 scopus 로고    scopus 로고
    • Internet Crime Complaint Center, accessed 14 May 2012
    • Internet Crime Complaint Center, '2010 Internet Crime Report' (2011) http://www.ic3.gov/media/annualreport/2010'IC3Report.pdf, accessed 14 May 2012.
    • (2011) 2010 Internet Crime Report
  • 50
  • 51
    • 84876674269 scopus 로고    scopus 로고
    • Note
    • Explanatory Report (n. 23 above) [86].
  • 52
    • 84876668751 scopus 로고    scopus 로고
    • Note
    • Explanatory Report (n. 23 above)., [83].
  • 53
    • 84876672258 scopus 로고    scopus 로고
    • Note
    • The Optional Protocol to the Convention on the Rights of the Child on the Sale of Children, Child Prostitution and Child Pornography, UN Doc.A/RES/54/263 (16 March 2001) and the Vienna International Conference on Combating Child Pornography on the Internet (Vienna, 1999).
  • 54
    • 84876681407 scopus 로고    scopus 로고
    • Note
    • Additional Protocol to the Convention on Cybercrime, Concerning the Criminalisation of Acts of a Racist or Xenophobic Nature Committed Through Computer Systems (2003), CETS No. 189.
  • 56
    • 84876695107 scopus 로고    scopus 로고
    • Note
    • The Berne Convention for the Protection of Literary and Artistic Works (1886), 1161 UNTS 30.
  • 57
    • 84876677333 scopus 로고    scopus 로고
    • Note
    • Agreement on Trade Related Aspects of Intellectual Property Rights (1994), 1869 UNTS 299.
  • 58
    • 84876673472 scopus 로고    scopus 로고
    • Note
    • World Intellectual Property Organisation Copyright Treaty (1996) 36 ILM 65; World Intellectual Property Organisation Performances and Phonograms Treaty (1996), 36 ILM 76.
  • 59
    • 84876667795 scopus 로고    scopus 로고
    • Google Translate tr, Heise Netze, 21 October 2009, accessed 14 May 2012
    • M. Ermert, 'ITU Will Manage IP Addresses' (Google Translate tr, Heise Netze, 21 October 2009) http://www.heise.de/netze/meldung/ITU-will-IP-Adressen-verwalten-835928.html accessed 14 May 2012.
    • ITU Will Manage IP Addresses
    • Ermert, M.1
  • 60
    • 84943607448 scopus 로고    scopus 로고
    • Australia's Accession to the Cyber crime Convention: Is the Convention Still Relevant in Combating Cyber crime in the Era of Botnets and Obfuscation Crime Tools
    • A. Maurushat, 'Australia's Accession to the Cyber crime Convention: Is the Convention Still Relevant in Combating Cyber crime in the Era of Botnets and Obfuscation Crime Tools' (2010) 33 University of New South Wales Law Journal 431, 432.
    • (2010) University of New South Wales Law Journal , vol.33 , Issue.431 , pp. 432
    • Maurushat, A.1
  • 61
    • 84876682141 scopus 로고    scopus 로고
    • Note
    • Convention (n. 13 above) art 1(a). Under art 1(b) 'computer data' is defined as 'any representation of facts, information or concepts in a form suitable for processing in a computer system, including a program suitable to cause a computer system to perform a function.
  • 62
    • 84876687550 scopus 로고    scopus 로고
    • Note
    • Law Commission (UK), Computer Misuse, Final Report No 186 (1989) [3.39].
  • 63
    • 84876673312 scopus 로고    scopus 로고
    • Note
    • 18 USC § 1030(e)(1).
  • 64
    • 84876688175 scopus 로고    scopus 로고
    • Note
    • Model Criminal Code Officers Committee, Model Criminal Code: Chapter 4, Damage and Computer Offences Final Report (2001) 125.
  • 65
    • 84876684483 scopus 로고    scopus 로고
    • Note
    • Maurushat (n. 59 above) 438.
  • 66
    • 84876683971 scopus 로고    scopus 로고
    • Note
    • Maurushat (n. 59 above) 436-437.
  • 67
  • 69
    • 84865862974 scopus 로고    scopus 로고
    • MessageLabs, accessed 11 May 2012, 9
    • Message Labs Intelligence: 2010 Annual Security Report' (Message Labs) http://www.symanteccloud.com/mlireport/MessageLabsIntelligence'2010'Annual'Report'FINAL.pdf accessed 11 May 2012, 9.
    • Message Labs Intelligence: 2010 Annual Security Report
  • 70
    • 0012186120 scopus 로고    scopus 로고
    • Cyber-Crimes: A Practical Approach to the Application of Federal Computer Crime Laws
    • E. J. Sinrod and W.P. Reilly, 'Cyber-Crimes: A Practical Approach to the Application of Federal Computer Crime Laws' (2000) 16 Santa Clara Computer & High Technology Law Journal 177, 189-191.
    • (2000) Santa Clara Computer & High Technology Law Journal , vol.16 , Issue.177 , pp. 189-191
    • Sinrod, E.J.1    Reilly, W.P.2
  • 71
    • 84876682494 scopus 로고    scopus 로고
    • British Student Charged Over Online Attacks in January
    • London, 25 August 2011, accessed 11May 2012
    • C. Arthur, 'British Student Charged Over Online Attacks in January' The Guardian (London, 25 August 2011) http://www.guardian.co.uk/technology/2011/aug/25/british-student-charged-online-attacks?INTCMP=ILCNETTXT3487, accessed 11May 2012.
    • The Guardian
    • Arthur, C.1
  • 72
    • 84876691149 scopus 로고    scopus 로고
    • Note
    • Maurushat (n. 56 above) 432.
  • 73
    • 84876670450 scopus 로고    scopus 로고
    • Note
    • Explanatory Report (n. 23 above) [65].
  • 74
    • 84876690481 scopus 로고    scopus 로고
    • Note
    • Convention (n. 13 above) art 6.
  • 76
    • 84876669355 scopus 로고    scopus 로고
    • Note
    • Explanatory Notes to the Police and Justice Act 2006, [303].
  • 77
    • 33745143977 scopus 로고    scopus 로고
    • Criminalising Hacking Tools
    • P. Sommer, 'Criminalising Hacking Tools' (2006) 3 Digital Investigation 68, 70.
    • (2006) Digital Investigation , vol.3 , Issue.68 , pp. 70
    • Sommer, P.1
  • 78
    • 84876684958 scopus 로고    scopus 로고
    • Note
    • Maurushat (n. 56 above) 447.
  • 79
    • 84876673892 scopus 로고    scopus 로고
    • Note
    • All Party Parliamentary Internet Group (n. 74 above) [73].
  • 80
    • 84876676745 scopus 로고    scopus 로고
    • Note
    • All Party Parliamentary Internet Group (n. 74 above) [73].
  • 81
    • 84876689753 scopus 로고    scopus 로고
    • Note
    • Convention (n. 13 above) art 6(2).
  • 82
    • 84876695121 scopus 로고    scopus 로고
    • Note
    • Explanatory Report (n. 23 above) [77].
  • 83
    • 84876689590 scopus 로고    scopus 로고
    • Note
    • 'Computer-Related Offences' section.
  • 84
    • 84864578373 scopus 로고    scopus 로고
    • The True Identity of Australian Identity Theft Offences: A Measured Response or an Unjustified Status Offence
    • A. Steel, 'The True Identity of Australian Identity Theft Offences: A Measured Response or an Unjustified Status Offence' (2010) 33:2 University of New South Wales Law Journal 503, 505.
    • (2010) University of New South Wales Law Journal , vol.33 , Issue.503 , pp. 505
    • Steel, A.1
  • 85
    • 84876676626 scopus 로고    scopus 로고
    • Note
    • Organisation for Economic Co-operation and Development (Committee on Consumer Policy) 'Scoping Paper on Online Identity Theft Ministerial Background Report' (Seoul, 2007) DSTI/CP(2007)3/Final, 17-24.
  • 87
    • 84876687880 scopus 로고    scopus 로고
    • Symantec, November 2008, accessed 11 May 2012
    • Symantec Report on the Underground Economy July 07-June 08' (Symantec, November 2008) http://eval.symantec.com/mktginfo/enterprise/white'papers/b-whitepaper'underground'economy'report'11-2008-14525717.en-us.pdf accessed 11 May 2012.
    • Symantec Report On the Underground Economy July 07-June 08
  • 88
    • 84876675284 scopus 로고    scopus 로고
    • Model Criminal Law Officers Committee
    • Model Criminal Law Officers Committee, 'Identity Crime, Final Report' (2008) 12.
    • (2008) Identity Crime, Final Report , pp. 12
  • 89
    • 84876686980 scopus 로고    scopus 로고
    • Note
    • Identity crime' is a generic term used to describe those offences where the defendant uses a false identity in the commission of a criminal offence. 'Identity fraud' is a specific form of identity crime where a false identity is used to gain money, goods, benefits or services. Australasian Centre for Policing Research and the Australian Transaction Reports and Analysis Centre, 'Standardisation of Definitions of Identity Crime Terms: A Step Towards Consistency' (2006) Report Series No. 145.3, 9-10.
  • 90
    • 84924707734 scopus 로고    scopus 로고
    • Cambridge: Cambridge University Press
    • J. Clough, Principles of Cybercrime (Cambridge: Cambridge University Press, 2010) 207-220.
    • (2010) Principles of Cybercrime , pp. 207-220
    • Clough, J.1
  • 91
    • 84876679406 scopus 로고    scopus 로고
    • Note
    • Criminal Code Act 1995 (Cth) s 372.1(b).
  • 92
    • 84876673207 scopus 로고    scopus 로고
    • Note
    • Article 6, 'Misuse of Devices', does create a range of offences in relation to passwords, access codes and similar data by which a computer system may be accessed. However, these relate to the hacking offences found in Articles 2 to 5 rather than fraud or other criminal offences; Explanatory Report (n 23) [71].
  • 93
    • 84876677139 scopus 로고    scopus 로고
    • Note
    • The principal US federal provisions were enacted as the Identity Theft and Assumption Deterrence Act of 1998, 18 USC § 1028 (1998).
  • 94
    • 84876667975 scopus 로고    scopus 로고
    • Note
    • Criminal Code Act 1995 (Cth) pt 9.5. Although some Australian states had enacted such offences as early as 2003; Steel (n. 83 above) 508.
  • 95
    • 84876689151 scopus 로고    scopus 로고
    • Note
    • Criminal Cod, R.S.C., 1985, c. C-46, s. 402.1-403. For a complete summary, see Legal and Legislative Affairs Division of Canada, Legislative Summary LS-637E, Bill S-4: An Act to Amend the Criminal Code (Identity Theft and Related Misconduct) (N. Holmes and D. Valiquet, Legal and Legislative Affairs Division of Canada, 2009).
  • 96
    • 84876667172 scopus 로고    scopus 로고
    • Note
    • Identity Cards Act 2006 (UK).
  • 97
    • 84876683427 scopus 로고    scopus 로고
    • Note
    • Steel (n. 83 above).
  • 98
    • 84876695395 scopus 로고    scopus 로고
    • Council of Europe, Project on Cybercrime, 22 November 2007), by M. Gercke
    • Council of Europe, 'Internet-Related Identity Theft Discussion Paper' (Project on Cybercrime, 22 November 2007), by M. Gercke, 31.
    • Internet-Related Identity Theft Discussion Paper , pp. 31
  • 99
    • 33747617663 scopus 로고    scopus 로고
    • Child Protection on the Internet-Challenges for Criminal Law
    • A.A. Gillespie, 'Child Protection on the Internet-Challenges for Criminal Law' (2002) 14 Child & Family Law Quarterly 411, 412.
    • (2002) Child & Family Law Quarterly , vol.14 , Issue.411 , pp. 412
    • Gillespie, A.A.1
  • 100
    • 84876686070 scopus 로고    scopus 로고
    • Clothing Logo Links NSW Girl to Internet "Predator"
    • Sydney, 5 June 2011, accessed 11 May 2012
    • P. Mitchell and J. Norrie, 'Clothing Logo Links NSW Girl to Internet "Predator"', Sydney Morning Herald (Sydney, 5 June 2011) http://www.smh.com.au/technology/technology-news/clothing-logo-links-nsw-girl-to-internet-predator-20110604-1fm5p.html accessed 11 May 2012.
    • Sydney Morning Herald
    • Mitchell, P.1    Norrie, J.2
  • 101
    • 84876676361 scopus 로고    scopus 로고
    • Note
    • Royal Commission into the New South Wales Police Service, Final Report, Volume V: The Paedophile Inquiry (1997), by Justice JRT Wood [16.27].
  • 102
    • 25444527989 scopus 로고    scopus 로고
    • Children, Chatrooms and the Law
    • A.A. Gillespie, 'Children, Chatrooms and the Law' (2001) Criminal Law Review 435, 436-440.
    • (2001) Criminal Law Review , vol.435 , pp. 436-440
    • Gillespie, A.A.1
  • 104
    • 84876689189 scopus 로고    scopus 로고
    • Note
    • Clough (n. 89 above) 337.
  • 105
    • 84876685878 scopus 로고    scopus 로고
    • Note
    • Ashcroft v. American Civil Liberties Union, 542 US 656 (2004).
  • 106
    • 84876686645 scopus 로고    scopus 로고
    • Note
    • Council of Europe, Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse, CETS N. 201, Explanatory Report (1 July 2010) [157].
  • 107
    • 84876689301 scopus 로고    scopus 로고
    • Note
    • Additional Protocol (n. 53 above).
  • 108
    • 84876692945 scopus 로고    scopus 로고
    • Note
    • This provision is also reflected in the European Commission Framework Directive on Combating the Sexual Abuse, Sexual Exploitation of Children and Child Pornography, repealing Framework Decision 2004/68/JHA (Brussels, 29 March 2010) COM(2010) 94 final, 2010/0064 (COD).
  • 109
    • 84876690430 scopus 로고    scopus 로고
    • Symantec, February 2012, accessed 11 May 2012
    • The Symantec Intelligence Report' (Symantec, February 2012) http://www.symantec.com/business/theme.jsp?themeid=state'of'spam accessed 11 May 2012.
    • The Symantec Intelligence Report
  • 111
    • 84876688843 scopus 로고    scopus 로고
    • Note
    • It is also increasingly prevalent in other networks such as SMS/MMS; Organisation for Economic Co-operation and Development, Report of the OECD Task Force on Spam: Anti-Spam Toolkit of Recommended Policies and Measures (2006) 20-21.
  • 112
    • 84876685213 scopus 로고    scopus 로고
    • Note
    • Congressional findings in relation to the Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act 15 USC § 7703(c)(1). Federal Trade Commission, Spam Summit: The Next Generation of Threats and Solutions (2007) 2-3.
  • 114
    • 84876691244 scopus 로고    scopus 로고
    • Note
    • Clough (n. 89 above) 239. Although the United States provisions are supplemented by specific criminal offences, these relate to serious conduct involving unauthorized access to, or use of, protected computers for the purposes of spam or falsifying of addressing or other identifying information; 18 USC §1037(a).
  • 115
    • 84876695234 scopus 로고    scopus 로고
    • Note
    • Explanatory Report (n. 23 above) [69].
  • 116
    • 84876685760 scopus 로고    scopus 로고
    • Note
    • Clough (n. 89 above) 239-242.
  • 117
    • 84876665807 scopus 로고    scopus 로고
    • Note
    • European Parliament and of the Council of the European Union, Directive on Privacy and Electronic Communications (12 July 2002) Directive 2002/58/EC.
  • 118
    • 84876688659 scopus 로고    scopus 로고
    • Note
    • Organisation for Economic Co-Operation and Development 'OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security' (2002).
  • 119
    • 84876692573 scopus 로고    scopus 로고
    • Note
    • R v. Boden [2002] QCA 164.
  • 120
    • 84876695166 scopus 로고    scopus 로고
    • Note
    • It is beyond the scope of this chapter to consider accountability for statesponsored attacks.
  • 121
    • 84876664633 scopus 로고    scopus 로고
    • State Responsibility for Cyber Attacks: Competing Standards for a Growing Problem
    • S.J. Shackleford and Richard Andres, 'State Responsibility for Cyber Attacks: Competing Standards for a Growing Problem' (2011) 42:3 Georgetown Journal of International Law 971.
    • (2011) Georgetown Journal of International Law , vol.42 , Issue.3 , pp. 971
    • Shackleford, S.J.1    Andres, R.2
  • 122
    • 84859931806 scopus 로고    scopus 로고
    • The White House, accessed 14 May 2012
    • International Strategy for Cyberspace' (The White House, 2011) http://www.whitehouse.gov/sites/default/files/rss'viewer/international'strategy'for'cyberspace.pdf accessed 14 May 2012.
    • (2011) International Strategy For Cyberspace
  • 123
    • 84872944057 scopus 로고    scopus 로고
    • Australian Government, accessed 17 May 2012
    • Cyber Security Strategy' (Australian Government, 2009) http://www.ag.gov.au/Cybersecurity/Pages/default.aspx accessed 17 May 2012.
    • (2009) Cyber Security Strategy
  • 127
    • 84874493906 scopus 로고    scopus 로고
    • Symantec, accessed 14 May 2012
    • The Stuxnet Worm' (Symantec, 2010) http://www.symantec.com/business/outbreak/index.jsp?id=stuxnet accessed 14 May 2012.
    • (2010) The Stuxnet Worm
  • 128
    • 77955740556 scopus 로고    scopus 로고
    • Cyber-Terrorism: Legal Principle and Law in the United Kingdom
    • C. Walker, 'Cyber-Terrorism: Legal Principle and Law in the United Kingdom' (2006) 110:3 Pennsylvania State Law Review 625, 635-642.
    • (2006) Pennsylvania State Law Review , vol.110 , Issue.625 , pp. 635-642
    • Walker, C.1
  • 129
    • 84876677133 scopus 로고    scopus 로고
    • Note
    • R v. Lodhi [2006] NSWSC 584.
  • 131
    • 84876689253 scopus 로고    scopus 로고
    • Note
    • For example, possession of materials in preparation for a terrorist act; Criminal Code Act 1995 (Cth) s.101.4; Terrorism Act 2000 (UK) s. 57.
  • 132
  • 133
    • 84876689331 scopus 로고    scopus 로고
    • Note
    • Clough (n. 89 above) 12.
  • 134
    • 84876667976 scopus 로고    scopus 로고
    • Note
    • Weimann (n. 129 above) 132-133.
  • 135
    • 85133984743 scopus 로고    scopus 로고
    • The Definition of Terrorism
    • in Alex P Schmid (ed), Abingdon: Routledge
    • A. P. Schmid, 'The Definition of Terrorism' in Alex P Schmid (ed), The Routledge Handbook of Terrorism Research (Abingdon: Routledge, 2011).
    • (2011) The Routledge Handbook of Terrorism Research
    • Schmid, A.P.1
  • 136
    • 84876683326 scopus 로고    scopus 로고
    • Note
    • To further confuse matters a distinction is sometimes drawn between cyberterrorism and so-called 'hacktivism'; that is, the use of hacking by political activists; Weimann (n. 129 above) 135.
  • 137
    • 84876687940 scopus 로고    scopus 로고
    • in U.S., U.K., and Canadian News Media' (Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities Oxford Internet Institute Conference, Oxford, England, 8-10 September 2005
    • S. Keith, 'Fear-mongering or fact: The Construction of "Cyber-terrorism" in U.S., U.K., and Canadian News Media' (Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities Oxford Internet Institute Conference, Oxford, England, 8-10 September 2005) 1-2.
    • Fear-mongering Or Fact: The Construction of "Cyber-terrorism" , pp. 1-2
    • Keith, S.1
  • 138
    • 84869043791 scopus 로고    scopus 로고
    • United Nations Treaty Office, accessed 14 May 2012
    • Text and Status of the United Nations Conventions on Terrorism' (United Nations Treaty Office) http://treaties.un.org/Pages/DB.aspx?path=DB/studies/page2'en.xml&menu=MTDSG accessed 14 May 2012.
    • Text and Status of the United Nations Conventions On Terrorism
  • 139
    • 84876667822 scopus 로고    scopus 로고
    • Note
    • Report of the Ad Hoc Committee Established by General Assembly Resolution 51/210, UN Doc. Supp. No. 37 (A/57/37) (2002).
  • 140
    • 84876686464 scopus 로고    scopus 로고
    • Committee of Experts on Terrorism, Council of Europe, 16 January 2008, accessed 14 May 2012 app II
    • Committee of Experts on Terrorism, 'Opinion of CODEXTER on Cyberterrorism and Misuse of the Internet for Terrorist Purposes' (Council of Europe, 16 January 2008) https://wcd.coe.int/wcd/ViewDoc.jsp?Ref=CM(2007)177&Language=lanEnglish&Ver=original&Site=COE&BackColorInternet=DBDCF2&BackColorIntranet=FDC864&BackColorLogged=FDC864 accessed 14 May 2012 app II.
    • Opinion of CODEXTER On Cyberterrorism and Misuse of the Internet For Terrorist Purposes
  • 141
    • 84876670525 scopus 로고    scopus 로고
    • Note
    • Walker (n. 125 above) 631.
  • 142
    • 84876671249 scopus 로고    scopus 로고
    • Note
    • Criminal Code Act 1995 (Cth) s 100.1(2)(f); Criminal Code, R.S.C., 1985, c. C-46, s. 83.01(1). The draft international convention on terrorism also refers to 'serious damage to an infrastructure facility'; UN General Assembly (n. 135 above) annex II, art. 2(b).
  • 143
    • 84876678854 scopus 로고    scopus 로고
    • Note
    • The Holy See is not a member state of the United Nations but has permanent observer status; 'Permanent Observers' (United Nations, 29 February 2008) http://www.un.org/en/members/nonmembers.shtml accessed 14 May 2012.
  • 144
    • 84876694435 scopus 로고    scopus 로고
    • There are 193 members states of the United Nations, United Nations, 3 July 2006, accessed 14 May 2012
    • There are 193 members states of the United Nations. 'Member States' (United Nations, 3 July 2006), http://www.un.org/en/members/index.shtml accessed 14 May 2012.
    • Member States
  • 145
    • 84876679568 scopus 로고    scopus 로고
    • Intergovernmental Group of Twenty Four, accessed 14 May 2012
    • Intergovernmental Group of Twenty Four' (Intergovernmental Group of Twenty Four, 2011) http://www.g24.org/ accessed 14 May 2012.
    • (2011) Intergovernmental Group of Twenty Four
  • 147
    • 84876668302 scopus 로고    scopus 로고
    • Note
    • Council of Europe, Contribution of the Secretary General of the Council of Europe to the Twelfth United Nations Congress on Crime Prevention and Criminal Justice (16 February 2010) 19.
  • 148
    • 84876672049 scopus 로고    scopus 로고
    • Note
    • Report of the African Regional Preparatory Meeting for the Twelfth United Nations Congress on Crime Prevention and Criminal Justice, UN Doc. A/CONF. 213/RPM.4/1 (24 February 2010) [40].
  • 149
    • 84876677525 scopus 로고    scopus 로고
    • Note
    • Report of the Asian and Pacific Regional Preparatory Meeting for the Twelfth United Nations Congress on Crime Prevention and Criminal Justice, UN Doc. A/CONF.213/RPM.3/1 (8 September 2009) 28; Report of the Western Asian Regional Preparatory Meeting for the Twelfth United Nations Congress on Crime Prevention and Criminal Justice, UN Doc. A/CONF.213/RPM.2/1 (29 June 2009) [47].
  • 150
    • 84876671292 scopus 로고    scopus 로고
    • Note
    • Report of the Latin American and Caribbean Regional Preparatory Meeting for the Twelfth United Nations Congress on Crime Prevention and Criminal Justice, UN Doc. A/CONF.213/RPM.1/1 (26 May 2009) [41].
  • 151
    • 84876691255 scopus 로고    scopus 로고
    • Note
    • Report of the Twelfth United Nations Congress on Crime Prevention and Criminal Justice, UN Doc. A/conf.213/18 (18 May 2010), 56.
  • 152
    • 84876691940 scopus 로고    scopus 로고
    • Global Cybercrime Treaty Rejected at UN
    • accessed 14 May 2012
    • G. Masters, 'Global Cybercrime Treaty Rejected at UN' SC Magazine (Sydney, 23 April 2010), http://www.scmagazineus.com/global-cybercrime-treaty-rejected-atun/article/168630/ accessed 14 May 2012.
    • SC Magazine (Sydney, 23 April 2010)
    • Masters, G.1
  • 153
    • 84876695501 scopus 로고    scopus 로고
    • Proposed Directive on Attacks against Information Systems and Repealing Council Framework Decision 2005/222/JHA COM
    • Note, European Commission
    • The Quintet of Attorneys General from Australia, Canada, New Zealand, the United Kingdom and the United States have recently resolved to promote the Convention as the key international instrument for dealing with cybercrime and use the Convention as a basis for delivering capacity building and awareness raising activities; 'Quintet of Attorneys General Action Plan to Fight Cyber Crime' (US Reference Service, 2011) http://usrsaustralia.state.gov/us-oz/2011/07/15/aag2.html accessed 17 May 2012. European Commission, 'Proposed Directive on Attacks against Information Systems and Repealing Council Framework Decision 2005/222/JHA COM (2010) 51:7, Explanatory Memorandum' (2010) 2.
    • (2010) Explanatory Memorandum , vol.51 , Issue.7 , pp. 2
  • 154
    • 84876682663 scopus 로고    scopus 로고
    • Note
    • Paragraph 42 of The 'Salvador Declaration' was adopted by the Commission on Crime Prevention and Criminal Justice and then by the Economic and Social Council in UN Economic and Social Council Res 2010/18 (22 July 2010) and by the General Assembly in UNGA Res 65/230 (1 April 2011) UN Doc A/65/457.
  • 155
    • 84876684132 scopus 로고    scopus 로고
    • Note
    • Paragraph 42 of The 'Salvador Declaration' was adopted by the Commission on Crime Prevention and Criminal Justice and then by the Economic and Social Council in UN Economic and Social Council Res 2010/18 (22 July 2010) and by the General Assembly in UNGA Res 65/230 (1 April 2011) UN Doc A/65/457.
  • 156
    • 84876684683 scopus 로고    scopus 로고
    • Note
    • Model Criminal Code Officers Committee (n. 63 above) 89.
  • 157
    • 84876687898 scopus 로고    scopus 로고
    • Note
    • Recommended for the endorsement of Law Ministers in 2002. At the meeting of Commonwealth Law Ministers in Sydney, Australia in 2011 ministers resolved that 'the Commonwealth Secretariat form a multidisciplinary working group of experts to review the practical implications of cybercrime in the Commonwealth and identify the most effective means of international co-operation and enforcement, taking into account, amongst others, the Council of Europe Convention on Cybercrime, without duplicating the work of other international bodies.' 'Commonwealth Law Ministers Meeting Communiqué 2011'(Commonwealth Secretariat) http://www.thecommonwealth.org/document/177370/238332/clmm'2011.htm, accessed 14 May 2012.
  • 158
    • 84876683244 scopus 로고    scopus 로고
    • International Telecommunication Union, February 2010
    • ITU Toolkit for Cybercrime Legislation' (International Telecommunication Union, February 2010).
    • ITU Toolkit For Cybercrime Legislation
  • 159
    • 84876691480 scopus 로고    scopus 로고
    • Note
    • Council of Europe (n. 25 above) 42.
  • 160
    • 84876695501 scopus 로고    scopus 로고
    • Proposed Directive on Attacks Against Information Systems And Repealing Council Framework Decision 2005/222/JHA COM
    • European Commission
    • European Commission, 'Proposed Directive on Attacks Against Information Systems And Repealing Council Framework Decision 2005/222/JHA COM (2010) 517, Explanatory Memorandum' (2010) 2.
    • (2010) Explanatory Memorandum , vol.517 , pp. 2
  • 161
    • 84876693777 scopus 로고    scopus 로고
    • Note
    • For example, the proposal by the EU to replace its Council Framework Decision 2005/222/JHA of 24 February 2005 on Attacks Against Information Systems (2005) OJ L 69/67 with the European Commission 'Proposed Directive on Attacks Against Information Systems And Repealing Council Framework Decision' (2010) 2005/222/JHA; European Commission, 'Proposed Directive on Attacks Against Information Systems And Repealing Council Framework Decision' (2010) 2005/222/JHA COM, 517.
  • 162
    • 84876691815 scopus 로고    scopus 로고
    • Note
    • Convention (n. 13 above) Art. 44(3).
  • 163
    • 84876671759 scopus 로고    scopus 로고
    • Note
    • Additional Protocol (n. 53 above).
  • 165
    • 84876695099 scopus 로고    scopus 로고
    • Council of Europe, accessed 14 May 2012
    • List of Declarations Made with Respect to Treaty No. 185' (Council of Europe) http://conventions.coe.int/Treaty/Commun/ListeDeclarations.asp?NT=185&CM=8&DF=09/06/2011&CL=ENG&VL=1 accessed 14 May 2012.
    • List of Declarations Made With Respect to Treaty No. 185


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.