-
1
-
-
0042838107
-
The perverse law of child pornography
-
Adler, A., ‘The perverse law of child pornography’ (2001) 101 The Columbia Law Review 209
-
(2001)
The Columbia Law Review
, vol.101
-
-
Adler, A.1
-
2
-
-
84924741284
-
Briton sentenced to 51 months prison in US for Internet piracy
-
Agence France Presse, 23 June
-
Agence France Presse, ‘Briton sentenced to 51 months prison in US for Internet piracy’, The Sydney Morning Herald, 23 June 2007, www.smh.com.au/news/Technology/Briton-sentenced-to-51-months-prison-in-US-for-Internetpiracy/2007/06/23/1182019396798.html
-
(2007)
The Sydney Morning Herald
-
-
-
3
-
-
84924741283
-
Conficker worm wiggles into millions of computers
-
Agence France Presse, 21 January
-
Agence France Presse, ‘Conficker worm wiggles into millions of computers’, The Age, 21 January 2009
-
(2009)
The Age
-
-
-
4
-
-
34147115086
-
Possession and Dispossession: A critical assessment of defences in cases of possession of indecent photographs of children
-
Akdeniz, Y., ‘Possession and Dispossession: A critical assessment of defences in cases of possession of indecent photographs of children’ (2007) Criminal Law Review 274
-
(2007)
Criminal Law Review
-
-
Akdeniz, Y.1
-
5
-
-
23044524837
-
Regulation of Investigatory Powers Act 2000 (1): BigBrother.Gov.Uk: State surveillance in the age of information and rights
-
Akdeniz, Y., Taylor, N. and Walker, C., ‘Regulation of Investigatory Powers Act 2000 (1): BigBrother.gov.uk: State surveillance in the age of information and rights’ (2001) Criminal Law Review 73
-
(2001)
Criminal Law Review
-
-
Akdeniz, Y.1
Taylor, N.2
Walker, C.3
-
10
-
-
34548344520
-
-
Origins of the Word ‘Phishing’, (2008), APACS-the UK
-
Anti-PhishingWorking Group, Phishing Activity Trends Report: Q2/2008 (2008) Origins of the Word ‘Phishing’ (2008), www.antiphishing.org/word phish.html APACS-the UK
-
(2008)
Phishing Activity Trends Report: Q2/2008
-
-
-
12
-
-
84924720382
-
The fate of the Child Pornography Act of 1996: Virtual child pornography: Criminal conduct or protected speech?
-
Armagh, D. S., ‘The fate of the Child Pornography Act of 1996: Virtual child pornography: Criminal conduct or protected speech?’ (2002) 23 Cardozo Law Review 1993
-
(2002)
Cardozo Law Review
, vol.23
-
-
Armagh, D.S.1
-
13
-
-
33646749711
-
The CAN-SPAM Act: An inadequate attempt to deal with a growing problem
-
Arora, V., ‘The CAN-SPAM Act: An inadequate attempt to deal with a growing problem’ (2006) 39 Columbia Journal of Law and Social Problems 299
-
(2006)
Columbia Journal of Law and Social Problems
, vol.39
-
-
Arora, V.1
-
18
-
-
84924741281
-
Australasian Centre for Policing Research and the Australian Transaction Reports and Analysis Centre
-
Report Series no. 145.3, Australasian Centre for Policing Research
-
Australasian Centre for Policing Research and the Australian Transaction Reports and Analysis Centre, Standardisation of Definitions of Identity Crime Terms: A step towards consistency, Report Series no. 145.3, Australasian Centre for Policing Research (2006)
-
(2006)
Standardisation of Definitions of Identity Crime Terms: A Step Towards Consistency
-
-
-
26
-
-
84924741279
-
-
Media Release, 15 December
-
Australian Payments Clearing Association, Payment Fraud in Australia, Media Release, 15 December 2008, www.apca.com.au/Public/apca01live.nsf/ResourceLookup/Press_Release_Payments_Fraud_Statistics_5.pdf/$File/Press_Release_Payments_Fraud_Statistics_5.pdf
-
(2008)
Payment Fraud in Australia
-
-
Australian Payments Clearing Association1
-
28
-
-
51349124747
-
-
Baum, K., Identity Theft 2004, Bureau of Justice Statistics Bulletin (US Department of Justice, 2006)
-
(2006)
Identity Theft 2004
-
-
Baum, K.1
-
29
-
-
84924741277
-
Virtual theft leads to arrest
-
14 November
-
BBC News, ‘“Virtual theft” leads to arrest’, BBC News Online (Asia-Pacific) 14 November 2007, http://news.bbc.co.uk/2/hi/technology/7094764.stm
-
(2007)
BBC News Online (Asia-Pacific)
-
-
BBC News1
-
30
-
-
84924741276
-
Caution for Who star Townshend
-
7 May
-
BBC News, ‘Caution for Who star Townshend’, BBC News Online, 7 May 2003, http://news.bbc.co.uk/1/hi/uk/3007871.stm
-
(2003)
BBC News Online
-
-
BBC News1
-
31
-
-
84924741275
-
Web paedophile given nine years
-
22 June
-
BBC News, ‘Web paedophile given nine years’, BBC News, 22 June 2006, http://news.bbc.co.uk/2/hi/uk news/england/5106612.stm
-
(2006)
BBC News
-
-
BBC News1
-
32
-
-
84924741274
-
Q&A: Child benefit records lost: How worried should people be by the loss of discs containing child benefit recipients personal details?
-
22 November
-
BBC News, ‘Q&A: Child benefit records lost: How worried should people be by the loss of discs containing child benefit recipients’ personal details?’, BBC News, 22 November 2007, http://news.bbc.co.uk/2/hi/uk news/politics/7103828.stm
-
(2007)
BBC News
-
-
BBC News1
-
33
-
-
84924741273
-
Woman in jail over virtualmurder
-
Online (Asia-Pacific), 24 October
-
BBC News, ‘Woman in jail over virtualmurder’, BBCNews Online (Asia-Pacific), 24 October 2008, http://news.bbc.co.uk/2/hi/asia-pacific/7688091.stm
-
(2008)
Bbcnews
-
-
BBC News1
-
34
-
-
84924741272
-
Internet piracy trio sent to jail
-
6 May
-
BBC News, ‘Internet piracy trio sent to jail’, BBC News: Technology, 6 May 2005, http://news.bbc.co.uk/1/hi/technology/4518771.stm
-
(2005)
BBC News: Technology
-
-
BBC News1
-
36
-
-
33846366159
-
Spyware and the limits of surveillance law
-
Bellia, P. L., ‘Spyware and the limits of surveillance law’ (2005) 20 Berkeley Technology Law Journal 1283
-
(2005)
Berkeley Technology Law Journal
, vol.20
-
-
Bellia, P.L.1
-
38
-
-
84924741269
-
New hacking tool hijacks file-sharing networks
-
19March
-
Biever, C., ‘New hacking tool hijacks file-sharing networks’, New Scientist.comNews Service, 19March 2004, www.newscientisttech.com/channel/tech/electronicthreats/dn4799
-
(2004)
New Scientist.Comnews Service
-
-
Biever, C.1
-
43
-
-
0141633143
-
Anti-stalking laws: Do they adequately protect stalking victims?
-
Bradfield, J. L., ‘Anti-stalking laws: Do they adequately protect stalking victims?’ (1998) 21 Harvard Women’s Law Journal 229
-
(1998)
Harvard Women’s Law Journal
, vol.21
-
-
Bradfield, J.L.1
-
44
-
-
84924744288
-
True threats: A more appropriate standard for analyzing First Amendment protection and free speech when violence is perpetrated over the Internet
-
Bradfield, J. L., ‘True threats: A more appropriate standard for analyzing First Amendment protection and free speech when violence is perpetrated over the Internet’ (2002) 78 North Dakota Law Review 753
-
(2002)
North Dakota Law Review
, vol.78
-
-
Bradfield, J.L.1
-
48
-
-
84952806773
-
The next step: Prioritizing jurisdiction
-
B. J. Koops and S. W. Brenner, The Hague: TMC Asser Press
-
Brenner, S.W., ‘The next step: Prioritizing jurisdiction’ in B. J. Koops and S. W. Brenner, Cybercrime and Jurisdiction: A global survey (The Hague: TMC Asser Press, 2006)
-
(2006)
Cybercrime and Jurisdiction: A Global Survey
-
-
Brenner, S.W.1
-
51
-
-
84905827277
-
Shifting boundaries of cybercrime: From computer hacking to cyberterrorism
-
Bronitt, S. and Gani, M., ‘Shifting boundaries of cybercrime: From computer hacking to cyberterrorism’ (2003) 27 Criminal Law Journal 303
-
(2003)
Criminal Law Journal
, vol.27
-
-
Bronitt, S.1
Gani, M.2
-
55
-
-
84924741266
-
Upskirt student jailed for six months
-
25 January
-
Butcher, S., ‘Upskirt student jailed for six months’, The Age, 25 January 2007
-
(2007)
The Age
-
-
Butcher, S.1
-
56
-
-
84924741265
-
Regulating sexual images on the web: Last call forMiller time, but new issues remain untapped
-
Calvert, C., ‘Regulating sexual images on the web: Last call forMiller time, but new issues remain untapped’ (2001) 23 Hastings Communications and Entertainment Law Journal 507
-
(2001)
Hastings Communications and Entertainment Law Journal
, vol.23
-
-
Calvert, C.1
-
57
-
-
79956859421
-
Opening up an academic privilege and shutting down child modeling sites: Revising child pornography laws in the United States
-
Calvert, C., ‘Opening up an academic privilege and shutting down child modeling sites: Revising child pornography laws in the United States’ (2002) 107 Dickinson Law Review 253
-
(2002)
Dickinson Law Review
, vol.107
-
-
Calvert, C.1
-
58
-
-
33845565984
-
Video voyeurism, privacy and the Internet: Exposing Peeping Toms in cyberspace
-
Calvert, C. and Brown, J., ‘Video voyeurism, privacy and the Internet: Exposing Peeping Toms in cyberspace’ (2000) 18 Cardozo Arts & Entertainment Law Journal 469
-
(2000)
Cardozo Arts & Entertainment Law Journal
, vol.18
-
-
Calvert, C.1
Brown, J.2
-
59
-
-
84924741264
-
-
Working Paper no. 47
-
Canada Law Reform Commission, Electronic Surveillance, Working Paper no. 47 (1986)
-
(1986)
Electronic Surveillance
-
-
-
69
-
-
84924741259
-
Legislating against computer misuse: The trials and tribulations of the Computer Misuse Act 1990
-
Charlesworth, A. ‘Legislating against computer misuse: The trials and tribulations of the Computer Misuse Act 1990’ (1993) 4 Journal of Law and Information Science 80
-
(1993)
Journal of Law and Information Science
, vol.4
-
-
Charlesworth, A.1
-
72
-
-
84953586760
-
Human identification in information systems:Management challenges and public policy issues
-
Clarke, R., ‘Human identification in information systems:Management challenges and public policy issues’ (1994) Information Technology and People 6
-
(1994)
Information Technology and People
-
-
Clarke, R.1
-
73
-
-
45849108729
-
Now you see it, now you dont: Digital images and the meaning of “possession”
-
Clough, J., ‘Now you see it, now you don’t: Digital images and the meaning of “possession”’ (2008) 19 Criminal Law Forum 209
-
(2008)
Criminal Law Forum
, vol.19
-
-
Clough, J.1
-
74
-
-
0000231532
-
Social change and crime rate trends: A routine activity approach
-
Cohen, L. and Felson, M., ‘Social change and crime rate trends: A routine activity approach’ (1979) 44 American Sociological Review 588
-
(1979)
American Sociological Review
, vol.44
-
-
Cohen, L.1
Felson, M.2
-
76
-
-
25544434835
-
-
Senate, 30August, (Christopher Ellison, Minister for Justice and Customs)
-
Commonwealth of Australia, ParliamentaryDebates, Senate, 30August 2004, 26620 (Christopher Ellison, Minister for Justice and Customs)
-
(2004)
Parliamentarydebates
-
-
Commonwealth of Australia1
-
82
-
-
84924741254
-
-
Pub. L. 108-21, title V, § 501, Apr. 30, 117 Stat. 676
-
Congressional Findings, Pub. L. 108-21, title V, § 501, Apr. 30, 2003, 117 Stat. 676
-
(2003)
-
-
Congressional Findings1
-
83
-
-
84924741253
-
-
Section 101(a) [title I, § 121 [1]] of Pub. L. 104-208
-
Congressional Findings, Section 101(a) [title I, § 121 [1]] of Pub. L. 104-208
-
-
-
Congressional Findings1
-
86
-
-
63849307694
-
Sexual grooming of children: Review of literature and theoretical considerations
-
Craven, S., Brown, S. and Gilchrist, E., ‘Sexual grooming of children: Review of literature and theoretical considerations’ (2006) 12 Journal of Sexual Aggression 287
-
(2006)
Journal of Sexual Aggression
, vol.12
-
-
Craven, S.1
Brown, S.2
Gilchrist, E.3
-
96
-
-
0002116494
-
A rape in cyberspace: How an evil clown, a Haitian trickster spirit, two wizards, and a cast of dozens turned a database into a society
-
23 December
-
Dibbell, J., ‘A rape in cyberspace: How an evil clown, a Haitian trickster spirit, two wizards, and a cast of dozens turned a database into a society’, The Village Voice 23 December 1993, http://juliandibbell.com/texts/bungle vv.html
-
(1993)
The Village Voice
-
-
Dibbell, J.1
-
98
-
-
70450107006
-
-
(Oxford Internet Institute, United Kingdom
-
Dutton, W. H., di Gennaro, C. and Hargrave, A. M., The Internet in Britain: The Oxford Internet survey (Oxford Internet Institute, United Kingdom, 2005)
-
(2005)
The Internet in Britain: The Oxford Internet Survey
-
-
Dutton, W.H.1
Di Gennaro, C.2
Hargrave, A.M.3
-
99
-
-
70450107006
-
-
Oxford Internet Institute, United Kingdom
-
Dutton, W. H., Helsper, E. J. and Gerber M. M., The Oxford Internet Survey: The Internet in Britain 2009 (Oxford Internet Institute, United Kingdom, 2009)
-
(2009)
The Oxford Internet Survey: The Internet in Britain 2009
-
-
Dutton, W.H.1
Helsper, E.J.2
Gerber, M.M.3
-
101
-
-
77955623854
-
Cyberstalking: Tackling harassment on the Internet
-
D. S.Wall (ed.), London: Routledge
-
Ellison, L., ‘Cyberstalking: Tackling harassment on the Internet’ in D. S.Wall (ed.), Crime and the Internet (London: Routledge, 2001)
-
(2001)
Crime and the Internet
-
-
Ellison, L.1
-
102
-
-
14244271149
-
Cyberstalking: The regulation of harassment on the Internet
-
Special Edition: ‘Crime, Criminal Justice and the Internet’ 29
-
Ellison, L. and Akdeniz, Y., ‘Cyberstalking: The regulation of harassment on the Internet’ (1998) Criminal Law Review, Special Edition: ‘Crime, Criminal Justice and the Internet’ 29
-
(1998)
Criminal Law Review
-
-
Ellison, L.1
Akdeniz, Y.2
-
103
-
-
84924741251
-
Secondman arrested for upskirt pics
-
23 January
-
Evans C. and Nguyen, K., ‘Secondman arrested for upskirt pics’, TheAge, 23 January 2007
-
(2007)
Theage
-
-
Evans, C.1
Nguyen, K.2
-
105
-
-
84924741249
-
(Interception and Access)
-
(Cth) Explanatory Notes, Police and Justice Act 2006, c. 48 (UK)
-
Explanatory Memorandum, Telecommunications (Interception and Access) Amendment Bill 2007 (Cth) Explanatory Notes, Police and Justice Act 2006, c. 48 (UK)
-
(2007)
Amendment Bill
-
-
Explanatory Memorandum, Telecommunications,1
-
106
-
-
84924741248
-
-
Explanatory Notes, Regulation of Investigatory Powers Act, c. 23 (UK)
-
Explanatory Notes, Regulation of Investigatory Powers Act (2000) c. 23 (UK)
-
(2000)
-
-
-
107
-
-
84924741247
-
-
Explanatory Notes, Sexual Offences Act, c. 42 (UK)
-
Explanatory Notes, Sexual Offences Act 2003, c. 42 (UK)
-
(2003)
-
-
-
108
-
-
81255171210
-
Computer misuse: The implications of the Police and Justice Act 2006
-
Fafinski, S., ‘Computer misuse: The implications of the Police and Justice Act 2006’ (2008) 72 Journal of Criminal Law 53
-
(2008)
Journal of Criminal Law
, vol.72
-
-
Fafinski, S.1
-
109
-
-
84924654278
-
-
(PEWInternet and American Life Project
-
Fallows, D., Data Memo (PEWInternet and American Life Project, 2007)
-
(2007)
Data Memo
-
-
Fallows, D.1
-
110
-
-
84924741246
-
A problem of “virtual proportions: The difficulties inherent in tailoring virtual child pornography laws to meet constitutional standards
-
Farhangian, J. J., ‘A problem of “virtual” proportions: The difficulties inherent in tailoring virtual child pornography laws to meet constitutional standards’ (2003) 12 Journal of Law and Policy 241
-
(2003)
Journal of Law and Policy
, vol.12
-
-
Farhangian, J.J.1
-
114
-
-
84924741245
-
-
Federal Trade Commission, ‘Facts for consumers: Dot cons’ (2000), www.ftc.gov/bcp/edu/pubs/consumer/tech/tec09.shtm
-
(2000)
Facts for Consumers: Dot Cons
-
-
-
117
-
-
84899247137
-
Close enough for government work: An examination of Congressional efforts to reduce the governments burden of proof in child pornography cases
-
Feldmeier, J. P., ‘Close enough for government work: An examination of Congressional efforts to reduce the government’s burden of proof in child pornography cases’ (2003) 30 Northern Kentucky Law Review 205
-
(2003)
Northern Kentucky Law Review
, vol.30
-
-
Feldmeier, J.P.1
-
119
-
-
84924741244
-
The objective standard of reasonableness and the mentally ill stalker
-
Finch, E., ‘The objective standard of reasonableness and the mentally ill stalker’ (2001) 65 The Journal of Criminal Law 489
-
(2001)
The Journal of Criminal Law
, vol.65
-
-
Finch, E.1
-
120
-
-
0036751650
-
Stalking the perfect stalking law: An evaluation of the efficacy of the Protection from Harassment Act 1997
-
Finch, E., ‘Stalking the perfect stalking law: An evaluation of the efficacy of the Protection from Harassment Act 1997’ (2002) Criminal Law Review 703
-
(2002)
Criminal Law Review
-
-
Finch, E.1
-
121
-
-
61249196608
-
The problem of stolen identity and the Internet
-
Y. Jewkes (ed.), United Kingdom:Willan Publishing
-
Finch, E., ‘The problem of stolen identity and the Internet’ in Y. Jewkes (ed.), CrimeOnline (United Kingdom:Willan Publishing, 2007)
-
(2007)
Crimeonline
-
-
Finch, E.1
-
122
-
-
85055401848
-
Being pursued: Stalking victimization in a national study of college women
-
Fisher, B. S., Cullen, F. T. and Turner, M. G., ‘Being pursued: Stalking victimization in a national study of college women’ (2002) 1 Criminology and Public Policy 257
-
(2002)
Criminology and Public Policy
, vol.1
-
-
Fisher, B.S.1
Cullen, F.T.2
Turner, M.G.3
-
124
-
-
84861829730
-
-
European Commission
-
Fraud Prevention Expert Group, Report on Identity Theft/Fraud (European Commission, 2007)
-
(2007)
Report on Identity Theft/Fraud
-
-
-
125
-
-
3042825662
-
Remembrance of data passed: A study of disk sanitization practices
-
Garfinkel, S. L. and Shelat, A., ‘Remembrance of data passed: A study of disk sanitization practices’ (2003) 1 IEEE Security & Privacy 17
-
(2003)
IEEE Security & Privacy
, vol.1
-
-
Garfinkel, S.L.1
Shelat, A.2
-
126
-
-
84861866369
-
The new pirates of the Caribbean: How data havens can provide safe harbors on the Internet beyond governmental reach
-
Geltzer, J. N., ‘The new pirates of the Caribbean: How data havens can provide safe harbors on the Internet beyond governmental reach’ (2004) Southwestern Journal of Law and Trade in the Americas 433
-
(2004)
Southwestern Journal of Law and Trade in the Americas
-
-
Geltzer, J.N.1
-
127
-
-
34848890424
-
Themediumand themessage: Personal privacy and the forced marriage of police and telecommunications providers
-
Gilbert, D., Kerr I. R. and McGill, J., ‘Themediumand themessage: Personal privacy and the forced marriage of police and telecommunications providers’ (2007) 51 Criminal Law Quarterly 469
-
(2007)
Criminal Law Quarterly
, vol.51
-
-
Gilbert, D.1
Kerr, I.R.2
McGill, J.3
-
129
-
-
33747617663
-
Child protection on the Internet: Challenges for criminal law
-
Gillespie, A. A., ‘Child protection on the Internet: Challenges for criminal law’ (2002) 14 Child and Family Law Quarterly 411
-
(2002)
Child and Family Law Quarterly
, vol.14
-
-
Gillespie, A.A.1
-
130
-
-
2442612055
-
The Sexual Offences Act 2003 (3): Tinkering with “child pornography
-
Gillespie, A. A., ‘The Sexual Offences Act 2003 (3): Tinkering with “child pornography”’ (2004) Criminal Law Review 361
-
(2004)
Criminal Law Review
-
-
Gillespie, A.A.1
-
131
-
-
65949088434
-
Child pornography: Balancing substantive and evidential law to safeguard children effectively from abuse
-
Gillespie, A. A., ‘Child pornography: Balancing substantive and evidential law to safeguard children effectively from abuse’ (2005) 9 The International Journal of Evidence and Proof 29
-
(2005)
The International Journal of Evidence and Proof
, vol.9
-
-
Gillespie, A.A.1
-
132
-
-
34548572832
-
Cyber-bullying and harassment of teenagers: The legal response
-
Gillespie, A. A., ‘Cyber-bullying and harassment of teenagers: The legal response’ (2006) 28 Journal of Social Welfare & Family Law 123
-
(2006)
Journal of Social Welfare & Family Law
, vol.28
-
-
Gillespie, A.A.1
-
133
-
-
84921614999
-
Enticing children on the Internet: The response of the criminal law
-
Gillespie, A. A., ‘Enticing children on the Internet: The response of the criminal law’ (2006) 3 Juridical Review 229
-
(2006)
Juridical Review
, vol.3
-
-
Gillespie, A.A.1
-
134
-
-
33646435281
-
Indecent images, grooming and the law
-
Gillespie, A. A., ‘Indecent images, grooming and the law’ (2006) Criminal Law Review 412
-
(2006)
Criminal Law Review
-
-
Gillespie, A.A.1
-
135
-
-
43049119344
-
Up-skirts and “down-blouses”: Voyeurism and the law
-
Gillespie, A. A., ‘“Up-skirts” and “down-blouses”: Voyeurism and the law’ (2008) Criminal Law Review 370
-
(2008)
Criminal Law Review
-
-
Gillespie, A.A.1
-
136
-
-
13444309016
-
A road to no warez: The No Electronic Theft Act and criminal copyright infringement
-
Goldman, E., ‘A road to no warez: The No Electronic Theft Act and criminal copyright infringement’ (2003) Oregon Law Review 369
-
(2003)
Oregon Law Review
-
-
Goldman, E.1
-
139
-
-
70449129147
-
Cyberstalking: A new crime: Evaluating the effectiveness of current state and federal laws
-
Goodno, N.H., ‘Cyberstalking: A new crime: Evaluating the effectiveness of current state and federal laws’ (2007) 72 Missouri Law Review 125
-
(2007)
Missouri Law Review
, vol.72
-
-
Goodno, N.H.1
-
140
-
-
34247160604
-
-
New Jersey: Pearson Prentice Hall
-
Grabosky, P., Electronic Crime (New Jersey: Pearson Prentice Hall, 2007)
-
(2007)
Electronic Crime
-
-
Grabosky, P.1
-
142
-
-
84924741242
-
Canadas criminal harassment provisions: A review of the first ten years
-
Grant, I., Bone, N. and Grant, K., ‘Canada’s criminal harassment provisions: A review of the first ten years’ (2003) 29 Queen’s Law Journal 175
-
(2003)
Queen’s Law Journal
, vol.29
-
-
Grant, I.1
Bone, N.2
Grant, K.3
-
144
-
-
77956388913
-
-
Briefing Paper no. 9/08,(NSW Parliamentary Library Research Service
-
Griffith, G. and Simon, K., Child Pornography Law, Briefing Paper no. 9/08,(NSW Parliamentary Library Research Service, 2008)
-
(2008)
Child Pornography Law
-
-
Griffith, G.1
Simon, K.2
-
145
-
-
84924741241
-
Criminal liability for theft of, interference with, or unauthorized use of, computer programs, files, or systems
-
4th
-
Gross, A. V., ‘Criminal liability for theft of, interference with, or unauthorized use of, computer programs, files, or systems’ (2003) 51 ALR 4th 971
-
(2003)
ALR
, vol.51
-
-
Gross, A.V.1
-
146
-
-
0141873478
-
The Internet loophole: Why threatening speech on-line requires a modification of the courts approach to true threats and incitement
-
Hammack, S., ‘The Internet loophole: Why threatening speech on-line requires a modification of the courts’ approach to true threats and incitement’ (2002) 36 Columbia Journal of Law and Social Problems 65
-
(2002)
Columbia Journal of Law and Social Problems
, vol.36
-
-
Hammack, S.1
-
149
-
-
84906228917
-
Cybercrime and jurisdiction in the United States
-
B. J. Koops and S. W. Brenner, The Hague: TMC Asser Press
-
Herrera-Flanigan, J. R., ‘Cybercrime and jurisdiction in the United States’ in B. J. Koops and S. W. Brenner, Cybercrime and Jurisdiction: A global survey (The Hague: TMC Asser Press, 2006)
-
(2006)
Cybercrime and Jurisdiction: A Global Survey
-
-
Herrera-Flanigan, J.R.1
-
151
-
-
84858632197
-
Child pornography and technology: The troubling analysis of United States v Mohrbacher
-
Hitt, J., ‘Child pornography and technology: The troubling analysis of United States v Mohrbacher’ (2001) 34 University of California Davis Law Review 1129
-
(2001)
University of California Davis Law Review
, vol.34
-
-
Hitt, J.1
-
155
-
-
79751471856
-
Protecting traditional privacy rights in a brave new digital world: The threat posed by cellular phone-cameras and what states should do to stop it
-
Horstmann, T. J., ‘Protecting traditional privacy rights in a brave new digital world: The threat posed by cellular phone-cameras and what states should do to stop it’ (2007) 111 Pennsylvania State Law Review 739
-
(2007)
Pennsylvania State Law Review
, vol.111
-
-
Horstmann, T.J.1
-
156
-
-
84924741237
-
-
Computer Crime, Final Report
-
House of Commons Standing Committee on Justice And Legal Affairs, Computer Crime, Final Report (1983)
-
(1983)
-
-
-
158
-
-
33749822465
-
The use of new communications and information technologies for sexual exploitation of women and children
-
Hughes, D.M., ‘The use of new communications and information technologies for sexual exploitation of women and children’ (2002) 13 HastingsWomen’s Law Journal 127
-
(2002)
HastingsWomen’s Law Journal
, vol.13
-
-
Hughes, D.M.1
-
159
-
-
84924741235
-
-
Development and Practice Report (Home Office
-
Hyde-Bales, K., Morris, S. and Charlton, A., The Police Recording of Computer Crime, Development and Practice Report (Home Office, 2004)
-
(2004)
The Police Recording of Computer Crime
-
-
Hyde-Bales, K.1
Morris, S.2
Charlton, A.3
-
171
-
-
0348199156
-
Law and borders: The rise of law in cyberspace
-
Johnson D. R. and Post, D., ‘Law and borders: The rise of law in cyberspace’ (1996) 48 Stanford Law Review 1367
-
(1996)
Stanford Law Review
, vol.48
-
-
Johnson, D.R.1
Post, D.2
-
174
-
-
33748575887
-
Threats and meanings: How the facts govern First Amendment doctrine
-
Karst, K. L., ‘Threats and meanings: How the facts govern First Amendment doctrine’ (2006) 58 Stanford Law Review1337
-
(2006)
Stanford Law Review
, vol.58
-
-
Karst, K.L.1
-
175
-
-
84906229843
-
Jurisdiction in the Cybercrime Convention
-
B. J. Koops and S.W. Brenner, The Hague: TMC Asser Press
-
Kaspersen, H. W. K., ‘Jurisdiction in the Cybercrime Convention’ in B. J. Koops and S.W. Brenner, Cybercrime and Jurisdiction: A global survey (The Hague: TMC Asser Press, 2006)
-
(2006)
Cybercrime and Jurisdiction: A Global Survey
-
-
Kaspersen, H.1
-
176
-
-
0347710521
-
State v Stevenson, the “Peeping Tom case: Overbreadth or overblown?
-
Kastens, A. H., ‘State v Stevenson, the “Peeping Tom” case: Overbreadth or overblown?’ (2001) Wisconsin Law Review 1371
-
(2001)
Wisconsin Law Review
-
-
Kastens, A.H.1
-
178
-
-
84917253643
-
Fear-mongering or fact: The construction of “cyber-terrorism in US, UK, and Canadian news media
-
Oxford, England, 8-10 September
-
Keith, S., ‘Fear-mongering or fact: The construction of “cyber-terrorism” in US, UK, and Canadian news media’, Paper presented at Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities sponsored by the Oxford Internet Institute, Oxford, England, 8-10 September, 2005
-
(2005)
Paper Presented at Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities Sponsored by the Oxford Internet Institute
-
-
Keith, S.1
-
179
-
-
0242595962
-
Cybercrimes scope: Interpreting “access” and “authorization” in computer misuse statutes
-
Kerr, O. S., ‘Cybercrime’s scope: Interpreting “access” and “authorization” in computer misuse statutes’ (2003) 78 New York University Law Review 1596
-
(2003)
New York University Law Review
, vol.78
-
-
Kerr, O.S.1
-
180
-
-
21244448737
-
Internet surveillance law after the USA Patriot Act: The big brother that isnt
-
Kerr, O. S., ‘Internet surveillance law after the USA Patriot Act: The big brother that isn’t’ (2003) 97 Northwestern University Law Review 607
-
(2003)
Northwestern University Law Review
, vol.97
-
-
Kerr, O.S.1
-
181
-
-
0043159103
-
Lifting the “fog of Internet surveillance: How a suppression remedy would change computer crime law
-
Kerr, O. S., ‘Lifting the “fog” of Internet surveillance: How a suppression remedy would change computer crime law’ (2003) 54 Hastings Law Journal 805
-
(2003)
Hastings Law Journal
, vol.54
-
-
Kerr, O.S.1
-
182
-
-
0038103787
-
The problem of perspective in Internet law
-
Kerr, O. S., ‘The problem of perspective in Internet law’ (2003) Georgetown Law Journal 357
-
(2003)
Georgetown Law Journal
-
-
Kerr, O.S.1
-
183
-
-
10844281812
-
A users guide to the Stored Communications Act-and a legislator’s guide to amending it
-
Kerr, O. S., ‘A user’s guide to the Stored Communications Act-and a legislator’s guide to amending it’ (2004) 72 George Washington Law Review 1701
-
(2004)
George Washington Law Review
, vol.72
-
-
Kerr, O.S.1
-
184
-
-
84890505583
-
Virtual crime, virtual deterrence: A skeptical view of self help, architecture and civil liability
-
Kerr, O. S., ‘Virtual crime, virtual deterrence: A skeptical view of self help, architecture and civil liability’ (2005) Journal of Law, Economics and Policy 197
-
(2005)
Journal of Law, Economics and Policy
-
-
Kerr, O.S.1
-
186
-
-
30644459230
-
Searches and seizures in a digital world
-
Kerr, O. S., ‘Searches and seizures in a digital world’ (2006) 119 Harvard Law Review 531
-
(2006)
Harvard Law Review
, vol.119
-
-
Kerr, O.S.1
-
188
-
-
59349086361
-
The case for the third-party doctrine
-
Kerr, O. S., ‘The case for the third-party doctrine’ (2009) 107 Michigan Law Review 561
-
(2009)
Michigan Law Review
, vol.107
-
-
Kerr, O.S.1
-
192
-
-
84924741231
-
Trojan horse found responsible for child porn
-
1 August
-
Kotadia, M., ‘Trojan horse found responsible for child porn’, ZDNet.co.uk, 1 August 2003, http://news.zdnet.co.uk/security/0,1000000189,39115422,00.htm
-
(2003)
Zdnet.Co.Uk
-
-
Kotadia, M.1
-
193
-
-
84870659578
-
-
Cat. no. 85-558, Canadian Centre for Justice Statistics
-
Kowalski, M., Cyber-Crime: Issues, data sources, and feasibility of collecting policereported statistics, Cat. no. 85-558, Canadian Centre for Justice Statistics (2002)
-
(2002)
Cyber-Crime: Issues, Data Sources, and Feasibility of Collecting Policereported Statistics
-
-
Kowalski, M.1
-
194
-
-
84899234913
-
Defeating the virtual defense in child pornography prosecutions
-
Kreston, S. S., ‘Defeating the virtual defense in child pornography prosecutions’ (2004) Journal of High Technology Law 49
-
(2004)
Journal of High Technology Law
-
-
Kreston, S.S.1
-
198
-
-
0007540494
-
-
4th edn (St. Paul: Thomson
-
LaFave, W. R., Criminal Law, 4th edn (St. Paul: Thomson, 2003)
-
(2003)
Criminal Law
-
-
Lafave, W.R.1
-
199
-
-
84924741230
-
-
Internet Crime Forum (2001), found at Home Office, Retention of Communications Data Under Part 11: Anti-Terrorism, Crime and Security Act 2001, Voluntary Code of Practice
-
Lamb, H., Principal Current Data Types, Internet Crime Forum (2001), found at Home Office, Retention of Communications Data Under Part 11: Anti-Terrorism, Crime and Security Act 2001, Voluntary Code of Practice (2001)
-
(2001)
Principal Current Data Types
-
-
Lamb, H.1
-
202
-
-
0003679293
-
-
Washington DC: National Center for Missing and Exploited Children
-
Lanning, K., Child Molesters: A behavioural analysis (Washington DC: National Center for Missing and Exploited Children, 1992)
-
(1992)
Child Molesters: A Behavioural Analysis
-
-
Lanning, K.1
-
204
-
-
30244472696
-
-
Working Paper no. 110
-
Law Commission, Computer Misuse, Working Paper no. 110 (1988)
-
(1988)
Computer Misuse
-
-
-
205
-
-
79955833702
-
-
Law Commission, Computer Misuse, Final Report no. 186 (1989)
-
(1989)
Computer Misuse
, pp. 186
-
-
-
206
-
-
84909020795
-
-
Item11 of the Sixth Programme of Law Reform: Criminal Law
-
Law Commission, Offences of Dishonesty:Money Transfers, Item11 of the Sixth Programme of Law Reform: Criminal Law (1996)
-
(1996)
Offences of Dishonesty:Money Transfers
-
-
-
207
-
-
84924751250
-
-
Final Report, Law Com no. 276
-
Law Commission, Fraud, Final Report, Law Com no. 276 (2002)
-
(2002)
Fraud
-
-
-
211
-
-
23044468066
-
Digitization, commodification, criminalization: The evolution of criminal copyright infringement and the importance of the willfulness requirement
-
Loren, L., ‘Digitization, commodification, criminalization: The evolution of criminal copyright infringement and the importance of the willfulness requirement’ (1999) 77 Washington University Law Quarterly 835
-
(1999)
Washington University Law Quarterly
, vol.77
-
-
Loren, L.1
-
212
-
-
58349086406
-
Identity theft in cyberspace: Crime control methods and their effectiveness in combating phishing attacks
-
Lynch, J., ‘Identity theft in cyberspace: Crime control methods and their effectiveness in combating phishing attacks’ (2005) 20 BerkleyTechnology LawJournal 259
-
(2005)
Berkleytechnology Lawjournal
, vol.20
-
-
Lynch, J.1
-
213
-
-
33847383343
-
Rights of access and the shape of the Internet
-
Madison, M. J., ‘Rights of access and the shape of the Internet’ (2003) Boston College Law Review 433
-
(2003)
Boston College Law Review
-
-
Madison, M.J.1
-
214
-
-
32844454675
-
The law regulating unsolicited commercial e-mail: An international perspective
-
Magee, J., ‘The law regulating unsolicited commercial e-mail: An international perspective’ (2003) 19 Santa Clara Computer and High Technology Law Journal 333
-
(2003)
Santa Clara Computer and High Technology Law Journal
, vol.19
-
-
Magee, J.1
-
215
-
-
84924741228
-
Comment: Are courts taking Internet threats seriously enough? An analysis of true threats transmitted over the Internet, as interpreted in United States v. Carmichael
-
McCann, A. E., ‘Comment: Are courts taking Internet threats seriously enough? An analysis of true threats transmitted over the Internet, as interpreted in United States v. Carmichael’ (2006) 26 Pace Law Review 523
-
(2006)
Pace Law Review
, vol.26
-
-
McCann, A.E.1
-
216
-
-
84924712440
-
Contemporary comment: Computer trespass in Victoria
-
McConvill, J., ‘Contemporary comment: Computer trespass in Victoria’ (2001) 25 Criminal Law Journal 220
-
(2001)
Criminal Law Journal
, vol.25
-
-
McConvill, J.1
-
218
-
-
84924741226
-
Wireless hotspots: The truth about their evil twins
-
McDonald, S., ‘Wireless hotspots: The truth about their evil twins’ (2006) 9 Internet Law Bulletin 13
-
(2006)
Internet Law Bulletin
, vol.9
-
-
McDonald, S.1
-
219
-
-
36348945077
-
Anti-stalking legislation in practice: Are wemeeting community needs?
-
McEwan, T., Mullen, P. and MacKenzie, R., ‘Anti-stalking legislation in practice: Are wemeeting community needs?’ (2007) 14 Psychiatry, Psychology and Law 207
-
(2007)
Psychiatry, Psychology and Law
, vol.14
-
-
McEwan, T.1
Mullen, P.2
Mackenzie, R.3
-
220
-
-
0036208141
-
Forensic psychiatry and the Internet: Practical perspectives on sexual predators and obsessional harassers in cyberspace
-
McGrath, M. and Casey, E., ‘Forensic psychiatry and the Internet: Practical perspectives on sexual predators and obsessional harassers in cyberspace’ (2002) 30 Journal of the American Academy of Psychiatry and the Law 81
-
(2002)
Journal of the American Academy of Psychiatry and the Law
, vol.30
-
-
McGrath, M.1
Casey, E.2
-
222
-
-
84867530097
-
The dark side of the web: Cyberstalking and the need for contemporary legislation
-
Merschman, J. C., ‘The dark side of the web: Cyberstalking and the need for contemporary legislation’ (2001) 24 Harvard Women’s Law Journal 255
-
(2001)
Harvard Women’s Law Journal
, vol.24
-
-
Merschman, J.C.1
-
225
-
-
84924741225
-
Formalist statutory construction and the doctrine of fair warning: An examination of United States v. Councilman
-
Miano, T. J., ‘Formalist statutory construction and the doctrine of fair warning: An examination of United States v. Councilman’ (2007) 14 George Mason Law Review 513
-
(2007)
George Mason Law Review
, vol.14
-
-
Miano, T.J.1
-
226
-
-
84924741224
-
Groomer guilty of procuring girl, 14, for sex
-
26 May
-
Miletic, D., ‘“Groomer” guilty of procuring girl, 14, for sex’, The Age, 26 May 2006
-
(2006)
The Age
-
-
Miletic, D.1
-
227
-
-
84924741223
-
Cyberstalking: Can communication via the Internet constitute a credible threat, and should an Internet service provider be liable if it does?
-
Mishler, J. L., ‘Cyberstalking: Can communication via the Internet constitute a credible threat, and should an Internet service provider be liable if it does?’ (2000) 17 Santa Clara Computer and High Technology Law Journal 115
-
(2000)
Santa Clara Computer and High Technology Law Journal
, vol.17
-
-
Mishler, J.L.1
-
234
-
-
84855660914
-
-
Discussion Paper
-
Model Criminal Law Officers Committee, Identity Crime, Discussion Paper (2007)
-
(2007)
Identity Crime
-
-
-
235
-
-
84855660914
-
-
Final Report
-
Model Criminal Law Officers Committee Identity Crime, Final Report (2008)
-
(2008)
Identity Crime
-
-
-
236
-
-
0344253685
-
The crime of copyright infringement: An inquiry based on morality, harm and criminal theory
-
Moohr, G. S., ‘The crime of copyright infringement: An inquiry based on morality, harm and criminal theory’ (2003) 83 Boston University Law Review 731
-
(2003)
Boston University Law Review
, vol.83
-
-
Moohr, G.S.1
-
240
-
-
84924741222
-
Computer virus “hijacks American Express web site
-
1 May
-
Naraine, R., ‘Computer virus “hijacks” American Express web site’, Fox News, 1 May 2006, www.foxnews.com/story/0,2933,193784,00.html
-
(2006)
Fox News
-
-
Naraine, R.1
-
247
-
-
84924741221
-
Value of Internet sales rises 56 per cent in 2005
-
(National Statistics, UK
-
National Statistics, ‘Value of Internet sales rises 56 per cent in 2005’, News Release (National Statistics, UK 2006)
-
(2006)
News Release
-
-
National Statistics1
-
250
-
-
84900473623
-
-
Report 108
-
New SouthWales Law Reform Commission, Surveillance: Final Report, Report 108 (2005)
-
(2005)
Surveillance: Final Report
-
-
-
253
-
-
84924741219
-
Spam legislation in Canada: Federalism, freedom of expression and the regulation of the Internet
-
Ng, K., ‘Spam legislation in Canada: Federalism, freedom of expression and the regulation of the Internet’ (2005) 2 University of Ottawa Law and Technology Journal 447
-
(2005)
University of Ottawa Law and Technology Journal
, vol.2
-
-
Ng, K.1
-
254
-
-
84955372887
-
Computer expert faces jail over “made-up child porn image
-
10August
-
Norfolk, A., ‘Computer expert faces jail over “made-up” child porn image’, TimesOnline, 10August 2006, http://technology.timesonline.co.uk/tol/news/tech_and_web/article604825.ece
-
(2006)
Timesonline
-
-
Norfolk, A.1
-
256
-
-
84857960338
-
Old crimes in new bottles: Sanctioning cybercrime
-
O’Neill, M. E., ‘Old crimes in new bottles: Sanctioning cybercrime’ (2000) 9 George Mason Law Review 237
-
(2000)
George Mason Law Review
, vol.9
-
-
O’Neill, M.E.1
-
260
-
-
78649306246
-
: Rethinking federal computer crime legislation
-
Olivenbaum, J.M., ‘
: Rethinking federal computer crime legislation’ (1997) 27 Seton Hall Law Review 574
-
(1997)
Seton Hall Law Review
, vol.27
-
-
Olivenbaum, J.M.1
-
263
-
-
33747597000
-
Getting to grips with sexual grooming? The new offence under the Sexual Offences Act 2003
-
Ost, S., ‘Getting to grips with sexual grooming? The new offence under the Sexual Offences Act 2003’ (2004) 26 Journal of Social Welfare and Family Law 147
-
(2004)
Journal of Social Welfare and Family Law
, vol.26
-
-
Ost, S.1
-
264
-
-
72649099038
-
E-mail privacy afterUnited States v.Councilman: Legislative options for amending ECPA
-
Oyama, K. A., ‘E-mail privacy afterUnited States v.Councilman: Legislative options for amending ECPA’ (2006) 21 Berkeley Technology Law Journal 499
-
(2006)
Berkeley Technology Law Journal
, vol.21
-
-
Oyama, K.A.1
-
265
-
-
0010876291
-
Does proposed federal cyberstalking legislation meet constitutional requirements?
-
Packard, A., ‘Does proposed federal cyberstalking legislation meet constitutional requirements?’ (2000) 5 Communication Law and Policy 505
-
(2000)
Communication Law and Policy
, vol.5
-
-
Packard, A.1
-
269
-
-
0344871648
-
-
Commonwealth of Australia
-
Parliamentary Joint Committee on the National Crime Authority, Organised Criminal Paedophile Activity (Commonwealth of Australia, 1995)
-
(1995)
Organised Criminal Paedophile Activity
-
-
-
270
-
-
85047460750
-
-
Parliament of the Commonwealth of Australia
-
Parliamentary Joint Committee on the National Crime Authority Cybercrime (Parliament of the Commonwealth of Australia, 2004)
-
(2004)
Cybercrime
-
-
-
271
-
-
84855902093
-
Identity theft statutes: Which will protect Americans the most?
-
Pastrikos, C., ‘Identity theft statutes: Which will protect Americans the most?’ (2004) 67 Albany Law Review 1137
-
(2004)
Albany Law Review
, vol.67
-
-
Pastrikos, C.1
-
272
-
-
84924741215
-
Panel: Cybercrimes and the domestication of international criminal law
-
Paust, J., ‘Panel: Cybercrimes and the domestication of international criminal law’ (2007) 5 Santa Clara Journal of International Law 432
-
(2007)
Santa Clara Journal of International Law
, vol.5
-
-
Paust, J.1
-
273
-
-
84898197226
-
Crime, copyright, and the digital age
-
Law Commission of Canada, (Vancouver: UBC Press
-
Penney, S., ‘Crime, copyright, and the digital age’ in Law Commission of Canada, What is a Crime? Defining criminal conduct in contemporary society (Vancouver: UBC Press, 2004)
-
(2004)
What is a Crime? Defining Criminal Conduct in Contemporary Society
-
-
Penney, S.1
-
275
-
-
36549025492
-
International computer fraud: A paradigm for limiting national jurisdiction
-
Podgor, E. S., ‘International computer fraud: A paradigm for limiting national jurisdiction’ (2002) 35 University of California Davis Law Review 267
-
(2002)
University of California Davis Law Review
, vol.35
-
-
Podgor, E.S.1
-
276
-
-
34247442481
-
Extraterritorial criminal jurisdiction: Replacing “objective territoriality with “defensive territoriality”
-
A. Sarat and P. Ewick (eds.)
-
Podgor, E. S., ‘Extraterritorial criminal jurisdiction: Replacing “objective territoriality” with “defensive territoriality”’ in A. Sarat and P. Ewick (eds.), Studies in Law, Politics, and Society (2003)
-
(2003)
Studies in Law, Politics, and Society
-
-
Podgor, E.S.1
-
278
-
-
84940664065
-
International spam regulation and enforcement: Recommendations following the world summit on the information society
-
Potashman, M., ‘International spam regulation and enforcement: Recommendations following the world summit on the information society’ (2006) 29 Boston College International & Comparative Law Review 323
-
(2006)
Boston College International & Comparative Law Review
, vol.29
-
-
Potashman, M.1
-
282
-
-
0347740270
-
Thwarting the stalker: Are anti-stalking measures keeping pace with todays stalker?
-
Radosevich, A. C., ‘Thwarting the stalker: Are anti-stalking measures keeping pace with today’s stalker?’ (2000) University of Illinois Law Review 1371
-
(2000)
University of Illinois Law Review
-
-
Radosevich, A.C.1
-
283
-
-
84924741211
-
Will wi-fi make your private network public? Wardriving, criminal and civil liability, and the security risks of wireless networks
-
Ramasastry, A., Winn J. K. and Winn, P., ‘Will wi-fi make your private network public? Wardriving, criminal and civil liability, and the security risks of wireless networks’ (2005) 1 Shidler Journal of Law, Commerce and Technology 9
-
(2005)
Shidler Journal of Law, Commerce and Technology
, vol.1
-
-
Ramasastry, A.1
Winn, J.K.2
Winn, P.3
-
284
-
-
84900046358
-
-
Study for the European Commission Directorate-General Information Society
-
Rathmell, A., Valeri, L., Robinson N. and Servida, A., Handbook of Legislative Procedures of Computer and Network Misuse in EU Countries, Study for the European Commission Directorate-General Information Society (2002)
-
(2002)
Handbook of Legislative Procedures of Computer and Network Misuse in EU Countries
-
-
Rathmell, A.1
Valeri, L.2
Robinson, N.3
Servida, A.4
-
286
-
-
3242808612
-
-
Restatement (Third) of Foreign Relations Law of the United States Richardson, R., Computer Security Institute
-
Restatement (Third) of Foreign Relations Law of the United States Richardson, R., 2008: CSI Computer Crime and Security Survey(Computer Security Institute, 2008)
-
(2008)
2008: CSI Computer Crime and Security Survey
-
-
-
287
-
-
84924741210
-
-
Columbia Public Lawand Legal TheoryWorking Papers, Paper no. 0698, Columbia Law School
-
Ricketson, S. and Ginsburg, J.C., Inducers and Authorisers: A comparison of the US Supreme Court’s Grokster decision and the Australian Federal Court’s KaZaa ruling, Columbia Public Lawand Legal TheoryWorking Papers, Paper no. 0698, Columbia Law School (2006)
-
(2006)
Inducers and Authorisers: A Comparison of the US Supreme Court’s Grokster Decision and the Australian Federal Court’s Kazaa Ruling
-
-
Ricketson, S.1
Ginsburg, J.C.2
-
290
-
-
84924741207
-
Playing hide and seek:How to protect virtual pornographers and actual children on the Internet
-
Rogers, A., ‘Playing hide and seek:How to protect virtual pornographers and actual children on the Internet’ (2005) Villanova Law Review 87
-
(2005)
Villanova Law Review
-
-
Rogers, A.1
-
291
-
-
84979807229
-
Viagra, viruses and virgins: A pan-Atlantic comparative analysis on the vanquishing of spam
-
Rogers, K., ‘Viagra, viruses and virgins: A pan-Atlantic comparative analysis on the vanquishing of spam’ (2006) 22 Computer Law and Security Report 228
-
(2006)
Computer Law and Security Report
, vol.22
-
-
Rogers, K.1
-
292
-
-
79751523573
-
Re-thinking privacy: Peeping Toms, video voyeurs, and failure of the criminal law to recognize a reasonable expectation of privacy in the public space
-
Rothenberg, L. E., ‘Re-thinking privacy: Peeping Toms, video voyeurs, and failure of the criminal law to recognize a reasonable expectation of privacy in the public space’ (2000) 49 American University Law Review 1127
-
(2000)
American University Law Review
, vol.49
-
-
Rothenberg, L.E.1
-
293
-
-
84924741206
-
TheWiretap Act-reconcilable differences: A framework for determining the “interception of electronic communications following United States v. Councilman’s rejection of the storage/transit dichotomy
-
Roundy, M. D., ‘TheWiretap Act-reconcilable differences: A framework for determining the “interception” of electronic communications following United States v. Councilman’s rejection of the storage/transit dichotomy’ (2006) 28 Western New England Law Review 403
-
(2006)
Western New England Law Review
, vol.28
-
-
Roundy, M.D.1
-
294
-
-
38149043134
-
War, peace, or stalemate: Wargames, wardialing, wardriving, and the emerging market for hacker ethics
-
Ryan, P. S., ‘War, peace, or stalemate: Wargames, wardialing, wardriving, and the emerging market for hacker ethics’ (2004) 9 Virginia Journal of Law and Technology 7
-
(2004)
Virginia Journal of Law and Technology
, vol.9
-
-
Ryan, P.S.1
-
296
-
-
77951931441
-
Anti-spam legislation: An analysis of laws and their effectiveness
-
Schryen, G., ‘Anti-spam legislation: An analysis of laws and their effectiveness’ (2007) 16 Information and Communications Technology Law 17
-
(2007)
Information and Communications Technology Law
, vol.16
-
-
Schryen, G.1
-
298
-
-
84909018304
-
-
Final Report no. 106
-
Scottish Law Commission, Report on Computer Crime, Final Report no. 106 (1987)
-
(1987)
Report on Computer Crime
-
-
-
301
-
-
0038806339
-
Cookies and the commonlaw:Are Internet advertisers trespassing on our computers?
-
Siebecker, M. R., ‘Cookies and the commonlaw:Are Internet advertisers trespassing on our computers?’ (2003) 76 Southern California Law Review 893
-
(2003)
Southern California Law Review
, vol.76
-
-
Siebecker, M.R.1
-
303
-
-
84924741205
-
Comment:ComputerMisuseAct 1990-recent developments
-
Singleton, S., ‘Comment:ComputerMisuseAct 1990-recent developments’ (1993) 57 Journal of Criminal Law 181
-
(1993)
Journal of Criminal Law
, vol.57
-
-
Singleton, S.1
-
304
-
-
0012186120
-
Cyber-crimes: A practical approach to the application of federal computer crime laws
-
Sinrod E. J. and Reilly, W. P., ‘Cyber-crimes: A practical approach to the application of federal computer crime laws’ (2000) 16 Santa Clara Computer and High Tech Law Journal 177
-
(2000)
Santa Clara Computer and High Tech Law Journal
, vol.16
-
-
Sinrod, E.J.1
Reilly, W.P.2
-
310
-
-
10844224409
-
The future of the Internet surveillance law: A symposium to discuss Internet surveillance, privacy & the USA PATRIOT Act: Surveillance law: Reshaping framework: Electronic surveillance law
-
Solove, D. J., ‘The future of the Internet surveillance law: A symposium to discuss Internet surveillance, privacy & the USA PATRIOT Act: Surveillance law: Reshaping framework: Electronic surveillance law’ (2004) 72 George Washington Law Review 1264
-
(2004)
George Washington Law Review
, vol.72
-
-
Solove, D.J.1
-
311
-
-
41949114572
-
Spam still pays: The failure of the CAN-SPAM Act of 2003 and proposed legal solutions
-
Soma, J., Singer, P. and Hurdd, J., ‘Spam still pays: The failure of the CAN-SPAM Act of 2003 and proposed legal solutions’ (2008) 45 Harvard Journal on Legislation 165
-
(2008)
Harvard Journal on Legislation
, vol.45
-
-
Soma, J.1
Singer, P.2
Hurdd, J.3
-
312
-
-
0345984397
-
Transnational extradition for computer crimes: Are new treaties and laws needed?
-
Soma, J. T., Muther, Jr, T. F. and Brissette, H. M. L., ‘Transnational extradition for computer crimes: Are new treaties and laws needed?’ (1997) 34 Harvard Journal on Legislation 317
-
(1997)
Harvard Journal on Legislation
, vol.34
-
-
Soma, J.T.1
Muther, T.F.2
Brissette, H.3
-
313
-
-
33745143977
-
Criminalising hacking tools
-
Sommer, P., ‘Criminalising hacking tools’ (2006) 3 Digital Investigation 68
-
(2006)
Digital Investigation
, vol.3
-
-
Sommer, P.1
-
314
-
-
84924741203
-
-
Sophos
-
Sophos, Security ThreatReport: 2009, www.sophos.com/sophos/docs/eng/marketing_material/sophos-security-threat-report-jan-2009-na.pdf
-
Security Threatreport: 2009
-
-
-
315
-
-
0344891911
-
Technical and legal approaches to unsolicited electronic mail
-
Sorkin, D., ‘Technical and legal approaches to unsolicited electronic mail’ (2001) 35 University of San Francisco Law Review 325
-
(2001)
University of San Francisco Law Review
, vol.35
-
-
Sorkin, D.1
-
316
-
-
84924741202
-
-
USHouse ofRepresentatives, 109th CongressJanuary
-
Staff Report Prepared for the Use of the Committee on Energy and Commerce, Sexual Exploitation of Children over the Internet, USHouse ofRepresentatives, 109th Congress, January 2007
-
(2007)
Sexual Exploitation of Children over the Internet
-
-
-
317
-
-
84902212067
-
-
Discussion Paper, Civil Law Policy (Melbourne: Department of Justice
-
Standing Committee of Attorney’s-General, Unauthorised Photographs on the Internet and Ancillary Privacy Issues, Discussion Paper, Civil Law Policy (Melbourne: Department of Justice, 2005)
-
(2005)
Unauthorised Photographs on the Internet and Ancillary Privacy Issues
-
-
-
322
-
-
84924741199
-
Vaguely going where no-one has gone: The expansive new computer access offences
-
Steel, A., ‘Vaguely going where no-one has gone: The expansive new computer access offences’ (2002) 26 Criminal Law Journal 72
-
(2002)
Criminal Law Journal
, vol.26
-
-
Steel, A.1
-
323
-
-
0002723655
-
On the Internet, nobody knows youre a dog
-
5 July
-
Steiner, P., ‘On the Internet, nobody knows you’re a dog’, The New Yorker, 5 July 1993
-
(1993)
The New Yorker
-
-
Steiner, P.1
-
324
-
-
78549280687
-
Verdict in MySpace suicide case
-
26 November
-
Steinhauer, J., ‘Verdict in MySpace suicide case’, New York Times, 26 November 2008
-
(2008)
New York Times
-
-
Steinhauer, J.1
-
325
-
-
84924741198
-
The response of the criminal law in Australia to computer abuse
-
Sullivan, C., ‘The response of the criminal law in Australia to computer abuse’ (1988) 12 Criminal Law Journal 228
-
(1988)
Criminal Law Journal
, vol.12
-
-
Sullivan, C.1
-
326
-
-
84924694269
-
-
Symantec
-
Symantec, Spam Monthly Report January 2009, http://eval.symantec.com/mktginfo/enterprise/otherresources/b-state of spam report 01-2009.en-us. pdf
-
(2009)
Spam Monthly Report January
-
-
-
329
-
-
84891992739
-
-
Organisation for Economic Co-operation and Development
-
Task Force on Spam, Anti-Spam Law Enforcement (Organisation for Economic Co-operation and Development, 2005)
-
(2005)
Anti-Spam Law Enforcement
-
-
Task Force on Spam1
-
336
-
-
0003551631
-
-
US Department of Justice, Office of Justice Programs
-
Tjaden, P. and Thoennes, J., Prevalence, Incidence, and Consequences of Violence againstWomen: Findings fromthe national violence against women survey, US Department of Justice, Office of Justice Programs (1998)
-
(1998)
Prevalence, Incidence, and Consequences of Violence Againstwomen: Findings Fromthe National Violence against Women Survey
-
-
Tjaden, P.1
Thoennes, J.2
-
343
-
-
84924741192
-
Shadowcrew identity theft ringleader gets 32 months in prison
-
USAttorney’s Office, District ofNewJersey, ‘“Shadowcrew” identity theft ringleader gets 32 months in prison’, News Release (2006), www.usdoj.gov/usao/nj/press/files/mant0629r.htm
-
(2006)
News Release
-
-
USAttorney’s Office, District ofNewJersey,1
-
344
-
-
84924741191
-
-
US Attorney’s Office, Western District of New York and US Department of Justice Computer Crimes and Intellectual Property Section
-
US Attorney’s Office, Western District of New York and US Department of Justice Computer Crimes and Intellectual Property Section, The Online World and Law Enforcement, www.fpd-fln.org/online world and law enforcement.htm
-
The Online World and Law Enforcement
-
-
-
357
-
-
84924741187
-
Computer Crimes and Intellectual Property Section
-
US Attorney’s Office, Western District of New York
-
US Department of Justice, Computer Crimes and Intellectual Property Section, The Online World And Law Enforcement (US Attorney’s Office, Western District of New York), www.fpd-fln.org/online_world_and_law_enforcement.htm
-
The Online World and Law Enforcement
-
-
US Department of Justice1
-
360
-
-
84924741185
-
Regulators launch fake scam websites to warn investors about fraud
-
US Securities Exchange Commission, ‘Regulators launch fake scam websites to warn investors about fraud’, News Release (2002), www.sec.gov/news/headlines/scamsites.htm
-
(2002)
News Release
-
-
-
361
-
-
84924741184
-
-
Permanent Subcommittee on Investigations of the Committee on Governmental Affairs
-
US Senate, Phony Identification and Credentials Via the Internet, Permanent Subcommittee on Investigations of the Committee on Governmental Affairs (2002)
-
(2002)
Phony Identification and Credentials via the Internet
-
-
US Senate1
-
367
-
-
77955740556
-
Cyber-terrorism: Legal principle and law in the United Kingdom
-
Walker, C., ‘Cyber-terrorism: Legal principle and law in the United Kingdom’ (2006) Pennsylvania State Law Review 625
-
(2006)
Pennsylvania State Law Review
-
-
Walker, C.1
-
369
-
-
24144448451
-
Surveillant Internet technologies and the growth in information capitalism: Spams and public trust in the information society
-
K. Haggerty and R. Ericson (eds.), Toronto: University of Toronto Press
-
Wall, D. S., ‘Surveillant Internet technologies and the growth in information capitalism: Spams and public trust in the information society’ in K. Haggerty and R. Ericson (eds.), The New Politics of Surveillance and Visibility (Toronto: University of Toronto Press, 2005)
-
(2005)
The New Politics of Surveillance and Visibility
-
-
Wall, D.S.1
-
370
-
-
24144472881
-
-
Cambridge: Polity
-
Wall, D. S., Cybercrime (Cambridge: Polity, 2007)
-
(2007)
Cybercrime
-
-
Wall, D.S.1
-
374
-
-
3042949374
-
Stalking: The criminal law response
-
Wells, C., ‘Stalking: The criminal law response’ (1997) Criminal Law Review 463
-
(1997)
Criminal Law Review
-
-
Wells, C.1
-
378
-
-
0037320325
-
Escaping or connecting? Characteristics of youth who form close online relationships
-
Wolak, J., Mitchell K. and Finkelhor, D., ‘Escaping or connecting? Characteristics of youth who form close online relationships’ (2003) 26 Journal of Adolescence 105
-
(2003)
Journal of Adolescence
, vol.26
-
-
Wolak, J.1
Mitchell, K.2
Finkelhor, D.3
-
380
-
-
5644270277
-
Internet-initiated sex crimes againstminors: Implications for prevention based on findings from a national study
-
424e11
-
Wolak, J., Mitchell K. and Finkelhor, D., ‘Internet-initiated sex crimes againstminors: Implications for prevention based on findings from a national study’ (2004) 35 Journal of Adolescent Health 424e11
-
(2004)
Journal of Adolescent Health
, vol.35
-
-
Wolak, J.1
Mitchell, K.2
Finkelhor, D.3
-
382
-
-
34447321339
-
The varieties of child pornography production
-
E. Quayle and M. Taylor (eds., (Russell House
-
Wolak, J., Finkelhor, D. and Mitchell, K. J., ‘The varieties of child pornography production’ in E. Quayle and M. Taylor (eds.), Viewing Child Pornography on The Internet: Understanding the offense, managing the offender, helping the victims (Russell House, 2005)
-
(2005)
Viewing Child Pornography on the Internet: Understanding the Offense, Managing the Offender, Helping the Victims
-
-
Wolak, J.1
Finkelhor, D.2
Mitchell, K.J.3
-
387
-
-
84924741177
-
How well do you know your computer? The level of scienter in 18 USC § 1462
-
Zappen, M. J., ‘How well do you know your computer? The level of scienter in 18 USC § 1462’ (2003) 66 Albany Law Review 1161
-
(2003)
Albany Law Review
, vol.66
-
-
Zappen, M.J.1
|