메뉴 건너뛰기




Volumn , Issue , 2010, Pages 1-449

Principles of cybercrime

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84924707734     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1017/CBO9780511845123     Document Type: Book
Times cited : (152)

References (387)
  • 1
    • 0042838107 scopus 로고    scopus 로고
    • The perverse law of child pornography
    • Adler, A., ‘The perverse law of child pornography’ (2001) 101 The Columbia Law Review 209
    • (2001) The Columbia Law Review , vol.101
    • Adler, A.1
  • 2
    • 84924741284 scopus 로고    scopus 로고
    • Briton sentenced to 51 months prison in US for Internet piracy
    • Agence France Presse, 23 June
    • Agence France Presse, ‘Briton sentenced to 51 months prison in US for Internet piracy’, The Sydney Morning Herald, 23 June 2007, www.smh.com.au/news/Technology/Briton-sentenced-to-51-months-prison-in-US-for-Internetpiracy/2007/06/23/1182019396798.html
    • (2007) The Sydney Morning Herald
  • 3
    • 84924741283 scopus 로고    scopus 로고
    • Conficker worm wiggles into millions of computers
    • Agence France Presse, 21 January
    • Agence France Presse, ‘Conficker worm wiggles into millions of computers’, The Age, 21 January 2009
    • (2009) The Age
  • 4
    • 34147115086 scopus 로고    scopus 로고
    • Possession and Dispossession: A critical assessment of defences in cases of possession of indecent photographs of children
    • Akdeniz, Y., ‘Possession and Dispossession: A critical assessment of defences in cases of possession of indecent photographs of children’ (2007) Criminal Law Review 274
    • (2007) Criminal Law Review
    • Akdeniz, Y.1
  • 5
    • 23044524837 scopus 로고    scopus 로고
    • Regulation of Investigatory Powers Act 2000 (1): BigBrother.Gov.Uk: State surveillance in the age of information and rights
    • Akdeniz, Y., Taylor, N. and Walker, C., ‘Regulation of Investigatory Powers Act 2000 (1): BigBrother.gov.uk: State surveillance in the age of information and rights’ (2001) Criminal Law Review 73
    • (2001) Criminal Law Review
    • Akdeniz, Y.1    Taylor, N.2    Walker, C.3
  • 10
    • 34548344520 scopus 로고    scopus 로고
    • Origins of the Word ‘Phishing’, (2008), APACS-the UK
    • Anti-PhishingWorking Group, Phishing Activity Trends Report: Q2/2008 (2008) Origins of the Word ‘Phishing’ (2008), www.antiphishing.org/word phish.html APACS-the UK
    • (2008) Phishing Activity Trends Report: Q2/2008
  • 12
    • 84924720382 scopus 로고    scopus 로고
    • The fate of the Child Pornography Act of 1996: Virtual child pornography: Criminal conduct or protected speech?
    • Armagh, D. S., ‘The fate of the Child Pornography Act of 1996: Virtual child pornography: Criminal conduct or protected speech?’ (2002) 23 Cardozo Law Review 1993
    • (2002) Cardozo Law Review , vol.23
    • Armagh, D.S.1
  • 13
    • 33646749711 scopus 로고    scopus 로고
    • The CAN-SPAM Act: An inadequate attempt to deal with a growing problem
    • Arora, V., ‘The CAN-SPAM Act: An inadequate attempt to deal with a growing problem’ (2006) 39 Columbia Journal of Law and Social Problems 299
    • (2006) Columbia Journal of Law and Social Problems , vol.39
    • Arora, V.1
  • 18
    • 84924741281 scopus 로고    scopus 로고
    • Australasian Centre for Policing Research and the Australian Transaction Reports and Analysis Centre
    • Report Series no. 145.3, Australasian Centre for Policing Research
    • Australasian Centre for Policing Research and the Australian Transaction Reports and Analysis Centre, Standardisation of Definitions of Identity Crime Terms: A step towards consistency, Report Series no. 145.3, Australasian Centre for Policing Research (2006)
    • (2006) Standardisation of Definitions of Identity Crime Terms: A Step Towards Consistency
  • 26
    • 84924741279 scopus 로고    scopus 로고
    • Media Release, 15 December
    • Australian Payments Clearing Association, Payment Fraud in Australia, Media Release, 15 December 2008, www.apca.com.au/Public/apca01live.nsf/ResourceLookup/Press_Release_Payments_Fraud_Statistics_5.pdf/$File/Press_Release_Payments_Fraud_Statistics_5.pdf
    • (2008) Payment Fraud in Australia
    • Australian Payments Clearing Association1
  • 28
    • 51349124747 scopus 로고    scopus 로고
    • Baum, K., Identity Theft 2004, Bureau of Justice Statistics Bulletin (US Department of Justice, 2006)
    • (2006) Identity Theft 2004
    • Baum, K.1
  • 29
    • 84924741277 scopus 로고    scopus 로고
    • Virtual theft leads to arrest
    • 14 November
    • BBC News, ‘“Virtual theft” leads to arrest’, BBC News Online (Asia-Pacific) 14 November 2007, http://news.bbc.co.uk/2/hi/technology/7094764.stm
    • (2007) BBC News Online (Asia-Pacific)
    • BBC News1
  • 30
    • 84924741276 scopus 로고    scopus 로고
    • Caution for Who star Townshend
    • 7 May
    • BBC News, ‘Caution for Who star Townshend’, BBC News Online, 7 May 2003, http://news.bbc.co.uk/1/hi/uk/3007871.stm
    • (2003) BBC News Online
    • BBC News1
  • 31
    • 84924741275 scopus 로고    scopus 로고
    • Web paedophile given nine years
    • 22 June
    • BBC News, ‘Web paedophile given nine years’, BBC News, 22 June 2006, http://news.bbc.co.uk/2/hi/uk news/england/5106612.stm
    • (2006) BBC News
    • BBC News1
  • 32
    • 84924741274 scopus 로고    scopus 로고
    • Q&A: Child benefit records lost: How worried should people be by the loss of discs containing child benefit recipients personal details?
    • 22 November
    • BBC News, ‘Q&A: Child benefit records lost: How worried should people be by the loss of discs containing child benefit recipients’ personal details?’, BBC News, 22 November 2007, http://news.bbc.co.uk/2/hi/uk news/politics/7103828.stm
    • (2007) BBC News
    • BBC News1
  • 33
    • 84924741273 scopus 로고    scopus 로고
    • Woman in jail over virtualmurder
    • Online (Asia-Pacific), 24 October
    • BBC News, ‘Woman in jail over virtualmurder’, BBCNews Online (Asia-Pacific), 24 October 2008, http://news.bbc.co.uk/2/hi/asia-pacific/7688091.stm
    • (2008) Bbcnews
    • BBC News1
  • 34
    • 84924741272 scopus 로고    scopus 로고
    • Internet piracy trio sent to jail
    • 6 May
    • BBC News, ‘Internet piracy trio sent to jail’, BBC News: Technology, 6 May 2005, http://news.bbc.co.uk/1/hi/technology/4518771.stm
    • (2005) BBC News: Technology
    • BBC News1
  • 36
    • 33846366159 scopus 로고    scopus 로고
    • Spyware and the limits of surveillance law
    • Bellia, P. L., ‘Spyware and the limits of surveillance law’ (2005) 20 Berkeley Technology Law Journal 1283
    • (2005) Berkeley Technology Law Journal , vol.20
    • Bellia, P.L.1
  • 38
    • 84924741269 scopus 로고    scopus 로고
    • New hacking tool hijacks file-sharing networks
    • 19March
    • Biever, C., ‘New hacking tool hijacks file-sharing networks’, New Scientist.comNews Service, 19March 2004, www.newscientisttech.com/channel/tech/electronicthreats/dn4799
    • (2004) New Scientist.Comnews Service
    • Biever, C.1
  • 43
    • 0141633143 scopus 로고    scopus 로고
    • Anti-stalking laws: Do they adequately protect stalking victims?
    • Bradfield, J. L., ‘Anti-stalking laws: Do they adequately protect stalking victims?’ (1998) 21 Harvard Women’s Law Journal 229
    • (1998) Harvard Women’s Law Journal , vol.21
    • Bradfield, J.L.1
  • 44
    • 84924744288 scopus 로고    scopus 로고
    • True threats: A more appropriate standard for analyzing First Amendment protection and free speech when violence is perpetrated over the Internet
    • Bradfield, J. L., ‘True threats: A more appropriate standard for analyzing First Amendment protection and free speech when violence is perpetrated over the Internet’ (2002) 78 North Dakota Law Review 753
    • (2002) North Dakota Law Review , vol.78
    • Bradfield, J.L.1
  • 45
    • 12344293756 scopus 로고    scopus 로고
    • Is there such a thing as “virtual crime?
    • Brenner, S.W., ‘Is there such a thing as “virtual crime”?’ (2001) 4 CaliforniaCriminal Law Review 1
    • (2001) Californiacriminal Law Review , vol.4
    • Brenner, S.W.1
  • 47
    • 84855930457 scopus 로고    scopus 로고
    • Toward a criminal law for cyberspace: Distributed security
    • Brenner, S.W., ‘Toward a criminal law for cyberspace: Distributed security’ (2004) 10 Buffalo Journal of Science and Technology 1
    • (2004) Buffalo Journal of Science and Technology , vol.10
    • Brenner, S.W.1
  • 48
    • 84952806773 scopus 로고    scopus 로고
    • The next step: Prioritizing jurisdiction
    • B. J. Koops and S. W. Brenner, The Hague: TMC Asser Press
    • Brenner, S.W., ‘The next step: Prioritizing jurisdiction’ in B. J. Koops and S. W. Brenner, Cybercrime and Jurisdiction: A global survey (The Hague: TMC Asser Press, 2006)
    • (2006) Cybercrime and Jurisdiction: A Global Survey
    • Brenner, S.W.1
  • 51
    • 84905827277 scopus 로고    scopus 로고
    • Shifting boundaries of cybercrime: From computer hacking to cyberterrorism
    • Bronitt, S. and Gani, M., ‘Shifting boundaries of cybercrime: From computer hacking to cyberterrorism’ (2003) 27 Criminal Law Journal 303
    • (2003) Criminal Law Journal , vol.27
    • Bronitt, S.1    Gani, M.2
  • 55
    • 84924741266 scopus 로고    scopus 로고
    • Upskirt student jailed for six months
    • 25 January
    • Butcher, S., ‘Upskirt student jailed for six months’, The Age, 25 January 2007
    • (2007) The Age
    • Butcher, S.1
  • 56
    • 84924741265 scopus 로고    scopus 로고
    • Regulating sexual images on the web: Last call forMiller time, but new issues remain untapped
    • Calvert, C., ‘Regulating sexual images on the web: Last call forMiller time, but new issues remain untapped’ (2001) 23 Hastings Communications and Entertainment Law Journal 507
    • (2001) Hastings Communications and Entertainment Law Journal , vol.23
    • Calvert, C.1
  • 57
    • 79956859421 scopus 로고    scopus 로고
    • Opening up an academic privilege and shutting down child modeling sites: Revising child pornography laws in the United States
    • Calvert, C., ‘Opening up an academic privilege and shutting down child modeling sites: Revising child pornography laws in the United States’ (2002) 107 Dickinson Law Review 253
    • (2002) Dickinson Law Review , vol.107
    • Calvert, C.1
  • 58
    • 33845565984 scopus 로고    scopus 로고
    • Video voyeurism, privacy and the Internet: Exposing Peeping Toms in cyberspace
    • Calvert, C. and Brown, J., ‘Video voyeurism, privacy and the Internet: Exposing Peeping Toms in cyberspace’ (2000) 18 Cardozo Arts & Entertainment Law Journal 469
    • (2000) Cardozo Arts & Entertainment Law Journal , vol.18
    • Calvert, C.1    Brown, J.2
  • 59
    • 84924741264 scopus 로고
    • Working Paper no. 47
    • Canada Law Reform Commission, Electronic Surveillance, Working Paper no. 47 (1986)
    • (1986) Electronic Surveillance
  • 69
    • 84924741259 scopus 로고
    • Legislating against computer misuse: The trials and tribulations of the Computer Misuse Act 1990
    • Charlesworth, A. ‘Legislating against computer misuse: The trials and tribulations of the Computer Misuse Act 1990’ (1993) 4 Journal of Law and Information Science 80
    • (1993) Journal of Law and Information Science , vol.4
    • Charlesworth, A.1
  • 72
    • 84953586760 scopus 로고
    • Human identification in information systems:Management challenges and public policy issues
    • Clarke, R., ‘Human identification in information systems:Management challenges and public policy issues’ (1994) Information Technology and People 6
    • (1994) Information Technology and People
    • Clarke, R.1
  • 73
    • 45849108729 scopus 로고    scopus 로고
    • Now you see it, now you dont: Digital images and the meaning of “possession”
    • Clough, J., ‘Now you see it, now you don’t: Digital images and the meaning of “possession”’ (2008) 19 Criminal Law Forum 209
    • (2008) Criminal Law Forum , vol.19
    • Clough, J.1
  • 74
    • 0000231532 scopus 로고
    • Social change and crime rate trends: A routine activity approach
    • Cohen, L. and Felson, M., ‘Social change and crime rate trends: A routine activity approach’ (1979) 44 American Sociological Review 588
    • (1979) American Sociological Review , vol.44
    • Cohen, L.1    Felson, M.2
  • 76
    • 25544434835 scopus 로고    scopus 로고
    • Senate, 30August, (Christopher Ellison, Minister for Justice and Customs)
    • Commonwealth of Australia, ParliamentaryDebates, Senate, 30August 2004, 26620 (Christopher Ellison, Minister for Justice and Customs)
    • (2004) Parliamentarydebates
    • Commonwealth of Australia1
  • 82
    • 84924741254 scopus 로고    scopus 로고
    • Pub. L. 108-21, title V, § 501, Apr. 30, 117 Stat. 676
    • Congressional Findings, Pub. L. 108-21, title V, § 501, Apr. 30, 2003, 117 Stat. 676
    • (2003)
    • Congressional Findings1
  • 83
    • 84924741253 scopus 로고    scopus 로고
    • Section 101(a) [title I, § 121 [1]] of Pub. L. 104-208
    • Congressional Findings, Section 101(a) [title I, § 121 [1]] of Pub. L. 104-208
    • Congressional Findings1
  • 86
    • 63849307694 scopus 로고    scopus 로고
    • Sexual grooming of children: Review of literature and theoretical considerations
    • Craven, S., Brown, S. and Gilchrist, E., ‘Sexual grooming of children: Review of literature and theoretical considerations’ (2006) 12 Journal of Sexual Aggression 287
    • (2006) Journal of Sexual Aggression , vol.12
    • Craven, S.1    Brown, S.2    Gilchrist, E.3
  • 96
    • 0002116494 scopus 로고
    • A rape in cyberspace: How an evil clown, a Haitian trickster spirit, two wizards, and a cast of dozens turned a database into a society
    • 23 December
    • Dibbell, J., ‘A rape in cyberspace: How an evil clown, a Haitian trickster spirit, two wizards, and a cast of dozens turned a database into a society’, The Village Voice 23 December 1993, http://juliandibbell.com/texts/bungle vv.html
    • (1993) The Village Voice
    • Dibbell, J.1
  • 101
    • 77955623854 scopus 로고    scopus 로고
    • Cyberstalking: Tackling harassment on the Internet
    • D. S.Wall (ed.), London: Routledge
    • Ellison, L., ‘Cyberstalking: Tackling harassment on the Internet’ in D. S.Wall (ed.), Crime and the Internet (London: Routledge, 2001)
    • (2001) Crime and the Internet
    • Ellison, L.1
  • 102
    • 14244271149 scopus 로고    scopus 로고
    • Cyberstalking: The regulation of harassment on the Internet
    • Special Edition: ‘Crime, Criminal Justice and the Internet’ 29
    • Ellison, L. and Akdeniz, Y., ‘Cyberstalking: The regulation of harassment on the Internet’ (1998) Criminal Law Review, Special Edition: ‘Crime, Criminal Justice and the Internet’ 29
    • (1998) Criminal Law Review
    • Ellison, L.1    Akdeniz, Y.2
  • 103
    • 84924741251 scopus 로고    scopus 로고
    • Secondman arrested for upskirt pics
    • 23 January
    • Evans C. and Nguyen, K., ‘Secondman arrested for upskirt pics’, TheAge, 23 January 2007
    • (2007) Theage
    • Evans, C.1    Nguyen, K.2
  • 105
    • 84924741249 scopus 로고    scopus 로고
    • (Interception and Access)
    • (Cth) Explanatory Notes, Police and Justice Act 2006, c. 48 (UK)
    • Explanatory Memorandum, Telecommunications (Interception and Access) Amendment Bill 2007 (Cth) Explanatory Notes, Police and Justice Act 2006, c. 48 (UK)
    • (2007) Amendment Bill
    • Explanatory Memorandum, Telecommunications,1
  • 106
    • 84924741248 scopus 로고    scopus 로고
    • Explanatory Notes, Regulation of Investigatory Powers Act, c. 23 (UK)
    • Explanatory Notes, Regulation of Investigatory Powers Act (2000) c. 23 (UK)
    • (2000)
  • 107
    • 84924741247 scopus 로고    scopus 로고
    • Explanatory Notes, Sexual Offences Act, c. 42 (UK)
    • Explanatory Notes, Sexual Offences Act 2003, c. 42 (UK)
    • (2003)
  • 108
    • 81255171210 scopus 로고    scopus 로고
    • Computer misuse: The implications of the Police and Justice Act 2006
    • Fafinski, S., ‘Computer misuse: The implications of the Police and Justice Act 2006’ (2008) 72 Journal of Criminal Law 53
    • (2008) Journal of Criminal Law , vol.72
    • Fafinski, S.1
  • 109
    • 84924654278 scopus 로고    scopus 로고
    • (PEWInternet and American Life Project
    • Fallows, D., Data Memo (PEWInternet and American Life Project, 2007)
    • (2007) Data Memo
    • Fallows, D.1
  • 110
    • 84924741246 scopus 로고    scopus 로고
    • A problem of “virtual proportions: The difficulties inherent in tailoring virtual child pornography laws to meet constitutional standards
    • Farhangian, J. J., ‘A problem of “virtual” proportions: The difficulties inherent in tailoring virtual child pornography laws to meet constitutional standards’ (2003) 12 Journal of Law and Policy 241
    • (2003) Journal of Law and Policy , vol.12
    • Farhangian, J.J.1
  • 114
    • 84924741245 scopus 로고    scopus 로고
    • Federal Trade Commission, ‘Facts for consumers: Dot cons’ (2000), www.ftc.gov/bcp/edu/pubs/consumer/tech/tec09.shtm
    • (2000) Facts for Consumers: Dot Cons
  • 117
    • 84899247137 scopus 로고    scopus 로고
    • Close enough for government work: An examination of Congressional efforts to reduce the governments burden of proof in child pornography cases
    • Feldmeier, J. P., ‘Close enough for government work: An examination of Congressional efforts to reduce the government’s burden of proof in child pornography cases’ (2003) 30 Northern Kentucky Law Review 205
    • (2003) Northern Kentucky Law Review , vol.30
    • Feldmeier, J.P.1
  • 119
    • 84924741244 scopus 로고    scopus 로고
    • The objective standard of reasonableness and the mentally ill stalker
    • Finch, E., ‘The objective standard of reasonableness and the mentally ill stalker’ (2001) 65 The Journal of Criminal Law 489
    • (2001) The Journal of Criminal Law , vol.65
    • Finch, E.1
  • 120
    • 0036751650 scopus 로고    scopus 로고
    • Stalking the perfect stalking law: An evaluation of the efficacy of the Protection from Harassment Act 1997
    • Finch, E., ‘Stalking the perfect stalking law: An evaluation of the efficacy of the Protection from Harassment Act 1997’ (2002) Criminal Law Review 703
    • (2002) Criminal Law Review
    • Finch, E.1
  • 121
    • 61249196608 scopus 로고    scopus 로고
    • The problem of stolen identity and the Internet
    • Y. Jewkes (ed.), United Kingdom:Willan Publishing
    • Finch, E., ‘The problem of stolen identity and the Internet’ in Y. Jewkes (ed.), CrimeOnline (United Kingdom:Willan Publishing, 2007)
    • (2007) Crimeonline
    • Finch, E.1
  • 122
    • 85055401848 scopus 로고    scopus 로고
    • Being pursued: Stalking victimization in a national study of college women
    • Fisher, B. S., Cullen, F. T. and Turner, M. G., ‘Being pursued: Stalking victimization in a national study of college women’ (2002) 1 Criminology and Public Policy 257
    • (2002) Criminology and Public Policy , vol.1
    • Fisher, B.S.1    Cullen, F.T.2    Turner, M.G.3
  • 124
    • 84861829730 scopus 로고    scopus 로고
    • European Commission
    • Fraud Prevention Expert Group, Report on Identity Theft/Fraud (European Commission, 2007)
    • (2007) Report on Identity Theft/Fraud
  • 125
    • 3042825662 scopus 로고    scopus 로고
    • Remembrance of data passed: A study of disk sanitization practices
    • Garfinkel, S. L. and Shelat, A., ‘Remembrance of data passed: A study of disk sanitization practices’ (2003) 1 IEEE Security & Privacy 17
    • (2003) IEEE Security & Privacy , vol.1
    • Garfinkel, S.L.1    Shelat, A.2
  • 126
    • 84861866369 scopus 로고    scopus 로고
    • The new pirates of the Caribbean: How data havens can provide safe harbors on the Internet beyond governmental reach
    • Geltzer, J. N., ‘The new pirates of the Caribbean: How data havens can provide safe harbors on the Internet beyond governmental reach’ (2004) Southwestern Journal of Law and Trade in the Americas 433
    • (2004) Southwestern Journal of Law and Trade in the Americas
    • Geltzer, J.N.1
  • 127
    • 34848890424 scopus 로고    scopus 로고
    • Themediumand themessage: Personal privacy and the forced marriage of police and telecommunications providers
    • Gilbert, D., Kerr I. R. and McGill, J., ‘Themediumand themessage: Personal privacy and the forced marriage of police and telecommunications providers’ (2007) 51 Criminal Law Quarterly 469
    • (2007) Criminal Law Quarterly , vol.51
    • Gilbert, D.1    Kerr, I.R.2    McGill, J.3
  • 128
  • 129
    • 33747617663 scopus 로고    scopus 로고
    • Child protection on the Internet: Challenges for criminal law
    • Gillespie, A. A., ‘Child protection on the Internet: Challenges for criminal law’ (2002) 14 Child and Family Law Quarterly 411
    • (2002) Child and Family Law Quarterly , vol.14
    • Gillespie, A.A.1
  • 130
    • 2442612055 scopus 로고    scopus 로고
    • The Sexual Offences Act 2003 (3): Tinkering with “child pornography
    • Gillespie, A. A., ‘The Sexual Offences Act 2003 (3): Tinkering with “child pornography”’ (2004) Criminal Law Review 361
    • (2004) Criminal Law Review
    • Gillespie, A.A.1
  • 131
    • 65949088434 scopus 로고    scopus 로고
    • Child pornography: Balancing substantive and evidential law to safeguard children effectively from abuse
    • Gillespie, A. A., ‘Child pornography: Balancing substantive and evidential law to safeguard children effectively from abuse’ (2005) 9 The International Journal of Evidence and Proof 29
    • (2005) The International Journal of Evidence and Proof , vol.9
    • Gillespie, A.A.1
  • 132
    • 34548572832 scopus 로고    scopus 로고
    • Cyber-bullying and harassment of teenagers: The legal response
    • Gillespie, A. A., ‘Cyber-bullying and harassment of teenagers: The legal response’ (2006) 28 Journal of Social Welfare & Family Law 123
    • (2006) Journal of Social Welfare & Family Law , vol.28
    • Gillespie, A.A.1
  • 133
    • 84921614999 scopus 로고    scopus 로고
    • Enticing children on the Internet: The response of the criminal law
    • Gillespie, A. A., ‘Enticing children on the Internet: The response of the criminal law’ (2006) 3 Juridical Review 229
    • (2006) Juridical Review , vol.3
    • Gillespie, A.A.1
  • 134
    • 33646435281 scopus 로고    scopus 로고
    • Indecent images, grooming and the law
    • Gillespie, A. A., ‘Indecent images, grooming and the law’ (2006) Criminal Law Review 412
    • (2006) Criminal Law Review
    • Gillespie, A.A.1
  • 135
    • 43049119344 scopus 로고    scopus 로고
    • Up-skirts and “down-blouses”: Voyeurism and the law
    • Gillespie, A. A., ‘“Up-skirts” and “down-blouses”: Voyeurism and the law’ (2008) Criminal Law Review 370
    • (2008) Criminal Law Review
    • Gillespie, A.A.1
  • 136
    • 13444309016 scopus 로고    scopus 로고
    • A road to no warez: The No Electronic Theft Act and criminal copyright infringement
    • Goldman, E., ‘A road to no warez: The No Electronic Theft Act and criminal copyright infringement’ (2003) Oregon Law Review 369
    • (2003) Oregon Law Review
    • Goldman, E.1
  • 139
    • 70449129147 scopus 로고    scopus 로고
    • Cyberstalking: A new crime: Evaluating the effectiveness of current state and federal laws
    • Goodno, N.H., ‘Cyberstalking: A new crime: Evaluating the effectiveness of current state and federal laws’ (2007) 72 Missouri Law Review 125
    • (2007) Missouri Law Review , vol.72
    • Goodno, N.H.1
  • 140
    • 34247160604 scopus 로고    scopus 로고
    • New Jersey: Pearson Prentice Hall
    • Grabosky, P., Electronic Crime (New Jersey: Pearson Prentice Hall, 2007)
    • (2007) Electronic Crime
    • Grabosky, P.1
  • 142
    • 84924741242 scopus 로고    scopus 로고
    • Canadas criminal harassment provisions: A review of the first ten years
    • Grant, I., Bone, N. and Grant, K., ‘Canada’s criminal harassment provisions: A review of the first ten years’ (2003) 29 Queen’s Law Journal 175
    • (2003) Queen’s Law Journal , vol.29
    • Grant, I.1    Bone, N.2    Grant, K.3
  • 144
    • 77956388913 scopus 로고    scopus 로고
    • Briefing Paper no. 9/08,(NSW Parliamentary Library Research Service
    • Griffith, G. and Simon, K., Child Pornography Law, Briefing Paper no. 9/08,(NSW Parliamentary Library Research Service, 2008)
    • (2008) Child Pornography Law
    • Griffith, G.1    Simon, K.2
  • 145
    • 84924741241 scopus 로고    scopus 로고
    • Criminal liability for theft of, interference with, or unauthorized use of, computer programs, files, or systems
    • 4th
    • Gross, A. V., ‘Criminal liability for theft of, interference with, or unauthorized use of, computer programs, files, or systems’ (2003) 51 ALR 4th 971
    • (2003) ALR , vol.51
    • Gross, A.V.1
  • 146
    • 0141873478 scopus 로고    scopus 로고
    • The Internet loophole: Why threatening speech on-line requires a modification of the courts approach to true threats and incitement
    • Hammack, S., ‘The Internet loophole: Why threatening speech on-line requires a modification of the courts’ approach to true threats and incitement’ (2002) 36 Columbia Journal of Law and Social Problems 65
    • (2002) Columbia Journal of Law and Social Problems , vol.36
    • Hammack, S.1
  • 149
    • 84906228917 scopus 로고    scopus 로고
    • Cybercrime and jurisdiction in the United States
    • B. J. Koops and S. W. Brenner, The Hague: TMC Asser Press
    • Herrera-Flanigan, J. R., ‘Cybercrime and jurisdiction in the United States’ in B. J. Koops and S. W. Brenner, Cybercrime and Jurisdiction: A global survey (The Hague: TMC Asser Press, 2006)
    • (2006) Cybercrime and Jurisdiction: A Global Survey
    • Herrera-Flanigan, J.R.1
  • 151
    • 84858632197 scopus 로고    scopus 로고
    • Child pornography and technology: The troubling analysis of United States v Mohrbacher
    • Hitt, J., ‘Child pornography and technology: The troubling analysis of United States v Mohrbacher’ (2001) 34 University of California Davis Law Review 1129
    • (2001) University of California Davis Law Review , vol.34
    • Hitt, J.1
  • 154
  • 155
    • 79751471856 scopus 로고    scopus 로고
    • Protecting traditional privacy rights in a brave new digital world: The threat posed by cellular phone-cameras and what states should do to stop it
    • Horstmann, T. J., ‘Protecting traditional privacy rights in a brave new digital world: The threat posed by cellular phone-cameras and what states should do to stop it’ (2007) 111 Pennsylvania State Law Review 739
    • (2007) Pennsylvania State Law Review , vol.111
    • Horstmann, T.J.1
  • 156
    • 84924741237 scopus 로고
    • Computer Crime, Final Report
    • House of Commons Standing Committee on Justice And Legal Affairs, Computer Crime, Final Report (1983)
    • (1983)
  • 158
    • 33749822465 scopus 로고    scopus 로고
    • The use of new communications and information technologies for sexual exploitation of women and children
    • Hughes, D.M., ‘The use of new communications and information technologies for sexual exploitation of women and children’ (2002) 13 HastingsWomen’s Law Journal 127
    • (2002) HastingsWomen’s Law Journal , vol.13
    • Hughes, D.M.1
  • 171
    • 0348199156 scopus 로고    scopus 로고
    • Law and borders: The rise of law in cyberspace
    • Johnson D. R. and Post, D., ‘Law and borders: The rise of law in cyberspace’ (1996) 48 Stanford Law Review 1367
    • (1996) Stanford Law Review , vol.48
    • Johnson, D.R.1    Post, D.2
  • 174
    • 33748575887 scopus 로고    scopus 로고
    • Threats and meanings: How the facts govern First Amendment doctrine
    • Karst, K. L., ‘Threats and meanings: How the facts govern First Amendment doctrine’ (2006) 58 Stanford Law Review1337
    • (2006) Stanford Law Review , vol.58
    • Karst, K.L.1
  • 175
    • 84906229843 scopus 로고    scopus 로고
    • Jurisdiction in the Cybercrime Convention
    • B. J. Koops and S.W. Brenner, The Hague: TMC Asser Press
    • Kaspersen, H. W. K., ‘Jurisdiction in the Cybercrime Convention’ in B. J. Koops and S.W. Brenner, Cybercrime and Jurisdiction: A global survey (The Hague: TMC Asser Press, 2006)
    • (2006) Cybercrime and Jurisdiction: A Global Survey
    • Kaspersen, H.1
  • 176
    • 0347710521 scopus 로고    scopus 로고
    • State v Stevenson, the “Peeping Tom case: Overbreadth or overblown?
    • Kastens, A. H., ‘State v Stevenson, the “Peeping Tom” case: Overbreadth or overblown?’ (2001) Wisconsin Law Review 1371
    • (2001) Wisconsin Law Review
    • Kastens, A.H.1
  • 179
    • 0242595962 scopus 로고    scopus 로고
    • Cybercrimes scope: Interpreting “access” and “authorization” in computer misuse statutes
    • Kerr, O. S., ‘Cybercrime’s scope: Interpreting “access” and “authorization” in computer misuse statutes’ (2003) 78 New York University Law Review 1596
    • (2003) New York University Law Review , vol.78
    • Kerr, O.S.1
  • 180
    • 21244448737 scopus 로고    scopus 로고
    • Internet surveillance law after the USA Patriot Act: The big brother that isnt
    • Kerr, O. S., ‘Internet surveillance law after the USA Patriot Act: The big brother that isn’t’ (2003) 97 Northwestern University Law Review 607
    • (2003) Northwestern University Law Review , vol.97
    • Kerr, O.S.1
  • 181
    • 0043159103 scopus 로고    scopus 로고
    • Lifting the “fog of Internet surveillance: How a suppression remedy would change computer crime law
    • Kerr, O. S., ‘Lifting the “fog” of Internet surveillance: How a suppression remedy would change computer crime law’ (2003) 54 Hastings Law Journal 805
    • (2003) Hastings Law Journal , vol.54
    • Kerr, O.S.1
  • 182
    • 0038103787 scopus 로고    scopus 로고
    • The problem of perspective in Internet law
    • Kerr, O. S., ‘The problem of perspective in Internet law’ (2003) Georgetown Law Journal 357
    • (2003) Georgetown Law Journal
    • Kerr, O.S.1
  • 183
    • 10844281812 scopus 로고    scopus 로고
    • A users guide to the Stored Communications Act-and a legislator’s guide to amending it
    • Kerr, O. S., ‘A user’s guide to the Stored Communications Act-and a legislator’s guide to amending it’ (2004) 72 George Washington Law Review 1701
    • (2004) George Washington Law Review , vol.72
    • Kerr, O.S.1
  • 184
    • 84890505583 scopus 로고    scopus 로고
    • Virtual crime, virtual deterrence: A skeptical view of self help, architecture and civil liability
    • Kerr, O. S., ‘Virtual crime, virtual deterrence: A skeptical view of self help, architecture and civil liability’ (2005) Journal of Law, Economics and Policy 197
    • (2005) Journal of Law, Economics and Policy
    • Kerr, O.S.1
  • 186
    • 30644459230 scopus 로고    scopus 로고
    • Searches and seizures in a digital world
    • Kerr, O. S., ‘Searches and seizures in a digital world’ (2006) 119 Harvard Law Review 531
    • (2006) Harvard Law Review , vol.119
    • Kerr, O.S.1
  • 188
    • 59349086361 scopus 로고    scopus 로고
    • The case for the third-party doctrine
    • Kerr, O. S., ‘The case for the third-party doctrine’ (2009) 107 Michigan Law Review 561
    • (2009) Michigan Law Review , vol.107
    • Kerr, O.S.1
  • 192
    • 84924741231 scopus 로고    scopus 로고
    • Trojan horse found responsible for child porn
    • 1 August
    • Kotadia, M., ‘Trojan horse found responsible for child porn’, ZDNet.co.uk, 1 August 2003, http://news.zdnet.co.uk/security/0,1000000189,39115422,00.htm
    • (2003) Zdnet.Co.Uk
    • Kotadia, M.1
  • 194
    • 84899234913 scopus 로고    scopus 로고
    • Defeating the virtual defense in child pornography prosecutions
    • Kreston, S. S., ‘Defeating the virtual defense in child pornography prosecutions’ (2004) Journal of High Technology Law 49
    • (2004) Journal of High Technology Law
    • Kreston, S.S.1
  • 198
    • 0007540494 scopus 로고    scopus 로고
    • 4th edn (St. Paul: Thomson
    • LaFave, W. R., Criminal Law, 4th edn (St. Paul: Thomson, 2003)
    • (2003) Criminal Law
    • Lafave, W.R.1
  • 199
    • 84924741230 scopus 로고    scopus 로고
    • Internet Crime Forum (2001), found at Home Office, Retention of Communications Data Under Part 11: Anti-Terrorism, Crime and Security Act 2001, Voluntary Code of Practice
    • Lamb, H., Principal Current Data Types, Internet Crime Forum (2001), found at Home Office, Retention of Communications Data Under Part 11: Anti-Terrorism, Crime and Security Act 2001, Voluntary Code of Practice (2001)
    • (2001) Principal Current Data Types
    • Lamb, H.1
  • 202
    • 0003679293 scopus 로고
    • Washington DC: National Center for Missing and Exploited Children
    • Lanning, K., Child Molesters: A behavioural analysis (Washington DC: National Center for Missing and Exploited Children, 1992)
    • (1992) Child Molesters: A Behavioural Analysis
    • Lanning, K.1
  • 204
    • 30244472696 scopus 로고
    • Working Paper no. 110
    • Law Commission, Computer Misuse, Working Paper no. 110 (1988)
    • (1988) Computer Misuse
  • 205
    • 79955833702 scopus 로고
    • Law Commission, Computer Misuse, Final Report no. 186 (1989)
    • (1989) Computer Misuse , pp. 186
  • 206
    • 84909020795 scopus 로고    scopus 로고
    • Item11 of the Sixth Programme of Law Reform: Criminal Law
    • Law Commission, Offences of Dishonesty:Money Transfers, Item11 of the Sixth Programme of Law Reform: Criminal Law (1996)
    • (1996) Offences of Dishonesty:Money Transfers
  • 207
    • 84924751250 scopus 로고    scopus 로고
    • Final Report, Law Com no. 276
    • Law Commission, Fraud, Final Report, Law Com no. 276 (2002)
    • (2002) Fraud
  • 211
    • 23044468066 scopus 로고    scopus 로고
    • Digitization, commodification, criminalization: The evolution of criminal copyright infringement and the importance of the willfulness requirement
    • Loren, L., ‘Digitization, commodification, criminalization: The evolution of criminal copyright infringement and the importance of the willfulness requirement’ (1999) 77 Washington University Law Quarterly 835
    • (1999) Washington University Law Quarterly , vol.77
    • Loren, L.1
  • 212
    • 58349086406 scopus 로고    scopus 로고
    • Identity theft in cyberspace: Crime control methods and their effectiveness in combating phishing attacks
    • Lynch, J., ‘Identity theft in cyberspace: Crime control methods and their effectiveness in combating phishing attacks’ (2005) 20 BerkleyTechnology LawJournal 259
    • (2005) Berkleytechnology Lawjournal , vol.20
    • Lynch, J.1
  • 213
    • 33847383343 scopus 로고    scopus 로고
    • Rights of access and the shape of the Internet
    • Madison, M. J., ‘Rights of access and the shape of the Internet’ (2003) Boston College Law Review 433
    • (2003) Boston College Law Review
    • Madison, M.J.1
  • 214
    • 32844454675 scopus 로고    scopus 로고
    • The law regulating unsolicited commercial e-mail: An international perspective
    • Magee, J., ‘The law regulating unsolicited commercial e-mail: An international perspective’ (2003) 19 Santa Clara Computer and High Technology Law Journal 333
    • (2003) Santa Clara Computer and High Technology Law Journal , vol.19
    • Magee, J.1
  • 215
    • 84924741228 scopus 로고    scopus 로고
    • Comment: Are courts taking Internet threats seriously enough? An analysis of true threats transmitted over the Internet, as interpreted in United States v. Carmichael
    • McCann, A. E., ‘Comment: Are courts taking Internet threats seriously enough? An analysis of true threats transmitted over the Internet, as interpreted in United States v. Carmichael’ (2006) 26 Pace Law Review 523
    • (2006) Pace Law Review , vol.26
    • McCann, A.E.1
  • 216
    • 84924712440 scopus 로고    scopus 로고
    • Contemporary comment: Computer trespass in Victoria
    • McConvill, J., ‘Contemporary comment: Computer trespass in Victoria’ (2001) 25 Criminal Law Journal 220
    • (2001) Criminal Law Journal , vol.25
    • McConvill, J.1
  • 218
    • 84924741226 scopus 로고    scopus 로고
    • Wireless hotspots: The truth about their evil twins
    • McDonald, S., ‘Wireless hotspots: The truth about their evil twins’ (2006) 9 Internet Law Bulletin 13
    • (2006) Internet Law Bulletin , vol.9
    • McDonald, S.1
  • 219
    • 36348945077 scopus 로고    scopus 로고
    • Anti-stalking legislation in practice: Are wemeeting community needs?
    • McEwan, T., Mullen, P. and MacKenzie, R., ‘Anti-stalking legislation in practice: Are wemeeting community needs?’ (2007) 14 Psychiatry, Psychology and Law 207
    • (2007) Psychiatry, Psychology and Law , vol.14
    • McEwan, T.1    Mullen, P.2    Mackenzie, R.3
  • 220
    • 0036208141 scopus 로고    scopus 로고
    • Forensic psychiatry and the Internet: Practical perspectives on sexual predators and obsessional harassers in cyberspace
    • McGrath, M. and Casey, E., ‘Forensic psychiatry and the Internet: Practical perspectives on sexual predators and obsessional harassers in cyberspace’ (2002) 30 Journal of the American Academy of Psychiatry and the Law 81
    • (2002) Journal of the American Academy of Psychiatry and the Law , vol.30
    • McGrath, M.1    Casey, E.2
  • 222
    • 84867530097 scopus 로고    scopus 로고
    • The dark side of the web: Cyberstalking and the need for contemporary legislation
    • Merschman, J. C., ‘The dark side of the web: Cyberstalking and the need for contemporary legislation’ (2001) 24 Harvard Women’s Law Journal 255
    • (2001) Harvard Women’s Law Journal , vol.24
    • Merschman, J.C.1
  • 225
    • 84924741225 scopus 로고    scopus 로고
    • Formalist statutory construction and the doctrine of fair warning: An examination of United States v. Councilman
    • Miano, T. J., ‘Formalist statutory construction and the doctrine of fair warning: An examination of United States v. Councilman’ (2007) 14 George Mason Law Review 513
    • (2007) George Mason Law Review , vol.14
    • Miano, T.J.1
  • 226
    • 84924741224 scopus 로고    scopus 로고
    • Groomer guilty of procuring girl, 14, for sex
    • 26 May
    • Miletic, D., ‘“Groomer” guilty of procuring girl, 14, for sex’, The Age, 26 May 2006
    • (2006) The Age
    • Miletic, D.1
  • 227
    • 84924741223 scopus 로고    scopus 로고
    • Cyberstalking: Can communication via the Internet constitute a credible threat, and should an Internet service provider be liable if it does?
    • Mishler, J. L., ‘Cyberstalking: Can communication via the Internet constitute a credible threat, and should an Internet service provider be liable if it does?’ (2000) 17 Santa Clara Computer and High Technology Law Journal 115
    • (2000) Santa Clara Computer and High Technology Law Journal , vol.17
    • Mishler, J.L.1
  • 234
    • 84855660914 scopus 로고    scopus 로고
    • Discussion Paper
    • Model Criminal Law Officers Committee, Identity Crime, Discussion Paper (2007)
    • (2007) Identity Crime
  • 235
    • 84855660914 scopus 로고    scopus 로고
    • Final Report
    • Model Criminal Law Officers Committee Identity Crime, Final Report (2008)
    • (2008) Identity Crime
  • 236
    • 0344253685 scopus 로고    scopus 로고
    • The crime of copyright infringement: An inquiry based on morality, harm and criminal theory
    • Moohr, G. S., ‘The crime of copyright infringement: An inquiry based on morality, harm and criminal theory’ (2003) 83 Boston University Law Review 731
    • (2003) Boston University Law Review , vol.83
    • Moohr, G.S.1
  • 240
    • 84924741222 scopus 로고    scopus 로고
    • Computer virus “hijacks American Express web site
    • 1 May
    • Naraine, R., ‘Computer virus “hijacks” American Express web site’, Fox News, 1 May 2006, www.foxnews.com/story/0,2933,193784,00.html
    • (2006) Fox News
    • Naraine, R.1
  • 247
    • 84924741221 scopus 로고    scopus 로고
    • Value of Internet sales rises 56 per cent in 2005
    • (National Statistics, UK
    • National Statistics, ‘Value of Internet sales rises 56 per cent in 2005’, News Release (National Statistics, UK 2006)
    • (2006) News Release
    • National Statistics1
  • 250
    • 84900473623 scopus 로고    scopus 로고
    • Report 108
    • New SouthWales Law Reform Commission, Surveillance: Final Report, Report 108 (2005)
    • (2005) Surveillance: Final Report
  • 253
    • 84924741219 scopus 로고    scopus 로고
    • Spam legislation in Canada: Federalism, freedom of expression and the regulation of the Internet
    • Ng, K., ‘Spam legislation in Canada: Federalism, freedom of expression and the regulation of the Internet’ (2005) 2 University of Ottawa Law and Technology Journal 447
    • (2005) University of Ottawa Law and Technology Journal , vol.2
    • Ng, K.1
  • 254
    • 84955372887 scopus 로고    scopus 로고
    • Computer expert faces jail over “made-up child porn image
    • 10August
    • Norfolk, A., ‘Computer expert faces jail over “made-up” child porn image’, TimesOnline, 10August 2006, http://technology.timesonline.co.uk/tol/news/tech_and_web/article604825.ece
    • (2006) Timesonline
    • Norfolk, A.1
  • 256
    • 84857960338 scopus 로고    scopus 로고
    • Old crimes in new bottles: Sanctioning cybercrime
    • O’Neill, M. E., ‘Old crimes in new bottles: Sanctioning cybercrime’ (2000) 9 George Mason Law Review 237
    • (2000) George Mason Law Review , vol.9
    • O’Neill, M.E.1
  • 260
    • 78649306246 scopus 로고    scopus 로고
    • : Rethinking federal computer crime legislation
    • Olivenbaum, J.M., ‘: Rethinking federal computer crime legislation’ (1997) 27 Seton Hall Law Review 574
    • (1997) Seton Hall Law Review , vol.27
    • Olivenbaum, J.M.1
  • 263
    • 33747597000 scopus 로고    scopus 로고
    • Getting to grips with sexual grooming? The new offence under the Sexual Offences Act 2003
    • Ost, S., ‘Getting to grips with sexual grooming? The new offence under the Sexual Offences Act 2003’ (2004) 26 Journal of Social Welfare and Family Law 147
    • (2004) Journal of Social Welfare and Family Law , vol.26
    • Ost, S.1
  • 264
    • 72649099038 scopus 로고    scopus 로고
    • E-mail privacy afterUnited States v.Councilman: Legislative options for amending ECPA
    • Oyama, K. A., ‘E-mail privacy afterUnited States v.Councilman: Legislative options for amending ECPA’ (2006) 21 Berkeley Technology Law Journal 499
    • (2006) Berkeley Technology Law Journal , vol.21
    • Oyama, K.A.1
  • 265
    • 0010876291 scopus 로고    scopus 로고
    • Does proposed federal cyberstalking legislation meet constitutional requirements?
    • Packard, A., ‘Does proposed federal cyberstalking legislation meet constitutional requirements?’ (2000) 5 Communication Law and Policy 505
    • (2000) Communication Law and Policy , vol.5
    • Packard, A.1
  • 269
    • 0344871648 scopus 로고
    • Commonwealth of Australia
    • Parliamentary Joint Committee on the National Crime Authority, Organised Criminal Paedophile Activity (Commonwealth of Australia, 1995)
    • (1995) Organised Criminal Paedophile Activity
  • 270
    • 85047460750 scopus 로고    scopus 로고
    • Parliament of the Commonwealth of Australia
    • Parliamentary Joint Committee on the National Crime Authority Cybercrime (Parliament of the Commonwealth of Australia, 2004)
    • (2004) Cybercrime
  • 271
    • 84855902093 scopus 로고    scopus 로고
    • Identity theft statutes: Which will protect Americans the most?
    • Pastrikos, C., ‘Identity theft statutes: Which will protect Americans the most?’ (2004) 67 Albany Law Review 1137
    • (2004) Albany Law Review , vol.67
    • Pastrikos, C.1
  • 272
    • 84924741215 scopus 로고    scopus 로고
    • Panel: Cybercrimes and the domestication of international criminal law
    • Paust, J., ‘Panel: Cybercrimes and the domestication of international criminal law’ (2007) 5 Santa Clara Journal of International Law 432
    • (2007) Santa Clara Journal of International Law , vol.5
    • Paust, J.1
  • 274
    • 78149334726 scopus 로고    scopus 로고
    • Data breaches: What the underground world of “carding reveals
    • Peretti, K., ‘Data breaches: What the underground world of “carding” reveals’ (2008) 25 Santa Clara Computer and High Technology Journal 375
    • (2008) Santa Clara Computer and High Technology Journal , vol.25
    • Peretti, K.1
  • 275
    • 36549025492 scopus 로고    scopus 로고
    • International computer fraud: A paradigm for limiting national jurisdiction
    • Podgor, E. S., ‘International computer fraud: A paradigm for limiting national jurisdiction’ (2002) 35 University of California Davis Law Review 267
    • (2002) University of California Davis Law Review , vol.35
    • Podgor, E.S.1
  • 276
    • 34247442481 scopus 로고    scopus 로고
    • Extraterritorial criminal jurisdiction: Replacing “objective territoriality with “defensive territoriality”
    • A. Sarat and P. Ewick (eds.)
    • Podgor, E. S., ‘Extraterritorial criminal jurisdiction: Replacing “objective territoriality” with “defensive territoriality”’ in A. Sarat and P. Ewick (eds.), Studies in Law, Politics, and Society (2003)
    • (2003) Studies in Law, Politics, and Society
    • Podgor, E.S.1
  • 278
    • 84940664065 scopus 로고    scopus 로고
    • International spam regulation and enforcement: Recommendations following the world summit on the information society
    • Potashman, M., ‘International spam regulation and enforcement: Recommendations following the world summit on the information society’ (2006) 29 Boston College International & Comparative Law Review 323
    • (2006) Boston College International & Comparative Law Review , vol.29
    • Potashman, M.1
  • 282
    • 0347740270 scopus 로고    scopus 로고
    • Thwarting the stalker: Are anti-stalking measures keeping pace with todays stalker?
    • Radosevich, A. C., ‘Thwarting the stalker: Are anti-stalking measures keeping pace with today’s stalker?’ (2000) University of Illinois Law Review 1371
    • (2000) University of Illinois Law Review
    • Radosevich, A.C.1
  • 283
    • 84924741211 scopus 로고    scopus 로고
    • Will wi-fi make your private network public? Wardriving, criminal and civil liability, and the security risks of wireless networks
    • Ramasastry, A., Winn J. K. and Winn, P., ‘Will wi-fi make your private network public? Wardriving, criminal and civil liability, and the security risks of wireless networks’ (2005) 1 Shidler Journal of Law, Commerce and Technology 9
    • (2005) Shidler Journal of Law, Commerce and Technology , vol.1
    • Ramasastry, A.1    Winn, J.K.2    Winn, P.3
  • 286
    • 3242808612 scopus 로고    scopus 로고
    • Restatement (Third) of Foreign Relations Law of the United States Richardson, R., Computer Security Institute
    • Restatement (Third) of Foreign Relations Law of the United States Richardson, R., 2008: CSI Computer Crime and Security Survey(Computer Security Institute, 2008)
    • (2008) 2008: CSI Computer Crime and Security Survey
  • 290
    • 84924741207 scopus 로고    scopus 로고
    • Playing hide and seek:How to protect virtual pornographers and actual children on the Internet
    • Rogers, A., ‘Playing hide and seek:How to protect virtual pornographers and actual children on the Internet’ (2005) Villanova Law Review 87
    • (2005) Villanova Law Review
    • Rogers, A.1
  • 291
    • 84979807229 scopus 로고    scopus 로고
    • Viagra, viruses and virgins: A pan-Atlantic comparative analysis on the vanquishing of spam
    • Rogers, K., ‘Viagra, viruses and virgins: A pan-Atlantic comparative analysis on the vanquishing of spam’ (2006) 22 Computer Law and Security Report 228
    • (2006) Computer Law and Security Report , vol.22
    • Rogers, K.1
  • 292
    • 79751523573 scopus 로고    scopus 로고
    • Re-thinking privacy: Peeping Toms, video voyeurs, and failure of the criminal law to recognize a reasonable expectation of privacy in the public space
    • Rothenberg, L. E., ‘Re-thinking privacy: Peeping Toms, video voyeurs, and failure of the criminal law to recognize a reasonable expectation of privacy in the public space’ (2000) 49 American University Law Review 1127
    • (2000) American University Law Review , vol.49
    • Rothenberg, L.E.1
  • 293
    • 84924741206 scopus 로고    scopus 로고
    • TheWiretap Act-reconcilable differences: A framework for determining the “interception of electronic communications following United States v. Councilman’s rejection of the storage/transit dichotomy
    • Roundy, M. D., ‘TheWiretap Act-reconcilable differences: A framework for determining the “interception” of electronic communications following United States v. Councilman’s rejection of the storage/transit dichotomy’ (2006) 28 Western New England Law Review 403
    • (2006) Western New England Law Review , vol.28
    • Roundy, M.D.1
  • 294
    • 38149043134 scopus 로고    scopus 로고
    • War, peace, or stalemate: Wargames, wardialing, wardriving, and the emerging market for hacker ethics
    • Ryan, P. S., ‘War, peace, or stalemate: Wargames, wardialing, wardriving, and the emerging market for hacker ethics’ (2004) 9 Virginia Journal of Law and Technology 7
    • (2004) Virginia Journal of Law and Technology , vol.9
    • Ryan, P.S.1
  • 296
    • 77951931441 scopus 로고    scopus 로고
    • Anti-spam legislation: An analysis of laws and their effectiveness
    • Schryen, G., ‘Anti-spam legislation: An analysis of laws and their effectiveness’ (2007) 16 Information and Communications Technology Law 17
    • (2007) Information and Communications Technology Law , vol.16
    • Schryen, G.1
  • 298
    • 84909018304 scopus 로고
    • Final Report no. 106
    • Scottish Law Commission, Report on Computer Crime, Final Report no. 106 (1987)
    • (1987) Report on Computer Crime
  • 301
    • 0038806339 scopus 로고    scopus 로고
    • Cookies and the commonlaw:Are Internet advertisers trespassing on our computers?
    • Siebecker, M. R., ‘Cookies and the commonlaw:Are Internet advertisers trespassing on our computers?’ (2003) 76 Southern California Law Review 893
    • (2003) Southern California Law Review , vol.76
    • Siebecker, M.R.1
  • 303
    • 84924741205 scopus 로고
    • Comment:ComputerMisuseAct 1990-recent developments
    • Singleton, S., ‘Comment:ComputerMisuseAct 1990-recent developments’ (1993) 57 Journal of Criminal Law 181
    • (1993) Journal of Criminal Law , vol.57
    • Singleton, S.1
  • 304
    • 0012186120 scopus 로고    scopus 로고
    • Cyber-crimes: A practical approach to the application of federal computer crime laws
    • Sinrod E. J. and Reilly, W. P., ‘Cyber-crimes: A practical approach to the application of federal computer crime laws’ (2000) 16 Santa Clara Computer and High Tech Law Journal 177
    • (2000) Santa Clara Computer and High Tech Law Journal , vol.16
    • Sinrod, E.J.1    Reilly, W.P.2
  • 310
    • 10844224409 scopus 로고    scopus 로고
    • The future of the Internet surveillance law: A symposium to discuss Internet surveillance, privacy & the USA PATRIOT Act: Surveillance law: Reshaping framework: Electronic surveillance law
    • Solove, D. J., ‘The future of the Internet surveillance law: A symposium to discuss Internet surveillance, privacy & the USA PATRIOT Act: Surveillance law: Reshaping framework: Electronic surveillance law’ (2004) 72 George Washington Law Review 1264
    • (2004) George Washington Law Review , vol.72
    • Solove, D.J.1
  • 311
    • 41949114572 scopus 로고    scopus 로고
    • Spam still pays: The failure of the CAN-SPAM Act of 2003 and proposed legal solutions
    • Soma, J., Singer, P. and Hurdd, J., ‘Spam still pays: The failure of the CAN-SPAM Act of 2003 and proposed legal solutions’ (2008) 45 Harvard Journal on Legislation 165
    • (2008) Harvard Journal on Legislation , vol.45
    • Soma, J.1    Singer, P.2    Hurdd, J.3
  • 312
    • 0345984397 scopus 로고    scopus 로고
    • Transnational extradition for computer crimes: Are new treaties and laws needed?
    • Soma, J. T., Muther, Jr, T. F. and Brissette, H. M. L., ‘Transnational extradition for computer crimes: Are new treaties and laws needed?’ (1997) 34 Harvard Journal on Legislation 317
    • (1997) Harvard Journal on Legislation , vol.34
    • Soma, J.T.1    Muther, T.F.2    Brissette, H.3
  • 313
    • 33745143977 scopus 로고    scopus 로고
    • Criminalising hacking tools
    • Sommer, P., ‘Criminalising hacking tools’ (2006) 3 Digital Investigation 68
    • (2006) Digital Investigation , vol.3
    • Sommer, P.1
  • 314
    • 84924741203 scopus 로고    scopus 로고
    • Sophos
    • Sophos, Security ThreatReport: 2009, www.sophos.com/sophos/docs/eng/marketing_material/sophos-security-threat-report-jan-2009-na.pdf
    • Security Threatreport: 2009
  • 315
    • 0344891911 scopus 로고    scopus 로고
    • Technical and legal approaches to unsolicited electronic mail
    • Sorkin, D., ‘Technical and legal approaches to unsolicited electronic mail’ (2001) 35 University of San Francisco Law Review 325
    • (2001) University of San Francisco Law Review , vol.35
    • Sorkin, D.1
  • 316
    • 84924741202 scopus 로고    scopus 로고
    • USHouse ofRepresentatives, 109th CongressJanuary
    • Staff Report Prepared for the Use of the Committee on Energy and Commerce, Sexual Exploitation of Children over the Internet, USHouse ofRepresentatives, 109th Congress, January 2007
    • (2007) Sexual Exploitation of Children over the Internet
  • 317
    • 84902212067 scopus 로고    scopus 로고
    • Discussion Paper, Civil Law Policy (Melbourne: Department of Justice
    • Standing Committee of Attorney’s-General, Unauthorised Photographs on the Internet and Ancillary Privacy Issues, Discussion Paper, Civil Law Policy (Melbourne: Department of Justice, 2005)
    • (2005) Unauthorised Photographs on the Internet and Ancillary Privacy Issues
  • 322
    • 84924741199 scopus 로고    scopus 로고
    • Vaguely going where no-one has gone: The expansive new computer access offences
    • Steel, A., ‘Vaguely going where no-one has gone: The expansive new computer access offences’ (2002) 26 Criminal Law Journal 72
    • (2002) Criminal Law Journal , vol.26
    • Steel, A.1
  • 323
    • 0002723655 scopus 로고
    • On the Internet, nobody knows youre a dog
    • 5 July
    • Steiner, P., ‘On the Internet, nobody knows you’re a dog’, The New Yorker, 5 July 1993
    • (1993) The New Yorker
    • Steiner, P.1
  • 324
    • 78549280687 scopus 로고    scopus 로고
    • Verdict in MySpace suicide case
    • 26 November
    • Steinhauer, J., ‘Verdict in MySpace suicide case’, New York Times, 26 November 2008
    • (2008) New York Times
    • Steinhauer, J.1
  • 325
    • 84924741198 scopus 로고
    • The response of the criminal law in Australia to computer abuse
    • Sullivan, C., ‘The response of the criminal law in Australia to computer abuse’ (1988) 12 Criminal Law Journal 228
    • (1988) Criminal Law Journal , vol.12
    • Sullivan, C.1
  • 326
    • 84924694269 scopus 로고    scopus 로고
    • Symantec
    • Symantec, Spam Monthly Report January 2009, http://eval.symantec.com/mktginfo/enterprise/otherresources/b-state of spam report 01-2009.en-us. pdf
    • (2009) Spam Monthly Report January
  • 329
    • 84891992739 scopus 로고    scopus 로고
    • Organisation for Economic Co-operation and Development
    • Task Force on Spam, Anti-Spam Law Enforcement (Organisation for Economic Co-operation and Development, 2005)
    • (2005) Anti-Spam Law Enforcement
    • Task Force on Spam1
  • 343
    • 84924741192 scopus 로고    scopus 로고
    • Shadowcrew identity theft ringleader gets 32 months in prison
    • USAttorney’s Office, District ofNewJersey, ‘“Shadowcrew” identity theft ringleader gets 32 months in prison’, News Release (2006), www.usdoj.gov/usao/nj/press/files/mant0629r.htm
    • (2006) News Release
    • USAttorney’s Office, District ofNewJersey,1
  • 344
    • 84924741191 scopus 로고    scopus 로고
    • US Attorney’s Office, Western District of New York and US Department of Justice Computer Crimes and Intellectual Property Section
    • US Attorney’s Office, Western District of New York and US Department of Justice Computer Crimes and Intellectual Property Section, The Online World and Law Enforcement, www.fpd-fln.org/online world and law enforcement.htm
    • The Online World and Law Enforcement
  • 357
    • 84924741187 scopus 로고    scopus 로고
    • Computer Crimes and Intellectual Property Section
    • US Attorney’s Office, Western District of New York
    • US Department of Justice, Computer Crimes and Intellectual Property Section, The Online World And Law Enforcement (US Attorney’s Office, Western District of New York), www.fpd-fln.org/online_world_and_law_enforcement.htm
    • The Online World and Law Enforcement
    • US Department of Justice1
  • 360
    • 84924741185 scopus 로고    scopus 로고
    • Regulators launch fake scam websites to warn investors about fraud
    • US Securities Exchange Commission, ‘Regulators launch fake scam websites to warn investors about fraud’, News Release (2002), www.sec.gov/news/headlines/scamsites.htm
    • (2002) News Release
  • 361
    • 84924741184 scopus 로고    scopus 로고
    • Permanent Subcommittee on Investigations of the Committee on Governmental Affairs
    • US Senate, Phony Identification and Credentials Via the Internet, Permanent Subcommittee on Investigations of the Committee on Governmental Affairs (2002)
    • (2002) Phony Identification and Credentials via the Internet
    • US Senate1
  • 367
    • 77955740556 scopus 로고    scopus 로고
    • Cyber-terrorism: Legal principle and law in the United Kingdom
    • Walker, C., ‘Cyber-terrorism: Legal principle and law in the United Kingdom’ (2006) Pennsylvania State Law Review 625
    • (2006) Pennsylvania State Law Review
    • Walker, C.1
  • 369
    • 24144448451 scopus 로고    scopus 로고
    • Surveillant Internet technologies and the growth in information capitalism: Spams and public trust in the information society
    • K. Haggerty and R. Ericson (eds.), Toronto: University of Toronto Press
    • Wall, D. S., ‘Surveillant Internet technologies and the growth in information capitalism: Spams and public trust in the information society’ in K. Haggerty and R. Ericson (eds.), The New Politics of Surveillance and Visibility (Toronto: University of Toronto Press, 2005)
    • (2005) The New Politics of Surveillance and Visibility
    • Wall, D.S.1
  • 370
    • 24144472881 scopus 로고    scopus 로고
    • Cambridge: Polity
    • Wall, D. S., Cybercrime (Cambridge: Polity, 2007)
    • (2007) Cybercrime
    • Wall, D.S.1
  • 374
    • 3042949374 scopus 로고    scopus 로고
    • Stalking: The criminal law response
    • Wells, C., ‘Stalking: The criminal law response’ (1997) Criminal Law Review 463
    • (1997) Criminal Law Review
    • Wells, C.1
  • 378
    • 0037320325 scopus 로고    scopus 로고
    • Escaping or connecting? Characteristics of youth who form close online relationships
    • Wolak, J., Mitchell K. and Finkelhor, D., ‘Escaping or connecting? Characteristics of youth who form close online relationships’ (2003) 26 Journal of Adolescence 105
    • (2003) Journal of Adolescence , vol.26
    • Wolak, J.1    Mitchell, K.2    Finkelhor, D.3
  • 380
    • 5644270277 scopus 로고    scopus 로고
    • Internet-initiated sex crimes againstminors: Implications for prevention based on findings from a national study
    • 424e11
    • Wolak, J., Mitchell K. and Finkelhor, D., ‘Internet-initiated sex crimes againstminors: Implications for prevention based on findings from a national study’ (2004) 35 Journal of Adolescent Health 424e11
    • (2004) Journal of Adolescent Health , vol.35
    • Wolak, J.1    Mitchell, K.2    Finkelhor, D.3
  • 387
    • 84924741177 scopus 로고    scopus 로고
    • How well do you know your computer? The level of scienter in 18 USC § 1462
    • Zappen, M. J., ‘How well do you know your computer? The level of scienter in 18 USC § 1462’ (2003) 66 Albany Law Review 1161
    • (2003) Albany Law Review , vol.66
    • Zappen, M.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.