메뉴 건너뛰기




Volumn , Issue , 2006, Pages 1-185

Cybercrime and society

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84950105202     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4135/9781446212196     Document Type: Book
Times cited : (320)

References (428)
  • 3
    • 84950160991 scopus 로고    scopus 로고
    • 2 February, at
    • ABC Newsonline (2005) ‘Seller Charged Over Stolen Goods on eBay’, 2 February, at http://www.abc.net.au/news/newsitems/200502/s1294115.htm
    • (2005) Seller Charged Over Stolen Goods on eBay
  • 4
    • 84950110906 scopus 로고    scopus 로고
    • ALA (American Library Association) (2004) ‘ALA Intellectual Freedom Committee Report to Council’, at http://www.ala.org/ala/oif/ifgroups/ifcommittee/ifcinaction/ifcreports/ifcreportac04.pdf
    • (2004) ALA Intellectual Freedom Committee Report to Council
  • 5
    • 23844435126 scopus 로고    scopus 로고
    • Secured and Sorted Mobilities: Examples from the Airport
    • Adey, P. (2004) ‘Secured and Sorted Mobilities: Examples from the Airport’, Surveillance and Society, 1(4): 500-19.
    • (2004) Surveillance and Society , vol.1 , Issue.4 , pp. 500-519
    • Adey, P.1
  • 6
    • 14244273295 scopus 로고    scopus 로고
    • Computer Pornography: A Comparative Study of the US and UK Obscenity Laws and Child Pornography Laws in Relation to the Internet
    • Akdeniz, Y. (1996) ‘Computer Pornography: A Comparative Study of the US and UK Obscenity Laws and Child Pornography Laws in Relation to the Internet’, International Review of Law, Computers and Technology, 10(2): 235-62. doi:10.1080/13600869.1996.9966445 http://dx.doi.org/10.1080/13600869.1996.9966445
    • (1996) International Review of Law, Computers and Technology , vol.10 , Issue.2 , pp. 235-262
    • Akdeniz, Y.1
  • 8
    • 0010072762 scopus 로고    scopus 로고
    • Child Pornography
    • Y. Akdeniz, C. Walker and D. Wall, Harlow, Longman
    • Akdeniz, Y. (2000) ‘Child Pornography’, in Y. Akdeniz, C. Walker and D. Wall (eds), The Internet, Law and Society. Harlow: Longman.
    • (2000) The Internet, Law and Society
    • Akdeniz, Y.1
  • 12
    • 14244271147 scopus 로고    scopus 로고
    • Sexually Oriented Expression
    • Y. Akdeniz, C. Walker and D. Wall, Harlow, Longman
    • Akdeniz, Y. and Strossen, N. (2000) ‘Sexually Oriented Expression’, in Y. Akdeniz, C. Walker and D. Wall (eds), The Internet, Law and Society. Harlow: Longman.
    • (2000) The Internet, Law and Society
    • Akdeniz, Y.1    Strossen, N.2
  • 14
    • 84858900274 scopus 로고    scopus 로고
    • report for the Irish Internet Advisory Board
    • Amarach Consulting (2001) ‘Research of Internet Downside Issues: August 2001', report for the Irish Internet Advisory Board, at http://www.
    • (2001) Research of Internet Downside Issues: August 2001
  • 15
    • 84861253055 scopus 로고    scopus 로고
    • posted 20 July 2002, at
    • Ananova (2002) ‘Movie Industry Hunts Down Online Pirates’ posted 20 July 2002, at http://www.ananova.com/enetrtainment/story/sm_632999.html
    • (2002) Movie Industry Hunts Down Online Pirates
  • 17
    • 84950109850 scopus 로고    scopus 로고
    • ASACP (Association of Sites Advocating Child Protection) (2005) ‘Why ASACP?’ at http://www.asacp.org/index.php
    • (2005) Why ASACP?
  • 19
    • 0003354783 scopus 로고    scopus 로고
    • Sex, Guys, and Cyberspace: Effects of Internet Pornography and Individual Differences on Men’s Attitudes Toward Women
    • Barak, A., Fisher, W., Belfry, S. and Lashambe, D. (1999) ‘Sex, Guys, and Cyberspace: Effects of Internet Pornography and Individual Differences on Men’s Attitudes Toward Women’, Journal of Psychology and Human Sexuality, 11(1): 63-91. doi:10.1300/J056v11n01_04 http://dx.doi.org/10.1300/J056v11n01_04
    • (1999) Journal of Psychology and Human Sexuality , vol.11 , Issue.1 , pp. 63-91
    • Barak, A.1    Fisher, W.2    Belfry, S.3    Lashambe, D.4
  • 20
    • 84950133783 scopus 로고    scopus 로고
    • Wednesday 1 August 2001, at
    • BBC News (2001a) ‘Code Red Cost Tops $1.2bn’, Wednesday 1 August 2001, at http://news.bbc.co.uk/hi/business/1468986.stm
    • (2001) Code Red Cost Tops $1.2bn
  • 21
    • 17644386656 scopus 로고    scopus 로고
    • Thursday 13 September 2001, at
    • BBC News (2001b) '"Mafiaboy" Hacker Jailed’, Thursday 13 September 2001, at http://www.news.bbc.co.uk/1/hi/sci/tech/1541252.stm.
    • (2001) "Mafiaboy" Hacker Jailed
  • 22
    • 84950145236 scopus 로고    scopus 로고
    • 9 March 2004, at
    • BBC News (2004) ‘UK and US to Act on Web Sex Sites’, 9 March 2004, at http://news.bbc.co.uk/go/pr/fr/-/hi/uk/3545147.stm
    • (2004) UK and US to Act on Web Sex Sites
  • 24
    • 84885978676 scopus 로고    scopus 로고
    • Pornography-Dot-Com: Eroticising Privacy on the Internet
    • Bennett, D. (2001) ‘Pornography-Dot-Com: Eroticising Privacy on the Internet’, The Review of Education/Pedagogy/Cultural Studies, 23: 381-91.
    • (2001) The Review of Education/Pedagogy/Cultural Studies , vol.23 , pp. 381-391
    • Bennett, D.1
  • 25
    • 84950156943 scopus 로고    scopus 로고
    • The UK Sexual Offences Bill: A Victorian Spinster’s View of Sex
    • Bennion, F. (2003) ‘The UK Sexual Offences Bill: A Victorian Spinster’s View of Sex’, Common Law, 12(1): 61-6.
    • (2003) Common Law , vol.12 , Issue.1 , pp. 61-66
    • Bennion, F.1
  • 27
    • 0032755116 scopus 로고    scopus 로고
    • Cyber-Crime: The US Experience
    • Bequai, A. (1999) ‘Cyber-Crime: the US Experience’, Computers and Security, 18(1): 16-18. doi:10.1016/S0167-4048(99)80003-0 http://dx.doi.org/10.1016/S0167-4048%2899%2980003-0
    • (1999) Computers and Security , vol.18 , Issue.1 , pp. 16-18
    • Bequai, A.1
  • 28
    • 84950117059 scopus 로고    scopus 로고
    • Washington, DC, National White Collar Crime Centre
    • Beresford, A. (2003) Securities/Investment Fraud. Washington, DC: National White Collar Crime Centre.
    • (2003) Securities/Investment Fraud
    • Beresford, A.1
  • 29
    • 12344336865 scopus 로고
    • The Original Confidence Man
    • Bergmann, J. (1969) ‘The Original Confidence Man’, American Quarterly, 21(3): 560-77. doi:10.2307/2711934 http://dx.doi.org/10.2307/2711934
    • (1969) American Quarterly , vol.21 , Issue.3 , pp. 560-577
    • Bergmann, J.1
  • 34
    • 84937340971 scopus 로고    scopus 로고
    • A Plague of Viruses: Biological, Computer and Marketing
    • Boase, J. and Wellman, B. (2001) ‘A Plague of Viruses: Biological, Computer and Marketing’, Current Sociology, 49(6): 39-55. doi:10.1177/0011392101496006 http://dx.doi.org/10.1177/0011392101496006
    • (2001) Current Sociology , vol.49 , Issue.6 , pp. 39-55
    • Boase, J.1    Wellman, B.2
  • 35
    • 35448952265 scopus 로고    scopus 로고
    • Victims of Cyberstalking: An Exploratory Study of Harassment Perpetrated via the Internet
    • Bocij, P. (2003) ‘Victims of Cyberstalking: An Exploratory Study of Harassment Perpetrated via the Internet’, First Monday, 8(10), at http://www.firstmonday.org/issues/issues8_10/bocij/index.html
    • (2003) First Monday , vol.8 , Issue.10
    • Bocij, P.1
  • 36
    • 79952194506 scopus 로고    scopus 로고
    • Cyberstalking: Genuine Problem or Public Hysteria?
    • Bocij, P. and McFarlane, L. (2002) ‘Cyberstalking: Genuine Problem or Public Hysteria?', Prison Service Journal, 140: 32-5.
    • (2002) Prison Service Journal , vol.140 , pp. 32-35
    • Bocij, P.1    McFarlane, L.2
  • 37
    • 34548593955 scopus 로고    scopus 로고
    • Cyberstalking: A New Challenge for Criminal Justice
    • Bocij, P., Griffiths, M. and McFarlane, L. (2002) ‘Cyberstalking: A New Challenge for Criminal Justice’, The Criminal Lawyer, 122: 3-5.
    • (2002) The Criminal Lawyer , vol.122 , pp. 3-5
    • Bocij, P.1    Griffiths, M.2    McFarlane, L.3
  • 39
    • 84950149992 scopus 로고    scopus 로고
    • Building Bridges, Standing Guard
    • May
    • Boni, B. (2001) ‘Building Bridges, Standing Guard’, Network Security, 5, May, 18-19.
    • (2001) Network Security , vol.5 , pp. 18-19
    • Boni, B.1
  • 40
    • 34547402198 scopus 로고    scopus 로고
    • Preserving the Commons in the Information Order
    • WSIS, Vienna, Institut für Neue Kulturtechnologien
    • Bollier, D. (2003) ‘Preserving the Commons in the Information Order’, in WSIS World Information: Knowledge of Future Culture. Vienna: Institut für Neue Kulturtechnologien.
    • (2003) World Information: Knowledge of Future Culture
    • Bollier, D.1
  • 41
    • 0002344456 scopus 로고    scopus 로고
    • Information Warfare: The Computer Revolution is Altering How Future Wars Will be Conducted
    • August
    • Bowers, S. (1998) ‘Information Warfare: The Computer Revolution is Altering How Future Wars Will be Conducted’, Armed Forces Journal International, August, 38-9.
    • (1998) Armed Forces Journal International , pp. 38-39
    • Bowers, S.1
  • 43
    • 1942425896 scopus 로고    scopus 로고
    • Policing and the Police
    • M. Maguire, R. Morgan and R. Reiner, 3rd edition, Oxford, Oxford University Press
    • Bowling, B. and Foster, J. (2002) ‘Policing and the Police’, in M. Maguire, R. Morgan and R. Reiner (eds), The Oxford Handbook of Criminology, 3rd edition. Oxford: Oxford University Press.
    • (2002) The Oxford Handbook of Criminology
    • Bowling, B.1    Foster, J.2
  • 44
    • 0346827586 scopus 로고    scopus 로고
    • In Community We Trust: Online Security Communication at eBay
    • Boyd, J. (2002) ‘In Community We Trust: Online Security Communication at eBay’, Journal of Computer-Mediated Communication, 7(3) at http://ascusc.org.jcmc/vol7/issues3/boyd.html
    • (2002) Journal of Computer-Mediated Communication , vol.7 , Issue.3
    • Boyd, J.1
  • 45
    • 84950136207 scopus 로고    scopus 로고
    • 7 June, London, BPI
    • BPI (British Phonographic Industry) (2002) Market Information, 184, 7 June. London: BPI.
    • (2002) Market Information , vol.184
  • 46
    • 0037527904 scopus 로고    scopus 로고
    • Power and Control Dynamics in Prestalking and Stalking Situations
    • Brewster, M. (2003) ‘Power and Control Dynamics in Prestalking and Stalking Situations’, Journal of Family Violence, 18(4): 207-17. doi:10.1023/A:1024064214054 http://dx.doi.org/10.1023/A:1024064214054
    • (2003) Journal of Family Violence , vol.18 , Issue.4 , pp. 207-217
    • Brewster, M.1
  • 48
    • 85177495449 scopus 로고    scopus 로고
    • The Treatment of Hate Speech in German Constitutional Law
    • online at
    • Brugger, W. (2002) ‘The Treatment of Hate Speech in German Constitutional Law’, German Law Journal, 40(1), online at: http://www.germanlawjournal.com/pdf/Vol04No01/PDF_Vol_04_No_01_01-44_Public_Brugger.pd
    • (2002) German Law Journal , vol.40 , Issue.1
    • Brugger, W.1
  • 49
    • 9144264974 scopus 로고    scopus 로고
    • URL (consulted March 2005)
    • BSA (Business Software Alliance) (2003) ‘Eighth Annual BSA Global Software Piracy Study’, URL (consulted March 2005): http://www.bsaa.com.au/downloads/BSA_Piracy_Booklet.pdf
    • (2003) Eighth Annual BSA Global Software Piracy Study
  • 50
    • 84950124190 scopus 로고    scopus 로고
    • URL (consulted March 2005)
    • BSA (Business Software Alliance) (2005) ‘Fact Sheet: The Cyber Frontier and Children’, URL (consulted March 2005): http://www.bsa.org/resources/loader.cfm?url=/commonspot/security/getfile.cfm&pageid=1323&hitboxdone=yes
    • (2005) Fact Sheet: The Cyber Frontier and Children
  • 52
    • 49049102652 scopus 로고    scopus 로고
    • Remember: Mimesis is a Form of Creativity
    • Vienna, Institut für Neue Kulturtechnologien
    • Bunz, M. (2003) ‘Remember: Mimesis is a Form of Creativity’, in World Information: Knowledge of Future Culture. Vienna: Institut für Neue Kulturtechnologien.
    • (2003) World Information: Knowledge of Future Culture
    • Bunz, M.1
  • 55
    • 2642551677 scopus 로고    scopus 로고
    • London, Cabinet Office
    • Cabinet Office (2002) Identity Fraud: A Study. London: Cabinet Office.
    • (2002) Identity Fraud: A Study
  • 56
    • 84950136137 scopus 로고    scopus 로고
    • Somebody’s Listening
    • 12 August
    • Campbell, D. (1998) ‘Somebody’s Listening’, New Statesman, 12 August: 10-12.
    • (1998) New Statesman , pp. 10-12
    • Campbell, D.1
  • 57
    • 0035532916 scopus 로고    scopus 로고
    • Not Such a Neat Net: Some Comments on Virtual Criminality
    • Capeller, W. (2001) ‘Not Such a Neat Net: Some Comments on Virtual Criminality’, Social and Legal Studies, 10: 229-42.
    • (2001) Social and Legal Studies , vol.10 , pp. 229-242
    • Capeller, W.1
  • 59
    • 0001026431 scopus 로고    scopus 로고
    • "Digital Democracy" or "Information Aristocracy"? Economic Regeneration and the Information Economy
    • B. Loader, London, Routledge
    • Carter, D. (1997) '"Digital Democracy" or "Information Aristocracy"? Economic Regeneration and the Information Economy’, in B. Loader (ed.), The Governance of Cyberspace: Politics, Technology and Global Restructuring. London: Routledge.
    • (1997) The Governance of Cyberspace: Politics, Technology and Global Restructuring
    • Carter, D.1
  • 60
    • 84950112088 scopus 로고    scopus 로고
    • Interview with MPAA President Jack Valenti
    • Carugati, A. (2003) Interview with MPAA President Jack Valenti, Worldscreen, at http://worldscreen.com/interviewscurrent.php?filename=203valenti.txt
    • (2003) Worldscreen
    • Carugati, A.1
  • 67
    • 84950111655 scopus 로고    scopus 로고
    • Proceedings of the CollECTeR Workshop on eCommerce, May 7/8, Adelaide South Australia, at
    • Chance, S., Tootell. H. and Morris, E. (2004) ‘The Impact of Anti-Terrorism Legislation on Dataveillance’, Proceedings of the CollECTeR Workshop on eCommerce, May 7/8, Adelaide South Australia, at http://www.collecter.org/coll2004/proceedings/phance_Morris_Tootell.pdf
    • (2004) The Impact of Anti-Terrorism Legislation on Dataveillance
    • Chance, S.1    Tootell, H.2    Morris, E.3
  • 68
    • 34248156608 scopus 로고    scopus 로고
    • The Governance of the Internet in Europe
    • Y. Akdeniz, C. Walker and D. Wall, Harlow, Longman
    • Charlesworth, A. (2000) ‘The Governance of the Internet in Europe’, in Y. Akdeniz, C. Walker and D. Wall (eds), The Internet, Law and Society. Harlow: Longman.
    • (2000) The Internet, Law and Society
    • Charlesworth, A.1
  • 72
    • 0000204509 scopus 로고
    • Social Change and Crime Rate Trends: A Routine Activity Approach
    • Cohen, L. and Felson, M. (1979) ‘Social Change and Crime Rate Trends: A Routine Activity Approach’, American Sociological Review, 44: 588-608. doi:10.2307/2094589 http://dx.doi.org/10.2307/2094589
    • (1979) American Sociological Review , vol.44 , pp. 588-608
    • Cohen, L.1    Felson, M.2
  • 75
    • 84979812554 scopus 로고    scopus 로고
    • Securing Cyberspace - New Laws and Developing Strategies
    • Coleman, C. (2003) ‘Securing Cyberspace - New Laws and Developing Strategies’, Computer Law and Security Report, 19(2): 131-6. doi:10.1016/S0267-3649(03)00208-5 http://dx.doi.org/10.1016/S0267-3649%2803%2900208-5
    • (2003) Computer Law and Security Report , vol.19 , Issue.2 , pp. 131-136
    • Coleman, C.1
  • 77
    • 84950154083 scopus 로고    scopus 로고
    • press release 17 March 2003, at
    • Comscore Media Metrix (2003) ‘Canada Trumps U.S. in Broadband Use’, press release 17 March 2003, at http://www.comscore.com/press/release.asp?id=312
    • (2003) Canada Trumps U.S. in Broadband Use
  • 79
  • 80
    • 0003077458 scopus 로고
    • The Future of High-Technology Crime: A Parallel Delphi Study
    • Coutorie, L. (1995) ‘The Future of High-Technology Crime: A Parallel Delphi Study’, Journal of Criminal Justice, 23(1): 13-27. doi:10.1016/0047-2352(94)00042-5 http://dx.doi.org/10.1016/0047-2352%2894%2900042-5
    • (1995) Journal of Criminal Justice , vol.23 , Issue.1 , pp. 13-27
    • Coutorie, L.1
  • 81
    • 84937377718 scopus 로고    scopus 로고
    • What is Cyberterrorism?
    • Conway, M. (2002) ‘What is Cyberterrorism?', Current History, 101(659): 436-442.
    • (2002) Current History , vol.101 , Issue.659 , pp. 436-442
    • Conway, M.1
  • 83
    • 3242808612 scopus 로고    scopus 로고
    • Computer Security Institute, San Francisco
    • CSI/FBI (2003) ‘CSI/FBI Computer Crime and Security Survey’, Computer Security Institute. San Francisco.
    • (2003) CSI/FBI Computer Crime and Security Survey
  • 84
    • 33749830846 scopus 로고    scopus 로고
    • Child Pornography: Images of the Abuse of Children
    • London, NSPCC
    • Creighton, S. (2003) ‘Child Pornography: Images of the Abuse of Children’, NSPCC Information Briefings. London: NSPCC.
    • (2003) NSPCC Information Briefings
    • Creighton, S.1
  • 87
    • 84950149361 scopus 로고    scopus 로고
    • Go-Ahead for Police to Tap Coded Mail
    • 24 September, at
    • Cumiskey, A. (1998) ‘Go-Ahead for Police to Tap Coded Mail’, The Daily Telegraph, 24 September, at http://www.chiark.greenend.org.uk/pipermail/ukcrypto/1998-September/002454.html
    • (1998) The Daily Telegraph
    • Cumiskey, A.1
  • 91
    • 0033818021 scopus 로고    scopus 로고
    • Hate Crimes on the Internet
    • Deirmenjian, J. (2000) ‘Hate Crimes on the Internet’, Journal of Forensic Sciences, 45(5): 1020-22.
    • (2000) Journal of Forensic Sciences , vol.45 , Issue.5 , pp. 1020-1022
    • Deirmenjian, J.1
  • 92
    • 0012815237 scopus 로고
    • Words That Would: A Tort Action for Racial Insults, Epithets, and Name-Calling
    • Delgado, R. (1982) ‘Words That Would: A Tort Action for Racial Insults, Epithets, and Name-Calling’, Harvard Civil Rights-Civil Liberties Law Review, 17: 133-181.
    • (1982) Harvard Civil Rights-Civil Liberties Law Review , vol.17 , pp. 133-181
    • Delgado, R.1
  • 93
    • 84950115490 scopus 로고    scopus 로고
    • Why Worm Writer Surrendered
    • 14 February 2001, at
    • Delio, M. (2001) ‘Why Worm Writer Surrendered’, Wired Magazine, 14 February 2001, at http://www.wired.com/news/culture/0,1284,41809,00.html
    • (2001) Wired Magazine
    • Delio, M.1
  • 94
    • 0000327879 scopus 로고
    • Postscript on the Societies of Control
    • New York, Columbia University Press
    • Deleuze, G. (1995) ‘Postscript on the Societies of Control’, in Negotiations. New York: Columbia University Press.
    • (1995) Negotiations
    • Deleuze, G.1
  • 98
    • 84859604766 scopus 로고    scopus 로고
    • Denning, D. (2000a) ‘Cyberterrorism’, at http://www.cs.georgetown.edu~denning/infosec/cyberterror.html
    • (2000) Cyberterrorism
    • Denning, D.1
  • 99
    • 84859604766 scopus 로고    scopus 로고
    • Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives, 23 May 2000
    • Denning, D. (2000b) Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives, 23 May 2000.
    • (2000) Cyberterrorism
    • Denning, D.1
  • 103
    • 84919555980 scopus 로고    scopus 로고
    • URL (consulted March 2005)
    • Digital Intelligence Centre (DIG) (2004) ‘Digital Intelligence Centre: Archived News’, URL (consulted March 2005): http://www.itic.ca/DIC/News/archive.html#2004-06-09
    • (2004) Digital Intelligence Centre: Archived News
  • 105
    • 78751569023 scopus 로고    scopus 로고
    • The Electronic Cloak: Secret Sexual Deviance in Cyberspace
    • Y. Jewkes, Cullompton, Willan
    • DiMarco, H. (2003) ‘The Electronic Cloak: Secret Sexual Deviance in Cyberspace’, in Y. Jewkes (ed.), Dot.cons: Crime, Deviance and Identity on the Internet. Cullompton: Willan.
    • (2003) Dot.cons: Crime, Deviance and Identity on the Internet
    • DiMarco, H.1
  • 106
    • 38048999561 scopus 로고    scopus 로고
    • Internet Auction Fraud: The Silent Victims
    • Dolan, K. (2004) ‘Internet Auction Fraud: The Silent Victims’, Journal of Economic Crime Management, 2(1).
    • (2004) Journal of Economic Crime Management , vol.2 , Issue.1
    • Dolan, K.1
  • 109
    • 0033339151 scopus 로고    scopus 로고
    • Computer Crime and Abuse: A Survey of Public Attitudes and Awareness
    • Dowland, P., Furnell, S., Illingworth, H. and Reynolds, P. (1999) ‘Computer Crime and Abuse: A Survey of Public Attitudes and Awareness’, Computers and Security, 18(8): 715-26. doi:10.1016/S0167-4048(99)80135-7 http://dx.doi.org/10.1016/S0167-4048%2899%2980135-7
    • (1999) Computers and Security , vol.18 , Issue.8 , pp. 715-726
    • Dowland, P.1    Furnell, S.2    Illingworth, H.3    Reynolds, P.4
  • 115
    • 0345635488 scopus 로고    scopus 로고
    • ECPAT (End Child Prostitution, Child Pornography and Trafficking of Children for Sexual Purposes) (1997) Child Pornography: An International Perspective, at http://www.csecworldcongress.org/PDF/en/Stockholm/Background_reading/Theme_papers/Theme%200paper%Pornography%201996_EN.pdf
    • (1997) Child Pornography: An International Perspective
  • 117
    • 84950150565 scopus 로고    scopus 로고
    • EFF (Electronic Frontier Foundation) (2001) ‘Online Censorship and Free Expression’, at http://www.eff.org//Censorship/?f=gottesman_lords_video_case.article
    • (2001) Online Censorship and Free Expression
  • 118
    • 84950142450 scopus 로고    scopus 로고
    • EFF (Electronic Frontier Foundation) (2005) ‘EFF Analysis of PATRIOT II’, at http://www.eff.org/Censorship/Terrorism_militias/patriot-act-II-analysis.php
    • (2005) EFF Analysis of PATRIOT II
  • 119
    • 84950117011 scopus 로고    scopus 로고
    • Reuters Subsidiary Target of US Inquiry into Theft of Data from Bloomberg
    • Eichenwald, K. (1998) ‘Reuters Subsidiary Target of US Inquiry into Theft of Data from Bloomberg’, Computers and Security, 17, 2, 157.
    • (1998) Computers and Security , vol.17 , Issue.2 , pp. 157
    • Eichenwald, K.1
  • 120
    • 0038172257 scopus 로고    scopus 로고
    • Cyberterrorism: Are We Under Siege?
    • Embar-Seddon, A. (2003) ‘Cyberterrorism: Are We Under Siege?', American Behavioral Scientist, 45(6): 1033-43. doi:10.1177/0002764202045006007 http://dx.doi.org/10.1177/0002764202045006007
    • (2003) American Behavioral Scientist , vol.45 , Issue.6 , pp. 1033-1043
    • Embar-Seddon, A.1
  • 121
    • 0041021933 scopus 로고    scopus 로고
    • On Being Stalked
    • Emerson, R., Ferris, K. and Brooks-Gardner, C. (1998) ‘On Being Stalked’, Social Problems, (45)3: 289-314. doi:10.1525/sp.1998.45.3.03x0193k http://dx.doi.org/10.1525/sp.1998.45.3.03x0193k
    • (1998) Social Problems , vol.45 , Issue.3 , pp. 289-314
    • Emerson, R.1    Ferris, K.2    Brooks-Gardner, C.3
  • 122
    • 84950126939 scopus 로고    scopus 로고
    • SEC Tackles Internet Investment Fraud
    • January 1996
    • English, E. (1996) ‘SEC Tackles Internet Investment Fraud’, Network Security, January 1996: 8.
    • (1996) Network Security , pp. 8
    • English, E.1
  • 126
    • 33645107828 scopus 로고    scopus 로고
    • EPIC (Electronic Privacy Information Center) (2005) ‘ChoicePoint’, at http://www.epic.org/privacy/choicepoint/default.html
    • (2005) ChoicePoint
  • 127
    • 78951484833 scopus 로고    scopus 로고
    • John M. Olin Law and Economics Working Paper № 204, URL (consulted March 2005)
    • Epstein, R. (2004) ‘Liberty versus Property? Cracks in the Foundations of Copyright Law’, John M. Olin Law and Economics Working Paper № 204, URL (consulted March 2005): http://www.law.uchicago.edu/Lawecon/index.html
    • (2004) Liberty versus Property? Cracks in the Foundations of Copyright Law
    • Epstein, R.1
  • 128
    • 49049091487 scopus 로고    scopus 로고
    • Please Pirate My Songs
    • WSIS, Vienna, Institut für Neue Kulturtechnologien
    • Escolar, I. (2003) ‘Please Pirate My Songs’, in WSIS World Information: Knowledge of Future Culture. Vienna: Institut für Neue Kulturtechnologien.
    • (2003) World Information: Knowledge of Future Culture
    • Escolar, I.1
  • 129
    • 84950137464 scopus 로고    scopus 로고
    • Cyber Crime: A Growing Problem
    • Esen, R. (2002) ‘Cyber Crime: A Growing Problem’, Journal of Criminal Law, 66(3): 269-83.
    • (2002) Journal of Criminal Law , vol.66 , Issue.3 , pp. 269-283
    • Esen, R.1
  • 131
    • 0037843389 scopus 로고    scopus 로고
    • Credit Card Fraud Funds Terrorism
    • Everett, C. (2003) ‘Credit Card Fraud Funds Terrorism’, Computer Fraud and Security, 5(1): 1.
    • (2003) Computer Fraud and Security , vol.5 , Issue.1 , pp. 1
    • Everett, C.1
  • 132
    • 84950121752 scopus 로고    scopus 로고
    • Virtual Community
    • special issue on ‘The Futures of Community’, January 2004, at
    • Evans, K. (2004) ‘Virtual Community’, The Electronic Journal of Social Issues, 2 (1), special issue on ‘The Futures of Community’, January 2004, at http://www.whb.co.uk/socialissues/indexvol2.htm
    • (2004) The Electronic Journal of Social Issues , vol.2 , Issue.1
    • Evans, K.1
  • 135
    • 84861251215 scopus 로고    scopus 로고
    • September 2003, at
    • FACT (2003b) ‘Special Report’, September 2003, at http://www.fact-uk.org.uk
    • (2003) Special Report
  • 136
    • 84950150909 scopus 로고    scopus 로고
    • paper presented at the Children and Crime: Victims and Offenders Conference, Brisbane, Australia, 17-18 June
    • Feather, M. (1999) ‘Internet and Child Victimisation’, paper presented at the Children and Crime: Victims and Offenders Conference, Brisbane, Australia, 17-18 June.
    • (1999) Internet and Child Victimisation
    • Feather, M.1
  • 137
    • 0004152943 scopus 로고    scopus 로고
    • 2nd edn, Thousand Oaks, CA, Pine Forge Press
    • Felson, M. (1998) Crime and Everyday Life, 2nd edn. Thousand Oaks, CA: Pine Forge Press.
    • (1998) Crime and Everyday Life
    • Felson, M.1
  • 143
    • 84950127037 scopus 로고    scopus 로고
    • Tiffany & Co. Cracks Down on eBay Counterfeiters
    • Flahardy, C. (2004) ‘Tiffany & Co. Cracks Down on eBay Counterfeiters’, Corporate Legal Times, 14(154): 1-2.
    • (2004) Corporate Legal Times , vol.14 , Issue.154 , pp. 1-2
    • Flahardy, C.1
  • 144
    • 84950147196 scopus 로고    scopus 로고
    • paper presented at the International Conference on Countering Terrorism Through Enhanced International Cooperation, 22-24 September, 2000, Courmayeur, Italy
    • Fleming, P. and Stohl, M. (2000) ‘Myths and Realities of Cyberterrorism’, paper presented at the International Conference on Countering Terrorism Through Enhanced International Cooperation, 22-24 September, 2000, Courmayeur, Italy.
    • (2000) Myths and Realities of Cyberterrorism
    • Fleming, P.1    Stohl, M.2
  • 147
    • 0030668250 scopus 로고    scopus 로고
    • Social Learning Theory Analysis of Computer Crime Among College Students
    • Fream, A. and Skinner, W. (1997) ‘Social Learning Theory Analysis of Computer Crime Among College Students’, Journal of Research in Crime and Delinquency, 34(4): 495-518. doi:10.1177/0022427897034004005 http://dx.doi.org/10.1177/0022427897034004005
    • (1997) Journal of Research in Crime and Delinquency , vol.34 , Issue.4 , pp. 495-518
    • Fream, A.1    Skinner, W.2
  • 150
    • 0029613287 scopus 로고
    • A Proposal for Mental Health Provisions in State Anti-Stalking Law
    • Summer
    • Fritz, J. (1995) ‘A Proposal for Mental Health Provisions in State Anti-Stalking Law’, Journal of Psychiatry and Law, Summer: 295-318.
    • (1995) Journal of Psychiatry and Law , pp. 295-318
    • Fritz, J.1
  • 156
    • 10144243033 scopus 로고
    • Terrorists’ Perspectives: Memoirs
    • D. Paletz and A. Schmid, Newbury Park, CA, Sage
    • Gerrits, R. (1992) ‘Terrorists’ Perspectives: Memoirs’, in D. Paletz and A. Schmid (eds), Terrorism and the Media. Newbury Park, CA: Sage.
    • (1992) Terrorism and the Media
    • Gerrits, R.1
  • 160
    • 0002595742 scopus 로고
    • Stalking: Crime of the '90‘s?
    • Goode, M. (1995) ‘Stalking: Crime of the '90‘s?', Criminal Law Journal, 19(1): 1-10.
    • (1995) Criminal Law Journal , vol.19 , Issue.1 , pp. 1-10
    • Goode, M.1
  • 161
    • 84950122824 scopus 로고    scopus 로고
    • Google (2005) ‘Gmail Privacy Policy’, at http://gmail.google.com/gmail/help/privacy.html
    • (2005) Gmail Privacy Policy
  • 165
    • 0035381384 scopus 로고    scopus 로고
    • Virtual Criminality: Old Wine in New Bottles?
    • Grabosky, P. (2001) ‘Virtual Criminality: Old Wine in New Bottles?', Social and Legal Studies, 10: 243-9.
    • (2001) Social and Legal Studies , vol.10 , pp. 243-249
    • Grabosky, P.1
  • 166
    • 84950147205 scopus 로고    scopus 로고
    • Grabosky, P. (2003) ‘Cyberterrorism’, at http://www.alrc.gov.au/reform/summaries/82.htm
    • (2003) Cyberterrorism
    • Grabosky, P.1
  • 167
    • 57649121448 scopus 로고    scopus 로고
    • Telecommunication Fraud in the Digital Age: The Convergence of Technologies
    • D. Wall, London, Routledge
    • Grabosky, P. and Smith, R. (2001) ‘Telecommunication Fraud in the Digital Age: The Convergence of Technologies’, in D. Wall (ed.), Crime and the Internet. London: Routledge.
    • (2001) Crime and the Internet
    • Grabosky, P.1    Smith, R.2
  • 168
    • 84864164438 scopus 로고    scopus 로고
    • Uncovering and Eliminating Child Pornography Rings on the Internet: Issues Regarding and Avenues Facilitating Law Enforcement’s Access to "Wonderland"
    • Graham, W. (2000) ‘Uncovering and Eliminating Child Pornography Rings on the Internet: Issues Regarding and Avenues Facilitating Law Enforcement’s Access to "Wonderland"', Law Review of Michigan State University-Detroit College of Law, 2: 457-84.
    • (2000) Law Review of Michigan State University-Detroit College of Law , vol.2 , pp. 457-484
    • Graham, W.1
  • 169
    • 0034226904 scopus 로고    scopus 로고
    • Perils of Internet Fraud: An Empirical Investigation of Deception and Trust With Experienced Internet Consumers
    • Grazioli, S. and Jarvenpaa, S. (2000) ‘Perils of Internet Fraud: An Empirical Investigation of Deception and Trust With Experienced Internet Consumers’, IEEE Transactions on Systems, Man, and Cybernetics, 30(4): 395-410. doi:10.1109/3468.852434 http://dx.doi.org/10.1109/3468.852434
    • (2000) IEEE Transactions on Systems, Man, and Cybernetics , vol.30 , Issue.4 , pp. 395-410
    • Grazioli, S.1    Jarvenpaa, S.2
  • 170
    • 84950157632 scopus 로고    scopus 로고
    • Policing Cyberspace
    • Green, C. (1998) ‘Policing Cyberspace’, Focus, 45(3): 66-68.
    • (1998) Focus , vol.45 , Issue.3 , pp. 66-68
    • Green, C.1
  • 171
    • 84950156863 scopus 로고    scopus 로고
    • The Myth of Cyberterrorism: There Are Many Ways Terrorists Can Kill You - Computers Aren’t One of Them
    • Green, J. (2001) ‘The Myth of Cyberterrorism: There Are Many Ways Terrorists Can Kill You - Computers Aren’t One of Them’, The Washington Quarterly Online, at http://www.washingtonmonthly.com/features/2001/0211.green.html
    • (2001) The Washington Quarterly Online
    • Green, J.1
  • 173
    • 84919553315 scopus 로고    scopus 로고
    • Software
    • June
    • Grow, B. (2004) ‘Software’, Business Week, 21, June: 84.
    • (2004) Business Week , vol.21 , pp. 84
    • Grow, B.1
  • 175
    • 84950119653 scopus 로고    scopus 로고
    • Ebay India Boss Cuffed in Porn Vid Scandal
    • 20 December, at
    • Haines, L. (2004) ‘Ebay India Boss Cuffed in Porn Vid Scandal’, The Register, 20 December, at http://www.theregister.co.uk/2004/12/20/ebay_india_scandal/
    • (2004) The Register
    • Haines, L.1
  • 177
    • 79955822585 scopus 로고    scopus 로고
    • The USA Patriot Act and the Politics of Fear
    • J. Ferrell, K. Hayward, W. Morrison and M. Presdee, London, GlassHouse
    • Hamm, M. (2004) ‘The USA Patriot Act and the Politics of Fear’, in J. Ferrell, K. Hayward, W. Morrison and M. Presdee (eds), Critical Criminology Unleashed. London: GlassHouse.
    • (2004) Critical Criminology Unleashed
    • Hamm, M.1
  • 178
    • 84919563884 scopus 로고    scopus 로고
    • As Internet Booms, So Do Hacker-Proofing Measures
    • Halverson, G. (1996) ‘As Internet Booms, So Do Hacker-Proofing Measures’, Christian Science Monitor, 88(144): 9.
    • (1996) Christian Science Monitor , vol.88 , Issue.144 , pp. 9
    • Halverson, G.1
  • 179
    • 84950157815 scopus 로고    scopus 로고
    • Delhi Schoolboy Sparks Global Porn Row
    • 21 December
    • Harding, L. (2004) ‘Delhi Schoolboy Sparks Global Porn Row’, The Guardian, 21 December.
    • (2004) The Guardian
    • Harding, L.1
  • 181
    • 77953409717 scopus 로고
    • Justifying Intellectual Property
    • Hettinger, E. (1989) ‘Justifying Intellectual Property’, Philosophy and Public Affairs, 18(1): 31-52.
    • (1989) Philosophy and Public Affairs , vol.18 , Issue.1 , pp. 31-52
    • Hettinger, E.1
  • 182
    • 0037228072 scopus 로고    scopus 로고
    • The Law, Cybercrime, Risk Assessment and Cyber Protection
    • Hinde, S. (2003) ‘The Law, Cybercrime, Risk Assessment and Cyber Protection’, Computers and Security, 22(2): 90-5. doi:10.1016/S0167-4048(03)00203-7 http://dx.doi.org/10.1016/S0167-4048%2803%2900203-7
    • (2003) Computers and Security , vol.22 , Issue.2 , pp. 90-95
    • Hinde, S.1
  • 183
    • 79953729134 scopus 로고    scopus 로고
    • Theory and Policy in Online Privacy
    • Hinduja, S. (2004) ‘Theory and Policy in Online Privacy’, Knowledge, Technology, and Policy, 17(1): 38-58. doi:10.1007/BF02687075 http://dx.doi.org/10.1007/BF02687075
    • (2004) Knowledge, Technology, and Policy , vol.17 , Issue.1 , pp. 38-58
    • Hinduja, S.1
  • 184
    • 0003991890 scopus 로고
    • Berkeley, CA, University of California Press
    • Hirschi, T. (1969) Causes of Delinquency. Berkeley, CA: University of California Press.
    • (1969) Causes of Delinquency
    • Hirschi, T.1
  • 185
    • 84902021035 scopus 로고    scopus 로고
    • Cyberstalking and Law Enforcement
    • Hitchcock, J. (2003) ‘Cyberstalking and Law Enforcement’, Police Chief Magazine, 70(12), at http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arch&article_id=166&issue_id=122003
    • (2003) Police Chief Magazine , vol.70 , Issue.12
    • Hitchcock, J.1
  • 186
    • 3042612832 scopus 로고    scopus 로고
    • Criminological Psychology
    • M. Maguire, R. Morgan and R. Reiner, 3rd edn, Oxford, Oxford University Press
    • Hollin, C. (2002) ‘Criminological Psychology’, in M. Maguire, R. Morgan and R. Reiner (eds), The Oxford Handbook of Criminology, 3rd edn. Oxford: Oxford University Press.
    • (2002) The Oxford Handbook of Criminology
    • Hollin, C.1
  • 187
    • 84950161354 scopus 로고    scopus 로고
    • The Emperor’s Sword: Art Under WIPO
    • Vienna, Institut für Neue Kulturtechnologien
    • Holmes, B. (2003) ‘The Emperor’s Sword: Art Under WIPO’, in WSIS World Information: Knowledge of Future Culture. Vienna: Institut für Neue Kulturtechnologien.
    • (2003) World Information: Knowledge of Future Culture
    • Holmes, B.1
  • 189
    • 84861240243 scopus 로고    scopus 로고
    • press release 24 May 2002
    • Home Office (2002b) ‘Chipping of Goods Initiative’, press release 24 May 2002, at http://www.homeoffice.gov.uk/docs/pressnotice3.doc
    • (2002) Chipping of Goods Initiative
  • 192
    • 10244252836 scopus 로고    scopus 로고
    • Watching the Web: Thoughts on Expanding Police Surveillance Opportunities under the Cyber-Crime Convention
    • Huey, L. and Rosenberg, R. (2004) ‘Watching the Web: Thoughts on Expanding Police Surveillance Opportunities under the Cyber-Crime Convention’, Canadian Journal of Criminology and Criminal Justice, 46(4): 597-606.
    • (2004) Canadian Journal of Criminology and Criminal Justice , vol.46 , Issue.4 , pp. 597-606
    • Huey, L.1    Rosenberg, R.2
  • 194
    • 0010870825 scopus 로고
    • Moral Panic and the Moral Language in the Media
    • Hunt, A. (1987) ‘Moral Panic and the Moral Language in the Media’, British Journal of Sociology, 48: 629-648. doi:10.2307/591600 http://dx.doi.org/10.2307/591600
    • (1987) British Journal of Sociology , vol.48 , pp. 629-648
    • Hunt, A.1
  • 199
    • 34250853193 scopus 로고    scopus 로고
    • online at
    • ICCC (Internet Crime Complaint Centre) (2004) IC3 2004 Internet Fraud - Crime Report, online at http://www.ifccfbi.gov/strategy/2004_IC3Report.pdf.
    • (2004) IC3 2004 Internet Fraud - Crime Report
  • 201
    • 20144368744 scopus 로고    scopus 로고
    • IFR (Internet Filter Review) (2004) ‘Internet Pornography Statistics’, at http://internet-filter-review.toptenreviews.com/internet-pornography-statistics.html
    • (2004) Internet Pornography Statistics
  • 202
    • 34347244108 scopus 로고    scopus 로고
    • IIPA (International Intellectual Property Alliance) (2005) ‘Statistics’, at http://www.iipa.com/copyrighttrade_issues.html
    • (2005) Statistics
  • 207
    • 49049084356 scopus 로고    scopus 로고
    • URL (consulted March 2005)
    • IPSOS (2004) ‘Online Software Piracy Poll’, URL (consulted March 2005): http://www.ipsos-na.com/news/pressrelease.cfm?id=2452
    • (2004) Online Software Piracy Poll
  • 208
    • 84950104950 scopus 로고    scopus 로고
    • 12 February 2004
    • ITU (International Telecommunications Union) (2004) ‘Statistics at a Glance’, 12 February 2004, at http://www.itu.int/ITUD/ict/statistics/at_glance/Internet02.pdf
    • (2004) Statistics at a Glance
  • 209
    • 84886380836 scopus 로고    scopus 로고
    • IWF (Internet Watch Foundation) (2004) ‘Significant Trends 2003', at http://www.iwf.org.uk/media/page.70.216.htm
    • (2004) Significant Trends 2003
  • 210
    • 84950141038 scopus 로고    scopus 로고
    • Keeping Secrets: International Developments to Protect Undisclosed Business Information and Trade Secrets
    • D. Thomas and B. Loader, London, Routledge
    • Jackson, M. (2000) ‘Keeping Secrets: International Developments to Protect Undisclosed Business Information and Trade Secrets’, in D. Thomas and B. Loader (eds), Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. London: Routledge.
    • (2000) Cybercrime: Law Enforcement, Security and Surveillance in the Information Age
    • Jackson, M.1
  • 211
    • 0042843517 scopus 로고    scopus 로고
    • The Impact of the USA Patriot Act on Collection and Analysis of Personal Information Under the Foreign Intelligence Surveillance Act
    • Jaeger, P., Bertot, J. and McClure, C. (2003) ‘The Impact of the USA Patriot Act on Collection and Analysis of Personal Information Under the Foreign Intelligence Surveillance Act’, Government Information Quarterly, 20: 295-314. doi:10.1016/S0740-624X(03)00057-1 http://dx.doi.org/10.1016/S0740-624X%2803%2900057-1
    • (2003) Government Information Quarterly , vol.20 , pp. 295-314
    • Jaeger, P.1    Bertot, J.2    McClure, C.3
  • 213
    • 0038663891 scopus 로고    scopus 로고
    • Masculinities and Crime
    • M. Maguire, R. Morgan and R. Reiner, Oxford, Oxford University Press
    • Jefferson, T. (1997) ‘Masculinities and Crime’, in M. Maguire, R. Morgan and R. Reiner (eds), The Oxford Handbook of Criminology. Oxford: Oxford University Press.
    • (1997) The Oxford Handbook of Criminology
    • Jefferson, T.1
  • 215
    • 51049086988 scopus 로고    scopus 로고
    • Policing the Filth: The Problems of Investigating Online Child Pornography in England and Wales
    • Jewkes, Y. and Andrews, C. (2005) ‘Policing the Filth: The Problems of Investigating Online Child Pornography in England and Wales’, Policing and Society, 15(1): 42-62. doi:10.1080/1043946042000338922 http://dx.doi.org/10.1080/1043946042000338922
    • (2005) Policing and Society , vol.15 , Issue.1 , pp. 42-62
    • Jewkes, Y.1    Andrews, C.2
  • 216
  • 219
    • 34547110242 scopus 로고    scopus 로고
    • Ways of Owning and Sharing Cultural Property
    • E. Kasten, Berlin, Dietrich Reimer Verlag
    • Kasten, E. (2004) ‘Ways of Owning and Sharing Cultural Property’, in E. Kasten (ed.), Properties of Culture - Culture as Property. Berlin: Dietrich Reimer Verlag.
    • (2004) Properties of Culture - Culture as Property
    • Kasten, E.1
  • 220
    • 84866584454 scopus 로고    scopus 로고
    • Experts Say Terrorists Hiding Message on Web
    • 18 June, at
    • Kelley, J. (2001) ‘Experts Say Terrorists Hiding Message on Web’, USA Today, 18 June, at http://www.usatoday.com/news/washdc/2001-02-05-ejihad.htm
    • (2001) USA Today
    • Kelley, J.1
  • 221
    • 35548955391 scopus 로고    scopus 로고
    • Information, Society and the Panopticon
    • King, L. (2001) ‘Information, Society and the Panopticon’, The Western Journal of Graduate Research, 10(1): 40-50.
    • (2001) The Western Journal of Graduate Research , vol.10 , Issue.1 , pp. 40-50
    • King, L.1
  • 222
    • 0037276453 scopus 로고    scopus 로고
    • An Exploratory Study of Moral Intensity Regarding Software Piracy of Students in Thailand
    • Kini, R., Pamakrishna, H. and Vijayaraman, B. (2003) ‘An Exploratory Study of Moral Intensity Regarding Software Piracy of Students in Thailand’, Behaviour and Information Technology, 22(1): 63-70. doi:10.1080/01449290301784 http://dx.doi.org/10.1080/01449290301784
    • (2003) Behaviour and Information Technology , vol.22 , Issue.1 , pp. 63-70
    • Kini, R.1    Pamakrishna, H.2    Vijayaraman, B.3
  • 224
    • 3843129652 scopus 로고
    • Stalking Laws Proliferate, But Critics Say Constitutional Flaws Also Abound
    • November
    • Kolarik, G-L. (1992) ‘Stalking Laws Proliferate, But Critics Say Constitutional Flaws Also Abound’, American Bar Association Journal, November: 35-6.
    • (1992) American Bar Association Journal , pp. 35-36
    • Kolarik, G.-L.1
  • 225
    • 84950110217 scopus 로고    scopus 로고
    • Disruption, Deterrence and Destruction: Targeting the Traders in Fakes, paper presented at the Anti-Counterfeiting Group (ACG) conference, London, 15 May 2003
    • Kounoupias, N. (2003) ‘Copyright Piracy Disruption, Deterrence and Destruction’, Disruption, Deterrence and Destruction: Targeting the Traders in Fakes, paper presented at the Anti-Counterfeiting Group (ACG) conference, London, 15 May 2003.
    • (2003) Copyright Piracy Disruption, Deterrence and Destruction
    • Kounoupias, N.1
  • 226
    • 0033312965 scopus 로고    scopus 로고
    • Hackers: Freedom Fighters of the 21st Century
    • Kovacich, G. (1999) ‘Hackers: Freedom Fighters of the 21st Century’, Computers and Security, 18(7): 573-76. doi:10.1016/S0167-4048(99)82003-3 http://dx.doi.org/10.1016/S0167-4048%2899%2982003-3
    • (1999) Computers and Security , vol.18 , Issue.7 , pp. 573-576
    • Kovacich, G.1
  • 228
    • 69849099876 scopus 로고
    • Pornography, Sex Crime and Public Policy
    • S. Gerull and B. Halstead, Canberra, Australian Institute of Criminology
    • Kutchinsky, B. (1992) ‘Pornography, Sex Crime and Public Policy’, in S. Gerull and B. Halstead (eds), Sex Industry and Public Policy. Canberra: Australian Institute of Criminology.
    • (1992) Sex Industry and Public Policy
    • Kutchinsky, B.1
  • 229
    • 25444523153 scopus 로고    scopus 로고
    • Legal Constructions of Crime
    • M. Maguire, R. Morgan and R. Reiner, 3rd edition, Oxford, Oxford University Press
    • Lacey, N. (2002) ‘Legal Constructions of Crime’, in M. Maguire, R. Morgan and R. Reiner (eds), The Oxford Handbook of Criminology, 3rd edition. Oxford: Oxford University Press.
    • (2002) The Oxford Handbook of Criminology
    • Lacey, N.1
  • 231
    • 84868535521 scopus 로고    scopus 로고
    • Pornography-Blocking Software May Also Block Health Information Sites
    • Larkin, M. (2002) ‘Pornography-Blocking Software May Also Block Health Information Sites’, The Lancet, 360: 1946. doi:10.1016/S0140-6736(02)11939-8 http://dx.doi.org/10.1016/S0140-6736%2802%2911939-8
    • (2002) The Lancet , vol.360
    • Larkin, M.1
  • 233
    • 84950162014 scopus 로고    scopus 로고
    • Lawson, W. (2002) ‘Too Many Passwords’, at http://www.icdri.org/biometrics/Too%Many%20Passwords.pdf
    • (2002) Too Many Passwords
    • Lawson, W.1
  • 236
    • 84950124892 scopus 로고    scopus 로고
    • Lee, D. (2005) ‘eBay is Fence of the Young’, at http://newsobserver.com/news/v-printer/story/1899135p-8235660c.html
    • (2005) Ebay is Fence of the Young
    • Lee, D.1
  • 237
    • 13744253908 scopus 로고
    • Locke’s Theory of Property
    • Lemos, R. (1975) ‘Locke’s Theory of Property’, Interpretation, 5: 226-44.
    • (1975) Interpretation , vol.5 , pp. 226-244
    • Lemos, R.1
  • 238
    • 0347130162 scopus 로고    scopus 로고
    • The Challenge of Cyberspatial Forms of Human Interaction to Teritorrial Governance and Policing
    • B. Loader, London, Routledge
    • Lenk, K. (1997) ‘The Challenge of Cyberspatial Forms of Human Interaction to Teritorrial Governance and Policing’ in B. Loader (ed.), The Governance of Cyberspace: Politics, Technology and Global Restructuring. London: Routledge.
    • (1997) The Governance of Cyberspace: Politics, Technology and Global Restructuring
    • Lenk, K.1
  • 242
    • 84950147716 scopus 로고    scopus 로고
    • paper presented at the Tenth Conference on Computers, Freedom and Privacy, Toronoto, 6 April 2000, at
    • Litman, J. (2000) ‘The Demonization of Piracy’, paper presented at the Tenth Conference on Computers, Freedom and Privacy, Toronoto, 6 April 2000, at http://www.wayne.edu/litman/papers/demon.pdf
    • (2000) The Demonization of Piracy
    • Litman, J.1
  • 243
    • 77956778176 scopus 로고    scopus 로고
    • Cyberporn and Moral Panic: An Evaluation of Press Reactions to Pornography on the Internet
    • Littlewood, A. (2003) ‘Cyberporn and Moral Panic: An Evaluation of Press Reactions to Pornography on the Internet’, Library and Information Research, 27(86): 8-18.
    • (2003) Library and Information Research , vol.27 , Issue.86 , pp. 8-18
    • Littlewood, A.1
  • 246
    • 0242389921 scopus 로고    scopus 로고
    • Contemporary Landscapes of Crime, Order and Control: Governance, Risk and Globalization
    • M. Maguire, R. Morgan and R. Reiner, 3rd edn, Oxford, Oxford University Press
    • Loader, I. and Sparks, R. (2002) ‘Contemporary Landscapes of Crime, Order and Control: Governance, Risk and Globalization’, in M. Maguire, R. Morgan and R. Reiner (eds), The Oxford Handbook of Criminology, 3rd edn. Oxford: Oxford University Press.
    • (2002) The Oxford Handbook of Criminology
    • Loader, I.1    Sparks, R.2
  • 247
    • 0000027246 scopus 로고
    • Family Factors as Correlates and Predictors of Juvenile Conduct Problems and Delinquency
    • M. Tonry and N. Morris, Chicago, University of Chicago Press
    • Loeber, R. and Stouthamer-Loeber, M. (1986) ‘Family Factors as Correlates and Predictors of Juvenile Conduct Problems and Delinquency’, in M. Tonry and N. Morris (eds), Crime and Justice: An Annual Review of Research, vol. 7. Chicago: University of Chicago Press. doi:10.1086/449112 http://dx.doi.org/10.1086/449112
    • (1986) Crime and Justice: An Annual Review of Research , vol.7
    • Loeber, R.1    Stouthamer-Loeber, M.2
  • 249
    • 49049094558 scopus 로고    scopus 로고
    • URL (consulted March 2005)
    • Love, C. (2000) ‘Love Manifesto’, URL (consulted March 2005): http://www.reznor.com/commentary/loves_manifesto1.html
    • (2000) Love Manifesto
    • Love, C.1
  • 250
    • 0002922955 scopus 로고
    • Stalking Strangers and Lovers: Changing Media Typifications of a New Crime Problem
    • J. Best, New York, Aldine de Gruyter
    • Lowney, K. and Best, J. (1995) ‘Stalking Strangers and Lovers: Changing Media Typifications of a New Crime Problem’, in J. Best (ed.), Images of Issues: Typifying Contemporary Social Problems. New York: Aldine de Gruyter.
    • (1995) Images of Issues: Typifying Contemporary Social Problems
    • Lowney, K.1    Best, J.2
  • 253
    • 65849351005 scopus 로고    scopus 로고
    • Publishing Notoriety: Piracy, Pornography and Oscar Wilde
    • Mackie, G. (2004) ‘Publishing Notoriety: Piracy, Pornography and Oscar Wilde’, University of Toronto Quarterly, 73(4): 980-90. doi:10.3138/utq.73.4.980 http://dx.doi.org/10.3138/utq.73.4.980
    • (2004) University of Toronto Quarterly , vol.73 , Issue.4 , pp. 980-990
    • Mackie, G.1
  • 254
    • 84892635107 scopus 로고    scopus 로고
    • Cambridge MA, Harvard University Press
    • MacKinnon, C. (1996) Only Words. Cambridge MA: Harvard University Press.
    • (1996) Only Words
    • MacKinnon, C.1
  • 255
    • 21244469567 scopus 로고    scopus 로고
    • Crime Statistics: The '"Data Explosion" and Its Implications
    • M. Maguire, R. Morgan and R. Reiner, 3rd edn, Oxford, Oxford University Press
    • Maguire, M. (2002) ‘Crime Statistics: The '"Data Explosion" and Its Implications’, in M. Maguire, R. Morgan and R. Reiner (eds), The Oxford Handbook of Criminology, 3rd edn. Oxford: Oxford University Press.
    • (2002) The Oxford Handbook of Criminology
    • Maguire, M.1
  • 257
    • 79551580658 scopus 로고    scopus 로고
    • 5th edn, Oxford, Oxford University Press
    • Martin, E. (ed.) (2003) Oxford Dictionary of Law, 5th edn. Oxford: Oxford University Press.
    • (2003) Oxford Dictionary of Law
    • Martin, E.1
  • 260
    • 84950134576 scopus 로고    scopus 로고
    • Anatomy of a Virus
    • Thursday 5 February
    • McCandless, D. (2004) ‘Anatomy of a Virus’, The Guardian, Thursday 5 February.
    • (2004) The Guardian
    • McCandless, D.1
  • 261
    • 84950130935 scopus 로고    scopus 로고
    • Multiculturalism, Racism and Hate Speech
    • online at
    • McCormack, T. (1998) ‘Multiculturalism, Racism and Hate Speech’, Institute for Social Research Newsletter, 13(1), online at http://www.math.yorku.ca/ISR/newsletter/multi_racism_hate.htm
    • (1998) Institute for Social Research Newsletter , vol.13 , Issue.1
    • McCormack, T.1
  • 263
    • 0037408425 scopus 로고    scopus 로고
    • When Creators, Corporations and Consumers Collide: Napster and the Development of On-Line Music Distribution
    • McCourt, T. and Burkart, P. (2003) ‘When Creators, Corporations and Consumers Collide: Napster and the Development of On-Line Music Distribution’, Media, Culture and Society, 25(3): 333-50. doi:10.1177/0163443703025003003 http://dx.doi.org/10.1177/0163443703025003003
    • (2003) Media, Culture and Society , vol.25 , Issue.3 , pp. 333-350
    • McCourt, T.1    Burkart, P.2
  • 264
    • 84891395253 scopus 로고    scopus 로고
    • Bin Laden: Steganography Master?
    • 7 February, at
    • McCullagh, D. (2001) ‘Bin Laden: Steganography Master?', Wired, 7 February, at http://www.wired.com/news/politics/0,1283,41658,00.html
    • (2001) Wired
    • McCullagh, D.1
  • 266
    • 36949024777 scopus 로고    scopus 로고
    • An Exploration of Predatory Behaviour in Cyberspace: Towards a Typology of Cyberstalkers
    • McFarlane, L. and Bocij, P. (2003) ‘An Exploration of Predatory Behaviour in Cyberspace: Towards a Typology of Cyberstalkers’, First Monday, 8(9), at http://www.firstmonday.org/issues/issue8_9/mcfarlance/index.html
    • (2003) First Monday , vol.8 , Issue.9
    • McFarlane, L.1    Bocij, P.2
  • 267
    • 0033771686 scopus 로고    scopus 로고
    • Legal and Psychological Aspects of Stalking: A Review
    • McGuire, B. and Wraith, A. (2000) ‘Legal and Psychological Aspects of Stalking: A Review’, The Journal of Forensic Psychiatry, 11(2): 316-27. doi:10.1080/09585180050142543 http://dx.doi.org/10.1080/09585180050142543
    • (2000) The Journal of Forensic Psychiatry , vol.11 , Issue.2 , pp. 316-327
    • McGuire, B.1    Wraith, A.2
  • 268
    • 84905623654 scopus 로고    scopus 로고
    • Wrestling (Racial) Equality from Tolerance of Hate Speech
    • McGonagle, T. (2001) ‘Wrestling (Racial) Equality from Tolerance of Hate Speech’, Dublin University Law Journal, 23: 21-54.
    • (2001) Dublin University Law Journal , vol.23 , pp. 21-54
    • McGonagle, T.1
  • 272
    • 77954574218 scopus 로고    scopus 로고
    • Hacktivism: Securing the National Infrastructure
    • Milone, M. (2003) ‘Hacktivism: Securing the National Infrastructure’, Knowledge, Technology and Policy, 16(1): 75-103. doi:10.1007/s12130-003-1017-5 http://dx.doi.org/10.1007/s12130-003-1017-5
    • (2003) Knowledge, Technology and Policy , vol.16 , Issue.1 , pp. 75-103
    • Milone, M.1
  • 277
    • 44749089016 scopus 로고    scopus 로고
    • The U.S. Supreme Court Addresses the Child Pornography Prevention Act and Child Online Protection Act in Ashcroft v. Free Speech Coalition and Ashcroft v. American Civil Liberties Union
    • Mota, S. (2003) ‘The U.S. Supreme Court Addresses the Child Pornography Prevention Act and Child Online Protection Act in Ashcroft v. Free Speech Coalition and Ashcroft v. American Civil Liberties Union’, Federal Communications Law Journal, 55(1): 85-98.
    • (2003) Federal Communications Law Journal , vol.55 , Issue.1 , pp. 85-98
    • Mota, S.1
  • 280
    • 49049100178 scopus 로고    scopus 로고
    • URL (consulted March 2005)
    • MPAA (2005) ‘Anti-Piracy’, URL (consulted March 2005): http://www.mpaa.org/anti-piracy/
    • (2005) Anti-Piracy
  • 282
    • 0035096515 scopus 로고    scopus 로고
    • Stalking: New Constructions of Human Behaviour
    • Mullen, P., Pathé, M. and Purcell, R. (2001) ‘Stalking: New Constructions of Human Behaviour’, Australian and New Zealand Journal of Psychiatry, 35: 9-16. doi:10.1046/j.1440-1614.2001.00849.x http://dx.doi.org/10.1046/j.1440-1614.2001.00849.x
    • (2001) Australian and New Zealand Journal of Psychiatry , vol.35 , pp. 9-16
    • Mullen, P.1    Pathé, M.2    Purcell, R.3
  • 284
  • 290
    • 84950117880 scopus 로고    scopus 로고
    • NHTCU National Hi-Tech Crime Unit (2004) ‘What is Hi-Tech Crime?', at http://www.nhtcu.org./nqcontent.cfm?a_id=12334&tt=nhtcu
    • (2004) What is Hi-Tech Crime?
  • 291
    • 0036311962 scopus 로고    scopus 로고
    • Subtle, Pervasing, Harm: Racist and Sexist Remarks in Public as Hate Speech
    • Nielsen, L. (2002) ‘Subtle, Pervasing, Harm: Racist and Sexist Remarks in Public as Hate Speech’, Journal of Social Issues, 58(2): 265-280. doi:10.1111/1540-4560.00260 http://dx.doi.org/10.1111/1540-4560.00260
    • (2002) Journal of Social Issues , vol.58 , Issue.2 , pp. 265-280
    • Nielsen, L.1
  • 294
    • 0003930077 scopus 로고    scopus 로고
    • available online
    • NUA Internet Statistics (2003) ‘How Many Online?', available online at http://www.nua.ie/surveys/how_many_online/
    • (2003) How Many Online?
  • 295
    • 27644480164 scopus 로고    scopus 로고
    • The Information Technology and Telecommunications Security Imperative: Important Issues and Drivers
    • Nugent, J. and Raisinghani, M. (2002) ‘The Information Technology and Telecommunications Security Imperative: Important Issues and Drivers’, Journal of Electronic Commerce Research, 3(1): 1-14.
    • (2002) Journal of Electronic Commerce Research , vol.3 , Issue.1 , pp. 1-14
    • Nugent, J.1    Raisinghani, M.2
  • 298
    • 36349001044 scopus 로고    scopus 로고
    • Trends and Issues in Criminal Justice, № 166, Canberra, Australia Institute of Criminology
    • Ogilvie, E. (2000) Cyberstalking, Trends and Issues in Criminal Justice, № 166. Canberra: Australia Institute of Criminology.
    • (2000) Cyberstalking
    • Ogilvie, E.1
  • 300
    • 29444438546 scopus 로고    scopus 로고
    • The Commons Concept and Intellectual Property Rights. Regime: Whither Plant Genetic Resources and Traditional Knowledge?
    • Onwuekwe, C. (2004) ‘The Commons Concept and Intellectual Property Rights. Regime: Whither Plant Genetic Resources and Traditional Knowledge?', Pierce Law Review, 2(1): 65-90.
    • (2004) Pierce Law Review , vol.2 , Issue.1 , pp. 65-90
    • Onwuekwe, C.1
  • 301
    • 84950162986 scopus 로고    scopus 로고
    • 1 May
    • Oser, K. (2003) ‘Data Intelligence’, 1 May, at http://directmag.com/datalist/marketing_data_intelligence/
    • (2003) Data Intelligence
    • Oser, K.1
  • 304
    • 84950155151 scopus 로고
    • Introduction
    • D., Paletz and A. Schmid, Newbury Park, CA, Sage
    • Paletz, D. and Vinson, C. (1992) ‘Introduction’, in D., Paletz and A. Schmid (eds), Terrorism and the Media. Newbury Park, CA: Sage.
    • (1992) Terrorism and the Media
    • Paletz, D.1    Vinson, C.2
  • 307
    • 0034818913 scopus 로고    scopus 로고
    • Trends in Cybercrime - An Overview of Current Financial Crimes on the Internet
    • Philippsohn, S. (2001) ‘Trends in Cybercrime - An Overview of Current Financial Crimes on the Internet’, Computers and Security, 20: 53-69. doi:10.1016/S0167-4048(01)01021-5 http://dx.doi.org/10.1016/S0167-4048%2801%2901021-5
    • (2001) Computers and Security , vol.20 , pp. 53-69
    • Philippsohn, S.1
  • 308
    • 84950135442 scopus 로고    scopus 로고
    • Play It Cybersafe (2005) ‘Parents’ and Teacher’s Guide’, at http://www.playitcyber-safe.com/pdfs/TG-copyrightCrusader-2005.pdf
    • (2005) Parents’ and Teacher’s Guide
  • 311
    • 84950137443 scopus 로고    scopus 로고
    • 23 September
    • Prigg, M. (2004) ‘Police Alert Over Stolen Goods on eBay’, 23 September, at http://www.thisismoney.co.uk/news/article.html?in_article_id=317003&in_page_id=2
    • (2004) Police Alert Over Stolen Goods on eBay
    • Prigg, M.1
  • 313
    • 70349697871 scopus 로고    scopus 로고
    • RAC (Royal Automobile Club) (2003) ‘Road Traffic Accident Statistics’, at http://www.rac.co.uk/web/personalinjuryclaims/claim_categories/road_traffic_accidents/statistics
    • (2003) Road Traffic Accident Statistics
  • 316
    • 75349101791 scopus 로고    scopus 로고
    • Encryption, Anonymity and Markets: Law Enfor\ and Technology in a Free Market World
    • D. Thomas and B. Loader, London, Routledge
    • Reitinger, P. (2000) ‘Encryption, Anonymity and Markets: Law Enfor\ and Technology in a Free Market World’, in D. Thomas and B. Loader (eds), Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. London: Routledge.
    • (2000) Cybercrime: Law Enforcement, Security and Surveillance in the Information Age
    • Reitinger, P.1
  • 317
    • 0012828167 scopus 로고    scopus 로고
    • Cybercrimes of the 21st Century
    • Riem, A. (2001) ‘Cybercrimes of the 21st Century’, Computer Fraud and Security, 4: 7-8.
    • (2001) Computer Fraud and Security , vol.4 , pp. 7-8
    • Riem, A.1
  • 318
    • 0000052745 scopus 로고    scopus 로고
    • Assessment Typology and Intervention with the Survivors of Stalking
    • Roberts, A. and Dziegielewski, S. (1996) ‘Assessment Typology and Intervention with the Survivors of Stalking’, Aggression and Violent Behaviour, 1(4): 359-68. doi:10.1016/S1359-1789(96)00011-0 http://dx.doi.org/10.1016/S1359-1789%2896%2900011-0
    • (1996) Aggression and Violent Behaviour , vol.1 , Issue.4 , pp. 359-368
    • Roberts, A.1    Dziegielewski, S.2
  • 320
    • 33845227601 scopus 로고    scopus 로고
    • Rogerson, M. and Pease, K. (2004) ‘Privacy, Identity and Crime Prevention’, at http://www.foresight.gov.uk/previous_projects/Cyber_Trust_and_Crime_Prevention/Reports_and_Publications/Privacy_Identity_and_Crime_Prevention/Michelle_Ken.pdf
    • (2004) Privacy, Identity and Crime Prevention
    • Rogerson, M.1    Pease, K.2
  • 321
    • 84920857585 scopus 로고    scopus 로고
    • Net Firms Led Killer to Victim
    • 4-5 December
    • Romei, S. (1999) ‘Net Firms Led Killer to Victim’, The Australian, 4-5 December: 19-22.
    • (1999) The Australian , pp. 19-22
    • Romei, S.1
  • 322
    • 84922602990 scopus 로고    scopus 로고
    • Strategies to Tackle Racism and Xenophobia on the Internet - Where Are We in Europe?
    • Rorive, I. (2002) ‘Strategies to Tackle Racism and Xenophobia on the Internet - Where Are We in Europe?', International Journal of Communications Law and Policy, 7: 1-10. doi:10.1207/S15326926CLP0701_01 http://dx.doi.org/10.1207/S15326926CLP0701_01
    • (2002) International Journal of Communications Law and Policy , vol.7 , pp. 1-10
    • Rorive, I.1
  • 323
    • 0347014877 scopus 로고    scopus 로고
    • Government and Control
    • Rose, N. (2000) ‘Government and Control’, British Journal of Criminology, 40: 321-339. doi:10.1093/bjc/40.2.321 http://dx.doi.org/10.1093/bjc/40.2.321
    • (2000) British Journal of Criminology , vol.40 , pp. 321-339
    • Rose, N.1
  • 326
    • 3042669232 scopus 로고    scopus 로고
    • Spinning the Web of Hate: Web-Based Hate Propogation by Extremist Organizations
    • Schaffer, J. (2002) ‘Spinning the Web of Hate: Web-Based Hate Propogation by Extremist Organizations’, Journal of Criminal Justice and Popular Culture, 9(2): 69-88.
    • (2002) Journal of Criminal Justice and Popular Culture , vol.9 , Issue.2 , pp. 69-88
    • Schaffer, J.1
  • 327
    • 0009751112 scopus 로고
    • The Response Problem as a Definition Problem
    • A. Scmid and R. Crelinsten, London, Frank Cass
    • Schmid, A. (1993) ‘The Response Problem as a Definition Problem’, in A. Scmid and R. Crelinsten (eds), Western Responses to Terrorism. London: Frank Cass.
    • (1993) Western Responses to Terrorism
    • Schmid, A.1
  • 332
    • 34547776747 scopus 로고    scopus 로고
    • Organized Crime, Terrorism and Cybercrime
    • A. Bryden and P. Fluri, Baden-Baden, Nomos Verlagsgesellschaft
    • Shelley, L. (2003) ‘Organized Crime, Terrorism and Cybercrime’, in A. Bryden and P. Fluri (eds), Security Sector Reform: Institutions, Society and Good Governance. Baden-Baden: Nomos Verlagsgesellschaft.
    • (2003) Security Sector Reform: Institutions, Society and Good Governance
    • Shelley, L.1
  • 335
    • 0012186120 scopus 로고    scopus 로고
    • Cyber-Crimes: A Practical Approach to the Application of Federal Computer Crime Laws
    • Sinrod, E. and Reilly, W. (2000) ‘Cyber-Crimes: A Practical Approach to the Application of Federal Computer Crime Laws’, Santa Clara Computer and High Technology Law Journal, 16(2): 1-53.
    • (2000) Santa Clara Computer and High Technology Law Journal , vol.16 , Issue.2 , pp. 1-53
    • Sinrod, E.1    Reilly, W.2
  • 338
    • 0009854060 scopus 로고    scopus 로고
    • Australian Institute of Criminology Trends and Issues in Crime and Criminal Justice Paper №121., Canberra, AIT
    • Smith, R., Holmes, M. and Kaufmann, P. (1999) ‘Nigerian Advanced Fee Fraud’, Australian Institute of Criminology Trends and Issues in Crime and Criminal Justice Paper №121. Canberra: AIT.
    • (1999) Nigerian Advanced Fee Fraud
    • Smith, R.1    Holmes, M.2    Kaufmann, P.3
  • 339
    • 0035532912 scopus 로고    scopus 로고
    • Sites of Criminality and Sites of Governance
    • Snyder, F. (2001) ‘Sites of Criminality and Sites of Governance’, Social and Legal Studies, 10: 251-6.
    • (2001) Social and Legal Studies , vol.10 , pp. 251-256
    • Snyder, F.1
  • 343
    • 84998068436 scopus 로고    scopus 로고
    • The Tactical Topography of Stalking Victimization and Management
    • Spitzberg, B. (2002) ‘The Tactical Topography of Stalking Victimization and Management’, Trauma Violence and Abuse, 3(4): 261-88. doi:10.1177/1524838002237330 http://dx.doi.org/10.1177/1524838002237330
    • (2002) Trauma Violence and Abuse , vol.3 , Issue.4 , pp. 261-288
    • Spitzberg, B.1
  • 346
    • 84950136872 scopus 로고    scopus 로고
    • Hate Speech
    • Y. Akdeniz, C. Walker and D. Wall, Harlow, Longman
    • Steinhardt, B. (2000) ‘Hate Speech’, in Y. Akdeniz, C. Walker and D. Wall (eds), The Internet, Law and Society. Harlow: Longman.
    • (2000) The Internet, Law and Society
    • Steinhardt, B.1
  • 348
    • 33645996790 scopus 로고    scopus 로고
    • Burn Berne: Why the Leading International Copyright Convention Must Be Replaced
    • Story, A. (2003) ‘Burn Berne: Why the Leading International Copyright Convention Must Be Replaced’, Houston Law Review, 40(3): 763-801.
    • (2003) Houston Law Review , vol.40 , Issue.3 , pp. 763-801
    • Story, A.1
  • 351
    • 55349137921 scopus 로고    scopus 로고
    • Don’t Shoot the Messenger?
    • The UK and Online Intermediary Liability
    • Sutter, G. (2003) ‘Don’t Shoot the Messenger?’ The UK and Online Intermediary Liability’, International Review of Law, Computers and Technology, 17(1): 73-84. doi:10.1080/1360086032000063138 http://dx.doi.org/10.1080/1360086032000063138
    • (2003) International Review of Law, Computers and Technology , vol.17 , Issue.1 , pp. 73-84
    • Sutter, G.1
  • 354
    • 84950152751 scopus 로고    scopus 로고
    • Google’s New E-mail Service Sparks Privacy Concerns
    • July/August
    • Swartz, N. (2004a) ‘Google’s New E-mail Service Sparks Privacy Concerns’, The Information Management Journal, July/August: 6-7.
    • (2004) The Information Management Journal , pp. 6-7
    • Swartz, N.1
  • 355
    • 84950114050 scopus 로고    scopus 로고
    • Patriot Act Provision Ruled Unconstitutional
    • November/December
    • Swartz, N. (2004b) ‘Patriot Act Provision Ruled Unconstitutional’, The Information Management Journal, November/December: 6.
    • (2004) The Information Management Journal , pp. 6
    • Swartz, N.1
  • 356
    • 0012544108 scopus 로고    scopus 로고
    • New York, St. Martin’s Press
    • Sykes, C. (1999) The End of Privacy. New York: St. Martin’s Press.
    • (1999) The End of Privacy
    • Sykes, C.1
  • 357
    • 0001155759 scopus 로고
    • Techniques of Neutralization: A Theory of Delinquency
    • Sykes, G. and Matza, D. (1957) ‘Techniques of Neutralization: A Theory of Delinquency’, American Sociological Review, 22: 664-70. doi:10.2307/2089195 http://dx.doi.org/10.2307/2089195
    • (1957) American Sociological Review , vol.22 , pp. 664-670
    • Sykes, G.1    Matza, D.2
  • 358
    • 0002335673 scopus 로고    scopus 로고
    • Child Pornography: The Internet and Offending
    • Taylor, M., Quayle, E. and Holland, G. (2001) ‘Child Pornography: The Internet and Offending’, Recherche sur les Politiques, 2(2): 94-100.
    • (2001) Recherche sur les Politiques , vol.2 , Issue.2 , pp. 94-100
    • Taylor, M.1    Quayle, E.2    Holland, G.3
  • 362
    • 27644449111 scopus 로고    scopus 로고
    • Maestros or Misogynists? Gender and the Social Construction of Hacking
    • Y. Jewkes, Cullompton, Willan
    • Taylor, P. (2003) ‘Maestros or Misogynists? Gender and the Social Construction of Hacking’, in Y. Jewkes (ed.), Dot.cons: Crime, Deviance and Identity on the Internet. Cullompton: Willan.
    • (2003) Dot.cons: Crime, Deviance and Identity on the Internet
    • Taylor, P.1
  • 363
    • 84950114021 scopus 로고    scopus 로고
    • Hacktivism - Resistance is Fertile?
    • C. Sumner, Oxford, Blackwell
    • Taylor, P. (2004a) ‘Hacktivism - Resistance is Fertile?', in C. Sumner (ed.), The Blackwell Companion to Criminology. Oxford: Blackwell.
    • (2004) The Blackwell Companion to Criminology
    • Taylor, P.1
  • 364
    • 84950109751 scopus 로고    scopus 로고
    • Keyboard Protest: Hacktivist Spiders on the Web
    • J. Carter and D. Moreland, Cheltenham, New Clarion Press
    • Taylor, P. (2004b) ‘Keyboard Protest: Hacktivist Spiders on the Web’, in J. Carter and D. Moreland (eds), Anti-Capitalist Britain. Cheltenham: New Clarion Press.
    • (2004) Anti-Capitalist Britain
    • Taylor, P.1
  • 367
    • 84950150333 scopus 로고
    • The Conscience of a Hacker
    • Volume One, Phile 3 of 10, at
    • The Mentor (1986) ‘The Conscience of a Hacker’, Phrack Inc., Volume One, Issue 7, Phile 3 of 10, at http://www.mala.bc.ca/~soules/media112/hacker.htm.
    • (1986) Phrack Inc , Issue.7
  • 369
    • 84950146275 scopus 로고    scopus 로고
    • 10 May
    • The Register (2004) ‘Hate Websites Continue to Flourish’, 10 May, at http://www.theregister.co.uk/2004/05/10/hate_websites_flourish/
    • (2004) Hate Websites Continue to Flourish
  • 371
    • 84950118206 scopus 로고    scopus 로고
    • Notes from the Underground: Hackers as Watchdogs of Industry
    • 4 April 2002, at
    • Thomas, D. (2002) ‘Notes from the Underground: Hackers as Watchdogs of Industry’, Online Journalism Review, 4 April 2002, at http://www.ojr.org/ojr/business/p1017969515.php
    • (2002) Online Journalism Review
    • Thomas, D.1
  • 372
    • 0004107609 scopus 로고    scopus 로고
    • Introduction - Cybercrime: Law Enforcement, Security and Surveillance in the Information Age
    • D. Thomas and B Loader, London, Routledge
    • Thomas, D. and Loader, B. (2000a) ‘Introduction - Cybercrime: Law Enforcement, Security and Surveillance in the Information Age’, in D. Thomas and B Loader (eds), Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. London: Routledge.
    • (2000) Cybercrime: Law Enforcement, Security and Surveillance in the Information Age
    • Thomas, D.1    Loader, B.2
  • 375
    • 35948941103 scopus 로고    scopus 로고
    • U.S. Government Still Mining Data
    • July/August
    • TIMJ (2004) ‘U.S. Government Still Mining Data’, The In formation Management Journal, July/August: 7-8.
    • (2004) The In formation Management Journal , pp. 7-8
  • 376
    • 75349113939 scopus 로고    scopus 로고
    • Hate Speech Online: Restricted or Protected? Comparison of Regulations in the United States and Germany
    • Timofeeva, Y. (2003) ‘Hate Speech Online: Restricted or Protected? Comparison of Regulations in the United States and Germany’, Journal of Transnational Law and Policy, 12(2): 253-86.
    • (2003) Journal of Transnational Law and Policy , vol.12 , Issue.2 , pp. 253-286
    • Timofeeva, Y.1
  • 377
    • 33748932629 scopus 로고    scopus 로고
    • The Crime of Stalking: How Big is the Problem?
    • November, Washington, DC, National Institute of Justice
    • Tjaden, R. (1997) ‘The Crime of Stalking: How Big is the Problem?', National Institute of Justice Research Review, November. Washington, DC: National Institute of Justice.
    • (1997) National Institute of Justice Research Review
    • Tjaden, R.1
  • 378
    • 0007135068 scopus 로고    scopus 로고
    • Prevalence, Incidence, and Consequences of Violence Against Women: Findings From the National Violence Against Women Survey
    • November., Washington, DC, National Institute of Justice
    • Tjaden, R. and Thoennes, N. (1998) ‘Prevalence, Incidence, and Consequences of Violence Against Women: Findings From the National Violence Against Women Survey’, National Institute of Justice: Research in Brief, November. Washington, DC: National Institute of Justice.
    • (1998) National Institute of Justice: Research in Brief
    • Tjaden, R.1    Thoennes, N.2
  • 380
    • 84950147640 scopus 로고    scopus 로고
    • Internet Banks "in Denial" on Hacking thefts
    • 19 April
    • Travis, A. (2001) ‘Internet Banks "in Denial" on Hacking thefts’, The Guardian, 19 April.
    • (2001) The Guardian
    • Travis, A.1
  • 385
    • 84950125525 scopus 로고    scopus 로고
    • BBC News, 14 November 2003, at
    • Twist, J. (2003) ‘Cracking the Hacker Underground’, BBC News, 14 November 2003, at http://news.bbc.co.uk/go/pr/-/1/hi/technology/3246375.htm
    • (2003) Cracking the Hacker Underground
    • Twist, J.1
  • 386
    • 84950159611 scopus 로고    scopus 로고
    • UK Parliament (2002) Hansard, 377 (75), at: http://www.publications.parliament.uk/pa/cm200102/cmhansrd/vo020108/text/20108w61.htm
    • (2002) Hansard , vol.377 , Issue.75
  • 389
    • 57349134681 scopus 로고    scopus 로고
    • Department of State Publication 10465, Washington, DC, State Department
    • U.S. Department of State (1997) Nigerian Advanced Fee Fraud. Department of State Publication 10465. Washington, DC: State Department.
    • (1997) Nigerian Advanced Fee Fraud
  • 392
    • 84887746285 scopus 로고    scopus 로고
    • report presented to the U.S. Senate Committee on Commerce, Science and Transportation, on behalf of the MPAA, 28 February 2002. Available online at
    • Valenti, J. (2002) ‘If You Cannot Protect What You Own, You Don’t Own Anything’, report presented to the U.S. Senate Committee on Commerce, Science and Transportation, on behalf of the MPAA, 28 February 2002. Available online at http://www.mpaa.org/jack/2002/2002_02_28b.htm
    • (2002) If You Cannot Protect What You Own, You Don’t Own Anything
    • Valenti, J.1
  • 393
    • 3242699141 scopus 로고    scopus 로고
    • testimony to the Subcommittee on Courts, The Internet, and Intellectual Property, U.S. House of Representatives, 13 March 2003
    • Valenti, J. (2003) ‘International Copyright Piracy: Links to Organized Crime and Terrorism’, testimony to the Subcommittee on Courts, The Internet, and Intellectual Property, U.S. House of Representatives, 13 March 2003, at http://www.mpaaa.org/jack/2003/2003_03_13B.htm
    • (2003) International Copyright Piracy: Links to Organized Crime and Terrorism
    • Valenti, J.1
  • 395
    • 34748886377 scopus 로고    scopus 로고
    • Hacktivists or Cyberterrorists? The Changing Media Discourse on Hacking
    • October. Online at
    • Vegh, S. (2002) ‘Hacktivists or Cyberterrorists? The Changing Media Discourse on Hacking’, First Monday, 7, 10, October. Online at http://firstmonday.org/issues/issue7_10/vegh/index.html
    • (2002) First Monday , vol.7 , Issue.10
    • Vegh, S.1
  • 400
    • 84919506928 scopus 로고    scopus 로고
    • Global Focus on Cybercrime
    • Wales, E. (2001) ‘Global Focus on Cybercrime’, Computer Fraud and Security, (1): 6-6(1). doi:10.1016/S1361-3723(01)01012-0 http://dx.doi.org/10.1016/S1361-3723%2801%2901012-0
    • (2001) Computer Fraud and Security , Issue.1 , pp. 6
    • Wales, E.1
  • 401
    • 0008701752 scopus 로고    scopus 로고
    • Y. Akdeniz, C. Walker and D. Wall, Harlow, Longman
    • Walker, C., Wall, D. and Akdeniz, Y. (2000) ‘The Internet, Law and Society’, in Y. Akdeniz, C. Walker and D. Wall (eds), The Internet, Law and Society. Harlow: Longman.
    • (2000) The Internet, Law and Society
    • Walker, C.1    Wall, D.2    Akdeniz, Y.3
  • 403
    • 33846041841 scopus 로고    scopus 로고
    • Cybercrimes and the Internet
    • D. Wall, London, Routledge
    • Wall, D. (2001a) ‘Cybercrimes and the Internet’, in D. Wall (ed.), Crime and the Internet. London: Routledge.
    • (2001) Crime and the Internet
    • Wall, D.1
  • 404
    • 58049181925 scopus 로고    scopus 로고
    • Maintaining Order and Law on the Internet
    • D. Wall, London, Routledge
    • Wall, D. (2001b) ‘Maintaining Order and Law on the Internet’, in D. Wall (ed.), Crime and the Internet. London: Routledge.
    • (2001) Crime and the Internet
    • Wall, D.1
  • 407
    • 58049139846 scopus 로고    scopus 로고
    • Hacking, Viruses and Fraud
    • Y. Akdeniz, C. Walker and D. Wall, Harlow, Longman
    • Wasik, M. (2000) ‘Hacking, Viruses and Fraud’, in Y. Akdeniz, C. Walker and D. Wall (eds), The Internet, Law and Society. Harlow: Longman.
    • (2000) The Internet, Law and Society
    • Wasik, M.1
  • 409
    • 79956134837 scopus 로고    scopus 로고
    • The Banality of Evil and the First Amendment
    • Wendel, W. (2004) ‘The Banality of Evil and the First Amendment’, Michigan Law Review, 102: 1404-22. doi:10.2307/4141951 http://dx.doi.org/10.2307/4141951
    • (2004) Michigan Law Review , vol.102 , pp. 1404-1422
    • Wendel, W.1
  • 410
    • 84950148236 scopus 로고    scopus 로고
    • United States Institute of Peace, Special Report 116., Washington, DC, USIP
    • Weimann, G. (2004) http://www.terror.net, United States Institute of Peace, Special Report 116. Washington, DC: USIP.
    • (2004)
    • Weimann, G.1
  • 413
  • 414
    • 84950122753 scopus 로고    scopus 로고
    • Protecting our Children from Internet Smut: Moral Duty or Moral Panic?
    • Wilkins, J. (1997) ‘Protecting our Children from Internet Smut: Moral Duty or Moral Panic?', The Humanist, 57(5): 4.
    • (1997) The Humanist , vol.57 , Issue.5 , pp. 4
    • Wilkins, J.1
  • 418
    • 75349105286 scopus 로고    scopus 로고
    • paper presented at the OSCE Meeting on the Relationship Between Racist, Xenophobic and Anti-Semitic Propoganda on the Internet and Hate Crimes, Paris, 16-17 June
    • Wolf, C. (2004) ‘Regulating Hate Speech Qua Speech is Not the Solution to the Epidemic of Hate on the Internet’, paper presented at the OSCE Meeting on the Relationship Between Racist, Xenophobic and Anti-Semitic Propoganda on the Internet and Hate Crimes, Paris, 16-17 June.
    • (2004) Regulating Hate Speech Qua Speech is Not the Solution to the Epidemic of Hate on the Internet
    • Wolf, C.1
  • 419
    • 1442310828 scopus 로고    scopus 로고
    • Hackers: Militants or Merry Pranksters? A Content Analysis of Defaced Web Pages
    • Woo, H., Kim, Y. and Dominisk, J. (2004) ‘Hackers: Militants or Merry Pranksters? A Content Analysis of Defaced Web Pages’, Media Psychology, 6: 63-82. doi:10.1207/s1532785xmep0601_3 http://dx.doi.org/10.1207/s1532785xmep0601_3
    • (2004) Media Psychology , vol.6 , pp. 63-82
    • Woo, H.1    Kim, Y.2    Dominisk, J.3
  • 420
    • 84950131313 scopus 로고    scopus 로고
    • PC Users Warned Over New Mydoom Threat
    • 10 February 2004
    • Wright, G. (2004) ‘PC Users Warned Over New Mydoom Threat’, The Guardian, 10 February 2004.
    • (2004) The Guardian
    • Wright, G.1
  • 421
    • 84919553300 scopus 로고    scopus 로고
    • Biometrics The Next Phase in Network Security
    • 28 September
    • Wright, H. (1998) ‘Biometrics The Next Phase in Network Security’, NZ Infotech Weekly, 28 September: 10.
    • (1998) NZ Infotech Weekly , pp. 10
    • Wright, H.1
  • 423
    • 25444520749 scopus 로고    scopus 로고
    • The Global Epidemic of Movie "Piracy": Crime-Wave or Social Construction?
    • Yar, M. (2005) ‘The Global Epidemic of Movie "Piracy": Crime-Wave or Social Construction?', Media, Culture and Society, 27(1): 677-96. doi:10.1177/0163443705055723 http://dx.doi.org/10.1177/0163443705055723
    • (2005) Media, Culture and Society , vol.27 , Issue.1 , pp. 677-696
    • Yar, M.1
  • 424
    • 0010936055 scopus 로고
    • The Role of the Police as Amplifiers of Deviancy, Negotiators of Reality and Translators of Fantasy
    • S. Cohen, Harmondsworth, Penguin
    • Young, J. (1971) ‘The Role of the Police as Amplifiers of Deviancy, Negotiators of Reality and Translators of Fantasy’, in S. Cohen (ed.), Images of Deviance. Harmondsworth: Penguin.
    • (1971) Images of Deviance
    • Young, J.1
  • 425
    • 3042869109 scopus 로고    scopus 로고
    • Internet Addiction: The Emergence of a New Clinical Disorder
    • Young, K. (1998) ‘Internet Addiction: The Emergence of a New Clinical Disorder’, CyberPsychology and Behavior, 1(3): 237-44. doi:10.1089/cpb.1998.1.237 http://dx.doi.org/10.1089/cpb.1998.1.237
    • (1998) CyberPsychology and Behavior , vol.1 , Issue.3 , pp. 237-244
    • Young, K.1
  • 426
    • 0033374866 scopus 로고    scopus 로고
    • Cyber Disorders: The Mental Health Concern for the New Millennium
    • Young, K., Pistner, M. and O’Mara, J. (1999) ‘Cyber Disorders: The Mental Health Concern for the New Millennium’, CyberPsychology and Behavior, 2(5): 475-79. doi:10.1089/cpb.1999.2.475 http://dx.doi.org/10.1089/cpb.1999.2.475
    • (1999) CyberPsychology and Behavior , vol.2 , Issue.5 , pp. 475-479
    • Young, K.1    Pistner, M.2    O’Mara, J.3
  • 427
    • 84950126806 scopus 로고    scopus 로고
    • 25 February, at
    • ZDNet (2005) ‘Man Charged with Selling Dinosaur Fossils on eBay’, 25 February, at http://news.zdnet.com/2100-1040-22-5590529.html?part=rss&tag=feed&subj=zdnet
    • (2005) Man Charged with Selling Dinosaur Fossils on eBay


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.