-
3
-
-
84950160991
-
-
2 February, at
-
ABC Newsonline (2005) ‘Seller Charged Over Stolen Goods on eBay’, 2 February, at http://www.abc.net.au/news/newsitems/200502/s1294115.htm
-
(2005)
Seller Charged Over Stolen Goods on eBay
-
-
-
4
-
-
84950110906
-
-
ALA (American Library Association) (2004) ‘ALA Intellectual Freedom Committee Report to Council’, at http://www.ala.org/ala/oif/ifgroups/ifcommittee/ifcinaction/ifcreports/ifcreportac04.pdf
-
(2004)
ALA Intellectual Freedom Committee Report to Council
-
-
-
5
-
-
23844435126
-
Secured and Sorted Mobilities: Examples from the Airport
-
Adey, P. (2004) ‘Secured and Sorted Mobilities: Examples from the Airport’, Surveillance and Society, 1(4): 500-19.
-
(2004)
Surveillance and Society
, vol.1
, Issue.4
, pp. 500-519
-
-
Adey, P.1
-
6
-
-
14244273295
-
Computer Pornography: A Comparative Study of the US and UK Obscenity Laws and Child Pornography Laws in Relation to the Internet
-
Akdeniz, Y. (1996) ‘Computer Pornography: A Comparative Study of the US and UK Obscenity Laws and Child Pornography Laws in Relation to the Internet’, International Review of Law, Computers and Technology, 10(2): 235-62. doi:10.1080/13600869.1996.9966445 http://dx.doi.org/10.1080/13600869.1996.9966445
-
(1996)
International Review of Law, Computers and Technology
, vol.10
, Issue.2
, pp. 235-262
-
-
Akdeniz, Y.1
-
8
-
-
0010072762
-
Child Pornography
-
Y. Akdeniz, C. Walker and D. Wall, Harlow, Longman
-
Akdeniz, Y. (2000) ‘Child Pornography’, in Y. Akdeniz, C. Walker and D. Wall (eds), The Internet, Law and Society. Harlow: Longman.
-
(2000)
The Internet, Law and Society
-
-
Akdeniz, Y.1
-
12
-
-
14244271147
-
Sexually Oriented Expression
-
Y. Akdeniz, C. Walker and D. Wall, Harlow, Longman
-
Akdeniz, Y. and Strossen, N. (2000) ‘Sexually Oriented Expression’, in Y. Akdeniz, C. Walker and D. Wall (eds), The Internet, Law and Society. Harlow: Longman.
-
(2000)
The Internet, Law and Society
-
-
Akdeniz, Y.1
Strossen, N.2
-
13
-
-
0008701752
-
-
Harlow, Longman
-
Akdeniz, Y., Walker, C. and Wall, D. (eds) (2000) The Internet, Law and Society. Harlow: Longman.
-
(2000)
The Internet, Law and Society
-
-
Akdeniz, Y.1
Walker, C.2
Wall, D.3
-
14
-
-
84858900274
-
-
report for the Irish Internet Advisory Board
-
Amarach Consulting (2001) ‘Research of Internet Downside Issues: August 2001', report for the Irish Internet Advisory Board, at http://www.
-
(2001)
Research of Internet Downside Issues: August 2001
-
-
-
15
-
-
84861253055
-
-
posted 20 July 2002, at
-
Ananova (2002) ‘Movie Industry Hunts Down Online Pirates’ posted 20 July 2002, at http://www.ananova.com/enetrtainment/story/sm_632999.html
-
(2002)
Movie Industry Hunts Down Online Pirates
-
-
-
17
-
-
84950109850
-
-
ASACP (Association of Sites Advocating Child Protection) (2005) ‘Why ASACP?’ at http://www.asacp.org/index.php
-
(2005)
Why ASACP?
-
-
-
19
-
-
0003354783
-
Sex, Guys, and Cyberspace: Effects of Internet Pornography and Individual Differences on Men’s Attitudes Toward Women
-
Barak, A., Fisher, W., Belfry, S. and Lashambe, D. (1999) ‘Sex, Guys, and Cyberspace: Effects of Internet Pornography and Individual Differences on Men’s Attitudes Toward Women’, Journal of Psychology and Human Sexuality, 11(1): 63-91. doi:10.1300/J056v11n01_04 http://dx.doi.org/10.1300/J056v11n01_04
-
(1999)
Journal of Psychology and Human Sexuality
, vol.11
, Issue.1
, pp. 63-91
-
-
Barak, A.1
Fisher, W.2
Belfry, S.3
Lashambe, D.4
-
20
-
-
84950133783
-
-
Wednesday 1 August 2001, at
-
BBC News (2001a) ‘Code Red Cost Tops $1.2bn’, Wednesday 1 August 2001, at http://news.bbc.co.uk/hi/business/1468986.stm
-
(2001)
Code Red Cost Tops $1.2bn
-
-
-
21
-
-
17644386656
-
-
Thursday 13 September 2001, at
-
BBC News (2001b) '"Mafiaboy" Hacker Jailed’, Thursday 13 September 2001, at http://www.news.bbc.co.uk/1/hi/sci/tech/1541252.stm.
-
(2001)
"Mafiaboy" Hacker Jailed
-
-
-
22
-
-
84950145236
-
-
9 March 2004, at
-
BBC News (2004) ‘UK and US to Act on Web Sex Sites’, 9 March 2004, at http://news.bbc.co.uk/go/pr/fr/-/hi/uk/3545147.stm
-
(2004)
UK and US to Act on Web Sex Sites
-
-
-
25
-
-
84950156943
-
The UK Sexual Offences Bill: A Victorian Spinster’s View of Sex
-
Bennion, F. (2003) ‘The UK Sexual Offences Bill: A Victorian Spinster’s View of Sex’, Common Law, 12(1): 61-6.
-
(2003)
Common Law
, vol.12
, Issue.1
, pp. 61-66
-
-
Bennion, F.1
-
27
-
-
0032755116
-
Cyber-Crime: The US Experience
-
Bequai, A. (1999) ‘Cyber-Crime: the US Experience’, Computers and Security, 18(1): 16-18. doi:10.1016/S0167-4048(99)80003-0 http://dx.doi.org/10.1016/S0167-4048%2899%2980003-0
-
(1999)
Computers and Security
, vol.18
, Issue.1
, pp. 16-18
-
-
Bequai, A.1
-
28
-
-
84950117059
-
-
Washington, DC, National White Collar Crime Centre
-
Beresford, A. (2003) Securities/Investment Fraud. Washington, DC: National White Collar Crime Centre.
-
(2003)
Securities/Investment Fraud
-
-
Beresford, A.1
-
29
-
-
12344336865
-
The Original Confidence Man
-
Bergmann, J. (1969) ‘The Original Confidence Man’, American Quarterly, 21(3): 560-77. doi:10.2307/2711934 http://dx.doi.org/10.2307/2711934
-
(1969)
American Quarterly
, vol.21
, Issue.3
, pp. 560-577
-
-
Bergmann, J.1
-
34
-
-
84937340971
-
A Plague of Viruses: Biological, Computer and Marketing
-
Boase, J. and Wellman, B. (2001) ‘A Plague of Viruses: Biological, Computer and Marketing’, Current Sociology, 49(6): 39-55. doi:10.1177/0011392101496006 http://dx.doi.org/10.1177/0011392101496006
-
(2001)
Current Sociology
, vol.49
, Issue.6
, pp. 39-55
-
-
Boase, J.1
Wellman, B.2
-
35
-
-
35448952265
-
Victims of Cyberstalking: An Exploratory Study of Harassment Perpetrated via the Internet
-
Bocij, P. (2003) ‘Victims of Cyberstalking: An Exploratory Study of Harassment Perpetrated via the Internet’, First Monday, 8(10), at http://www.firstmonday.org/issues/issues8_10/bocij/index.html
-
(2003)
First Monday
, vol.8
, Issue.10
-
-
Bocij, P.1
-
36
-
-
79952194506
-
Cyberstalking: Genuine Problem or Public Hysteria?
-
Bocij, P. and McFarlane, L. (2002) ‘Cyberstalking: Genuine Problem or Public Hysteria?', Prison Service Journal, 140: 32-5.
-
(2002)
Prison Service Journal
, vol.140
, pp. 32-35
-
-
Bocij, P.1
McFarlane, L.2
-
37
-
-
34548593955
-
Cyberstalking: A New Challenge for Criminal Justice
-
Bocij, P., Griffiths, M. and McFarlane, L. (2002) ‘Cyberstalking: A New Challenge for Criminal Justice’, The Criminal Lawyer, 122: 3-5.
-
(2002)
The Criminal Lawyer
, vol.122
, pp. 3-5
-
-
Bocij, P.1
Griffiths, M.2
McFarlane, L.3
-
39
-
-
84950149992
-
Building Bridges, Standing Guard
-
May
-
Boni, B. (2001) ‘Building Bridges, Standing Guard’, Network Security, 5, May, 18-19.
-
(2001)
Network Security
, vol.5
, pp. 18-19
-
-
Boni, B.1
-
40
-
-
34547402198
-
Preserving the Commons in the Information Order
-
WSIS, Vienna, Institut für Neue Kulturtechnologien
-
Bollier, D. (2003) ‘Preserving the Commons in the Information Order’, in WSIS World Information: Knowledge of Future Culture. Vienna: Institut für Neue Kulturtechnologien.
-
(2003)
World Information: Knowledge of Future Culture
-
-
Bollier, D.1
-
41
-
-
0002344456
-
Information Warfare: The Computer Revolution is Altering How Future Wars Will be Conducted
-
August
-
Bowers, S. (1998) ‘Information Warfare: The Computer Revolution is Altering How Future Wars Will be Conducted’, Armed Forces Journal International, August, 38-9.
-
(1998)
Armed Forces Journal International
, pp. 38-39
-
-
Bowers, S.1
-
43
-
-
1942425896
-
Policing and the Police
-
M. Maguire, R. Morgan and R. Reiner, 3rd edition, Oxford, Oxford University Press
-
Bowling, B. and Foster, J. (2002) ‘Policing and the Police’, in M. Maguire, R. Morgan and R. Reiner (eds), The Oxford Handbook of Criminology, 3rd edition. Oxford: Oxford University Press.
-
(2002)
The Oxford Handbook of Criminology
-
-
Bowling, B.1
Foster, J.2
-
44
-
-
0346827586
-
In Community We Trust: Online Security Communication at eBay
-
Boyd, J. (2002) ‘In Community We Trust: Online Security Communication at eBay’, Journal of Computer-Mediated Communication, 7(3) at http://ascusc.org.jcmc/vol7/issues3/boyd.html
-
(2002)
Journal of Computer-Mediated Communication
, vol.7
, Issue.3
-
-
Boyd, J.1
-
45
-
-
84950136207
-
-
7 June, London, BPI
-
BPI (British Phonographic Industry) (2002) Market Information, 184, 7 June. London: BPI.
-
(2002)
Market Information
, vol.184
-
-
-
46
-
-
0037527904
-
Power and Control Dynamics in Prestalking and Stalking Situations
-
Brewster, M. (2003) ‘Power and Control Dynamics in Prestalking and Stalking Situations’, Journal of Family Violence, 18(4): 207-17. doi:10.1023/A:1024064214054 http://dx.doi.org/10.1023/A:1024064214054
-
(2003)
Journal of Family Violence
, vol.18
, Issue.4
, pp. 207-217
-
-
Brewster, M.1
-
48
-
-
85177495449
-
The Treatment of Hate Speech in German Constitutional Law
-
online at
-
Brugger, W. (2002) ‘The Treatment of Hate Speech in German Constitutional Law’, German Law Journal, 40(1), online at: http://www.germanlawjournal.com/pdf/Vol04No01/PDF_Vol_04_No_01_01-44_Public_Brugger.pd
-
(2002)
German Law Journal
, vol.40
, Issue.1
-
-
Brugger, W.1
-
49
-
-
9144264974
-
-
URL (consulted March 2005)
-
BSA (Business Software Alliance) (2003) ‘Eighth Annual BSA Global Software Piracy Study’, URL (consulted March 2005): http://www.bsaa.com.au/downloads/BSA_Piracy_Booklet.pdf
-
(2003)
Eighth Annual BSA Global Software Piracy Study
-
-
-
50
-
-
84950124190
-
-
URL (consulted March 2005)
-
BSA (Business Software Alliance) (2005) ‘Fact Sheet: The Cyber Frontier and Children’, URL (consulted March 2005): http://www.bsa.org/resources/loader.cfm?url=/commonspot/security/getfile.cfm&pageid=1323&hitboxdone=yes
-
(2005)
Fact Sheet: The Cyber Frontier and Children
-
-
-
52
-
-
49049102652
-
Remember: Mimesis is a Form of Creativity
-
Vienna, Institut für Neue Kulturtechnologien
-
Bunz, M. (2003) ‘Remember: Mimesis is a Form of Creativity’, in World Information: Knowledge of Future Culture. Vienna: Institut für Neue Kulturtechnologien.
-
(2003)
World Information: Knowledge of Future Culture
-
-
Bunz, M.1
-
55
-
-
2642551677
-
-
London, Cabinet Office
-
Cabinet Office (2002) Identity Fraud: A Study. London: Cabinet Office.
-
(2002)
Identity Fraud: A Study
-
-
-
56
-
-
84950136137
-
Somebody’s Listening
-
12 August
-
Campbell, D. (1998) ‘Somebody’s Listening’, New Statesman, 12 August: 10-12.
-
(1998)
New Statesman
, pp. 10-12
-
-
Campbell, D.1
-
57
-
-
0035532916
-
Not Such a Neat Net: Some Comments on Virtual Criminality
-
Capeller, W. (2001) ‘Not Such a Neat Net: Some Comments on Virtual Criminality’, Social and Legal Studies, 10: 229-42.
-
(2001)
Social and Legal Studies
, vol.10
, pp. 229-242
-
-
Capeller, W.1
-
59
-
-
0001026431
-
"Digital Democracy" or "Information Aristocracy"? Economic Regeneration and the Information Economy
-
B. Loader, London, Routledge
-
Carter, D. (1997) '"Digital Democracy" or "Information Aristocracy"? Economic Regeneration and the Information Economy’, in B. Loader (ed.), The Governance of Cyberspace: Politics, Technology and Global Restructuring. London: Routledge.
-
(1997)
The Governance of Cyberspace: Politics, Technology and Global Restructuring
-
-
Carter, D.1
-
60
-
-
84950112088
-
Interview with MPAA President Jack Valenti
-
Carugati, A. (2003) Interview with MPAA President Jack Valenti, Worldscreen, at http://worldscreen.com/interviewscurrent.php?filename=203valenti.txt
-
(2003)
Worldscreen
-
-
Carugati, A.1
-
67
-
-
84950111655
-
-
Proceedings of the CollECTeR Workshop on eCommerce, May 7/8, Adelaide South Australia, at
-
Chance, S., Tootell. H. and Morris, E. (2004) ‘The Impact of Anti-Terrorism Legislation on Dataveillance’, Proceedings of the CollECTeR Workshop on eCommerce, May 7/8, Adelaide South Australia, at http://www.collecter.org/coll2004/proceedings/phance_Morris_Tootell.pdf
-
(2004)
The Impact of Anti-Terrorism Legislation on Dataveillance
-
-
Chance, S.1
Tootell, H.2
Morris, E.3
-
68
-
-
34248156608
-
The Governance of the Internet in Europe
-
Y. Akdeniz, C. Walker and D. Wall, Harlow, Longman
-
Charlesworth, A. (2000) ‘The Governance of the Internet in Europe’, in Y. Akdeniz, C. Walker and D. Wall (eds), The Internet, Law and Society. Harlow: Longman.
-
(2000)
The Internet, Law and Society
-
-
Charlesworth, A.1
-
72
-
-
0000204509
-
Social Change and Crime Rate Trends: A Routine Activity Approach
-
Cohen, L. and Felson, M. (1979) ‘Social Change and Crime Rate Trends: A Routine Activity Approach’, American Sociological Review, 44: 588-608. doi:10.2307/2094589 http://dx.doi.org/10.2307/2094589
-
(1979)
American Sociological Review
, vol.44
, pp. 588-608
-
-
Cohen, L.1
Felson, M.2
-
75
-
-
84979812554
-
Securing Cyberspace - New Laws and Developing Strategies
-
Coleman, C. (2003) ‘Securing Cyberspace - New Laws and Developing Strategies’, Computer Law and Security Report, 19(2): 131-6. doi:10.1016/S0267-3649(03)00208-5 http://dx.doi.org/10.1016/S0267-3649%2803%2900208-5
-
(2003)
Computer Law and Security Report
, vol.19
, Issue.2
, pp. 131-136
-
-
Coleman, C.1
-
77
-
-
84950154083
-
-
press release 17 March 2003, at
-
Comscore Media Metrix (2003) ‘Canada Trumps U.S. in Broadband Use’, press release 17 March 2003, at http://www.comscore.com/press/release.asp?id=312
-
(2003)
Canada Trumps U.S. in Broadband Use
-
-
-
80
-
-
0003077458
-
The Future of High-Technology Crime: A Parallel Delphi Study
-
Coutorie, L. (1995) ‘The Future of High-Technology Crime: A Parallel Delphi Study’, Journal of Criminal Justice, 23(1): 13-27. doi:10.1016/0047-2352(94)00042-5 http://dx.doi.org/10.1016/0047-2352%2894%2900042-5
-
(1995)
Journal of Criminal Justice
, vol.23
, Issue.1
, pp. 13-27
-
-
Coutorie, L.1
-
81
-
-
84937377718
-
What is Cyberterrorism?
-
Conway, M. (2002) ‘What is Cyberterrorism?', Current History, 101(659): 436-442.
-
(2002)
Current History
, vol.101
, Issue.659
, pp. 436-442
-
-
Conway, M.1
-
84
-
-
33749830846
-
Child Pornography: Images of the Abuse of Children
-
London, NSPCC
-
Creighton, S. (2003) ‘Child Pornography: Images of the Abuse of Children’, NSPCC Information Briefings. London: NSPCC.
-
(2003)
NSPCC Information Briefings
-
-
Creighton, S.1
-
87
-
-
84950149361
-
Go-Ahead for Police to Tap Coded Mail
-
24 September, at
-
Cumiskey, A. (1998) ‘Go-Ahead for Police to Tap Coded Mail’, The Daily Telegraph, 24 September, at http://www.chiark.greenend.org.uk/pipermail/ukcrypto/1998-September/002454.html
-
(1998)
The Daily Telegraph
-
-
Cumiskey, A.1
-
91
-
-
0033818021
-
Hate Crimes on the Internet
-
Deirmenjian, J. (2000) ‘Hate Crimes on the Internet’, Journal of Forensic Sciences, 45(5): 1020-22.
-
(2000)
Journal of Forensic Sciences
, vol.45
, Issue.5
, pp. 1020-1022
-
-
Deirmenjian, J.1
-
92
-
-
0012815237
-
Words That Would: A Tort Action for Racial Insults, Epithets, and Name-Calling
-
Delgado, R. (1982) ‘Words That Would: A Tort Action for Racial Insults, Epithets, and Name-Calling’, Harvard Civil Rights-Civil Liberties Law Review, 17: 133-181.
-
(1982)
Harvard Civil Rights-Civil Liberties Law Review
, vol.17
, pp. 133-181
-
-
Delgado, R.1
-
93
-
-
84950115490
-
Why Worm Writer Surrendered
-
14 February 2001, at
-
Delio, M. (2001) ‘Why Worm Writer Surrendered’, Wired Magazine, 14 February 2001, at http://www.wired.com/news/culture/0,1284,41809,00.html
-
(2001)
Wired Magazine
-
-
Delio, M.1
-
94
-
-
0000327879
-
Postscript on the Societies of Control
-
New York, Columbia University Press
-
Deleuze, G. (1995) ‘Postscript on the Societies of Control’, in Negotiations. New York: Columbia University Press.
-
(1995)
Negotiations
-
-
Deleuze, G.1
-
98
-
-
84859604766
-
-
Denning, D. (2000a) ‘Cyberterrorism’, at http://www.cs.georgetown.edu~denning/infosec/cyberterror.html
-
(2000)
Cyberterrorism
-
-
Denning, D.1
-
99
-
-
84859604766
-
-
Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives, 23 May 2000
-
Denning, D. (2000b) Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives, 23 May 2000.
-
(2000)
Cyberterrorism
-
-
Denning, D.1
-
101
-
-
84944057601
-
Hiding Crimes in Cyberspace
-
D. Thomas, and B. Loader, London, Routledge
-
Denning, D. and Baugh, W. (2000) ‘Hiding Crimes in Cyberspace’, in D. Thomas, and B. Loader (eds), Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. London: Routledge.
-
(2000)
Cybercrime: Law Enforcement, Security and Surveillance in the Information Age
-
-
Denning, D.1
Baugh, W.2
-
103
-
-
84919555980
-
-
URL (consulted March 2005)
-
Digital Intelligence Centre (DIG) (2004) ‘Digital Intelligence Centre: Archived News’, URL (consulted March 2005): http://www.itic.ca/DIC/News/archive.html#2004-06-09
-
(2004)
Digital Intelligence Centre: Archived News
-
-
-
105
-
-
78751569023
-
The Electronic Cloak: Secret Sexual Deviance in Cyberspace
-
Y. Jewkes, Cullompton, Willan
-
DiMarco, H. (2003) ‘The Electronic Cloak: Secret Sexual Deviance in Cyberspace’, in Y. Jewkes (ed.), Dot.cons: Crime, Deviance and Identity on the Internet. Cullompton: Willan.
-
(2003)
Dot.cons: Crime, Deviance and Identity on the Internet
-
-
DiMarco, H.1
-
106
-
-
38048999561
-
Internet Auction Fraud: The Silent Victims
-
Dolan, K. (2004) ‘Internet Auction Fraud: The Silent Victims’, Journal of Economic Crime Management, 2(1).
-
(2004)
Journal of Economic Crime Management
, vol.2
, Issue.1
-
-
Dolan, K.1
-
109
-
-
0033339151
-
Computer Crime and Abuse: A Survey of Public Attitudes and Awareness
-
Dowland, P., Furnell, S., Illingworth, H. and Reynolds, P. (1999) ‘Computer Crime and Abuse: A Survey of Public Attitudes and Awareness’, Computers and Security, 18(8): 715-26. doi:10.1016/S0167-4048(99)80135-7 http://dx.doi.org/10.1016/S0167-4048%2899%2980135-7
-
(1999)
Computers and Security
, vol.18
, Issue.8
, pp. 715-726
-
-
Dowland, P.1
Furnell, S.2
Illingworth, H.3
Reynolds, P.4
-
115
-
-
0345635488
-
-
ECPAT (End Child Prostitution, Child Pornography and Trafficking of Children for Sexual Purposes) (1997) Child Pornography: An International Perspective, at http://www.csecworldcongress.org/PDF/en/Stockholm/Background_reading/Theme_papers/Theme%200paper%Pornography%201996_EN.pdf
-
(1997)
Child Pornography: An International Perspective
-
-
-
117
-
-
84950150565
-
-
EFF (Electronic Frontier Foundation) (2001) ‘Online Censorship and Free Expression’, at http://www.eff.org//Censorship/?f=gottesman_lords_video_case.article
-
(2001)
Online Censorship and Free Expression
-
-
-
118
-
-
84950142450
-
-
EFF (Electronic Frontier Foundation) (2005) ‘EFF Analysis of PATRIOT II’, at http://www.eff.org/Censorship/Terrorism_militias/patriot-act-II-analysis.php
-
(2005)
EFF Analysis of PATRIOT II
-
-
-
119
-
-
84950117011
-
Reuters Subsidiary Target of US Inquiry into Theft of Data from Bloomberg
-
Eichenwald, K. (1998) ‘Reuters Subsidiary Target of US Inquiry into Theft of Data from Bloomberg’, Computers and Security, 17, 2, 157.
-
(1998)
Computers and Security
, vol.17
, Issue.2
, pp. 157
-
-
Eichenwald, K.1
-
120
-
-
0038172257
-
Cyberterrorism: Are We Under Siege?
-
Embar-Seddon, A. (2003) ‘Cyberterrorism: Are We Under Siege?', American Behavioral Scientist, 45(6): 1033-43. doi:10.1177/0002764202045006007 http://dx.doi.org/10.1177/0002764202045006007
-
(2003)
American Behavioral Scientist
, vol.45
, Issue.6
, pp. 1033-1043
-
-
Embar-Seddon, A.1
-
121
-
-
0041021933
-
On Being Stalked
-
Emerson, R., Ferris, K. and Brooks-Gardner, C. (1998) ‘On Being Stalked’, Social Problems, (45)3: 289-314. doi:10.1525/sp.1998.45.3.03x0193k http://dx.doi.org/10.1525/sp.1998.45.3.03x0193k
-
(1998)
Social Problems
, vol.45
, Issue.3
, pp. 289-314
-
-
Emerson, R.1
Ferris, K.2
Brooks-Gardner, C.3
-
122
-
-
84950126939
-
SEC Tackles Internet Investment Fraud
-
January 1996
-
English, E. (1996) ‘SEC Tackles Internet Investment Fraud’, Network Security, January 1996: 8.
-
(1996)
Network Security
, pp. 8
-
-
English, E.1
-
126
-
-
33645107828
-
-
EPIC (Electronic Privacy Information Center) (2005) ‘ChoicePoint’, at http://www.epic.org/privacy/choicepoint/default.html
-
(2005)
ChoicePoint
-
-
-
127
-
-
78951484833
-
-
John M. Olin Law and Economics Working Paper № 204, URL (consulted March 2005)
-
Epstein, R. (2004) ‘Liberty versus Property? Cracks in the Foundations of Copyright Law’, John M. Olin Law and Economics Working Paper № 204, URL (consulted March 2005): http://www.law.uchicago.edu/Lawecon/index.html
-
(2004)
Liberty versus Property? Cracks in the Foundations of Copyright Law
-
-
Epstein, R.1
-
128
-
-
49049091487
-
Please Pirate My Songs
-
WSIS, Vienna, Institut für Neue Kulturtechnologien
-
Escolar, I. (2003) ‘Please Pirate My Songs’, in WSIS World Information: Knowledge of Future Culture. Vienna: Institut für Neue Kulturtechnologien.
-
(2003)
World Information: Knowledge of Future Culture
-
-
Escolar, I.1
-
129
-
-
84950137464
-
Cyber Crime: A Growing Problem
-
Esen, R. (2002) ‘Cyber Crime: A Growing Problem’, Journal of Criminal Law, 66(3): 269-83.
-
(2002)
Journal of Criminal Law
, vol.66
, Issue.3
, pp. 269-283
-
-
Esen, R.1
-
131
-
-
0037843389
-
Credit Card Fraud Funds Terrorism
-
Everett, C. (2003) ‘Credit Card Fraud Funds Terrorism’, Computer Fraud and Security, 5(1): 1.
-
(2003)
Computer Fraud and Security
, vol.5
, Issue.1
, pp. 1
-
-
Everett, C.1
-
132
-
-
84950121752
-
Virtual Community
-
special issue on ‘The Futures of Community’, January 2004, at
-
Evans, K. (2004) ‘Virtual Community’, The Electronic Journal of Social Issues, 2 (1), special issue on ‘The Futures of Community’, January 2004, at http://www.whb.co.uk/socialissues/indexvol2.htm
-
(2004)
The Electronic Journal of Social Issues
, vol.2
, Issue.1
-
-
Evans, K.1
-
135
-
-
84861251215
-
-
September 2003, at
-
FACT (2003b) ‘Special Report’, September 2003, at http://www.fact-uk.org.uk
-
(2003)
Special Report
-
-
-
136
-
-
84950150909
-
-
paper presented at the Children and Crime: Victims and Offenders Conference, Brisbane, Australia, 17-18 June
-
Feather, M. (1999) ‘Internet and Child Victimisation’, paper presented at the Children and Crime: Victims and Offenders Conference, Brisbane, Australia, 17-18 June.
-
(1999)
Internet and Child Victimisation
-
-
Feather, M.1
-
137
-
-
0004152943
-
-
2nd edn, Thousand Oaks, CA, Pine Forge Press
-
Felson, M. (1998) Crime and Everyday Life, 2nd edn. Thousand Oaks, CA: Pine Forge Press.
-
(1998)
Crime and Everyday Life
-
-
Felson, M.1
-
143
-
-
84950127037
-
Tiffany & Co. Cracks Down on eBay Counterfeiters
-
Flahardy, C. (2004) ‘Tiffany & Co. Cracks Down on eBay Counterfeiters’, Corporate Legal Times, 14(154): 1-2.
-
(2004)
Corporate Legal Times
, vol.14
, Issue.154
, pp. 1-2
-
-
Flahardy, C.1
-
144
-
-
84950147196
-
-
paper presented at the International Conference on Countering Terrorism Through Enhanced International Cooperation, 22-24 September, 2000, Courmayeur, Italy
-
Fleming, P. and Stohl, M. (2000) ‘Myths and Realities of Cyberterrorism’, paper presented at the International Conference on Countering Terrorism Through Enhanced International Cooperation, 22-24 September, 2000, Courmayeur, Italy.
-
(2000)
Myths and Realities of Cyberterrorism
-
-
Fleming, P.1
Stohl, M.2
-
147
-
-
0030668250
-
Social Learning Theory Analysis of Computer Crime Among College Students
-
Fream, A. and Skinner, W. (1997) ‘Social Learning Theory Analysis of Computer Crime Among College Students’, Journal of Research in Crime and Delinquency, 34(4): 495-518. doi:10.1177/0022427897034004005 http://dx.doi.org/10.1177/0022427897034004005
-
(1997)
Journal of Research in Crime and Delinquency
, vol.34
, Issue.4
, pp. 495-518
-
-
Fream, A.1
Skinner, W.2
-
150
-
-
0029613287
-
A Proposal for Mental Health Provisions in State Anti-Stalking Law
-
Summer
-
Fritz, J. (1995) ‘A Proposal for Mental Health Provisions in State Anti-Stalking Law’, Journal of Psychiatry and Law, Summer: 295-318.
-
(1995)
Journal of Psychiatry and Law
, pp. 295-318
-
-
Fritz, J.1
-
156
-
-
10144243033
-
Terrorists’ Perspectives: Memoirs
-
D. Paletz and A. Schmid, Newbury Park, CA, Sage
-
Gerrits, R. (1992) ‘Terrorists’ Perspectives: Memoirs’, in D. Paletz and A. Schmid (eds), Terrorism and the Media. Newbury Park, CA: Sage.
-
(1992)
Terrorism and the Media
-
-
Gerrits, R.1
-
160
-
-
0002595742
-
Stalking: Crime of the '90‘s?
-
Goode, M. (1995) ‘Stalking: Crime of the '90‘s?', Criminal Law Journal, 19(1): 1-10.
-
(1995)
Criminal Law Journal
, vol.19
, Issue.1
, pp. 1-10
-
-
Goode, M.1
-
161
-
-
84950122824
-
-
Google (2005) ‘Gmail Privacy Policy’, at http://gmail.google.com/gmail/help/privacy.html
-
(2005)
Gmail Privacy Policy
-
-
-
162
-
-
38049069763
-
Identity Fraud: A Critical National and Global Threat
-
Gordon, G., Willox, N., Rebovich, D., Regan, T. and Gordon, J. (2004) ‘Identity Fraud: A Critical National and Global Threat’, Journal of Economic Crime Management, 2(1): 3-47.
-
(2004)
Journal of Economic Crime Management
, vol.2
, Issue.1
, pp. 3-47
-
-
Gordon, G.1
Willox, N.2
Rebovich, D.3
Regan, T.4
Gordon, J.5
-
165
-
-
0035381384
-
Virtual Criminality: Old Wine in New Bottles?
-
Grabosky, P. (2001) ‘Virtual Criminality: Old Wine in New Bottles?', Social and Legal Studies, 10: 243-9.
-
(2001)
Social and Legal Studies
, vol.10
, pp. 243-249
-
-
Grabosky, P.1
-
166
-
-
84950147205
-
-
Grabosky, P. (2003) ‘Cyberterrorism’, at http://www.alrc.gov.au/reform/summaries/82.htm
-
(2003)
Cyberterrorism
-
-
Grabosky, P.1
-
167
-
-
57649121448
-
Telecommunication Fraud in the Digital Age: The Convergence of Technologies
-
D. Wall, London, Routledge
-
Grabosky, P. and Smith, R. (2001) ‘Telecommunication Fraud in the Digital Age: The Convergence of Technologies’, in D. Wall (ed.), Crime and the Internet. London: Routledge.
-
(2001)
Crime and the Internet
-
-
Grabosky, P.1
Smith, R.2
-
168
-
-
84864164438
-
Uncovering and Eliminating Child Pornography Rings on the Internet: Issues Regarding and Avenues Facilitating Law Enforcement’s Access to "Wonderland"
-
Graham, W. (2000) ‘Uncovering and Eliminating Child Pornography Rings on the Internet: Issues Regarding and Avenues Facilitating Law Enforcement’s Access to "Wonderland"', Law Review of Michigan State University-Detroit College of Law, 2: 457-84.
-
(2000)
Law Review of Michigan State University-Detroit College of Law
, vol.2
, pp. 457-484
-
-
Graham, W.1
-
169
-
-
0034226904
-
Perils of Internet Fraud: An Empirical Investigation of Deception and Trust With Experienced Internet Consumers
-
Grazioli, S. and Jarvenpaa, S. (2000) ‘Perils of Internet Fraud: An Empirical Investigation of Deception and Trust With Experienced Internet Consumers’, IEEE Transactions on Systems, Man, and Cybernetics, 30(4): 395-410. doi:10.1109/3468.852434 http://dx.doi.org/10.1109/3468.852434
-
(2000)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.30
, Issue.4
, pp. 395-410
-
-
Grazioli, S.1
Jarvenpaa, S.2
-
170
-
-
84950157632
-
Policing Cyberspace
-
Green, C. (1998) ‘Policing Cyberspace’, Focus, 45(3): 66-68.
-
(1998)
Focus
, vol.45
, Issue.3
, pp. 66-68
-
-
Green, C.1
-
171
-
-
84950156863
-
The Myth of Cyberterrorism: There Are Many Ways Terrorists Can Kill You - Computers Aren’t One of Them
-
Green, J. (2001) ‘The Myth of Cyberterrorism: There Are Many Ways Terrorists Can Kill You - Computers Aren’t One of Them’, The Washington Quarterly Online, at http://www.washingtonmonthly.com/features/2001/0211.green.html
-
(2001)
The Washington Quarterly Online
-
-
Green, J.1
-
173
-
-
84919553315
-
Software
-
June
-
Grow, B. (2004) ‘Software’, Business Week, 21, June: 84.
-
(2004)
Business Week
, vol.21
, pp. 84
-
-
Grow, B.1
-
175
-
-
84950119653
-
Ebay India Boss Cuffed in Porn Vid Scandal
-
20 December, at
-
Haines, L. (2004) ‘Ebay India Boss Cuffed in Porn Vid Scandal’, The Register, 20 December, at http://www.theregister.co.uk/2004/12/20/ebay_india_scandal/
-
(2004)
The Register
-
-
Haines, L.1
-
177
-
-
79955822585
-
The USA Patriot Act and the Politics of Fear
-
J. Ferrell, K. Hayward, W. Morrison and M. Presdee, London, GlassHouse
-
Hamm, M. (2004) ‘The USA Patriot Act and the Politics of Fear’, in J. Ferrell, K. Hayward, W. Morrison and M. Presdee (eds), Critical Criminology Unleashed. London: GlassHouse.
-
(2004)
Critical Criminology Unleashed
-
-
Hamm, M.1
-
178
-
-
84919563884
-
As Internet Booms, So Do Hacker-Proofing Measures
-
Halverson, G. (1996) ‘As Internet Booms, So Do Hacker-Proofing Measures’, Christian Science Monitor, 88(144): 9.
-
(1996)
Christian Science Monitor
, vol.88
, Issue.144
, pp. 9
-
-
Halverson, G.1
-
179
-
-
84950157815
-
Delhi Schoolboy Sparks Global Porn Row
-
21 December
-
Harding, L. (2004) ‘Delhi Schoolboy Sparks Global Porn Row’, The Guardian, 21 December.
-
(2004)
The Guardian
-
-
Harding, L.1
-
181
-
-
77953409717
-
Justifying Intellectual Property
-
Hettinger, E. (1989) ‘Justifying Intellectual Property’, Philosophy and Public Affairs, 18(1): 31-52.
-
(1989)
Philosophy and Public Affairs
, vol.18
, Issue.1
, pp. 31-52
-
-
Hettinger, E.1
-
182
-
-
0037228072
-
The Law, Cybercrime, Risk Assessment and Cyber Protection
-
Hinde, S. (2003) ‘The Law, Cybercrime, Risk Assessment and Cyber Protection’, Computers and Security, 22(2): 90-5. doi:10.1016/S0167-4048(03)00203-7 http://dx.doi.org/10.1016/S0167-4048%2803%2900203-7
-
(2003)
Computers and Security
, vol.22
, Issue.2
, pp. 90-95
-
-
Hinde, S.1
-
183
-
-
79953729134
-
Theory and Policy in Online Privacy
-
Hinduja, S. (2004) ‘Theory and Policy in Online Privacy’, Knowledge, Technology, and Policy, 17(1): 38-58. doi:10.1007/BF02687075 http://dx.doi.org/10.1007/BF02687075
-
(2004)
Knowledge, Technology, and Policy
, vol.17
, Issue.1
, pp. 38-58
-
-
Hinduja, S.1
-
184
-
-
0003991890
-
-
Berkeley, CA, University of California Press
-
Hirschi, T. (1969) Causes of Delinquency. Berkeley, CA: University of California Press.
-
(1969)
Causes of Delinquency
-
-
Hirschi, T.1
-
185
-
-
84902021035
-
Cyberstalking and Law Enforcement
-
Hitchcock, J. (2003) ‘Cyberstalking and Law Enforcement’, Police Chief Magazine, 70(12), at http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arch&article_id=166&issue_id=122003
-
(2003)
Police Chief Magazine
, vol.70
, Issue.12
-
-
Hitchcock, J.1
-
186
-
-
3042612832
-
Criminological Psychology
-
M. Maguire, R. Morgan and R. Reiner, 3rd edn, Oxford, Oxford University Press
-
Hollin, C. (2002) ‘Criminological Psychology’, in M. Maguire, R. Morgan and R. Reiner (eds), The Oxford Handbook of Criminology, 3rd edn. Oxford: Oxford University Press.
-
(2002)
The Oxford Handbook of Criminology
-
-
Hollin, C.1
-
187
-
-
84950161354
-
The Emperor’s Sword: Art Under WIPO
-
Vienna, Institut für Neue Kulturtechnologien
-
Holmes, B. (2003) ‘The Emperor’s Sword: Art Under WIPO’, in WSIS World Information: Knowledge of Future Culture. Vienna: Institut für Neue Kulturtechnologien.
-
(2003)
World Information: Knowledge of Future Culture
-
-
Holmes, B.1
-
189
-
-
84861240243
-
-
press release 24 May 2002
-
Home Office (2002b) ‘Chipping of Goods Initiative’, press release 24 May 2002, at http://www.homeoffice.gov.uk/docs/pressnotice3.doc
-
(2002)
Chipping of Goods Initiative
-
-
-
192
-
-
10244252836
-
Watching the Web: Thoughts on Expanding Police Surveillance Opportunities under the Cyber-Crime Convention
-
Huey, L. and Rosenberg, R. (2004) ‘Watching the Web: Thoughts on Expanding Police Surveillance Opportunities under the Cyber-Crime Convention’, Canadian Journal of Criminology and Criminal Justice, 46(4): 597-606.
-
(2004)
Canadian Journal of Criminology and Criminal Justice
, vol.46
, Issue.4
, pp. 597-606
-
-
Huey, L.1
Rosenberg, R.2
-
194
-
-
0010870825
-
Moral Panic and the Moral Language in the Media
-
Hunt, A. (1987) ‘Moral Panic and the Moral Language in the Media’, British Journal of Sociology, 48: 629-648. doi:10.2307/591600 http://dx.doi.org/10.2307/591600
-
(1987)
British Journal of Sociology
, vol.48
, pp. 629-648
-
-
Hunt, A.1
-
199
-
-
34250853193
-
-
online at
-
ICCC (Internet Crime Complaint Centre) (2004) IC3 2004 Internet Fraud - Crime Report, online at http://www.ifccfbi.gov/strategy/2004_IC3Report.pdf.
-
(2004)
IC3 2004 Internet Fraud - Crime Report
-
-
-
201
-
-
20144368744
-
-
IFR (Internet Filter Review) (2004) ‘Internet Pornography Statistics’, at http://internet-filter-review.toptenreviews.com/internet-pornography-statistics.html
-
(2004)
Internet Pornography Statistics
-
-
-
202
-
-
34347244108
-
-
IIPA (International Intellectual Property Alliance) (2005) ‘Statistics’, at http://www.iipa.com/copyrighttrade_issues.html
-
(2005)
Statistics
-
-
-
207
-
-
49049084356
-
-
URL (consulted March 2005)
-
IPSOS (2004) ‘Online Software Piracy Poll’, URL (consulted March 2005): http://www.ipsos-na.com/news/pressrelease.cfm?id=2452
-
(2004)
Online Software Piracy Poll
-
-
-
208
-
-
84950104950
-
-
12 February 2004
-
ITU (International Telecommunications Union) (2004) ‘Statistics at a Glance’, 12 February 2004, at http://www.itu.int/ITUD/ict/statistics/at_glance/Internet02.pdf
-
(2004)
Statistics at a Glance
-
-
-
209
-
-
84886380836
-
-
IWF (Internet Watch Foundation) (2004) ‘Significant Trends 2003', at http://www.iwf.org.uk/media/page.70.216.htm
-
(2004)
Significant Trends 2003
-
-
-
210
-
-
84950141038
-
Keeping Secrets: International Developments to Protect Undisclosed Business Information and Trade Secrets
-
D. Thomas and B. Loader, London, Routledge
-
Jackson, M. (2000) ‘Keeping Secrets: International Developments to Protect Undisclosed Business Information and Trade Secrets’, in D. Thomas and B. Loader (eds), Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. London: Routledge.
-
(2000)
Cybercrime: Law Enforcement, Security and Surveillance in the Information Age
-
-
Jackson, M.1
-
211
-
-
0042843517
-
The Impact of the USA Patriot Act on Collection and Analysis of Personal Information Under the Foreign Intelligence Surveillance Act
-
Jaeger, P., Bertot, J. and McClure, C. (2003) ‘The Impact of the USA Patriot Act on Collection and Analysis of Personal Information Under the Foreign Intelligence Surveillance Act’, Government Information Quarterly, 20: 295-314. doi:10.1016/S0740-624X(03)00057-1 http://dx.doi.org/10.1016/S0740-624X%2803%2900057-1
-
(2003)
Government Information Quarterly
, vol.20
, pp. 295-314
-
-
Jaeger, P.1
Bertot, J.2
McClure, C.3
-
213
-
-
0038663891
-
Masculinities and Crime
-
M. Maguire, R. Morgan and R. Reiner, Oxford, Oxford University Press
-
Jefferson, T. (1997) ‘Masculinities and Crime’, in M. Maguire, R. Morgan and R. Reiner (eds), The Oxford Handbook of Criminology. Oxford: Oxford University Press.
-
(1997)
The Oxford Handbook of Criminology
-
-
Jefferson, T.1
-
215
-
-
51049086988
-
Policing the Filth: The Problems of Investigating Online Child Pornography in England and Wales
-
Jewkes, Y. and Andrews, C. (2005) ‘Policing the Filth: The Problems of Investigating Online Child Pornography in England and Wales’, Policing and Society, 15(1): 42-62. doi:10.1080/1043946042000338922 http://dx.doi.org/10.1080/1043946042000338922
-
(2005)
Policing and Society
, vol.15
, Issue.1
, pp. 42-62
-
-
Jewkes, Y.1
Andrews, C.2
-
219
-
-
34547110242
-
Ways of Owning and Sharing Cultural Property
-
E. Kasten, Berlin, Dietrich Reimer Verlag
-
Kasten, E. (2004) ‘Ways of Owning and Sharing Cultural Property’, in E. Kasten (ed.), Properties of Culture - Culture as Property. Berlin: Dietrich Reimer Verlag.
-
(2004)
Properties of Culture - Culture as Property
-
-
Kasten, E.1
-
220
-
-
84866584454
-
Experts Say Terrorists Hiding Message on Web
-
18 June, at
-
Kelley, J. (2001) ‘Experts Say Terrorists Hiding Message on Web’, USA Today, 18 June, at http://www.usatoday.com/news/washdc/2001-02-05-ejihad.htm
-
(2001)
USA Today
-
-
Kelley, J.1
-
221
-
-
35548955391
-
Information, Society and the Panopticon
-
King, L. (2001) ‘Information, Society and the Panopticon’, The Western Journal of Graduate Research, 10(1): 40-50.
-
(2001)
The Western Journal of Graduate Research
, vol.10
, Issue.1
, pp. 40-50
-
-
King, L.1
-
222
-
-
0037276453
-
An Exploratory Study of Moral Intensity Regarding Software Piracy of Students in Thailand
-
Kini, R., Pamakrishna, H. and Vijayaraman, B. (2003) ‘An Exploratory Study of Moral Intensity Regarding Software Piracy of Students in Thailand’, Behaviour and Information Technology, 22(1): 63-70. doi:10.1080/01449290301784 http://dx.doi.org/10.1080/01449290301784
-
(2003)
Behaviour and Information Technology
, vol.22
, Issue.1
, pp. 63-70
-
-
Kini, R.1
Pamakrishna, H.2
Vijayaraman, B.3
-
224
-
-
3843129652
-
Stalking Laws Proliferate, But Critics Say Constitutional Flaws Also Abound
-
November
-
Kolarik, G-L. (1992) ‘Stalking Laws Proliferate, But Critics Say Constitutional Flaws Also Abound’, American Bar Association Journal, November: 35-6.
-
(1992)
American Bar Association Journal
, pp. 35-36
-
-
Kolarik, G.-L.1
-
225
-
-
84950110217
-
-
Disruption, Deterrence and Destruction: Targeting the Traders in Fakes, paper presented at the Anti-Counterfeiting Group (ACG) conference, London, 15 May 2003
-
Kounoupias, N. (2003) ‘Copyright Piracy Disruption, Deterrence and Destruction’, Disruption, Deterrence and Destruction: Targeting the Traders in Fakes, paper presented at the Anti-Counterfeiting Group (ACG) conference, London, 15 May 2003.
-
(2003)
Copyright Piracy Disruption, Deterrence and Destruction
-
-
Kounoupias, N.1
-
226
-
-
0033312965
-
Hackers: Freedom Fighters of the 21st Century
-
Kovacich, G. (1999) ‘Hackers: Freedom Fighters of the 21st Century’, Computers and Security, 18(7): 573-76. doi:10.1016/S0167-4048(99)82003-3 http://dx.doi.org/10.1016/S0167-4048%2899%2982003-3
-
(1999)
Computers and Security
, vol.18
, Issue.7
, pp. 573-576
-
-
Kovacich, G.1
-
228
-
-
69849099876
-
Pornography, Sex Crime and Public Policy
-
S. Gerull and B. Halstead, Canberra, Australian Institute of Criminology
-
Kutchinsky, B. (1992) ‘Pornography, Sex Crime and Public Policy’, in S. Gerull and B. Halstead (eds), Sex Industry and Public Policy. Canberra: Australian Institute of Criminology.
-
(1992)
Sex Industry and Public Policy
-
-
Kutchinsky, B.1
-
229
-
-
25444523153
-
Legal Constructions of Crime
-
M. Maguire, R. Morgan and R. Reiner, 3rd edition, Oxford, Oxford University Press
-
Lacey, N. (2002) ‘Legal Constructions of Crime’, in M. Maguire, R. Morgan and R. Reiner (eds), The Oxford Handbook of Criminology, 3rd edition. Oxford: Oxford University Press.
-
(2002)
The Oxford Handbook of Criminology
-
-
Lacey, N.1
-
231
-
-
84868535521
-
Pornography-Blocking Software May Also Block Health Information Sites
-
Larkin, M. (2002) ‘Pornography-Blocking Software May Also Block Health Information Sites’, The Lancet, 360: 1946. doi:10.1016/S0140-6736(02)11939-8 http://dx.doi.org/10.1016/S0140-6736%2802%2911939-8
-
(2002)
The Lancet
, vol.360
-
-
Larkin, M.1
-
233
-
-
84950162014
-
-
Lawson, W. (2002) ‘Too Many Passwords’, at http://www.icdri.org/biometrics/Too%Many%20Passwords.pdf
-
(2002)
Too Many Passwords
-
-
Lawson, W.1
-
235
-
-
0009792450
-
Introduction
-
L. Lederer and R. Delgado, New York, Hills and Wang
-
Lederer, L. and Delgado, R. (1995) ‘Introduction’, in L. Lederer and R. Delgado, The Price We Pay: The Case Against Racist Speech, Hate Propoganda, and Pornography. New York: Hills and Wang.
-
(1995)
The Price We Pay: The Case Against Racist Speech, Hate Propoganda, and Pornography
-
-
Lederer, L.1
Delgado, R.2
-
236
-
-
84950124892
-
-
Lee, D. (2005) ‘eBay is Fence of the Young’, at http://newsobserver.com/news/v-printer/story/1899135p-8235660c.html
-
(2005)
Ebay is Fence of the Young
-
-
Lee, D.1
-
237
-
-
13744253908
-
Locke’s Theory of Property
-
Lemos, R. (1975) ‘Locke’s Theory of Property’, Interpretation, 5: 226-44.
-
(1975)
Interpretation
, vol.5
, pp. 226-244
-
-
Lemos, R.1
-
238
-
-
0347130162
-
The Challenge of Cyberspatial Forms of Human Interaction to Teritorrial Governance and Policing
-
B. Loader, London, Routledge
-
Lenk, K. (1997) ‘The Challenge of Cyberspatial Forms of Human Interaction to Teritorrial Governance and Policing’ in B. Loader (ed.), The Governance of Cyberspace: Politics, Technology and Global Restructuring. London: Routledge.
-
(1997)
The Governance of Cyberspace: Politics, Technology and Global Restructuring
-
-
Lenk, K.1
-
242
-
-
84950147716
-
-
paper presented at the Tenth Conference on Computers, Freedom and Privacy, Toronoto, 6 April 2000, at
-
Litman, J. (2000) ‘The Demonization of Piracy’, paper presented at the Tenth Conference on Computers, Freedom and Privacy, Toronoto, 6 April 2000, at http://www.wayne.edu/litman/papers/demon.pdf
-
(2000)
The Demonization of Piracy
-
-
Litman, J.1
-
243
-
-
77956778176
-
Cyberporn and Moral Panic: An Evaluation of Press Reactions to Pornography on the Internet
-
Littlewood, A. (2003) ‘Cyberporn and Moral Panic: An Evaluation of Press Reactions to Pornography on the Internet’, Library and Information Research, 27(86): 8-18.
-
(2003)
Library and Information Research
, vol.27
, Issue.86
, pp. 8-18
-
-
Littlewood, A.1
-
244
-
-
27944447932
-
-
findings from the UK Children Go Online project, at
-
Livingstone, S., Bober, M. and Helsper, E. (2005) Internet Literacy Amongst Children and Young People, findings from the UK Children Go Online project, at http://www.children-go-online.net
-
(2005)
Internet Literacy Amongst Children and Young People
-
-
Livingstone, S.1
Bober, M.2
Helsper, E.3
-
246
-
-
0242389921
-
Contemporary Landscapes of Crime, Order and Control: Governance, Risk and Globalization
-
M. Maguire, R. Morgan and R. Reiner, 3rd edn, Oxford, Oxford University Press
-
Loader, I. and Sparks, R. (2002) ‘Contemporary Landscapes of Crime, Order and Control: Governance, Risk and Globalization’, in M. Maguire, R. Morgan and R. Reiner (eds), The Oxford Handbook of Criminology, 3rd edn. Oxford: Oxford University Press.
-
(2002)
The Oxford Handbook of Criminology
-
-
Loader, I.1
Sparks, R.2
-
247
-
-
0000027246
-
Family Factors as Correlates and Predictors of Juvenile Conduct Problems and Delinquency
-
M. Tonry and N. Morris, Chicago, University of Chicago Press
-
Loeber, R. and Stouthamer-Loeber, M. (1986) ‘Family Factors as Correlates and Predictors of Juvenile Conduct Problems and Delinquency’, in M. Tonry and N. Morris (eds), Crime and Justice: An Annual Review of Research, vol. 7. Chicago: University of Chicago Press. doi:10.1086/449112 http://dx.doi.org/10.1086/449112
-
(1986)
Crime and Justice: An Annual Review of Research
, vol.7
-
-
Loeber, R.1
Stouthamer-Loeber, M.2
-
249
-
-
49049094558
-
-
URL (consulted March 2005)
-
Love, C. (2000) ‘Love Manifesto’, URL (consulted March 2005): http://www.reznor.com/commentary/loves_manifesto1.html
-
(2000)
Love Manifesto
-
-
Love, C.1
-
250
-
-
0002922955
-
Stalking Strangers and Lovers: Changing Media Typifications of a New Crime Problem
-
J. Best, New York, Aldine de Gruyter
-
Lowney, K. and Best, J. (1995) ‘Stalking Strangers and Lovers: Changing Media Typifications of a New Crime Problem’, in J. Best (ed.), Images of Issues: Typifying Contemporary Social Problems. New York: Aldine de Gruyter.
-
(1995)
Images of Issues: Typifying Contemporary Social Problems
-
-
Lowney, K.1
Best, J.2
-
253
-
-
65849351005
-
Publishing Notoriety: Piracy, Pornography and Oscar Wilde
-
Mackie, G. (2004) ‘Publishing Notoriety: Piracy, Pornography and Oscar Wilde’, University of Toronto Quarterly, 73(4): 980-90. doi:10.3138/utq.73.4.980 http://dx.doi.org/10.3138/utq.73.4.980
-
(2004)
University of Toronto Quarterly
, vol.73
, Issue.4
, pp. 980-990
-
-
Mackie, G.1
-
254
-
-
84892635107
-
-
Cambridge MA, Harvard University Press
-
MacKinnon, C. (1996) Only Words. Cambridge MA: Harvard University Press.
-
(1996)
Only Words
-
-
MacKinnon, C.1
-
255
-
-
21244469567
-
Crime Statistics: The '"Data Explosion" and Its Implications
-
M. Maguire, R. Morgan and R. Reiner, 3rd edn, Oxford, Oxford University Press
-
Maguire, M. (2002) ‘Crime Statistics: The '"Data Explosion" and Its Implications’, in M. Maguire, R. Morgan and R. Reiner (eds), The Oxford Handbook of Criminology, 3rd edn. Oxford: Oxford University Press.
-
(2002)
The Oxford Handbook of Criminology
-
-
Maguire, M.1
-
257
-
-
79551580658
-
-
5th edn, Oxford, Oxford University Press
-
Martin, E. (ed.) (2003) Oxford Dictionary of Law, 5th edn. Oxford: Oxford University Press.
-
(2003)
Oxford Dictionary of Law
-
-
Martin, E.1
-
260
-
-
84950134576
-
Anatomy of a Virus
-
Thursday 5 February
-
McCandless, D. (2004) ‘Anatomy of a Virus’, The Guardian, Thursday 5 February.
-
(2004)
The Guardian
-
-
McCandless, D.1
-
261
-
-
84950130935
-
Multiculturalism, Racism and Hate Speech
-
online at
-
McCormack, T. (1998) ‘Multiculturalism, Racism and Hate Speech’, Institute for Social Research Newsletter, 13(1), online at http://www.math.yorku.ca/ISR/newsletter/multi_racism_hate.htm
-
(1998)
Institute for Social Research Newsletter
, vol.13
, Issue.1
-
-
McCormack, T.1
-
263
-
-
0037408425
-
When Creators, Corporations and Consumers Collide: Napster and the Development of On-Line Music Distribution
-
McCourt, T. and Burkart, P. (2003) ‘When Creators, Corporations and Consumers Collide: Napster and the Development of On-Line Music Distribution’, Media, Culture and Society, 25(3): 333-50. doi:10.1177/0163443703025003003 http://dx.doi.org/10.1177/0163443703025003003
-
(2003)
Media, Culture and Society
, vol.25
, Issue.3
, pp. 333-350
-
-
McCourt, T.1
Burkart, P.2
-
264
-
-
84891395253
-
Bin Laden: Steganography Master?
-
7 February, at
-
McCullagh, D. (2001) ‘Bin Laden: Steganography Master?', Wired, 7 February, at http://www.wired.com/news/politics/0,1283,41658,00.html
-
(2001)
Wired
-
-
McCullagh, D.1
-
266
-
-
36949024777
-
An Exploration of Predatory Behaviour in Cyberspace: Towards a Typology of Cyberstalkers
-
McFarlane, L. and Bocij, P. (2003) ‘An Exploration of Predatory Behaviour in Cyberspace: Towards a Typology of Cyberstalkers’, First Monday, 8(9), at http://www.firstmonday.org/issues/issue8_9/mcfarlance/index.html
-
(2003)
First Monday
, vol.8
, Issue.9
-
-
McFarlane, L.1
Bocij, P.2
-
267
-
-
0033771686
-
Legal and Psychological Aspects of Stalking: A Review
-
McGuire, B. and Wraith, A. (2000) ‘Legal and Psychological Aspects of Stalking: A Review’, The Journal of Forensic Psychiatry, 11(2): 316-27. doi:10.1080/09585180050142543 http://dx.doi.org/10.1080/09585180050142543
-
(2000)
The Journal of Forensic Psychiatry
, vol.11
, Issue.2
, pp. 316-327
-
-
McGuire, B.1
Wraith, A.2
-
268
-
-
84905623654
-
Wrestling (Racial) Equality from Tolerance of Hate Speech
-
McGonagle, T. (2001) ‘Wrestling (Racial) Equality from Tolerance of Hate Speech’, Dublin University Law Journal, 23: 21-54.
-
(2001)
Dublin University Law Journal
, vol.23
, pp. 21-54
-
-
McGonagle, T.1
-
272
-
-
77954574218
-
Hacktivism: Securing the National Infrastructure
-
Milone, M. (2003) ‘Hacktivism: Securing the National Infrastructure’, Knowledge, Technology and Policy, 16(1): 75-103. doi:10.1007/s12130-003-1017-5 http://dx.doi.org/10.1007/s12130-003-1017-5
-
(2003)
Knowledge, Technology and Policy
, vol.16
, Issue.1
, pp. 75-103
-
-
Milone, M.1
-
277
-
-
44749089016
-
The U.S. Supreme Court Addresses the Child Pornography Prevention Act and Child Online Protection Act in Ashcroft v. Free Speech Coalition and Ashcroft v. American Civil Liberties Union
-
Mota, S. (2003) ‘The U.S. Supreme Court Addresses the Child Pornography Prevention Act and Child Online Protection Act in Ashcroft v. Free Speech Coalition and Ashcroft v. American Civil Liberties Union’, Federal Communications Law Journal, 55(1): 85-98.
-
(2003)
Federal Communications Law Journal
, vol.55
, Issue.1
, pp. 85-98
-
-
Mota, S.1
-
280
-
-
49049100178
-
-
URL (consulted March 2005)
-
MPAA (2005) ‘Anti-Piracy’, URL (consulted March 2005): http://www.mpaa.org/anti-piracy/
-
(2005)
Anti-Piracy
-
-
-
282
-
-
0035096515
-
Stalking: New Constructions of Human Behaviour
-
Mullen, P., Pathé, M. and Purcell, R. (2001) ‘Stalking: New Constructions of Human Behaviour’, Australian and New Zealand Journal of Psychiatry, 35: 9-16. doi:10.1046/j.1440-1614.2001.00849.x http://dx.doi.org/10.1046/j.1440-1614.2001.00849.x
-
(2001)
Australian and New Zealand Journal of Psychiatry
, vol.35
, pp. 9-16
-
-
Mullen, P.1
Pathé, M.2
Purcell, R.3
-
284
-
-
0003839534
-
-
New York, Basic Books
-
Murray, C. (1984) Losing Ground. New York: Basic Books.
-
(1984)
Losing Ground
-
-
Murray, C.1
-
290
-
-
84950117880
-
-
NHTCU National Hi-Tech Crime Unit (2004) ‘What is Hi-Tech Crime?', at http://www.nhtcu.org./nqcontent.cfm?a_id=12334&tt=nhtcu
-
(2004)
What is Hi-Tech Crime?
-
-
-
291
-
-
0036311962
-
Subtle, Pervasing, Harm: Racist and Sexist Remarks in Public as Hate Speech
-
Nielsen, L. (2002) ‘Subtle, Pervasing, Harm: Racist and Sexist Remarks in Public as Hate Speech’, Journal of Social Issues, 58(2): 265-280. doi:10.1111/1540-4560.00260 http://dx.doi.org/10.1111/1540-4560.00260
-
(2002)
Journal of Social Issues
, vol.58
, Issue.2
, pp. 265-280
-
-
Nielsen, L.1
-
294
-
-
0003930077
-
-
available online
-
NUA Internet Statistics (2003) ‘How Many Online?', available online at http://www.nua.ie/surveys/how_many_online/
-
(2003)
How Many Online?
-
-
-
295
-
-
27644480164
-
The Information Technology and Telecommunications Security Imperative: Important Issues and Drivers
-
Nugent, J. and Raisinghani, M. (2002) ‘The Information Technology and Telecommunications Security Imperative: Important Issues and Drivers’, Journal of Electronic Commerce Research, 3(1): 1-14.
-
(2002)
Journal of Electronic Commerce Research
, vol.3
, Issue.1
, pp. 1-14
-
-
Nugent, J.1
Raisinghani, M.2
-
297
-
-
34548575500
-
-
Preston, Cyberspace Research Unit
-
O’Connell, R., Price, J. and Barrow, C. (2004) Cyber Stalking, Abusive Cyber Sex and Online Grooming: A Programme of Education for Teenagers. Preston: Cyberspace Research Unit.
-
(2004)
Cyber Stalking, Abusive Cyber Sex and Online Grooming: A Programme of Education for Teenagers
-
-
O’Connell, R.1
Price, J.2
Barrow, C.3
-
298
-
-
36349001044
-
-
Trends and Issues in Criminal Justice, № 166, Canberra, Australia Institute of Criminology
-
Ogilvie, E. (2000) Cyberstalking, Trends and Issues in Criminal Justice, № 166. Canberra: Australia Institute of Criminology.
-
(2000)
Cyberstalking
-
-
Ogilvie, E.1
-
300
-
-
29444438546
-
The Commons Concept and Intellectual Property Rights. Regime: Whither Plant Genetic Resources and Traditional Knowledge?
-
Onwuekwe, C. (2004) ‘The Commons Concept and Intellectual Property Rights. Regime: Whither Plant Genetic Resources and Traditional Knowledge?', Pierce Law Review, 2(1): 65-90.
-
(2004)
Pierce Law Review
, vol.2
, Issue.1
, pp. 65-90
-
-
Onwuekwe, C.1
-
301
-
-
84950162986
-
-
1 May
-
Oser, K. (2003) ‘Data Intelligence’, 1 May, at http://directmag.com/datalist/marketing_data_intelligence/
-
(2003)
Data Intelligence
-
-
Oser, K.1
-
304
-
-
84950155151
-
Introduction
-
D., Paletz and A. Schmid, Newbury Park, CA, Sage
-
Paletz, D. and Vinson, C. (1992) ‘Introduction’, in D., Paletz and A. Schmid (eds), Terrorism and the Media. Newbury Park, CA: Sage.
-
(1992)
Terrorism and the Media
-
-
Paletz, D.1
Vinson, C.2
-
307
-
-
0034818913
-
Trends in Cybercrime - An Overview of Current Financial Crimes on the Internet
-
Philippsohn, S. (2001) ‘Trends in Cybercrime - An Overview of Current Financial Crimes on the Internet’, Computers and Security, 20: 53-69. doi:10.1016/S0167-4048(01)01021-5 http://dx.doi.org/10.1016/S0167-4048%2801%2901021-5
-
(2001)
Computers and Security
, vol.20
, pp. 53-69
-
-
Philippsohn, S.1
-
308
-
-
84950135442
-
-
Play It Cybersafe (2005) ‘Parents’ and Teacher’s Guide’, at http://www.playitcyber-safe.com/pdfs/TG-copyrightCrusader-2005.pdf
-
(2005)
Parents’ and Teacher’s Guide
-
-
-
313
-
-
70349697871
-
-
RAC (Royal Automobile Club) (2003) ‘Road Traffic Accident Statistics’, at http://www.rac.co.uk/web/personalinjuryclaims/claim_categories/road_traffic_accidents/statistics
-
(2003)
Road Traffic Accident Statistics
-
-
-
316
-
-
75349101791
-
Encryption, Anonymity and Markets: Law Enfor\ and Technology in a Free Market World
-
D. Thomas and B. Loader, London, Routledge
-
Reitinger, P. (2000) ‘Encryption, Anonymity and Markets: Law Enfor\ and Technology in a Free Market World’, in D. Thomas and B. Loader (eds), Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. London: Routledge.
-
(2000)
Cybercrime: Law Enforcement, Security and Surveillance in the Information Age
-
-
Reitinger, P.1
-
317
-
-
0012828167
-
Cybercrimes of the 21st Century
-
Riem, A. (2001) ‘Cybercrimes of the 21st Century’, Computer Fraud and Security, 4: 7-8.
-
(2001)
Computer Fraud and Security
, vol.4
, pp. 7-8
-
-
Riem, A.1
-
318
-
-
0000052745
-
Assessment Typology and Intervention with the Survivors of Stalking
-
Roberts, A. and Dziegielewski, S. (1996) ‘Assessment Typology and Intervention with the Survivors of Stalking’, Aggression and Violent Behaviour, 1(4): 359-68. doi:10.1016/S1359-1789(96)00011-0 http://dx.doi.org/10.1016/S1359-1789%2896%2900011-0
-
(1996)
Aggression and Violent Behaviour
, vol.1
, Issue.4
, pp. 359-368
-
-
Roberts, A.1
Dziegielewski, S.2
-
320
-
-
33845227601
-
-
Rogerson, M. and Pease, K. (2004) ‘Privacy, Identity and Crime Prevention’, at http://www.foresight.gov.uk/previous_projects/Cyber_Trust_and_Crime_Prevention/Reports_and_Publications/Privacy_Identity_and_Crime_Prevention/Michelle_Ken.pdf
-
(2004)
Privacy, Identity and Crime Prevention
-
-
Rogerson, M.1
Pease, K.2
-
321
-
-
84920857585
-
Net Firms Led Killer to Victim
-
4-5 December
-
Romei, S. (1999) ‘Net Firms Led Killer to Victim’, The Australian, 4-5 December: 19-22.
-
(1999)
The Australian
, pp. 19-22
-
-
Romei, S.1
-
322
-
-
84922602990
-
Strategies to Tackle Racism and Xenophobia on the Internet - Where Are We in Europe?
-
Rorive, I. (2002) ‘Strategies to Tackle Racism and Xenophobia on the Internet - Where Are We in Europe?', International Journal of Communications Law and Policy, 7: 1-10. doi:10.1207/S15326926CLP0701_01 http://dx.doi.org/10.1207/S15326926CLP0701_01
-
(2002)
International Journal of Communications Law and Policy
, vol.7
, pp. 1-10
-
-
Rorive, I.1
-
323
-
-
0347014877
-
Government and Control
-
Rose, N. (2000) ‘Government and Control’, British Journal of Criminology, 40: 321-339. doi:10.1093/bjc/40.2.321 http://dx.doi.org/10.1093/bjc/40.2.321
-
(2000)
British Journal of Criminology
, vol.40
, pp. 321-339
-
-
Rose, N.1
-
326
-
-
3042669232
-
Spinning the Web of Hate: Web-Based Hate Propogation by Extremist Organizations
-
Schaffer, J. (2002) ‘Spinning the Web of Hate: Web-Based Hate Propogation by Extremist Organizations’, Journal of Criminal Justice and Popular Culture, 9(2): 69-88.
-
(2002)
Journal of Criminal Justice and Popular Culture
, vol.9
, Issue.2
, pp. 69-88
-
-
Schaffer, J.1
-
327
-
-
0009751112
-
The Response Problem as a Definition Problem
-
A. Scmid and R. Crelinsten, London, Frank Cass
-
Schmid, A. (1993) ‘The Response Problem as a Definition Problem’, in A. Scmid and R. Crelinsten (eds), Western Responses to Terrorism. London: Frank Cass.
-
(1993)
Western Responses to Terrorism
-
-
Schmid, A.1
-
332
-
-
34547776747
-
Organized Crime, Terrorism and Cybercrime
-
A. Bryden and P. Fluri, Baden-Baden, Nomos Verlagsgesellschaft
-
Shelley, L. (2003) ‘Organized Crime, Terrorism and Cybercrime’, in A. Bryden and P. Fluri (eds), Security Sector Reform: Institutions, Society and Good Governance. Baden-Baden: Nomos Verlagsgesellschaft.
-
(2003)
Security Sector Reform: Institutions, Society and Good Governance
-
-
Shelley, L.1
-
335
-
-
0012186120
-
Cyber-Crimes: A Practical Approach to the Application of Federal Computer Crime Laws
-
Sinrod, E. and Reilly, W. (2000) ‘Cyber-Crimes: A Practical Approach to the Application of Federal Computer Crime Laws’, Santa Clara Computer and High Technology Law Journal, 16(2): 1-53.
-
(2000)
Santa Clara Computer and High Technology Law Journal
, vol.16
, Issue.2
, pp. 1-53
-
-
Sinrod, E.1
Reilly, W.2
-
338
-
-
0009854060
-
-
Australian Institute of Criminology Trends and Issues in Crime and Criminal Justice Paper №121., Canberra, AIT
-
Smith, R., Holmes, M. and Kaufmann, P. (1999) ‘Nigerian Advanced Fee Fraud’, Australian Institute of Criminology Trends and Issues in Crime and Criminal Justice Paper №121. Canberra: AIT.
-
(1999)
Nigerian Advanced Fee Fraud
-
-
Smith, R.1
Holmes, M.2
Kaufmann, P.3
-
339
-
-
0035532912
-
Sites of Criminality and Sites of Governance
-
Snyder, F. (2001) ‘Sites of Criminality and Sites of Governance’, Social and Legal Studies, 10: 251-6.
-
(2001)
Social and Legal Studies
, vol.10
, pp. 251-256
-
-
Snyder, F.1
-
343
-
-
84998068436
-
The Tactical Topography of Stalking Victimization and Management
-
Spitzberg, B. (2002) ‘The Tactical Topography of Stalking Victimization and Management’, Trauma Violence and Abuse, 3(4): 261-88. doi:10.1177/1524838002237330 http://dx.doi.org/10.1177/1524838002237330
-
(2002)
Trauma Violence and Abuse
, vol.3
, Issue.4
, pp. 261-288
-
-
Spitzberg, B.1
-
346
-
-
84950136872
-
Hate Speech
-
Y. Akdeniz, C. Walker and D. Wall, Harlow, Longman
-
Steinhardt, B. (2000) ‘Hate Speech’, in Y. Akdeniz, C. Walker and D. Wall (eds), The Internet, Law and Society. Harlow: Longman.
-
(2000)
The Internet, Law and Society
-
-
Steinhardt, B.1
-
348
-
-
33645996790
-
Burn Berne: Why the Leading International Copyright Convention Must Be Replaced
-
Story, A. (2003) ‘Burn Berne: Why the Leading International Copyright Convention Must Be Replaced’, Houston Law Review, 40(3): 763-801.
-
(2003)
Houston Law Review
, vol.40
, Issue.3
, pp. 763-801
-
-
Story, A.1
-
351
-
-
55349137921
-
Don’t Shoot the Messenger?
-
The UK and Online Intermediary Liability
-
Sutter, G. (2003) ‘Don’t Shoot the Messenger?’ The UK and Online Intermediary Liability’, International Review of Law, Computers and Technology, 17(1): 73-84. doi:10.1080/1360086032000063138 http://dx.doi.org/10.1080/1360086032000063138
-
(2003)
International Review of Law, Computers and Technology
, vol.17
, Issue.1
, pp. 73-84
-
-
Sutter, G.1
-
353
-
-
18844376174
-
-
Home Office Crime Reduction Research Series Paper 8., London, Home Office
-
Sutton, M., Schneider, J. and Hetherington, S. (2001) Tackling Theft with the Market Reduction Approach, Home Office Crime Reduction Research Series Paper 8. London: Home Office.
-
(2001)
Tackling Theft with the Market Reduction Approach
-
-
Sutton, M.1
Schneider, J.2
Hetherington, S.3
-
354
-
-
84950152751
-
Google’s New E-mail Service Sparks Privacy Concerns
-
July/August
-
Swartz, N. (2004a) ‘Google’s New E-mail Service Sparks Privacy Concerns’, The Information Management Journal, July/August: 6-7.
-
(2004)
The Information Management Journal
, pp. 6-7
-
-
Swartz, N.1
-
355
-
-
84950114050
-
Patriot Act Provision Ruled Unconstitutional
-
November/December
-
Swartz, N. (2004b) ‘Patriot Act Provision Ruled Unconstitutional’, The Information Management Journal, November/December: 6.
-
(2004)
The Information Management Journal
, pp. 6
-
-
Swartz, N.1
-
356
-
-
0012544108
-
-
New York, St. Martin’s Press
-
Sykes, C. (1999) The End of Privacy. New York: St. Martin’s Press.
-
(1999)
The End of Privacy
-
-
Sykes, C.1
-
357
-
-
0001155759
-
Techniques of Neutralization: A Theory of Delinquency
-
Sykes, G. and Matza, D. (1957) ‘Techniques of Neutralization: A Theory of Delinquency’, American Sociological Review, 22: 664-70. doi:10.2307/2089195 http://dx.doi.org/10.2307/2089195
-
(1957)
American Sociological Review
, vol.22
, pp. 664-670
-
-
Sykes, G.1
Matza, D.2
-
358
-
-
0002335673
-
Child Pornography: The Internet and Offending
-
Taylor, M., Quayle, E. and Holland, G. (2001) ‘Child Pornography: The Internet and Offending’, Recherche sur les Politiques, 2(2): 94-100.
-
(2001)
Recherche sur les Politiques
, vol.2
, Issue.2
, pp. 94-100
-
-
Taylor, M.1
Quayle, E.2
Holland, G.3
-
362
-
-
27644449111
-
Maestros or Misogynists? Gender and the Social Construction of Hacking
-
Y. Jewkes, Cullompton, Willan
-
Taylor, P. (2003) ‘Maestros or Misogynists? Gender and the Social Construction of Hacking’, in Y. Jewkes (ed.), Dot.cons: Crime, Deviance and Identity on the Internet. Cullompton: Willan.
-
(2003)
Dot.cons: Crime, Deviance and Identity on the Internet
-
-
Taylor, P.1
-
363
-
-
84950114021
-
Hacktivism - Resistance is Fertile?
-
C. Sumner, Oxford, Blackwell
-
Taylor, P. (2004a) ‘Hacktivism - Resistance is Fertile?', in C. Sumner (ed.), The Blackwell Companion to Criminology. Oxford: Blackwell.
-
(2004)
The Blackwell Companion to Criminology
-
-
Taylor, P.1
-
364
-
-
84950109751
-
Keyboard Protest: Hacktivist Spiders on the Web
-
J. Carter and D. Moreland, Cheltenham, New Clarion Press
-
Taylor, P. (2004b) ‘Keyboard Protest: Hacktivist Spiders on the Web’, in J. Carter and D. Moreland (eds), Anti-Capitalist Britain. Cheltenham: New Clarion Press.
-
(2004)
Anti-Capitalist Britain
-
-
Taylor, P.1
-
366
-
-
84950159847
-
-
Teich, A., Frankel, M., Kling, R. and Lee, Y. (1999) ‘Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference’, at http://www.indiana.edu/~tisj/readers/full-text/15-2%20teich.pdf
-
(1999)
Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference
-
-
Teich, A.1
Frankel, M.2
Kling, R.3
Lee, Y.4
-
367
-
-
84950150333
-
The Conscience of a Hacker
-
Volume One, Phile 3 of 10, at
-
The Mentor (1986) ‘The Conscience of a Hacker’, Phrack Inc., Volume One, Issue 7, Phile 3 of 10, at http://www.mala.bc.ca/~soules/media112/hacker.htm.
-
(1986)
Phrack Inc
, Issue.7
-
-
-
369
-
-
84950146275
-
-
10 May
-
The Register (2004) ‘Hate Websites Continue to Flourish’, 10 May, at http://www.theregister.co.uk/2004/05/10/hate_websites_flourish/
-
(2004)
Hate Websites Continue to Flourish
-
-
-
371
-
-
84950118206
-
Notes from the Underground: Hackers as Watchdogs of Industry
-
4 April 2002, at
-
Thomas, D. (2002) ‘Notes from the Underground: Hackers as Watchdogs of Industry’, Online Journalism Review, 4 April 2002, at http://www.ojr.org/ojr/business/p1017969515.php
-
(2002)
Online Journalism Review
-
-
Thomas, D.1
-
372
-
-
0004107609
-
Introduction - Cybercrime: Law Enforcement, Security and Surveillance in the Information Age
-
D. Thomas and B Loader, London, Routledge
-
Thomas, D. and Loader, B. (2000a) ‘Introduction - Cybercrime: Law Enforcement, Security and Surveillance in the Information Age’, in D. Thomas and B Loader (eds), Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. London: Routledge.
-
(2000)
Cybercrime: Law Enforcement, Security and Surveillance in the Information Age
-
-
Thomas, D.1
Loader, B.2
-
375
-
-
35948941103
-
U.S. Government Still Mining Data
-
July/August
-
TIMJ (2004) ‘U.S. Government Still Mining Data’, The In formation Management Journal, July/August: 7-8.
-
(2004)
The In formation Management Journal
, pp. 7-8
-
-
-
376
-
-
75349113939
-
Hate Speech Online: Restricted or Protected? Comparison of Regulations in the United States and Germany
-
Timofeeva, Y. (2003) ‘Hate Speech Online: Restricted or Protected? Comparison of Regulations in the United States and Germany’, Journal of Transnational Law and Policy, 12(2): 253-86.
-
(2003)
Journal of Transnational Law and Policy
, vol.12
, Issue.2
, pp. 253-286
-
-
Timofeeva, Y.1
-
377
-
-
33748932629
-
The Crime of Stalking: How Big is the Problem?
-
November, Washington, DC, National Institute of Justice
-
Tjaden, R. (1997) ‘The Crime of Stalking: How Big is the Problem?', National Institute of Justice Research Review, November. Washington, DC: National Institute of Justice.
-
(1997)
National Institute of Justice Research Review
-
-
Tjaden, R.1
-
378
-
-
0007135068
-
Prevalence, Incidence, and Consequences of Violence Against Women: Findings From the National Violence Against Women Survey
-
November., Washington, DC, National Institute of Justice
-
Tjaden, R. and Thoennes, N. (1998) ‘Prevalence, Incidence, and Consequences of Violence Against Women: Findings From the National Violence Against Women Survey’, National Institute of Justice: Research in Brief, November. Washington, DC: National Institute of Justice.
-
(1998)
National Institute of Justice: Research in Brief
-
-
Tjaden, R.1
Thoennes, N.2
-
380
-
-
84950147640
-
Internet Banks "in Denial" on Hacking thefts
-
19 April
-
Travis, A. (2001) ‘Internet Banks "in Denial" on Hacking thefts’, The Guardian, 19 April.
-
(2001)
The Guardian
-
-
Travis, A.1
-
385
-
-
84950125525
-
-
BBC News, 14 November 2003, at
-
Twist, J. (2003) ‘Cracking the Hacker Underground’, BBC News, 14 November 2003, at http://news.bbc.co.uk/go/pr/-/1/hi/technology/3246375.htm
-
(2003)
Cracking the Hacker Underground
-
-
Twist, J.1
-
386
-
-
84950159611
-
-
UK Parliament (2002) Hansard, 377 (75), at: http://www.publications.parliament.uk/pa/cm200102/cmhansrd/vo020108/text/20108w61.htm
-
(2002)
Hansard
, vol.377
, Issue.75
-
-
-
389
-
-
57349134681
-
-
Department of State Publication 10465, Washington, DC, State Department
-
U.S. Department of State (1997) Nigerian Advanced Fee Fraud. Department of State Publication 10465. Washington, DC: State Department.
-
(1997)
Nigerian Advanced Fee Fraud
-
-
-
392
-
-
84887746285
-
-
report presented to the U.S. Senate Committee on Commerce, Science and Transportation, on behalf of the MPAA, 28 February 2002. Available online at
-
Valenti, J. (2002) ‘If You Cannot Protect What You Own, You Don’t Own Anything’, report presented to the U.S. Senate Committee on Commerce, Science and Transportation, on behalf of the MPAA, 28 February 2002. Available online at http://www.mpaa.org/jack/2002/2002_02_28b.htm
-
(2002)
If You Cannot Protect What You Own, You Don’t Own Anything
-
-
Valenti, J.1
-
393
-
-
3242699141
-
-
testimony to the Subcommittee on Courts, The Internet, and Intellectual Property, U.S. House of Representatives, 13 March 2003
-
Valenti, J. (2003) ‘International Copyright Piracy: Links to Organized Crime and Terrorism’, testimony to the Subcommittee on Courts, The Internet, and Intellectual Property, U.S. House of Representatives, 13 March 2003, at http://www.mpaaa.org/jack/2003/2003_03_13B.htm
-
(2003)
International Copyright Piracy: Links to Organized Crime and Terrorism
-
-
Valenti, J.1
-
395
-
-
34748886377
-
Hacktivists or Cyberterrorists? The Changing Media Discourse on Hacking
-
October. Online at
-
Vegh, S. (2002) ‘Hacktivists or Cyberterrorists? The Changing Media Discourse on Hacking’, First Monday, 7, 10, October. Online at http://firstmonday.org/issues/issue7_10/vegh/index.html
-
(2002)
First Monday
, vol.7
, Issue.10
-
-
Vegh, S.1
-
398
-
-
0037927949
-
Attitudes towards Computer Hacking in Russia
-
D. Thomas and B. Loader, London, Routledge
-
Voiskounsky, A., Babeva, J. and Smyslova, O. (2000) ‘Attitudes towards Computer Hacking in Russia’, in D. Thomas and B. Loader (eds), Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. London: Routledge.
-
(2000)
Cybercrime: Law Enforcement, Security and Surveillance in the Information Age
-
-
Voiskounsky, A.1
Babeva, J.2
Smyslova, O.3
-
400
-
-
84919506928
-
Global Focus on Cybercrime
-
Wales, E. (2001) ‘Global Focus on Cybercrime’, Computer Fraud and Security, (1): 6-6(1). doi:10.1016/S1361-3723(01)01012-0 http://dx.doi.org/10.1016/S1361-3723%2801%2901012-0
-
(2001)
Computer Fraud and Security
, Issue.1
, pp. 6
-
-
Wales, E.1
-
401
-
-
0008701752
-
-
Y. Akdeniz, C. Walker and D. Wall, Harlow, Longman
-
Walker, C., Wall, D. and Akdeniz, Y. (2000) ‘The Internet, Law and Society’, in Y. Akdeniz, C. Walker and D. Wall (eds), The Internet, Law and Society. Harlow: Longman.
-
(2000)
The Internet, Law and Society
-
-
Walker, C.1
Wall, D.2
Akdeniz, Y.3
-
403
-
-
33846041841
-
Cybercrimes and the Internet
-
D. Wall, London, Routledge
-
Wall, D. (2001a) ‘Cybercrimes and the Internet’, in D. Wall (ed.), Crime and the Internet. London: Routledge.
-
(2001)
Crime and the Internet
-
-
Wall, D.1
-
404
-
-
58049181925
-
Maintaining Order and Law on the Internet
-
D. Wall, London, Routledge
-
Wall, D. (2001b) ‘Maintaining Order and Law on the Internet’, in D. Wall (ed.), Crime and the Internet. London: Routledge.
-
(2001)
Crime and the Internet
-
-
Wall, D.1
-
407
-
-
58049139846
-
Hacking, Viruses and Fraud
-
Y. Akdeniz, C. Walker and D. Wall, Harlow, Longman
-
Wasik, M. (2000) ‘Hacking, Viruses and Fraud’, in Y. Akdeniz, C. Walker and D. Wall (eds), The Internet, Law and Society. Harlow: Longman.
-
(2000)
The Internet, Law and Society
-
-
Wasik, M.1
-
409
-
-
79956134837
-
The Banality of Evil and the First Amendment
-
Wendel, W. (2004) ‘The Banality of Evil and the First Amendment’, Michigan Law Review, 102: 1404-22. doi:10.2307/4141951 http://dx.doi.org/10.2307/4141951
-
(2004)
Michigan Law Review
, vol.102
, pp. 1404-1422
-
-
Wendel, W.1
-
410
-
-
84950148236
-
-
United States Institute of Peace, Special Report 116., Washington, DC, USIP
-
Weimann, G. (2004) http://www.terror.net, United States Institute of Peace, Special Report 116. Washington, DC: USIP.
-
(2004)
-
-
Weimann, G.1
-
411
-
-
0012699411
-
Far Right Extremists on the Internet
-
D. Thomas, and B. Loader, London, Routledge
-
Whine, M. (2000) ‘Far Right Extremists on the Internet’, in D. Thomas, and B. Loader (eds), Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. London: Routledge.
-
(2000)
Cybercrime: Law Enforcement, Security and Surveillance in the Information Age
-
-
Whine, M.1
-
414
-
-
84950122753
-
Protecting our Children from Internet Smut: Moral Duty or Moral Panic?
-
Wilkins, J. (1997) ‘Protecting our Children from Internet Smut: Moral Duty or Moral Panic?', The Humanist, 57(5): 4.
-
(1997)
The Humanist
, vol.57
, Issue.5
, pp. 4
-
-
Wilkins, J.1
-
418
-
-
75349105286
-
-
paper presented at the OSCE Meeting on the Relationship Between Racist, Xenophobic and Anti-Semitic Propoganda on the Internet and Hate Crimes, Paris, 16-17 June
-
Wolf, C. (2004) ‘Regulating Hate Speech Qua Speech is Not the Solution to the Epidemic of Hate on the Internet’, paper presented at the OSCE Meeting on the Relationship Between Racist, Xenophobic and Anti-Semitic Propoganda on the Internet and Hate Crimes, Paris, 16-17 June.
-
(2004)
Regulating Hate Speech Qua Speech is Not the Solution to the Epidemic of Hate on the Internet
-
-
Wolf, C.1
-
419
-
-
1442310828
-
Hackers: Militants or Merry Pranksters? A Content Analysis of Defaced Web Pages
-
Woo, H., Kim, Y. and Dominisk, J. (2004) ‘Hackers: Militants or Merry Pranksters? A Content Analysis of Defaced Web Pages’, Media Psychology, 6: 63-82. doi:10.1207/s1532785xmep0601_3 http://dx.doi.org/10.1207/s1532785xmep0601_3
-
(2004)
Media Psychology
, vol.6
, pp. 63-82
-
-
Woo, H.1
Kim, Y.2
Dominisk, J.3
-
420
-
-
84950131313
-
PC Users Warned Over New Mydoom Threat
-
10 February 2004
-
Wright, G. (2004) ‘PC Users Warned Over New Mydoom Threat’, The Guardian, 10 February 2004.
-
(2004)
The Guardian
-
-
Wright, G.1
-
421
-
-
84919553300
-
Biometrics The Next Phase in Network Security
-
28 September
-
Wright, H. (1998) ‘Biometrics The Next Phase in Network Security’, NZ Infotech Weekly, 28 September: 10.
-
(1998)
NZ Infotech Weekly
, pp. 10
-
-
Wright, H.1
-
422
-
-
0030524313
-
A Typology of Interpersonal talking
-
Wright, J., Burgess, A., Laszlo, A., McCrary, G. and Douglas, J. (1996) ‘A Typology of Interpersonal talking’, Journal of Interpersonal Violence, 11(4): 487-502. doi:10.1177/088626096011004003 http://dx.doi.org/10.1177/088626096011004003
-
(1996)
Journal of Interpersonal Violence
, vol.11
, Issue.4
, pp. 487-502
-
-
Wright, J.1
Burgess, A.2
Laszlo, A.3
McCrary, G.4
Douglas, J.5
-
423
-
-
25444520749
-
The Global Epidemic of Movie "Piracy": Crime-Wave or Social Construction?
-
Yar, M. (2005) ‘The Global Epidemic of Movie "Piracy": Crime-Wave or Social Construction?', Media, Culture and Society, 27(1): 677-96. doi:10.1177/0163443705055723 http://dx.doi.org/10.1177/0163443705055723
-
(2005)
Media, Culture and Society
, vol.27
, Issue.1
, pp. 677-696
-
-
Yar, M.1
-
424
-
-
0010936055
-
The Role of the Police as Amplifiers of Deviancy, Negotiators of Reality and Translators of Fantasy
-
S. Cohen, Harmondsworth, Penguin
-
Young, J. (1971) ‘The Role of the Police as Amplifiers of Deviancy, Negotiators of Reality and Translators of Fantasy’, in S. Cohen (ed.), Images of Deviance. Harmondsworth: Penguin.
-
(1971)
Images of Deviance
-
-
Young, J.1
-
425
-
-
3042869109
-
Internet Addiction: The Emergence of a New Clinical Disorder
-
Young, K. (1998) ‘Internet Addiction: The Emergence of a New Clinical Disorder’, CyberPsychology and Behavior, 1(3): 237-44. doi:10.1089/cpb.1998.1.237 http://dx.doi.org/10.1089/cpb.1998.1.237
-
(1998)
CyberPsychology and Behavior
, vol.1
, Issue.3
, pp. 237-244
-
-
Young, K.1
-
426
-
-
0033374866
-
Cyber Disorders: The Mental Health Concern for the New Millennium
-
Young, K., Pistner, M. and O’Mara, J. (1999) ‘Cyber Disorders: The Mental Health Concern for the New Millennium’, CyberPsychology and Behavior, 2(5): 475-79. doi:10.1089/cpb.1999.2.475 http://dx.doi.org/10.1089/cpb.1999.2.475
-
(1999)
CyberPsychology and Behavior
, vol.2
, Issue.5
, pp. 475-479
-
-
Young, K.1
Pistner, M.2
O’Mara, J.3
|