-
1
-
-
0007255996
-
-
Associated Press
-
Associated Press (1998) “First Cyber Terrorist Action Reported”, www.techserver.com/newsroom/ntn/info/050698/info9_25501_noframes.html
-
(1998)
First Cyber Terrorist Action Reported
-
-
-
2
-
-
85140550252
-
Testimony to the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary
-
Bauer, J. (1998) “Testimony to the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary”, United States Senate. www.securitymanagement.com/library/bauer.html
-
(1998)
United States Senate
-
-
Bauer, J.1
-
3
-
-
84862393576
-
-
British Broadcasting Corporation (1999) “Nato Under ‘Cyber Attack’”, www.flora.org/flora.mai-not/10498
-
(1999)
Nato under ‘Cyber Attack
-
-
-
4
-
-
21744440215
-
SEC Enforcement and the Internet: Meeting the Challenge of the Next Millennium
-
Cella, J.J. and Stark, J.R. (1997) “SEC Enforcement and the Internet: Meeting the Challenge of the Next Millennium”, The Business Lawyer, 52: 815-49.
-
(1997)
The Business Lawyer
, vol.52
, pp. 815-849
-
-
Cella, J.J.1
Stark, J.R.2
-
5
-
-
0007180016
-
Indonesian Govt Suspected In Irish ISP Hack
-
Creed, A. (1999) “Indonesian Govt Suspected In Irish ISP Hack”, Newsbytes, www.ccurrents.com/newstoday/99/02/21/news8.html
-
(1999)
Newsbytes
-
-
Creed, A.1
-
7
-
-
0007314701
-
Hackers from Hell
-
Edwards, O. (1995) “Hackers from Hell”, Forbes, p. 182.
-
(1995)
Forbes
, pp. 182
-
-
Edwards, O.1
-
8
-
-
0002656375
-
Anonymity and its Enmities
-
Froomkin, A.M. (1995) “Anonymity and its Enmities”, Journal of ONLINE Law, art. 4; www.wm.edu/law/publications/jol/95_96/froomkin.html.
-
(1995)
Journal of ONLINE Law
-
-
Froomkin, A.M.1
-
9
-
-
0007255997
-
BT Starts Switchboard Anti-Hacking Investigation
-
Gold, S. (1999) “BT Starts Switchboard Anti-Hacking Investigation”, Newsbytes, www.infowar.com.
-
(1999)
Newsbytes
-
-
Gold, S.1
-
12
-
-
85068365784
-
Child Pornography in the Digital Age
-
Grant, A., David, F. and Grabosky, P. (1997) “Child Pornography in the Digital Age”, Transnational Organized Crime, 3, 4, 171-88.
-
(1997)
Transnational Organized Crime
, vol.3
, Issue.4
, pp. 171-188
-
-
Grant, A.1
David, F.2
Grabosky, P.3
-
13
-
-
0029491415
-
Emerging Challenge: Security and Safety in Cyberspace
-
Hundley, R. and Anderson, R. (1995) “Emerging Challenge: Security and Safety in Cyberspace”, IEEE Technology and Society Magazine, 14, 4, 19-28.
-
(1995)
IEEE Technology and Society Magazine
, vol.14
, Issue.4
, pp. 19-28
-
-
Hundley, R.1
Anderson, R.2
-
14
-
-
0007251448
-
-
Sydney: Law Book Co. Ltd
-
Lanham, D., et al. (1987) Criminal Fraud, Sydney: Law Book Co. Ltd.
-
(1987)
Criminal Fraud
-
-
Lanham, D.1
-
16
-
-
84925703505
-
An Online Extortion Plot Results in Release of Credit Card Data
-
Markoff, J. (2000) “An Online Extortion Plot Results in Release of Credit Card Data”, New York Times on the Web.
-
(2000)
New York Times on the Web
-
-
Markoff, J.1
-
17
-
-
0007255999
-
Crimes of the Net
-
Meyer, M. and Underwood, A. (1994) “Crimes of the Net”, Bulletin/Newsweek, 15 November 15, 68-9.
-
(1994)
Bulletin/Newsweek, 15 November
, vol.15
, pp. 68-69
-
-
Meyer, M.1
Underwood, A.2
-
18
-
-
0007316422
-
Phone Call Scams Skim off Millions
-
Newman, K. (1998) “Phone Call Scams Skim off Millions”, New Zealand Herald, www.infowar.com.
-
(1998)
New Zealand Herald
-
-
Newman, K.1
-
19
-
-
0002227725
-
Anarchy, State, and the Internet: An Essay on Law-Making in Cyberspace
-
Post, D.G. (1995) “Anarchy, State, and the Internet: An Essay on Law-Making in Cyberspace”, Journal of ONLINE Law, art. 3.
-
(1995)
Journal of ONLINE Law
-
-
Post, D.G.1
-
20
-
-
85016006634
-
Cyber-Terrorism: The Shape of Future Conflict?
-
Rathmell, A. (1997) “Cyber-Terrorism: The Shape of Future Conflict?”, Royal United Service Institute Journal, 40-6, www.kcl.ac.uk/orgs/icsa/rusi.htm#who
-
(1997)
Royal United Service Institute Journal
, pp. 40-46
-
-
Rathmell, A.1
-
22
-
-
84909006376
-
-
IIC Communications Topics, 13, London: International Institute of Communications
-
Schieck, M. (1995) “Combating Fraud in Cable and Telecommunications”, IIC Communications Topics, 13, London: International Institute of Communications.
-
(1995)
Combating Fraud in Cable and Telecommunications
-
-
Schieck, M.1
-
24
-
-
36849018768
-
Identity-Related Economic Crime: Risks and Countermeasures
-
Canberra: Australian Institute of Criminology
-
Smith, R.G. (1999) “Identity-Related Economic Crime: Risks and Countermeasures”, in Trends and Issues in Crime and Criminal Justice, 129, Canberra: Australian Institute of Criminology.
-
(1999)
Trends and Issues in Crime and Criminal Justice
, pp. 129
-
-
Smith, R.G.1
-
25
-
-
0038110510
-
Fighting Future Wars
-
Stix, G. (1995) “Fighting Future Wars”, Scientific American, 273, 6: 74-80.
-
(1995)
Scientific American
, vol.273
, Issue.6
, pp. 74-80
-
-
Stix, G.1
-
27
-
-
0007257543
-
Hackers Leave Red-Faced Yard with $1.29m Bill
-
Tendler, S. and Nuttall, N. (1996) “Hackers Leave Red-Faced Yard with $1.29m Bill”, The Australian, 6 August, p. 37.
-
(1996)
The Australian, 6 August
, pp. 37
-
-
Tendler, S.1
Nuttall, N.2
-
30
-
-
0007180019
-
Implications for Law Enforcement of the Move to a Cashless Society
-
in A. Graycar and P.N. Grabosky, Canberra: Australian Institute of Criminology
-
Wahlert, G. (1996) “Implications for Law Enforcement of the Move to a Cashless Society”, in A. Graycar and P.N. Grabosky (eds), Money Laundering, Canberra: Australian Institute of Criminology.
-
(1996)
Money Laundering
-
-
Wahlert, G.1
|