-
1
-
-
85182776974
-
The 'Stalker' Who Stayed at Home: A Town Terrorized over the Internet
-
September 2
-
Michele Kurtz, ''The 'Stalker' Who Stayed at Home: A Town Terrorized over the Internet,'' Boston Globe, September 2, 2001, A1
-
(2001)
Boston Globe
, pp. A1
-
-
Kurtz, M.1
-
2
-
-
85182763936
-
'Cyberspace Terrorist' Gets Jail: Townsend School Was His Target
-
June 6
-
Michele Kurtz, "'Cyberspace Terrorist' Gets Jail: Townsend School Was His Target, " Boston Globe, June 6, 2001, B1
-
(2001)
Boston Globe
, pp. B1
-
-
Kurtz, M.1
-
3
-
-
85182751371
-
Missouri Man Pleads Innocent to Terrorizing Students Online
-
August 15
-
Jessica Heslam, "Missouri Man Pleads Innocent to Terrorizing Students Online, " Boston Herald, August 15, 2000, 2
-
(2000)
Boston Herald
, pp. 2
-
-
Heslam, J.1
-
4
-
-
85182751128
-
Charges Filed in Threat, Porn Case
-
October 26
-
Bill Graham, "Charges Filed in Threat, Porn Case, " Kansas City Star, October 26, 1999, A1
-
(1999)
Kansas City Star
, pp. A1
-
-
Graham, B.1
-
5
-
-
85182751128
-
Disk Tied to Threat
-
October 27
-
Bill Graham, "Disk Tied to Threat, " Kansas City Star, October 27, 1999, B1
-
(1999)
Kansas City Star
, pp. B1
-
-
Graham, B.1
-
6
-
-
12344293756
-
Is There Such a Thing as 'Virtual Crime'?
-
Susan W. Brenner, "Is There Such a Thing as 'Virtual Crime'?" California Criminal Law Review 4 (2001): 1, http://www.boalt.org/CCLR/v4/v4 brenner.htm
-
(2001)
California Criminal Law Review
, vol.4
, pp. 1
-
-
Brenner, S.W.1
-
8
-
-
34249866520
-
-
New York: Charles Scribner's Sons
-
Donn Parker, Crime by Computer (New York: Charles Scribner's Sons, 1976), x-xi
-
(1976)
Crime by Computer
, pp. x-xi
-
-
Parker, D.1
-
11
-
-
85182778798
-
-
http://en.wikipedia.org/wiki/ Mainframe_computer
-
-
-
-
13
-
-
2542642717
-
-
New York: Walker and Company
-
Gerald McKnight, Computer Crime (New York: Walker and Company, 1973), 97-112
-
(1973)
Computer Crime
, pp. 97-112
-
-
McKnight, G.1
-
14
-
-
85069016114
-
Crime in the Suites: On the Rise
-
December 3
-
David Pauly et al., "Crime in the Suites: On the Rise, " Newsweek, December 3, 1979, 114
-
(1979)
Newsweek
, pp. 114
-
-
Pauly, D.1
-
15
-
-
85182748623
-
The Computer Bandits
-
August 9
-
Allan J. Mayer, "The Computer Bandits, " Newsweek, August 9, 1976, 58
-
(1976)
Newsweek
, pp. 58
-
-
Mayer, A.J.1
-
16
-
-
85182774332
-
Action Urged to Curb Crime by Computer
-
June 22
-
Larry Kramer, "Action Urged to Curb Crime by Computer, " Washington Post, June 22, 1978, D11
-
(1978)
Washington Post
, pp. D11
-
-
Kramer, L.1
-
17
-
-
85021957710
-
Scotland Yard Deprograms Great Computer Tape Heist
-
January 14
-
Bernard D. Nossiter, "Scotland Yard Deprograms Great Computer Tape Heist, " Washington Post, January 14, 1977, A15
-
(1977)
Washington Post
, pp. A15
-
-
Nossiter, B.D.1
-
18
-
-
85182761629
-
-
http://en.wikipedia.org/wiki/Phreaking
-
-
-
-
20
-
-
85182788590
-
-
http://en.wikipedia.org/ wiki/Blue_box
-
-
-
-
22
-
-
85182749542
-
-
http://en.wikipedia.org/wiki/ Theft_of_services
-
-
-
-
25
-
-
85182796174
-
Dial-Tone Phreak
-
December 30
-
Elizabeth McCracken, "Dial-Tone Phreak, " New York Times, December 30, 2007
-
(2007)
New York Times
-
-
McCracken, E.1
-
26
-
-
85182764641
-
RIP-Joybubbles, Honorary Geekdad
-
August 18
-
"RIP-Joybubbles, Honorary Geekdad, " Wired, August 18, 2007, http://www.democraticwarrior.com/forum/showthread.php?p=155216
-
(2007)
Wired
-
-
-
27
-
-
85182788200
-
The Twilight Years of Cap'n Crunch
-
January 13
-
Chris Rhoads, "The Twilight Years of Cap'n Crunch, " Wall Street Journal, January 13, 2007, 1
-
(2007)
Wall Street Journal
, pp. 1
-
-
Rhoads, C.1
-
28
-
-
85084629497
-
'Hackers' Ignore Consequents of Their High-Tech Joy Rides
-
Mary Thornton, "'Hackers' Ignore Consequents of Their High-Tech Joy Rides, " Washington Post, 1984, A1
-
(1984)
Washington Post
, pp. A1
-
-
Thornton, M.1
-
30
-
-
85182771976
-
-
http://www.netvalley.com/archives/mirrors/cerf-how-inet.txt
-
-
-
-
32
-
-
84894734322
-
Young Computer Bandits Byte Off More than They Could Chew
-
Barton Gellman, "Young Computer Bandits Byte Off More than They Could Chew, " Washington Post, August 30, 1983, A2
-
(1983)
Washington Post
, pp. A2
-
-
Gellman, B.1
-
33
-
-
85182792178
-
Film Provided Model for NASA Security Breach, Teen Says
-
August 27
-
John Gallant, "Film Provided Model for NASA Security Breach, Teen Says, " Computerworld, August 27, 1984, 18
-
(1984)
Computerworld
, pp. 18
-
-
Gallant, J.1
-
34
-
-
85182757368
-
Electronic Funds Transfer Review: A Look at Security
-
April 2
-
Michael Weinstein, "Electronic Funds Transfer Review: A Look at Security, " American Banker, April 2, 1984, 11
-
(1984)
American Banker
, pp. 11
-
-
Weinstein, M.1
-
35
-
-
79958858021
-
War Games: A Look Back at the Film That Turned Geeks and Phreaks into Stars
-
July 21
-
Scott Brown, "War Games: A Look Back at the Film That Turned Geeks and Phreaks into Stars, " Wired, July 21, 2008
-
(2008)
Wired
-
-
Brown, S.1
-
36
-
-
84884424411
-
The FBI Goes after Hackers
-
March 26
-
Tom Shea, "The FBI Goes after Hackers, " InfoWorld, March 26, 1984, 38
-
(1984)
InfoWorld
, pp. 38
-
-
Shea, T.1
-
37
-
-
0003954001
-
-
(New York: Ace Books, reissue edition)
-
William Gibson, Neuromancer (New York: Ace Books, 1995 reissue edition), 51
-
(1995)
Neuromancer
, pp. 51
-
-
Gibson, W.1
-
40
-
-
0345257994
-
-
Minneapolis: University of Minnesota Press
-
Douglas Thomas, Hacker Culture (Minneapolis: University of Minnesota Press, 2002), 81
-
(2002)
Hacker Culture
, pp. 81
-
-
Thomas, D.1
-
42
-
-
85182800529
-
Former Van Nuys Man Pleads Guilty to Computer Fraud
-
June 15
-
Janet Gilmore, "Former Van Nuys Man Pleads Guilty to Computer Fraud, " Daily News (Los Angeles), June 15, 1994, N6
-
(1994)
Daily News (Los Angeles)
, pp. N6
-
-
Gilmore, J.1
-
43
-
-
85032357646
-
-
Wikipedia
-
"Unsolved Mysteries, " Wikipedia, http://en.wikipedia.org/wiki/ Unsolved_Mysteries
-
Unsolved Mysteries
-
-
-
44
-
-
85182768624
-
Is Law Enforcement Ready for Cybercrime?
-
October 10
-
Benjamin Wittes, "Is Law Enforcement Ready for Cybercrime?" Legal Times, October 10, 1994, 1
-
(1994)
Legal Times
, pp. 1
-
-
Wittes, B.1
-
45
-
-
84894840680
-
Computer Hacker Who Jumped Bail Gets 41 Months
-
November 28
-
Leslie Berger, "Computer Hacker Who Jumped Bail Gets 41 Months, " Los Angeles Times, November 28, 1995, 5
-
(1995)
Los Angeles Times
, pp. 5
-
-
Berger, L.1
-
46
-
-
85182786301
-
Hackers Targeting Credit Cards
-
August 14
-
Mark Guidera, "Hackers Targeting Credit Cards, " (Albany) Times Union, August 14, 1994, A8
-
(1994)
(Albany) Times Union
, pp. A8
-
-
Guidera, M.1
-
47
-
-
85182777910
-
Criminals Lurk in Alleys of Cyberspace
-
April 1
-
Stevan Rosenlind, "Criminals Lurk in Alleys of Cyberspace, " Baltimore Sun, April 1, 1994, 6C
-
(1994)
Baltimore Sun
, pp. 6C
-
-
Rosenlind, S.1
-
48
-
-
84894759980
-
Cybercrime Epidemic at Major Corporations
-
October 25
-
Brian Akre, "Cybercrime Epidemic at Major Corporations, " Times-Picayune, October 25, 1995, C1
-
(1995)
Times-Picayune
, pp. C1
-
-
Akre, B.1
-
49
-
-
85182801364
-
Firms Face Business Pitfalls on the 'Net'
-
October 16
-
Ellen Messmer, "Firms Face Business Pitfalls on the 'Net', " Network World, October 16, 1995, 35
-
(1995)
Network World
, pp. 35
-
-
Messmer, E.1
-
50
-
-
84894870474
-
The Computer Virus-No Cures to Be Found
-
November 25
-
Robert Lemos, "The Computer Virus-No Cures to Be Found, " ZD Net, November 25, 2003, http://news.zdnet.com/2100-1009_22-5111442.html
-
(2003)
ZD Net
-
-
Lemos, R.1
-
52
-
-
84894736638
-
Virus Victims Are Stoic in Face of Multinet Attack
-
November 14
-
Lauren DiDio, "Virus Victims Are Stoic in Face of Multinet Attack, " Network World, November 14, 1988, 6
-
(1988)
Network World
, pp. 6
-
-
DiDio, L.1
-
53
-
-
84894716452
-
Morris Felony Charge Expected by End of July
-
July 17
-
Michael Alexander, "Morris Felony Charge Expected by End of July, " Computerworld, July 17, 1989, 4
-
(1989)
Computerworld
, pp. 4
-
-
Alexander, M.1
-
54
-
-
84894691967
-
Computer Intruder Is Found Guilty
-
January 23
-
John Markoff, "Computer Intruder Is Found Guilty, " New York Times, January 23, 1990, A21
-
(1990)
New York Times
, pp. A21
-
-
Markoff, J.1
-
55
-
-
84894691967
-
Computer Intruder Is Put on Probation and Fined $10, 000
-
May 5
-
John Markoff, "Computer Intruder Is Put on Probation and Fined $10, 000, " New York Times, May 5, 1990, 11
-
(1990)
New York Times
, pp. 11
-
-
Markoff, J.1
-
56
-
-
85182794456
-
Ex-hacker Hawks Laptops, Hypes Book
-
October 7
-
Elinor Mills Abreu, "Ex-hacker Hawks Laptops, Hypes Book, " Chicago Tribune, October 7, 2002, 2
-
(2002)
Chicago Tribune
, pp. 2
-
-
Abreu, E.M.1
-
57
-
-
85071616528
-
Cyberspace's Most Wanted
-
July 4
-
John Markoff, "Cyberspace's Most Wanted, " New York Times, July 4, 1994, 11
-
(1994)
New York Times
, pp. 11
-
-
Markoff, J.1
-
58
-
-
33750437281
-
The Talented Mr. Mitnick
-
March 1
-
Gregory T. Huang, "The Talented Mr. Mitnick, " Technology Review, March 1, 2005, 21
-
(2005)
Technology Review
, pp. 21
-
-
Huang, G.T.1
-
60
-
-
85182752354
-
The Boy Who Hacked into the Pentagon's Computer
-
April 10
-
Kathryn Lister, "The Boy Who Hacked into the Pentagon's Computer, " The Sun (UK), April 10, 1998, 6
-
(1998)
The Sun (UK)
, pp. 6
-
-
Lister, K.1
-
61
-
-
85182793228
-
Hacker Suspect Faces 15 Years
-
May 24
-
Jon Swartz, "Hacker Suspect Faces 15 Years, " San Francisco Chronicle, May 24, 1997, D1
-
(1997)
San Francisco Chronicle
, pp. D1
-
-
Swartz, J.1
-
62
-
-
85182778578
-
-
Inquirer. net, March 12
-
Thea Alberto, "7 International Cyber Thieves Nabbed in RP, " Inquirer. net, March 12, 2007, http://newsinfo.inquirer.net/breakingnews/infotech/ view_article.php?article_id=54389
-
(2007)
7 International Cyber Thieves Nabbed in RP
-
-
Alberto, T.1
-
63
-
-
85182753417
-
Dispelling the Myths about Viruses Is a First Step to Keeping Your Net Healthy
-
May 13
-
Linda Musthaler, "Dispelling the Myths about Viruses Is a First Step to Keeping Your Net Healthy, " Network World, May 13, 1996, 42
-
(1996)
Network World
, pp. 42
-
-
Musthaler, L.1
-
64
-
-
85182791559
-
'Innocent' Files Can Carry a Virus
-
September 12
-
Stephen Manes, "'Innocent' Files Can Carry a Virus, " New York Times, September 12, 1995, C8
-
(1995)
New York Times
, pp. C8
-
-
Manes, S.1
-
65
-
-
85182782456
-
Mutant E-Mail Viruses Battled
-
March 30
-
Miguel Helft, "Mutant E-Mail Viruses Battled, " San Jose Mercury News, March 30, 1999, 1A
-
(1999)
San Jose Mercury News
, pp. 1A
-
-
Helft, M.1
-
66
-
-
33745217557
-
FBI Agent Charged with Hacking
-
August 15
-
Mike Brunker, "FBI Agent Charged with Hacking, " MSNBC, August 15, 2002, http://www.msnbc.msn.com/id/3078784/
-
(2002)
MSNBC
-
-
Brunker, M.1
-
67
-
-
85182792490
-
-
U.S. Department of Justice, Criminal Resource Manual 274, http://www.usdoj.gov/usao/eousa/foia_reading_room/usam/title9/crm00274.htm
-
Criminal Resource Manual
, vol.274
-
-
-
68
-
-
47649118173
-
Bilateralism, Multilateralism, and the Architecture of International Law
-
Gabriella Blum, "Bilateralism, Multilateralism, and the Architecture of International Law, " Harvard International Law Journal 49 (2008): 323, 260
-
(2008)
Harvard International Law Journal
, vol.49
, pp. 323
-
-
Blum, G.1
-
69
-
-
85182769657
-
The Role of the United States in International Criminal Justice
-
823
-
Clint Williamson, "The Role of the United States in International Criminal Justice, " Penn State International Law Review 25 (2007): 819, 823
-
(2007)
Penn State International Law Review
, vol.25
, pp. 819
-
-
Williamson, C.1
-
70
-
-
84894731684
-
Prosecuting International Terrorists
-
843-844
-
Sarah E. Tilstra, "Prosecuting International Terrorists, " Pacific Rim Law and Policy Journal 12 (2003): 835, 843-44
-
(2003)
Pacific Rim Law and Policy Journal
, vol.12
, pp. 835
-
-
Tilstra, S.E.1
-
71
-
-
56049110303
-
Leaving the House: The Constitutional Status of Resignation from the House of Representatives
-
204
-
Josh Chafetz, "Leaving the House: The Constitutional Status of Resignation from the House of Representatives, " Duke Law Journal 58 (2008): 177, 204
-
(2008)
Duke Law Journal
, vol.58
, pp. 177
-
-
Chafetz, J.1
-
72
-
-
76249086752
-
Mad about Yoo, or, Why Worry about the Next Unconstitutional War?
-
110
-
Stuart Streichler, "Mad about Yoo, or, Why Worry about the Next Unconstitutional War?" Journal of Law and Politics, 24 (2008): 93, 110
-
(2008)
Journal of Law and Politics
, vol.24
, pp. 93
-
-
Streichler, S.1
-
73
-
-
85182800288
-
Perpich v. United States Department of Defense: Who Controls the Weekend Soldier?
-
Roy W. Breiten-bach, "Perpich v. United States Department of Defense: Who Controls the Weekend Soldier?" Saint John's Law Review 64 (1989): 133, 133
-
(1989)
Saint John's Law Review
, vol.64
, pp. 133
-
-
Breitenbach, R.W.1
-
74
-
-
1542394938
-
First Principles of American Federalism and the Nature of Federal Criminal Jurisdiction
-
21-25
-
Adam H. Kurland, "First Principles of American Federalism and the Nature of Federal Criminal Jurisdiction, " Emory Law Journal 45 (1996): 1, 21-25
-
(1996)
Emory Law Journal
, vol.45
, pp. 1
-
-
Kurland, A.H.1
-
75
-
-
85117509911
-
Exploring a European Union Constitution: Unexpected Lessons from the American Experience
-
86
-
Ken Gormly, "Exploring a European Union Constitution: Unexpected Lessons from the American Experience, " Rutgers Law Journal 35 (2003): 69, 86
-
(2003)
Rutgers Law Journal
, vol.35
, pp. 69
-
-
Gormly, K.1
-
76
-
-
85182778676
-
America's Anti-Standing Army Tradition and the Separate Community Doctrine
-
154
-
Earl F. Martin, "America's Anti-Standing Army Tradition and the Separate Community Doctrine, " Mississippi Law Journal 76 (2006): 135, 154
-
(2006)
Mississippi Law Journal
, vol.76
, pp. 135
-
-
Martin, E.F.1
-
77
-
-
77954519235
-
Racketeering and the Federalization of Crime
-
Craig M. Bradley, "Racketeering and the Federalization of Crime, " American Criminal Law Review 22 (1984): 213
-
(1984)
American Criminal Law Review
, vol.22
, pp. 213
-
-
Bradley, C.M.1
-
79
-
-
0039555878
-
Criminal Mischief: The Federalization of American Criminal Law
-
Kathleen F. Brickey, "Criminal Mischief: The Federalization of American Criminal Law, " Hastings Law Journal 46 (1995): 1135
-
(1995)
Hastings Law Journal
, vol.46
, pp. 1135
-
-
Brickey, K.F.1
-
80
-
-
84883688902
-
Responding to the Time-Based Failures of the Criminal Law through a Criminal Sunset Amendment
-
1344
-
Richard E. Myers II, "Responding to the Time-Based Failures of the Criminal Law through a Criminal Sunset Amendment, " Boston College Law Review 49 (2008): 1327, 1344
-
(2008)
Boston College Law Review
, vol.49
, pp. 1327
-
-
Richard, E.1
Myers, I.I.2
-
81
-
-
0347020664
-
The Private Police
-
1211
-
David Sklansky, "The Private Police, " U.C.L.A. Law Review 46 (1999): 1165, 1211
-
(1999)
U.C.L.A. Law Review
, vol.46
, pp. 1165
-
-
Sklansky, D.1
-
83
-
-
45849111528
-
The Posse Comitatus Act: Toward a Right to Civil Law Enforcement
-
429
-
Sean J. Kealy, "The Posse Comitatus Act: Toward a Right to Civil Law Enforcement, " Yale Law and Policy Review 21 (2003): 383, 429
-
(2003)
Yale Law and Policy Review
, vol.21
, pp. 383
-
-
Kealy, S.J.1
-
84
-
-
76249098185
-
Prosecutors in State Courts, 2005
-
Steven W. Perry, "Prosecutors in State Courts, 2005, " Bureau of Justice Statistics Bulletin, July 2006, 6, http://www.ojp.gov/bjs/abstract/psc05.htm
-
(2006)
Bureau of Justice Statistics Bulletin
-
-
Perry, S.W.1
-
85
-
-
85182785943
-
FBI, Secret Service Must Improve Cybercrime Training
-
Jason Miller, "FBI, Secret Service Must Improve Cybercrime Training, " Federal Computer Week, July 23, 2007, http://fcw.com/articles/2007/07/ 23/fbi-secret-service-must-improve-cybercrime-training.aspx
-
(2007)
Federal Computer Week
-
-
Miller, J.1
-
88
-
-
84902905280
-
Courts, Covenants, and Communities
-
1392
-
Clayton P. Gillette, "Courts, Covenants, and Communities, " University of Chicago Law Review 61 (1994): 1375, 1392
-
(1994)
University of Chicago Law Review
, vol.61
, pp. 1375
-
-
Gillette, C.P.1
-
89
-
-
85182783300
-
McAfee Launches Cybercrime Unit
-
April 8
-
John Wagley, "McAfee Launches Cybercrime Unit, " Security Management, April 8, 2009, http://www.securitymanagement.com/news/mcafee-launches-cybercrime-unit-005618
-
(2009)
Security Management
-
-
Wagley, J.1
-
91
-
-
33645092167
-
-
Westport, CT: Greenwood
-
J. Michael Olivero, Cyril D. Robinson, and Richard Scaglion, Police in Contradiction: The Evolution of the Police Function in Society (Westport, CT: Greenwood, 1994), 65
-
(1994)
Police in Contradiction: The Evolution of the Police Function in Society
, pp. 65
-
-
Olivero, J.M.1
Robinson, C.D.2
Scaglion, R.3
-
92
-
-
0347020664
-
The Private Police
-
1197
-
Olivero, Robinson, and Scaglion, Police in Contradiction, supra, 20; David A. Sklansky, "The Private Police, " UCLA Law Review 46 (1999): 1165, 1197
-
(1999)
UCLA Law Review
, vol.46
, pp. 1165
-
-
Sklansky, D.A.1
-
93
-
-
0242649810
-
Are Cops Constitutional?
-
692-693
-
Olivero, Robinson, and Scaglion, Police in Contradiction, 20; Roger Roots, "Are Cops Constitutional?" Seton Hall Constitutional Law Journal 11 (2001): 685, 692-93
-
(2001)
Seton Hall Constitutional Law Journal
, vol.11
, pp. 685
-
-
Roots, R.1
-
96
-
-
84990362417
-
The Beat Generation: Community Policing at Its Best
-
William D. Eggers and John O'Leary, "The Beat Generation: Community Policing at Its Best, " Policy Review 74 (1995): 1
-
(1995)
Policy Review
, vol.74
, pp. 1
-
-
Eggers, W.D.1
O'Leary, J.2
-
97
-
-
85182779668
-
Call Made for More Cybercrime to Be Reported to Police
-
December 9
-
Dan Raywood, "Call Made for More Cybercrime to Be Reported to Police, " SC Magazine, December 9, 2008, http://www.scmagazineuk.com/Call-made-for-more-cybercrime-to-be-reported-to-police/article/122299/
-
(2008)
SC Magazine
-
-
Raywood, D.1
-
100
-
-
84894762034
-
Proposed Rule 12.3: Prosecutorial Discovery and the Defense of Federal Authority
-
1316
-
Mary Patricia Jones, "Proposed Rule 12.3: Prosecutorial Discovery and the Defense of Federal Authority, " Virginia Law Review 72 (1986): 1299, 1316
-
(1986)
Virginia Law Review
, vol.72
, pp. 12996
-
-
Jones, M.P.1
-
101
-
-
85182755671
-
Russia's Cybercrime Haven
-
November
-
John Barham, "Russia's Cybercrime Haven, " Security Management, November 2008, http://www.securitymanagement.com/article/russias-cybercrime-haven-004818
-
(2008)
Security Management
-
-
Barham, J.1
-
102
-
-
84897641730
-
Money Laundering: New Legislation and New Regulations, but Is it Enough?
-
Bradley J.-M. Runyon, "Money Laundering: New Legislation and New Regulations, but Is it Enough?" North Carolina Banking Institute 3 (1999): 337
-
(1999)
North Carolina Banking Institute
, vol.3
, pp. 337
-
-
Bradley Runyon, J.-M.1
-
103
-
-
84909424577
-
Fatal Broadside: The Demise of Caribbean Offshore Financial Confidentiality Post USA Patriot Act
-
G. Scott Dowling, "Fatal Broadside: The Demise of Caribbean Offshore Financial Confidentiality Post USA Patriot Act, " Transnational Lawyer 17 (2004): 259
-
(2004)
Transnational Lawyer
, vol.17
, pp. 259
-
-
Scott Dowling, G.1
-
104
-
-
84992954178
-
Reacting to Cyber-Intrusions: The Technical, Legal and Ethical Dimensions
-
Richard E. Overill, "Reacting to Cyber-Intrusions: The Technical, Legal and Ethical Dimensions, " Journal of Financial Crime 11 (2003): 163
-
(2003)
Journal of Financial Crime
, vol.11
, pp. 163
-
-
Overill, R.E.1
-
106
-
-
85182770952
-
Strike and Counterstrike: The Law on Automated Intrusions and Striking Back
-
February 27
-
Curtis E. A. Karnow, "Strike and Counterstrike: The Law on Automated Intrusions and Striking Back, " Black Hat Windows Security, February 27, 2003, http://www.blackhat.com/presentations/win-usa-03/bh-win-03-karnow-notes.pdf
-
(2003)
Black Hat Windows Security
-
-
Curtis Karnow, E.A.1
-
107
-
-
85182749799
-
Hacking Back: Optimal Use of Self-Defense in Cyberspace
-
March 18
-
Ruperto P. Majuca and Jay P. Kegan, "Hacking Back: Optimal Use of Self-Defense in Cyberspace, " Social Science Research Network, March 18, 2009, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1363932
-
(2009)
Social Science Research Network
-
-
Majuca, R.P.1
Kegan, J.P.2
-
109
-
-
85182767680
-
Brandeis: The Public Activist and Freedom of Speech
-
664-665
-
Philippa Strum, "Brandeis: The Public Activist and Freedom of Speech, " Brandeis Law Journal 45 (2007): 659, 664-65
-
(2007)
Brandeis Law Journal
, vol.45
, pp. 659
-
-
Strum, P.1
|