메뉴 건너뛰기




Volumn , Issue , 2010, Pages 1-283

Cybercrime: Criminal threats from cyberspace

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85182777445     PISSN: None     EISSN: None     Source Type: Book    
DOI: None     Document Type: Book
Times cited : (72)

References (110)
  • 1
    • 85182776974 scopus 로고    scopus 로고
    • The 'Stalker' Who Stayed at Home: A Town Terrorized over the Internet
    • September 2
    • Michele Kurtz, ''The 'Stalker' Who Stayed at Home: A Town Terrorized over the Internet,'' Boston Globe, September 2, 2001, A1
    • (2001) Boston Globe , pp. A1
    • Kurtz, M.1
  • 2
    • 85182763936 scopus 로고    scopus 로고
    • 'Cyberspace Terrorist' Gets Jail: Townsend School Was His Target
    • June 6
    • Michele Kurtz, "'Cyberspace Terrorist' Gets Jail: Townsend School Was His Target, " Boston Globe, June 6, 2001, B1
    • (2001) Boston Globe , pp. B1
    • Kurtz, M.1
  • 3
    • 85182751371 scopus 로고    scopus 로고
    • Missouri Man Pleads Innocent to Terrorizing Students Online
    • August 15
    • Jessica Heslam, "Missouri Man Pleads Innocent to Terrorizing Students Online, " Boston Herald, August 15, 2000, 2
    • (2000) Boston Herald , pp. 2
    • Heslam, J.1
  • 4
    • 85182751128 scopus 로고    scopus 로고
    • Charges Filed in Threat, Porn Case
    • October 26
    • Bill Graham, "Charges Filed in Threat, Porn Case, " Kansas City Star, October 26, 1999, A1
    • (1999) Kansas City Star , pp. A1
    • Graham, B.1
  • 5
    • 85182751128 scopus 로고    scopus 로고
    • Disk Tied to Threat
    • October 27
    • Bill Graham, "Disk Tied to Threat, " Kansas City Star, October 27, 1999, B1
    • (1999) Kansas City Star , pp. B1
    • Graham, B.1
  • 6
    • 12344293756 scopus 로고    scopus 로고
    • Is There Such a Thing as 'Virtual Crime'?
    • Susan W. Brenner, "Is There Such a Thing as 'Virtual Crime'?" California Criminal Law Review 4 (2001): 1, http://www.boalt.org/CCLR/v4/v4 brenner.htm
    • (2001) California Criminal Law Review , vol.4 , pp. 1
    • Brenner, S.W.1
  • 8
    • 34249866520 scopus 로고
    • New York: Charles Scribner's Sons
    • Donn Parker, Crime by Computer (New York: Charles Scribner's Sons, 1976), x-xi
    • (1976) Crime by Computer , pp. x-xi
    • Parker, D.1
  • 11
    • 85182778798 scopus 로고    scopus 로고
    • http://en.wikipedia.org/wiki/ Mainframe_computer
  • 13
    • 2542642717 scopus 로고
    • New York: Walker and Company
    • Gerald McKnight, Computer Crime (New York: Walker and Company, 1973), 97-112
    • (1973) Computer Crime , pp. 97-112
    • McKnight, G.1
  • 14
    • 85069016114 scopus 로고
    • Crime in the Suites: On the Rise
    • December 3
    • David Pauly et al., "Crime in the Suites: On the Rise, " Newsweek, December 3, 1979, 114
    • (1979) Newsweek , pp. 114
    • Pauly, D.1
  • 15
    • 85182748623 scopus 로고
    • The Computer Bandits
    • August 9
    • Allan J. Mayer, "The Computer Bandits, " Newsweek, August 9, 1976, 58
    • (1976) Newsweek , pp. 58
    • Mayer, A.J.1
  • 16
    • 85182774332 scopus 로고
    • Action Urged to Curb Crime by Computer
    • June 22
    • Larry Kramer, "Action Urged to Curb Crime by Computer, " Washington Post, June 22, 1978, D11
    • (1978) Washington Post , pp. D11
    • Kramer, L.1
  • 17
    • 85021957710 scopus 로고
    • Scotland Yard Deprograms Great Computer Tape Heist
    • January 14
    • Bernard D. Nossiter, "Scotland Yard Deprograms Great Computer Tape Heist, " Washington Post, January 14, 1977, A15
    • (1977) Washington Post , pp. A15
    • Nossiter, B.D.1
  • 18
    • 85182761629 scopus 로고    scopus 로고
    • http://en.wikipedia.org/wiki/Phreaking
  • 20
    • 85182788590 scopus 로고    scopus 로고
    • http://en.wikipedia.org/ wiki/Blue_box
  • 22
    • 85182749542 scopus 로고    scopus 로고
    • http://en.wikipedia.org/wiki/ Theft_of_services
  • 25
    • 85182796174 scopus 로고    scopus 로고
    • Dial-Tone Phreak
    • December 30
    • Elizabeth McCracken, "Dial-Tone Phreak, " New York Times, December 30, 2007
    • (2007) New York Times
    • McCracken, E.1
  • 26
    • 85182764641 scopus 로고    scopus 로고
    • RIP-Joybubbles, Honorary Geekdad
    • August 18
    • "RIP-Joybubbles, Honorary Geekdad, " Wired, August 18, 2007, http://www.democraticwarrior.com/forum/showthread.php?p=155216
    • (2007) Wired
  • 27
    • 85182788200 scopus 로고    scopus 로고
    • The Twilight Years of Cap'n Crunch
    • January 13
    • Chris Rhoads, "The Twilight Years of Cap'n Crunch, " Wall Street Journal, January 13, 2007, 1
    • (2007) Wall Street Journal , pp. 1
    • Rhoads, C.1
  • 28
    • 85084629497 scopus 로고
    • 'Hackers' Ignore Consequents of Their High-Tech Joy Rides
    • Mary Thornton, "'Hackers' Ignore Consequents of Their High-Tech Joy Rides, " Washington Post, 1984, A1
    • (1984) Washington Post , pp. A1
    • Thornton, M.1
  • 30
    • 85182771976 scopus 로고    scopus 로고
    • http://www.netvalley.com/archives/mirrors/cerf-how-inet.txt
  • 32
    • 84894734322 scopus 로고
    • Young Computer Bandits Byte Off More than They Could Chew
    • Barton Gellman, "Young Computer Bandits Byte Off More than They Could Chew, " Washington Post, August 30, 1983, A2
    • (1983) Washington Post , pp. A2
    • Gellman, B.1
  • 33
    • 85182792178 scopus 로고
    • Film Provided Model for NASA Security Breach, Teen Says
    • August 27
    • John Gallant, "Film Provided Model for NASA Security Breach, Teen Says, " Computerworld, August 27, 1984, 18
    • (1984) Computerworld , pp. 18
    • Gallant, J.1
  • 34
    • 85182757368 scopus 로고
    • Electronic Funds Transfer Review: A Look at Security
    • April 2
    • Michael Weinstein, "Electronic Funds Transfer Review: A Look at Security, " American Banker, April 2, 1984, 11
    • (1984) American Banker , pp. 11
    • Weinstein, M.1
  • 35
    • 79958858021 scopus 로고    scopus 로고
    • War Games: A Look Back at the Film That Turned Geeks and Phreaks into Stars
    • July 21
    • Scott Brown, "War Games: A Look Back at the Film That Turned Geeks and Phreaks into Stars, " Wired, July 21, 2008
    • (2008) Wired
    • Brown, S.1
  • 36
    • 84884424411 scopus 로고
    • The FBI Goes after Hackers
    • March 26
    • Tom Shea, "The FBI Goes after Hackers, " InfoWorld, March 26, 1984, 38
    • (1984) InfoWorld , pp. 38
    • Shea, T.1
  • 37
    • 0003954001 scopus 로고
    • (New York: Ace Books, reissue edition)
    • William Gibson, Neuromancer (New York: Ace Books, 1995 reissue edition), 51
    • (1995) Neuromancer , pp. 51
    • Gibson, W.1
  • 40
    • 0345257994 scopus 로고    scopus 로고
    • Minneapolis: University of Minnesota Press
    • Douglas Thomas, Hacker Culture (Minneapolis: University of Minnesota Press, 2002), 81
    • (2002) Hacker Culture , pp. 81
    • Thomas, D.1
  • 42
    • 85182800529 scopus 로고
    • Former Van Nuys Man Pleads Guilty to Computer Fraud
    • June 15
    • Janet Gilmore, "Former Van Nuys Man Pleads Guilty to Computer Fraud, " Daily News (Los Angeles), June 15, 1994, N6
    • (1994) Daily News (Los Angeles) , pp. N6
    • Gilmore, J.1
  • 43
    • 85032357646 scopus 로고    scopus 로고
    • Wikipedia
    • "Unsolved Mysteries, " Wikipedia, http://en.wikipedia.org/wiki/ Unsolved_Mysteries
    • Unsolved Mysteries
  • 44
    • 85182768624 scopus 로고
    • Is Law Enforcement Ready for Cybercrime?
    • October 10
    • Benjamin Wittes, "Is Law Enforcement Ready for Cybercrime?" Legal Times, October 10, 1994, 1
    • (1994) Legal Times , pp. 1
    • Wittes, B.1
  • 45
    • 84894840680 scopus 로고
    • Computer Hacker Who Jumped Bail Gets 41 Months
    • November 28
    • Leslie Berger, "Computer Hacker Who Jumped Bail Gets 41 Months, " Los Angeles Times, November 28, 1995, 5
    • (1995) Los Angeles Times , pp. 5
    • Berger, L.1
  • 46
    • 85182786301 scopus 로고
    • Hackers Targeting Credit Cards
    • August 14
    • Mark Guidera, "Hackers Targeting Credit Cards, " (Albany) Times Union, August 14, 1994, A8
    • (1994) (Albany) Times Union , pp. A8
    • Guidera, M.1
  • 47
    • 85182777910 scopus 로고
    • Criminals Lurk in Alleys of Cyberspace
    • April 1
    • Stevan Rosenlind, "Criminals Lurk in Alleys of Cyberspace, " Baltimore Sun, April 1, 1994, 6C
    • (1994) Baltimore Sun , pp. 6C
    • Rosenlind, S.1
  • 48
    • 84894759980 scopus 로고
    • Cybercrime Epidemic at Major Corporations
    • October 25
    • Brian Akre, "Cybercrime Epidemic at Major Corporations, " Times-Picayune, October 25, 1995, C1
    • (1995) Times-Picayune , pp. C1
    • Akre, B.1
  • 49
    • 85182801364 scopus 로고
    • Firms Face Business Pitfalls on the 'Net'
    • October 16
    • Ellen Messmer, "Firms Face Business Pitfalls on the 'Net', " Network World, October 16, 1995, 35
    • (1995) Network World , pp. 35
    • Messmer, E.1
  • 50
    • 84894870474 scopus 로고    scopus 로고
    • The Computer Virus-No Cures to Be Found
    • November 25
    • Robert Lemos, "The Computer Virus-No Cures to Be Found, " ZD Net, November 25, 2003, http://news.zdnet.com/2100-1009_22-5111442.html
    • (2003) ZD Net
    • Lemos, R.1
  • 52
    • 84894736638 scopus 로고
    • Virus Victims Are Stoic in Face of Multinet Attack
    • November 14
    • Lauren DiDio, "Virus Victims Are Stoic in Face of Multinet Attack, " Network World, November 14, 1988, 6
    • (1988) Network World , pp. 6
    • DiDio, L.1
  • 53
    • 84894716452 scopus 로고
    • Morris Felony Charge Expected by End of July
    • July 17
    • Michael Alexander, "Morris Felony Charge Expected by End of July, " Computerworld, July 17, 1989, 4
    • (1989) Computerworld , pp. 4
    • Alexander, M.1
  • 54
    • 84894691967 scopus 로고
    • Computer Intruder Is Found Guilty
    • January 23
    • John Markoff, "Computer Intruder Is Found Guilty, " New York Times, January 23, 1990, A21
    • (1990) New York Times , pp. A21
    • Markoff, J.1
  • 55
    • 84894691967 scopus 로고
    • Computer Intruder Is Put on Probation and Fined $10, 000
    • May 5
    • John Markoff, "Computer Intruder Is Put on Probation and Fined $10, 000, " New York Times, May 5, 1990, 11
    • (1990) New York Times , pp. 11
    • Markoff, J.1
  • 56
    • 85182794456 scopus 로고    scopus 로고
    • Ex-hacker Hawks Laptops, Hypes Book
    • October 7
    • Elinor Mills Abreu, "Ex-hacker Hawks Laptops, Hypes Book, " Chicago Tribune, October 7, 2002, 2
    • (2002) Chicago Tribune , pp. 2
    • Abreu, E.M.1
  • 57
    • 85071616528 scopus 로고
    • Cyberspace's Most Wanted
    • July 4
    • John Markoff, "Cyberspace's Most Wanted, " New York Times, July 4, 1994, 11
    • (1994) New York Times , pp. 11
    • Markoff, J.1
  • 58
    • 33750437281 scopus 로고    scopus 로고
    • The Talented Mr. Mitnick
    • March 1
    • Gregory T. Huang, "The Talented Mr. Mitnick, " Technology Review, March 1, 2005, 21
    • (2005) Technology Review , pp. 21
    • Huang, G.T.1
  • 60
    • 85182752354 scopus 로고    scopus 로고
    • The Boy Who Hacked into the Pentagon's Computer
    • April 10
    • Kathryn Lister, "The Boy Who Hacked into the Pentagon's Computer, " The Sun (UK), April 10, 1998, 6
    • (1998) The Sun (UK) , pp. 6
    • Lister, K.1
  • 61
    • 85182793228 scopus 로고    scopus 로고
    • Hacker Suspect Faces 15 Years
    • May 24
    • Jon Swartz, "Hacker Suspect Faces 15 Years, " San Francisco Chronicle, May 24, 1997, D1
    • (1997) San Francisco Chronicle , pp. D1
    • Swartz, J.1
  • 62
    • 85182778578 scopus 로고    scopus 로고
    • Inquirer. net, March 12
    • Thea Alberto, "7 International Cyber Thieves Nabbed in RP, " Inquirer. net, March 12, 2007, http://newsinfo.inquirer.net/breakingnews/infotech/ view_article.php?article_id=54389
    • (2007) 7 International Cyber Thieves Nabbed in RP
    • Alberto, T.1
  • 63
    • 85182753417 scopus 로고    scopus 로고
    • Dispelling the Myths about Viruses Is a First Step to Keeping Your Net Healthy
    • May 13
    • Linda Musthaler, "Dispelling the Myths about Viruses Is a First Step to Keeping Your Net Healthy, " Network World, May 13, 1996, 42
    • (1996) Network World , pp. 42
    • Musthaler, L.1
  • 64
    • 85182791559 scopus 로고
    • 'Innocent' Files Can Carry a Virus
    • September 12
    • Stephen Manes, "'Innocent' Files Can Carry a Virus, " New York Times, September 12, 1995, C8
    • (1995) New York Times , pp. C8
    • Manes, S.1
  • 65
    • 85182782456 scopus 로고    scopus 로고
    • Mutant E-Mail Viruses Battled
    • March 30
    • Miguel Helft, "Mutant E-Mail Viruses Battled, " San Jose Mercury News, March 30, 1999, 1A
    • (1999) San Jose Mercury News , pp. 1A
    • Helft, M.1
  • 66
    • 33745217557 scopus 로고    scopus 로고
    • FBI Agent Charged with Hacking
    • August 15
    • Mike Brunker, "FBI Agent Charged with Hacking, " MSNBC, August 15, 2002, http://www.msnbc.msn.com/id/3078784/
    • (2002) MSNBC
    • Brunker, M.1
  • 67
    • 85182792490 scopus 로고    scopus 로고
    • U.S. Department of Justice, Criminal Resource Manual 274, http://www.usdoj.gov/usao/eousa/foia_reading_room/usam/title9/crm00274.htm
    • Criminal Resource Manual , vol.274
  • 68
    • 47649118173 scopus 로고    scopus 로고
    • Bilateralism, Multilateralism, and the Architecture of International Law
    • Gabriella Blum, "Bilateralism, Multilateralism, and the Architecture of International Law, " Harvard International Law Journal 49 (2008): 323, 260
    • (2008) Harvard International Law Journal , vol.49 , pp. 323
    • Blum, G.1
  • 69
    • 85182769657 scopus 로고    scopus 로고
    • The Role of the United States in International Criminal Justice
    • 823
    • Clint Williamson, "The Role of the United States in International Criminal Justice, " Penn State International Law Review 25 (2007): 819, 823
    • (2007) Penn State International Law Review , vol.25 , pp. 819
    • Williamson, C.1
  • 70
    • 84894731684 scopus 로고    scopus 로고
    • Prosecuting International Terrorists
    • 843-844
    • Sarah E. Tilstra, "Prosecuting International Terrorists, " Pacific Rim Law and Policy Journal 12 (2003): 835, 843-44
    • (2003) Pacific Rim Law and Policy Journal , vol.12 , pp. 835
    • Tilstra, S.E.1
  • 71
    • 56049110303 scopus 로고    scopus 로고
    • Leaving the House: The Constitutional Status of Resignation from the House of Representatives
    • 204
    • Josh Chafetz, "Leaving the House: The Constitutional Status of Resignation from the House of Representatives, " Duke Law Journal 58 (2008): 177, 204
    • (2008) Duke Law Journal , vol.58 , pp. 177
    • Chafetz, J.1
  • 72
    • 76249086752 scopus 로고    scopus 로고
    • Mad about Yoo, or, Why Worry about the Next Unconstitutional War?
    • 110
    • Stuart Streichler, "Mad about Yoo, or, Why Worry about the Next Unconstitutional War?" Journal of Law and Politics, 24 (2008): 93, 110
    • (2008) Journal of Law and Politics , vol.24 , pp. 93
    • Streichler, S.1
  • 73
    • 85182800288 scopus 로고
    • Perpich v. United States Department of Defense: Who Controls the Weekend Soldier?
    • Roy W. Breiten-bach, "Perpich v. United States Department of Defense: Who Controls the Weekend Soldier?" Saint John's Law Review 64 (1989): 133, 133
    • (1989) Saint John's Law Review , vol.64 , pp. 133
    • Breitenbach, R.W.1
  • 74
    • 1542394938 scopus 로고    scopus 로고
    • First Principles of American Federalism and the Nature of Federal Criminal Jurisdiction
    • 21-25
    • Adam H. Kurland, "First Principles of American Federalism and the Nature of Federal Criminal Jurisdiction, " Emory Law Journal 45 (1996): 1, 21-25
    • (1996) Emory Law Journal , vol.45 , pp. 1
    • Kurland, A.H.1
  • 75
    • 85117509911 scopus 로고    scopus 로고
    • Exploring a European Union Constitution: Unexpected Lessons from the American Experience
    • 86
    • Ken Gormly, "Exploring a European Union Constitution: Unexpected Lessons from the American Experience, " Rutgers Law Journal 35 (2003): 69, 86
    • (2003) Rutgers Law Journal , vol.35 , pp. 69
    • Gormly, K.1
  • 76
    • 85182778676 scopus 로고    scopus 로고
    • America's Anti-Standing Army Tradition and the Separate Community Doctrine
    • 154
    • Earl F. Martin, "America's Anti-Standing Army Tradition and the Separate Community Doctrine, " Mississippi Law Journal 76 (2006): 135, 154
    • (2006) Mississippi Law Journal , vol.76 , pp. 135
    • Martin, E.F.1
  • 77
    • 77954519235 scopus 로고
    • Racketeering and the Federalization of Crime
    • Craig M. Bradley, "Racketeering and the Federalization of Crime, " American Criminal Law Review 22 (1984): 213
    • (1984) American Criminal Law Review , vol.22 , pp. 213
    • Bradley, C.M.1
  • 79
    • 0039555878 scopus 로고
    • Criminal Mischief: The Federalization of American Criminal Law
    • Kathleen F. Brickey, "Criminal Mischief: The Federalization of American Criminal Law, " Hastings Law Journal 46 (1995): 1135
    • (1995) Hastings Law Journal , vol.46 , pp. 1135
    • Brickey, K.F.1
  • 80
    • 84883688902 scopus 로고    scopus 로고
    • Responding to the Time-Based Failures of the Criminal Law through a Criminal Sunset Amendment
    • 1344
    • Richard E. Myers II, "Responding to the Time-Based Failures of the Criminal Law through a Criminal Sunset Amendment, " Boston College Law Review 49 (2008): 1327, 1344
    • (2008) Boston College Law Review , vol.49 , pp. 1327
    • Richard, E.1    Myers, I.I.2
  • 81
    • 0347020664 scopus 로고    scopus 로고
    • The Private Police
    • 1211
    • David Sklansky, "The Private Police, " U.C.L.A. Law Review 46 (1999): 1165, 1211
    • (1999) U.C.L.A. Law Review , vol.46 , pp. 1165
    • Sklansky, D.1
  • 83
    • 45849111528 scopus 로고    scopus 로고
    • The Posse Comitatus Act: Toward a Right to Civil Law Enforcement
    • 429
    • Sean J. Kealy, "The Posse Comitatus Act: Toward a Right to Civil Law Enforcement, " Yale Law and Policy Review 21 (2003): 383, 429
    • (2003) Yale Law and Policy Review , vol.21 , pp. 383
    • Kealy, S.J.1
  • 84
    • 76249098185 scopus 로고    scopus 로고
    • Prosecutors in State Courts, 2005
    • Steven W. Perry, "Prosecutors in State Courts, 2005, " Bureau of Justice Statistics Bulletin, July 2006, 6, http://www.ojp.gov/bjs/abstract/psc05.htm
    • (2006) Bureau of Justice Statistics Bulletin
    • Perry, S.W.1
  • 85
    • 85182785943 scopus 로고    scopus 로고
    • FBI, Secret Service Must Improve Cybercrime Training
    • Jason Miller, "FBI, Secret Service Must Improve Cybercrime Training, " Federal Computer Week, July 23, 2007, http://fcw.com/articles/2007/07/ 23/fbi-secret-service-must-improve-cybercrime-training.aspx
    • (2007) Federal Computer Week
    • Miller, J.1
  • 88
    • 84902905280 scopus 로고
    • Courts, Covenants, and Communities
    • 1392
    • Clayton P. Gillette, "Courts, Covenants, and Communities, " University of Chicago Law Review 61 (1994): 1375, 1392
    • (1994) University of Chicago Law Review , vol.61 , pp. 1375
    • Gillette, C.P.1
  • 89
    • 85182783300 scopus 로고    scopus 로고
    • McAfee Launches Cybercrime Unit
    • April 8
    • John Wagley, "McAfee Launches Cybercrime Unit, " Security Management, April 8, 2009, http://www.securitymanagement.com/news/mcafee-launches-cybercrime-unit-005618
    • (2009) Security Management
    • Wagley, J.1
  • 92
    • 0347020664 scopus 로고    scopus 로고
    • The Private Police
    • 1197
    • Olivero, Robinson, and Scaglion, Police in Contradiction, supra, 20; David A. Sklansky, "The Private Police, " UCLA Law Review 46 (1999): 1165, 1197
    • (1999) UCLA Law Review , vol.46 , pp. 1165
    • Sklansky, D.A.1
  • 93
    • 0242649810 scopus 로고    scopus 로고
    • Are Cops Constitutional?
    • 692-693
    • Olivero, Robinson, and Scaglion, Police in Contradiction, 20; Roger Roots, "Are Cops Constitutional?" Seton Hall Constitutional Law Journal 11 (2001): 685, 692-93
    • (2001) Seton Hall Constitutional Law Journal , vol.11 , pp. 685
    • Roots, R.1
  • 96
    • 84990362417 scopus 로고
    • The Beat Generation: Community Policing at Its Best
    • William D. Eggers and John O'Leary, "The Beat Generation: Community Policing at Its Best, " Policy Review 74 (1995): 1
    • (1995) Policy Review , vol.74 , pp. 1
    • Eggers, W.D.1    O'Leary, J.2
  • 97
    • 85182779668 scopus 로고    scopus 로고
    • Call Made for More Cybercrime to Be Reported to Police
    • December 9
    • Dan Raywood, "Call Made for More Cybercrime to Be Reported to Police, " SC Magazine, December 9, 2008, http://www.scmagazineuk.com/Call-made-for-more-cybercrime-to-be-reported-to-police/article/122299/
    • (2008) SC Magazine
    • Raywood, D.1
  • 100
    • 84894762034 scopus 로고
    • Proposed Rule 12.3: Prosecutorial Discovery and the Defense of Federal Authority
    • 1316
    • Mary Patricia Jones, "Proposed Rule 12.3: Prosecutorial Discovery and the Defense of Federal Authority, " Virginia Law Review 72 (1986): 1299, 1316
    • (1986) Virginia Law Review , vol.72 , pp. 12996
    • Jones, M.P.1
  • 101
    • 85182755671 scopus 로고    scopus 로고
    • Russia's Cybercrime Haven
    • November
    • John Barham, "Russia's Cybercrime Haven, " Security Management, November 2008, http://www.securitymanagement.com/article/russias-cybercrime-haven-004818
    • (2008) Security Management
    • Barham, J.1
  • 102
    • 84897641730 scopus 로고    scopus 로고
    • Money Laundering: New Legislation and New Regulations, but Is it Enough?
    • Bradley J.-M. Runyon, "Money Laundering: New Legislation and New Regulations, but Is it Enough?" North Carolina Banking Institute 3 (1999): 337
    • (1999) North Carolina Banking Institute , vol.3 , pp. 337
    • Bradley Runyon, J.-M.1
  • 103
    • 84909424577 scopus 로고    scopus 로고
    • Fatal Broadside: The Demise of Caribbean Offshore Financial Confidentiality Post USA Patriot Act
    • G. Scott Dowling, "Fatal Broadside: The Demise of Caribbean Offshore Financial Confidentiality Post USA Patriot Act, " Transnational Lawyer 17 (2004): 259
    • (2004) Transnational Lawyer , vol.17 , pp. 259
    • Scott Dowling, G.1
  • 104
    • 84992954178 scopus 로고    scopus 로고
    • Reacting to Cyber-Intrusions: The Technical, Legal and Ethical Dimensions
    • Richard E. Overill, "Reacting to Cyber-Intrusions: The Technical, Legal and Ethical Dimensions, " Journal of Financial Crime 11 (2003): 163
    • (2003) Journal of Financial Crime , vol.11 , pp. 163
    • Overill, R.E.1
  • 106
    • 85182770952 scopus 로고    scopus 로고
    • Strike and Counterstrike: The Law on Automated Intrusions and Striking Back
    • February 27
    • Curtis E. A. Karnow, "Strike and Counterstrike: The Law on Automated Intrusions and Striking Back, " Black Hat Windows Security, February 27, 2003, http://www.blackhat.com/presentations/win-usa-03/bh-win-03-karnow-notes.pdf
    • (2003) Black Hat Windows Security
    • Curtis Karnow, E.A.1
  • 107
    • 85182749799 scopus 로고    scopus 로고
    • Hacking Back: Optimal Use of Self-Defense in Cyberspace
    • March 18
    • Ruperto P. Majuca and Jay P. Kegan, "Hacking Back: Optimal Use of Self-Defense in Cyberspace, " Social Science Research Network, March 18, 2009, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1363932
    • (2009) Social Science Research Network
    • Majuca, R.P.1    Kegan, J.P.2
  • 109
    • 85182767680 scopus 로고    scopus 로고
    • Brandeis: The Public Activist and Freedom of Speech
    • 664-665
    • Philippa Strum, "Brandeis: The Public Activist and Freedom of Speech, " Brandeis Law Journal 45 (2007): 659, 664-65
    • (2007) Brandeis Law Journal , vol.45 , pp. 659
    • Strum, P.1
  • 110


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.