书籍 Cyberspace crime的封面

Cyberspace crimePDF电子书下载

Ashgate

购买点数

17

出版社

出版时间

2003

ISBN

标注页数

582 页

PDF页数

605 页

标签

图书目录

PART Ⅰ THEORETICAL PERSPECTIVES AND VIEWPOINTS 3

1 David S. Wall (1999), 'Cybercrimes: New Wine, No Bottles?', in P. Davies, P. Francis and V. Jupp (eds), Invisible Crimes: Their Victims and their Regulation, London: Macmillan, pp. 105-39. 3

2 EN. Grabosky and Russell G. Smith (2001), 'Digital Crime in the Twenty-First Century', Journal oflnformation Ethics, 10, pp. 8-26. 39

3 Alan Norrie (2001), 'Dialogue and Debate: The Nature of Virtual Criminality', Social and Legal Studies, 10, pp. 227-28. 59

4 Wanda Capeller (2001), 'Not Such a Neat Net: Some Comments on Virtual Criminality', Social and Legal Studies, 10, pp. 229-42. 61

5 Peter N. Grabosky (2001), 'Virtual Criminality: Old Wine in New Bottles?', Social and Legal Studies, 10, pp. 243-49. 75

6 Francis Snyder (2001), 'Sites of Criminality and Sites of Governance', Social and Legal Studies, 10, pp. 251-56. 83

7 Graham Greenleaf (1998), 'An Endnote on Regulating Cyberspace: Architecture vs Law'?', University of New South Wales Law Journal, 21, pp. 593M522. 89

PART Ⅱ CYBERCRIMES 121

8 Amanda Chandler (1996), 'The Changing Definition and Image of Hackers in Popular Discourse', International Journal of the Sociology of Law, 24, pp. 229-51. 121

9 Liz Duff and Simon Gardiner (1996), 'Computer Crime in the Global Village: Strategies for Control and Regulation - in Defence of the Hacker', International Journal of the Sociology of Law, 24, pp. 211-28. 145

10 Tim Jordan and Paul Taylor (1998), 'A Sociology of Hackers', Sociological Review, November, pp. 757-80. 163

11 David Mann and Mike Sutton (1998), 'Netcrime: More Change in the Organization of Thieving', British Journal of Criminology, 38, pp. 201-29. 187

12 Dorothy E. Denning (2000), 'Cyberterrorism: The Logic Bomb versus the Truck Bomb', Global Dialogue, Autumn, pp. 29-37. 217

13 David L. Speer (2000), 'Redefining Borders: The Challenges of Cybercrime', Crime, Law and Social Change, 34, pp. 259-73. 227

14 George Smith (1998), 'An Electronic Pearl Harbor'? Not Likely', Issues in Science and Technology, 15, pp. 68-73. 243

15 Hedieh Nasheri and Timothy J. O'Hearn (1999), 'The Worldwide Search for Techno-thieves: International Competition v. International Co-operation', International Review of Law Computers and Technology, 13, pp. 373-82. 249

16 C. David Freedman (1999), 'The Extension of the Criminal Law to Protecting Confidential Commercial Information: Comments on the Issues and the CyberContext', International Review of Law Computers and Technology, 13, pp. 147-62. 259

17 Louise Ellison and Yaman Akdeniz (1998), 'Cyberstalking: The Regulation of Harassment on the Internet', Criminal Law Review Special Edition 1998, pp. 29-47. 275

18 Matthew Williams (2000), 'Virtually Criminal: Discourse, Deviance and Anxiety within Virtual Communities', International Review of Law Computers and Technology, 14, pp. 95-104. 295

19 Nadine Strossen (2000), 'Cybercrimes v. Cyberliberties', International Review of Law Computers and Technology, 14, pp. 11-24. 305

20 Clive Walker and Yaman Akdeniz (1998), 'The Governance of the Internet in Europe with Special Reference to Illegal and Harmful Content', Criminal Law Review Special Edition 1998, pp. 5-18. 319

21 Marty Rimm (1995), 'Marketing Pornography on the Information Superhighway: A Survey of 917,410 Images, Descriptions, Short Stories, and Animations Downloaded 8.5 Million Times by Consumers in Over 2000 Cities in Forty Countries, Provinces, and Territories', Georgetown Law Journal, 83, pp. 1849-915. 333

22 Catharine A. MacKinnon (1995), 'Vindication and Resistance: A Response to the Carnegie Mellon Study of Pornography in Cyberspace', Georgetown Law Journal, 83, pp. 1959-67. 401

23 Donna L. Hoffman and Thomas P. Novak (1995), 'A Detailed Analysis of the Conceptual, Logical, and Methodological Flaws in the Article: "Marketing Pornography on the Information Superhighway"', Owen Graduate School of Management, Vanderbilt University, pp. 1-21. 411

24 Jon Spencer (1999), 'Crime on the Internet: Its Presentation and Representation', Howard Journal, 38, pp. 241-51. 433

PART Ⅲ CRIMINAL JUSTICE PROCESSES 447

25 Marc D. Goodman (1997), 'Why the Police Don't Care About Computer Crime', Harvard Journal of Law and Technology, 10, pp. 465-94. 447

26 David S. Wall (1998), 'Policing and the Regulation of the Internet', Criminal Law Review Special Edition 1998, pp. 79-91. 477

27 P.K. Manning (2001), 'Technology's Ways: Information Technology, Crime Analysis and the Rationalizing of Policing', Criminal Justice, 1, pp. 83-103. 491

28 Janet B.L. Chan (2001), 'The Technological Game: How Information Technology is Transforming Police Practice', Criminal Justice, 1, pp. 139-59. 513

29 Peter Sommer (1998), 'Digital Footprints: Assessing Computer Evidence', Criminal Law Review Special Edition 1998, pp. 61-78. 535

30 Clive Walker (1996), 'Fundamental Rights, Fair Trials and the New Audio-Visual Sector', Modern Law Review, 59, pp. 517-39. 553

Name Index 577

查看更多关于的内容

相关书籍
出版社其它书籍
在线购买PDF电子书
下载此书RAR压缩包