Atjaunināt sīkdatņu piekrišanu

E-grāmata: Computer Crime

Edited by
Citas grāmatas par šo tēmu:
  • Formāts - EPUB+DRM
  • Cena: 363,16 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Bibliotēkām
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Alongside its positive impact of providing a global reach, the Internet is prone to a variety of abuses. In the 1990s it was unauthorised access of computers and impairment of the operation of computers through the introduction of viruses and worms that took centre stage. Since then the potential of the Internet for fraudulent activities has been realised by the criminal fraternity and, in recent years, we have seen, for instance, the rise of identity theft and the widespread distribution of offensive and illegal materials. The collection of essays in this volume, while being highly selective, provides a snapshot of the parameters of computer crime, the legal response and discussions surrounding ways to improve the security of cyberspace.

Recenzijas

'...this collection is a good starting point for further reading ... a useful addition to a library of material on the subject of cybercrime' Journal of the Law Society of Scotland

Acknowledgments vii
Series Preface ix
Introduction xi
PART I THE PARAMETERS OF COMPUTER CRIME
`Shoring Up the Weakest Link: What Lawmakers Around the World Need to Consider in Developing Comprehensive Laws to Combat Cyber Crime', Columbia Journal of Transnational Law, 43, pp. 705-62
3(58)
Richard W. Downing
`The Voyeuristic Hacker', Journal of Internet Law, 2, pp. 12-23
61(12)
Brian M. Hoffstadt
```Phishing'' for a Solution: Domestic and International Approaches to Decreasing Online Identity Theft', Emory International Law Review, 20, pp. 397-433
73(38)
Lauren L. Sullins
`Cyberextortion at Online Gambling Sites: Criminal Organization and Legal Challenges', Gaming Law Review, 11, pp. 648-65
111(20)
John McMullan
Aunshul Rege
PART II HARMONIZATION OF COMPUTER CRIME LAWS - THE COUNCIL OF EUROPE CONVENTION ON CYBERCRIME AND THE ADDITIONAL PROTOCOL TO THE COUNCIL OF EUROPE CONVENTION
`The Council of Europe Convention on Cybercrime', Journal of Transnational Law and Policy, 12, pp. 287-326
131(40)
Mike Keyser
`The Convention on Cybercrime: A Harmonized Implementation of International Penal Law: What Prospects for Procedural Due Process?', John Marshall Journal of Computer and Information Law, 23, pp. 329-61
171(34)
Miriam F. Miquelon-Weismann
`In Search of a Balance Between Police Power and Privacy in the Cybercrime Treaty', Richmond Journal of Law and Technology, 9, pp. 1-59
205(60)
D.C. Kennedy
`Go to Jail --- Do Not Pass Go, Do Not Pay Civil Damages: The United States' Hesitation Towards the International Convention on Cybercrime's Copyright Provisions', John Marshall Review of Intellectual Property Law, 1, pp. 364-82
265(20)
Adrienne N. Kitchen
`Combating Child Pornography on the Internet: The Council of Europe's Convention on Cybercrime', Temple International and Comparative Law Journal, 16, pp. 477-518
285(42)
Dina I. Oddis
`Internet Hate Speech: The European Framework and the Emerging American Haven', Washington and Lee Law Review, 62, pp. 781-830
327(52)
Christopher D. Van Blarcum
PART III INVESTIGATION, JURISDICTION AND SENTENCING ISSUES
`The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium', Duke Journal of Comparative and International Law, 9, pp. 451-89
379(40)
Michael A. Sussman
`International Cyber-Jurisdiction: A Comparative Analysis', American Business Law Journal, 39, pp. 531-73
419(44)
Ray August
`Cyber Crime and Punishment: Filtering Out Internet Felons', Fordham Intellectual Property, Media and Entertainment Law Journal, 14, pp. 1051-92
463(44)
Jessica Habib
PART IV CYBER SECURITY
`Who's to Protect Cyberspace?', Journal of Law, Economics and Policy, 1, pp. 473-95
507(24)
Christopher J. Coyne
Peter T. Lesson
`Hacking, Poaching, and Counterattacking: Digital Counterstrikes and the Contours of Self-Help', Journal of Law, Economics and Policy, 1, pp. 171-95
531(26)
Bruce P. Smith
`Virtual Crime, Virtual Deterrence: A Skeptical View of Self-Help, Architecture, and Civil Liability', Journal of Law, Economics and Policy, 1, pp. 197-214
557(18)
Orin S. Kerr
Name Index 575
Indira Carr is a Professor at the School of Law, University of Surrey, UK