Ashgate, 2003 - Computers - 582 pages
Cyberspace Crime is a collection of key texts that have contributed towards, or have reflected, the various debates that have taken place over crime and the internet during that past decade. The texts are organised into three parts. The first contains a number of viewpoints and perspectives that facilitate our broader understanding of cyberspace crime/ cybercrimes. The second part addresses each of the major types of cybercrime - trespass/ hacking/cracking, thefts/ deceptions, obscenities/ pornography, violence - and illustrate their associated problems of definition and resolution. The third and final part contains a selection of texts that each deal with the impact of cyberspace crime upon specific criminal justice processes: the police and the trial process.
What people are saying - Write a review
We haven't found any reviews in the usual places.
The Nature of Virtual Criminality
Clive Walker and Yaman Akdeniz 1998 The Governance of the Internet
Clive Walker 1996 Fundamental Rights Fair Trials and the New AudioVisual
11 other sections not shown
Other editions - View all
activities adult agencies Akdeniz anonymity behaviour child pornography commercial Communications Decency Act computer crime Computer Misuse computer networks computer security computer systems Copyright created Criminal Justice criminal law Criminology cyber cybercrime cyberspace cyberspace architecture cyberterrorism developed deviance digital crime discussion downloads e-mail economic espionage electronic encryption Enjeux juridiques ethical European example forms fraud global Grabosky hackers hacking identified illegal images individual Information Superhighway information warfare intellectual property Internet issues law enforcement Law Journal legislation Lessig London messages newsgroups obscene offender operation Operation Sundevil organisations police potential problem protection real space Regulating Cyberspace Rimm risk SatHackers server service providers sexual social society supra surveillance telecommunications theft threat tion trade secrets types United Usenet users victims virtual community virtual criminality viruses white-collar crimes