773
Views
10
CrossRef citations to date
0
Altmetric
Miscellany

Crime and Security in Cyberspace

Pages 51-68 | Published online: 21 Oct 2010

References

  • Addis A 2004 The Thin State in Thick Globalism: Sovereignty in the Information Age Vanderbilt Journal of Transnational Law January 3 107
  • Andrews S 2000 Who Holds the Key? A Comparative Study of US and European Encryption Policies Journal of Information, Law and Technology 2 available at ⟨http://elj.warwick.ac.uk/jilt/00-2/andrews.html
  • Article 29 Data Protection Working Party (2004) Opinion 9/2004, available at ⟨www.europa.eu.int/comm/privacy
  • Bantekas I Nash S 2003 International Criminal Law (London, Cavendish)
  • Barlow JP 1996 A Declaration of the Independence of Cyberspace ’, 9 February, available at ⟨http://homes.eff.org/~barlow/Declaration-Final.html
  • Birnhack MD Elkin-Koren N 2003 The Invisible Handshake: the Re-emergence of the State in the Digital Environment', Virginia Journal of Law and Technology, 8(2), available at ⟨http://www.vjolt.net/vol8/issue2/v8i2_a06-Birnhack-Elkin-Koren.pdf
  • Brenner , S . 2004 . Toward a Criminal Law for Cyberspace: Distributed Security . Boston University Journal of Science & Technology Law , 10 ( 2 ) : 6 – 11 .
  • Brenner , S and Koops , BJ . 2004 . Approaches to Cybercrime Jurisdiction . Journal of High Technology Law , 4 ( 1 ) : 1 – 46 .
  • Casey E 2004 Digital Evidence and Computer Crime, Cambridge, Academic Press
  • Cassese A 2003 International Criminal Law, Oxford, Oxford University Press
  • Commission Communication to the Council and the European Parliament 2004 Critical Infrastructure Protection in the fight against terrorism COM 702 final, Brussels, 20 October
  • Council on Foreign Relations 2004 Cyberterrorism http://www.terrorismanswers.org/terrorism/cyberterrorism.html#Q1
  • CSI (Computer Security Institute) and FBI (Federal Bureau of Investigations) 2003 Computer Crime and Security Survey http://www.gocsi.com/forms/fbi/pdf.jhtml
  • Directive 95/46/EC (1995) ‘On the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of such Data', OJ L 281/31, 23.11.1995.
  • Denning D 2000 Cyberterrorism: The Logic Bomb versus the Truck Bomb Global Dialogue Autumn 29 37
  • G8 1997 Principles and Action Plan to Combat High-tech Crime ⟨www.usdoj.gov/ag/events/g82004/97Communique.pdf
  • G8 2003 Principles for Protecting Critical Information Infrastructure ⟨www.usdoj.gov/ag/events/g82004/g8_CIIP_Principles.pdf
  • Gibson W 1984 Neuromancer, (New York, HarperCollins
  • Goldsmith JL 1998 The Internet and the Abiding Significance of Territorial Sovereignty
  • Grabosky , P . 2001 . Virtual Criminality: Old Wine in New Bottles . Social & Legal Studies , 10 : 243 – 49 .
  • Grewlich K 1999 Governance in 'Cyberspace (New York, Kluwer Law International)
  • The Guardian 2003 Hacker Attack Left Port in Chaos 7 October
  • The Guardian 2004 Blunkett Plans to Lift Court Ban on Covert Evidence 23 September
  • Home Office 2003 Access to Communications Data: Respecting Privacy and Protecting the Public from Crime Consultation Paper, London, May
  • Johnson , D and Post , D . 1996, 1996 . Law and Borders: the Rise of Law in Cyberspace . Stanford Law Review , 48 : 1367
  • Jordan T Taylor P 1998 A Sociology of Hackers Sociological Review November 1998 757 80
  • Kabay M 2001 Studies and Surveys of Computer Crime ⟨www.securitystats.com/reports/Studies_and_Surveys_of_Computer_Crime.pdf
  • Krasner SD 1999 Sovereignty: Organised Hypocrisy Princeton Princeton University Press
  • National Criminal Intelligence Service 1999 Project Trawler: Crime on the Information Highways
  • National Criminal Intelligence Service 2000 Looking to the Future, Clarity on Communication Data Retention Law: Submission to the Home Office for Legislation on Data Retention
  • NHCTU 2004 Hi-tech crime 2004: the impact on UK business’, NHTCU/NOP Survey, ⟨http://www.nhtcu.org
  • OECD 1997 Guidelines for Cryptography Policy 27 March
  • Perritt , HH . 1998 . The Internet as a Threat to Sovereignty? Thoughts on the Internet's Role in Strengthening National and Global Governance . Independent Journal of Global Legal Studies , 5 : 423
  • Post D 2004 Text of slide presented at 'The Internet and the Law: A Global Conversation' Symposium, University of Ottawa, 1-2 October 2004, available at ⟨http://web5.uottawa.ca/techlaw/symposium.php?idnt=99&;v=22&;c=5&;b=1
  • Reed C 2004 Internet Law: Text and Material Cambridge Cambridge University Press
  • Reidenberg J 2001 The Yahoo! Case and the International Democratization of the Internet Research Paper 11, Social Science Research Network, ⟨ http://papers.ssrn.com/paper.taf?abstract_id=267148
  • Schneier B 2000 Secrets and Lies: Digital Security in a Networked World New York Wiley
  • Schneier B 2003 Beyond Fear: Thinking Sensibly about Security in an Uncertain World London Springer-Verlag
  • Sommer , P . 2002 . Evidence from Cyberspace: Downloads, Logs and Captures . Computer and Telecommunications Law Review , 8 ( 2 )
  • Slaughter A-M 2000 Agencies on the loose: holding government networks accountable Bermann G Herdegen M Lindseth P Transatlantic Regulatory Cooperation. Legal Problems and Political Prospects Oxford Oxford University Press
  • Smith , G . 1998 . An Electronic Pearl Harbor? Not Likely . Issues on Science and Technology , 15 : 68 – 73 .
  • Smith R Grabosky P Urbas G 2004 Cyber Criminals on Trial Cambridge Cambridge University Press
  • Sussman M 2003 ‘The US response to criminal exploitations of the Internet and other new technologies’, presented at: Money Laundering and Cybercrime, conference at Academy of European Law, Trier, Germany, 20 February
  • US Government 2003 The National Strategy to Secure Cyberspace Washington
  • Walden I 2003 Computer Crime Reed C Angel J Computer Law 5th edn Oxford Oxford University Press
  • Wall DS 2003 Cyberspace Crime, Dartmouth, Aldershot
  • Wasik M 1991 Crime and the Computer, Oxford, Clarendon Press Oxford

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.