8
Views
1
CrossRef citations to date
0
Altmetric
Computer crime

Computer‐related crime, information security and investigation of crime: A delicate triangle

Pages 129-141 | Published online: 12 May 2010

Notes

  • December 1993 . Growth, Competitiveness, Employment — The challenges and ways forward into the 21st century December , Brussels White Paper
  • April 1994 . Europe and the Global Information Society — Recommendations to the European Council April , Brussels
  • 19 July 1994 . Europe's Way to the Information Society. An Action Plan 19 July , Brussels COM (94) 347 final
  • 1993 . Gazetta Ufficiale 305
  • Charbon and Kaspersen . 1990 . Computercriminaliteit in Nederland The Hague
  • Scottish Law Commission . 1987 . Report on Computer Crime Edinburgh
  • Sieber , Ulrich , ed. 1993 . Information Technology Crime Cologne, Berlin, Bonn, Munich
  • Kaspersen , Henrik . “ ‘Computer crimes and other crimes against information technology in the Netherlands’ ” . Edited by: Sieber . 347
  • London , W . 1994 . “ ‘EC information security legislation: where now?’ ” . In Computer Law and Security Report 226 – 233 .
  • Kilian , Wolfgang and Wiebe , Andreas . 1992 . Data Security in Computer Networks and Legal Problems Darmstadt
  • Sizer , R , eds. 1994 . Security and Control of Information Technology in Society Amsterdam
  • Guidelines for the Security of Information Systems , 190 Paris : OECD/GD . (92))
  • Vasilaki , Irini . 1994 . “ ‘Interception of telecommunications for criminal investigation ‐ a comparative analysis’ ” . In The Computer Law and Security Report 238 – 242 .
  • 1994 . Datenschutzberater, , 18 July : 12 13
  • 1994 . Voorontwerp van wet inzake Cryptografie, Mediaforum , : B49 – 55 .
  • 1994 . Dossier Cryptografie , 138 – 162 . CR .
  • FPE Wiemans . 1994 . Encryptie: justitié le en particuliere belangen 340 – 359 . DD

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.