You are not signed in. Sign in.
Authors: Richard Hollinger
ISBN-13: 9781855214675, ISBN-10: 1855214679
Format: Hardcover
Publisher: Ashgate Publishing, Limited
Date Published: April 1997
Edition: (Non-applicable)
Acknowledgements | ||
Series Preface | ||
Introduction | ||
1 | Microcomputers: From Movement to Industry | 3 |
2 | The Hacker Ethic | 11 |
3 | Computer Abuse | 23 |
4 | Computer Crime and Abuse | 35 |
5 | Consensual Realities in Cyberspace | 43 |
6 | Hackers: Computer Heroes or Electronic Highwaymen? | 45 |
7 | The Process of Criminalization: The Case of Computer Crime Laws | 59 |
8 | Technology, Property, and Law: The Case of Computer Crime | 85 |
9 | Computer Abuse: Problems of Instrumental Control | 107 |
10 | Computer Crime: Assessing the Lawyer's Perspective | 125 |
11 | Legally Speaking: Can Hackers Be Sued for Damages Caused by Computer Viruses? | 135 |
12 | Viruses and Criminal Law | 139 |
13 | Computer Crime and the Computer Fraud and Abuse Act of 1986 | 143 |
14 | The Computer Virus Eradication Act of 1989: The War Against Computer Crime Continues | 159 |
15 | Taming Cyberspace | 191 |
16 | Computer Crime: A Technology Gap | 197 |
17 | Rogue Computer Programs and Computer Rogues: Tailoring the Punishment to Fit the Crime | 211 |
18 | Straining the Capacity of the Law: The Idea of Computer Crime in the Age of the Computer Worm | 273 |
19 | Deterring Computer Crime | 297 |
20 | Criminological Concepts and Research Findings Relevant for Improving Computer Crime Control | 305 |
21 | Computer-Related Crimes | 313 |
22 | Computer Crime: Law Enforcement's Shift from a Corporeal Environment to the Intangible, Electronic World of Cyberspace | 341 |
23 | Computer-Related Crime: An International Problem in Need of an International Solution | 347 |
24 | Computer Crime: Computer Hacking and Misuse is Now a Criminal Offence | 375 |
25 | Cautionary Tales and the Impacts of Computers on Society | 379 |
26 | Computer Hackers Follow a Guttman-Like Progression | 389 |
27 | The Morality of Software Piracy: A Cross-Cultural Analysis | 391 |
28 | Crime by Computer: Correlates of Software Piracy and Unauthorized Account Access | 401 |
29 | University Students' Attitudes Towards Computer Crime: A Research Note | 413 |
30 | The Night the Network Failed | 417 |
31 | The Internet Worm: Crisis and Aftermath | 423 |
32 | Computer Crimes and Misdemeanors. Morris Code | 433 |
33 | Is Computer Hacking a Crime? A Debate from the Electronic Underground | 435 |
34 | Crime, Abuse, and Hacker Ethics | 447 |
35 | The United States vs. Craig Neidorf: A Debate on Electronic Publishing, Constitutional Rights and Hacking | 471 |
36 | Crime and Puzzlement: Desperados of the DataSphere | 491 |
37 | Good Cop, Bad Hacker | 515 |
38 | Computer Crime, United States Laws and Law Enforcement | 523 |
39 | Crime and Crypto on the Information Superhighway | 531 |
40 | Internet Babylon? Does the Carnegie Mellon Study of Pornography on the Information Superhighway Reveal a Threat to the Stability of Society? | 545 |
Name Index | 569 |