COMPUTER CRIMES
Enregistré dans:
| Publié dans: | The American Criminal Law Review vol. 44, no. 2 (Spring 2007), p. 285-335 |
|---|---|
| Auteur principal: | |
| Autres auteurs: | , |
| Publié: |
Georgetown University Law Center
|
| Sujets: | |
| Accès en ligne: | Citation/Abstract Full Text Full Text - PDF |
| Tags: |
Pas de tags, Soyez le premier à ajouter un tag!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 230364912 | ||
| 003 | UK-CbPIL | ||
| 022 | |a 0164-0364 | ||
| 022 | |a 0271-4574 | ||
| 022 | |a 0002-8118 | ||
| 035 | |a 230364912 | ||
| 045 | 2 | |b d20070401 |b d20070630 | |
| 084 | |a 23243 |2 nlm | ||
| 100 | 1 | |a Huang, Xiaomin | |
| 245 | 1 | |a COMPUTER CRIMES | |
| 260 | |b Georgetown University Law Center |c Spring 2007 | ||
| 513 | |a Feature | ||
| 520 | 3 | |a 4 To combat these new criminal behaviors, Congress passed specialized legislation.5 Experts have had difficulty calculating the damage caused by computer crimes due to (i) the difficulty in adequately defining what is a computer crime,6 (ii) victims' reluctance to report incidents for fear of losing customer confidence,7 (iii) the dual system of prosecution,8 and (iv) the lack of detection.9 In 2006, the Department of Justice's Bureau of Justice Statistics and the Department of Homeland security's National Cyber security Division began a joint effort to estimate the number of cyber attacks and the number of incidents of fraud and theft of information.10 B. Types of Computer-Related Offenses DOJ divides computer-related crimes into three categories according to the computer's role in the particular crime.11 First, a computer may be the object of a crime.12 This category primarily refers to theft of computer hardware or software.13 Second, a computer may be the subject of a crime.14 In this category, the computer is akin to the pedestrian who is mugged or the house that is robbed - it is the subject of the attack and the site of any damage caused. [...] the United States and thirty-three other countries have signed the Council of Europe's Treaty on Cybercrime.394 The Treaty on Cybercrime requires parties to: (i) establish substantive laws against cybercrime; (ii) ensure that their law enforcement officials have the necessary procedural authorities to investigate and prosecute cybercrime effectively; and (iii) provide international cooperation to other parties in the fight against computer-related crime.395 While the United States has already signed the treaty, the Senate still must ratify the treaty in order to give it effect in the United States.396 Second, the United States participates actively in the Subgroup on High-tech Crime at G-8's Lyon Group.397 One accomplishment of the Subgroup includes the development of a network that allows law enforcement authorities of member nations to contact each other for rapid assistance in investigating computer crime and preserving electronic evidence.398 In addition to increased multinational governmental cooperation, international organizations and private corporations are also working to combat international computer crimes by contributing to the drive to harmonize national legislation.399 For example, in 1992 the Business Software Alliance, a software industry trade group, launched an international copyright enforcement program involving national software trade associations and law enforcement agencies that began by focusing on distribution of counterfeit software.400 Nonetheless, international efforts have been mixed. | |
| 653 | |a Legislation | ||
| 653 | |a International organizations | ||
| 653 | |a Wire fraud | ||
| 653 | |a States | ||
| 653 | |a Search & seizure | ||
| 653 | |a First Amendment-US | ||
| 653 | |a Federal government | ||
| 653 | |a Criminal law | ||
| 653 | |a Identity theft | ||
| 653 | |a Software industry | ||
| 653 | |a Websites | ||
| 653 | |a Cybercrime | ||
| 653 | |a Internet service providers | ||
| 653 | |a Interstate commerce | ||
| 653 | |a Cybersecurity | ||
| 653 | |a International trade | ||
| 653 | |a Software | ||
| 653 | |a Theft | ||
| 653 | |a White collar crime | ||
| 653 | |a National security | ||
| 653 | |a Housing authorities | ||
| 653 | |a Victims | ||
| 653 | |a Criminality | ||
| 653 | |a Computers | ||
| 653 | |a Treaties | ||
| 653 | |a Pedestrians | ||
| 653 | |a Trade associations | ||
| 653 | |a Law enforcement agencies | ||
| 653 | |a Criminal justice | ||
| 653 | |a Law enforcement | ||
| 653 | |a Legislatures | ||
| 653 | |a Police | ||
| 653 | |a Internet | ||
| 653 | |a International cooperation | ||
| 653 | |a Fraud | ||
| 653 | |a Crime | ||
| 653 | |a Procedural justice | ||
| 653 | |a Cooperation | ||
| 653 | |a Closely held corporations | ||
| 653 | |a Fear of crime | ||
| 653 | |a Classification | ||
| 653 | |a Counterfeiting | ||
| 653 | |a Offenses | ||
| 653 | |a Statistics | ||
| 700 | 1 | |a Radkowski, Peter, III | |
| 700 | 1 | |a Roman, Peter | |
| 773 | 0 | |t The American Criminal Law Review |g vol. 44, no. 2 (Spring 2007), p. 285-335 | |
| 786 | 0 | |d ProQuest |t Criminal Justice Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/230364912/abstract/embedded/H09TXR3UUZB2ISDL?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/230364912/fulltext/embedded/H09TXR3UUZB2ISDL?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/230364912/fulltextPDF/embedded/H09TXR3UUZB2ISDL?source=fedsrch |