• No results found

Computer crime

Computer Abuse and Computer Crime as Organizational Activities, 2 Computer L.J. 403 (1980)

Computer Abuse and Computer Crime as Organizational Activities, 2 Computer L.J. 403 (1980)

... The literature about computer abuse and computer crime is skewed by emphasizing white collar crimes in which businesses are the primary victims of thefts and abuses [r] ...

27

The Trial of a Computer Crime, 2 Computer L.J. 441 (1980)

The Trial of a Computer Crime, 2 Computer L.J. 441 (1980)

... Knowledge of these problems with the computer crime bill lends support for whatever arguments a defense attorney may make when faced with the task of avoiding the ap[r] ...

17

Computer Crime and Intellectual Property Rights   A Review

Computer Crime and Intellectual Property Rights A Review

... and computer viruses are two major threats to information system ...of computer crime, although in some countries they are not strictly speaking illegal because of lack of specific outlawing hacking ...

6

Forensic Computer Crime Investigation pdf

Forensic Computer Crime Investigation pdf

... as computer crime was increasing, the corporate community turned to him and a select few others for assistance in combating these new developments in corporate criminal ...of Crime Investigative ...

338

Computer Crime and the Computer Fraud and Abuse Act of 1986, 10 Computer L.J. 71 (1990)

Computer Crime and the Computer Fraud and Abuse Act of 1986, 10 Computer L.J. 71 (1990)

... Many people who have written about computer crime have avoided the problem of developing a definition by arguing that computer crime is just traditional crime commit[r] ...

17

Trespassers Will Be Prosecuted: Computer Crime in the 1990s, 12 Computer L.J. 61 (1993)

Trespassers Will Be Prosecuted: Computer Crime in the 1990s, 12 Computer L.J. 61 (1993)

... the statute, the major elements of the statute, and its effectiveness in combatting and deterring computer crime. It will also discuss proposed amendments to the statu[r] ...

41

A Survey of Computer Crime Studies, 2 Computer L.J. 275 (1980)

A Survey of Computer Crime Studies, 2 Computer L.J. 275 (1980)

... The reason for this is that estimated crime losses expressed as a percentage of the total were too small to be detailed; theft or fraud accounted for only 7.6% o[r] ...

55

Computer Crime - The Need for Deterrent Legislation, 2 Computer L.J. 353 (1980)

Computer Crime - The Need for Deterrent Legislation, 2 Computer L.J. 353 (1980)

... as the basis for prosecution of computer crimes at the state level are arson (burning with malice) 68 and burglary (felonious intent to commit larceny or, more recentl[r] ...

33

Current and Proposed Computer Crime Legislation, 2 Computer L.J. 721 (1980)

Current and Proposed Computer Crime Legislation, 2 Computer L.J. 721 (1980)

... Whoever willfully, knowingly and without authority, directly or indirectly, accesses, causes to be accessed or attempts to access any computer, computer equipment, co[r] ...

53

Common Computer Crime Statutes

Common Computer Crime Statutes

... d. Intent of cardholder to defraud; penalties; knowledge of revocation. A person, who, with intent to defraud the issuer, a person or organization providing money, goods, services or anything else of value, or any other ...

26

On Computer Crime (Senate Bill S. 240), 1 Computer L.J. 517 (1978)

On Computer Crime (Senate Bill S. 240), 1 Computer L.J. 517 (1978)

... (3) the opportunities for computer-related crimes in Federal programs, in financial institutions, and in other entities which operate in interstate com- merce through the [r] ...

29

Straining the Capacity of the Law: The Idea of Computer Crime in the Age of the Computer Worm, 11 Computer L.J. 299 (1991)

Straining the Capacity of the Law: The Idea of Computer Crime in the Age of the Computer Worm, 11 Computer L.J. 299 (1991)

... Those in favor of criminal sanctions against hackers make the very compelling argument that any punishment endured by a handful of hackers like Robert Morris is easil[r] ...

25

The Investigation, Prosecution, and Prevention of Computer Crime: A State-of-the-Art Review, 2 Computer L.J. 385 (1980)

The Investigation, Prosecution, and Prevention of Computer Crime: A State-of-the-Art Review, 2 Computer L.J. 385 (1980)

... classes, using Bequai's categorization 43 : sabotage and vandalism against the computer itself, property crimes (theft of property through the use of a computer), thef[r] ...

19

Computer Crime Year In Review: MySpace, MBTA, Boston College and More

Computer Crime Year In Review: MySpace, MBTA, Boston College and More

... transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage.. without authorization, to a protected computer.[r] ...

61

Viewing Computer Crime: Where Does the Systems Error Really Exist?, 11 Computer L.J. 265 (1991)

Viewing Computer Crime: Where Does the Systems Error Really Exist?, 11 Computer L.J. 265 (1991)

... Another point of reference for the ethics vote is a lack of consistent prosecutions for computer crimes. Even the prosecution in Zinn noted this problem. They cited as poss[r] ...

23

The 1984 Federal Computer Crime Statute: A Partial Answer to a Pervasive Problem, 6 Computer L.J. 459 (1986)

The 1984 Federal Computer Crime Statute: A Partial Answer to a Pervasive Problem, 6 Computer L.J. 459 (1986)

... (3) knowingly accesses a computer without authorization, or hav- ing accessed a computer with authorization, uses the opportunity such access provides for purposes to [r] ...

27

Addressing Computer Crime Legislation: Progress and Regress, 4 Computer L.J. 195 (1983)

Addressing Computer Crime Legislation: Progress and Regress, 4 Computer L.J. 195 (1983)

... De- pending on the nature of the offense, the Florida statute allows prosecution under traditional common law and statutory property analysis or for tampering with t[r] ...

13

Cis1 Chapter 15 Computer Crime and Ethics

Cis1 Chapter 15 Computer Crime and Ethics

... He allegedly stole thousands of files from a computer security expert, credit card numbers, and unreleased software.. (Book: Takedown by T. Shimomura).[r] ...

17

On Charging Computer Crime, 2 Computer L.J. 429 (1980)

On Charging Computer Crime, 2 Computer L.J. 429 (1980)

... Though it is in just such fine distinctions that our liberties are rooted, the prospect of dismissal of a criminal case because of a dis- crepancy between statutory [r] ...

13

Australian attitudes towards computer crime

Australian attitudes towards computer crime

... regarding the significance of computer fraud and credit card fraud, copying computer software and computer hacking seem to be more acceptable to the academic respondents than to the p[r] ...

115

Show all 10000 documents...

Related subjects