1st Edition

Cyberspace Crime

Edited By D.S Wall Copyright 2003

    This book was published in 2003.This book is a collection of key texts that have contributed towards, or have reflected, the various debates that have taken place over crime and the internet during that past decade. The texts are organised into three parts. The first contains a number of viewpoints and perspectives that facilitate our broader understanding of cyberspace crime/ cybercrimes. The second part addresses each of the major types of cybercrime - trespass/ hacking/cracking, thefts/ deceptions, obscenities/ pornography, violence - and illustrate their associated problems of definition and resolution. The third and final part contains a selection of texts that each deal with the impact of cyberspace crime upon specific criminal justice processes: the police and the trial process.

    Acknowledgements, Series Preface, Introduction, PART I. THEORETICAL PERSPECTIVES AND VIEWPOINTS, 1. 'Cybercrimes: New Wine, No Bottles?', in P. Davies, P. Francis and V. Jupp (eds), Invisible Crimes: Their Victims and their Regulation, London: Macmillan, pp. 105-39, 2. 'Digital Crime in the Twenty-First Century', Journal of information Ethics, 10, pp. 8-26, 3. 'Dialogue and Debate: The Nature of Virtual Criminality', Social and Legal Studies, 10, pp. 227-28, 4. 'Not Such a Neat Net: Some Comments on Virtual Criminality', Social and Legal Studies, 10, pp. 229-42, 5. 'Virtual Criminality: Old Wine in New Bottles?', Social and Legal Studies, 10, pp. 243-49, 6. 'Sites of Criminality and Sites of Governance', Social and Legal Studies, 10, pp. 251-56, 7. 'An Endnote on Regulating Cyberspace: Architecture vs Law?', University of New South Wales Law Journal, 21, pp. 593-622, PART II. CYBERCRIMES, 8. 'The Changing Definition and Image of Hackers in Popular Discourse', International Journal of the Sociology of Law, 24, pp. 229-51, 9. 'Computer Crime in the Global Village: Strategies for Control and Regulation - in Defence of the Hacker', International Journal of the Sociology of Law, 24, pp. 211-28, 10. 'A Sociology of Hackers', Sociological Review, November, pp. 757-80, 11. 'Netcrime: More Change in the Organization of Thieving', British Journal of Criminology, 38, pp. 201-29, 12. 'Cyberterrorism: The Logic Bomb versus the Truck Bomb'. Global Dialogue, Autumn, pp. 29-37, 13. 'Redefining Borders: The Challenges of Cybercrime', Crime, Law and Social Change, 34, pp. 259-73, 14. 'An Electronic Pearl Harbor? Not Likely', Issues in Science and Technology, 15, pp. 68-73, 15. The Worldwide Search for Techno-thieves: International Competition v. International Co-operation', International Review of Law Computers and Technology, 13, pp. 373-82, 16. The Extension of the Criminal Law to Protecting Confidential Commercial Information: Comments on the Issues and the Cyber-Context', International Review of Law Computers and Technology, 13, pp. 147-62, 17. 'Cyberstalking: The Regulation of Harassment on the Internet', Criminal Law Review Special Edition 1998, pp. 29-47, 18.'Virtually Criminal: Discourse, Deviance and Anxiety within Virtual Communities', International Review of Law Computers and Technology, 14, pp. 95-104, 19. 'Cybercrimes v. Cyberliberties', International Review of Law Computers and Technology, 14, pp. 11-24, 20. The Governance of the Internet in Europe with Special Reference to Illegal and Harmful Content', Criminal Law Review Special Edition 1998, pp. 5-18, 21. 'Marketing Pornography on the Information Superhighway: A Survey of 917,410 Images, Descriptions, Short Stories, and Animations Downloaded 8.5 Million Times by Consumers in Over 2000 Cities in Forty Countries, Provinces, and Territories', Georgetown Law Journal, 83,pp. 1849-915, 22. 'Vindication and Resistance: A Response to the Carnegie Mellon Study of Pornography in Cyberspace', Georgetown Law Journal, 83, pp. 1959-67, 23. 'A Detailed Analysis of the Conceptual, Logical, and Methodological Flaws in the Article: Marketing Pornography on the Information Superhighway', Owen Graduate School of Management, Vanderbilt University, pp. 1-21, 24. 'Crime on the Internet: Its Presentation and Representation', Howard Journal, 38, pp. 241-51, PART III. CRIMINAL JUSTICE PROCESSES, 25. 'Why the Police Don't Care About Computer Crime', Harvard Journal of Law and Technology, 10, pp. 465-94, 26. 'Policing and the Regulation of the Internet', Criminal Law Review Special Edition 1998, pp. 79-91, 27. 'Technology's Ways: Information Technology, Crime Analysis and the Rationalizing of Policing', Criminal Justice, 1, pp. 83-103, 28. The Technological Game: How Information Technology is Transforming Police Practice', Criminal Justice, 1, pp. 139-59, 29. 'Digital Footprints: Assessing Computer Evidence', Criminal Law Re view Special Edition 1998, pp. 61 -7 8, 30. 'Fundamental Rights, Fair Trials and the New Audio-Visual Sector', Modern Law Review, 59, pp. 517-39, Name Index

    Biography

    D.S. Wall