Vulnerabilities of the web: a socio-legal view

Автор: Xingan Li
Организация: International Institute for Innovation Society, Helsinki, Finland

Категория:

Ключевые слова: Abuse, Anonymity, Disputability, Divisibility, Invisibility, Low confidentiality, Networked society, Uncertainty of the future, Uncontrollability, Universal accessibility
Аннотация. The purpose of this article is to review the social-legal environment of the emergence of cybercrime. The pervasiveness of information and communications systems brings about a legal gap in regulating the new crimes and new forms of existing crimes. There is also the inevitability for extending the objects that the criminal law should provide shield. The swift progression of technology and the inactivity of legal instruments form a sharp contrast. The multiple roles of computer systems in crime, and the decentralization of the Internet make it more complicated to combat cybercrime effectively through any single measure.

Библиография:

Bequai, A. 1978. Computer Crime, Lexington, Massachusetts, Toronto: Lexington Books
Bequai, A. 1983. How to Prevent Computer Crime: A Guide for Managers. New York, Chicago, Brisbane, Toronto, Singapore: John Wiley and Sons
Centre for Research in Electronic Commerce. 1999. Measuring the Internet Economy, The University of Texas at Austin
Clarke, A. C. 1997. 3001: The Final Odyssey, Hammersmith, London: Voyager
Dodge, M. and Kitchin, R. 2001. Mapping Cyberspace, New York, New York: Routledge
D'Ovidio, R., and Doyle, J. 2003. A Study on Cyberstalking: Understanding Investigative Hurdles, The FBI Law Enforcement Bulletin, volume 72, pp. 10-17
Edwards, L. and Walde, C. (eds.). 1997. Law and the Internet - Regulating Cyberspace, Oxford: Hart Publishing
Ekman, P. 1992. Telling Lies: Clues to Deceit in the Marketplace, Politics, and Marriage, New York: Norton
Elliot, M. A. and Merrill, F. E. 1961. Social Disorganization, fourth edition, New York, Evanston, and London: Happer and Row Publishers
Fisher, R. P. 1984. Information System Security, Prentice-Hall
Forcier, R. D. and Descy, D. E. 2002. The Computer as an Educational Tool, third edition, Englewood Cliffs, New Jersey: Merrill-Prentice Hall
Gates, B. 1995. The Road Ahead, New York: Viking
GeoHive. 2006. Countries with Most Personal Computers. Retrieved 15 March 2016, from http://www.geohive.com/charts/charts.php?xml=ec_inet&xsl=ec_inet_top2
Gibson, W. 1984. Neuromancer, New York: Ace Books
Grabosky, P. 2000. Cyber Crime and Information Warfare, The Transnational Crime Conference convened by the Australian Institute of Criminology in association with the Australian Federal Police and Australian Customs Service and held in Canberra, 9-10 March. Scientific and Practical Cyber Security Journal (SPCSJ) 2(2):38-58 Scientific Cyber Security Association (SCSA), 2018 ISSN: 2587-4667 57 Retrieved 15 March 2016, from http://www.aic.gov.au/conferences/transnational/grabosky.pdf
Helmkamp, J., Ball, R., and Townsend, K. 1996. Proceedings of the Academic Workshop: “Definitional Dilemma: Can and Should There Be a Universal Definition of White-collar crime?” Morgantown, West Virginia: National White-collar crime Centre
Howitt, D. 2002. Forensic and Criminal Psychology, Essex, England: Pearson
Icove, D., and co-workers. 1995. Computer Crime: A Crimefighter's Handbook, O'Reilly and Associates
Internet Crime Forum IRC Subgroup. 2001. Chat Wise, Street Wise-Children and Internet Chat Services
Internet System Consortium (ISC). 2006. Internet Domain Survey. Retrieved 15 March 2016, from http://www.isc.org/index.pl?/ops/ds
Internetworldstats.com. 2007. Internet Usage Statistics-The Big Picture. Retrieved 27 July 2007, from http://www.internetworldstats.com/stats.htm
Internetworldstats.com. 2015. Internet Usage Statistics-The Big Picture. Retrieved 15 February 2016, from http://www.internetworldstats.com/stats.htm
Interpol. 2003. IT security and Crime Prevention Methods: Explanations: A Report. Retrieved 15 March 2016, from http://www.interpol.int/Public/TechnologyCrime/CrimePrev/ITSecurity.asp
Karygiannis, T., and Owens, L. 2002. Wirelsss Network Security, 802.11, Bluetooth and Handheld Devices, NIST Special Publication 800-48.
Kehoe, B. P. 1993. Zen and the Art of the Internet, Englewood Cliffs, New Jersey: PTR Prentice Hall
Kelly, J. X. 2002. Cybercrime - High Tech Crime, JISC Legal Information Service - University of Strathclyde. Retrieved 15 March 2016, from http://www.jisc.ac.uk/legal/index.cfm?name=lis_cybercrime
Khosrow-Pour, M. 1998. Effective Utilization and Management of Emerging Information Technologies, Hershey: Idea Group Publishing
Kingdon, J. 1994. Shooting the Messenger: The Liability of Internet Service Providers for Prohibited Expression. Retrieved 15 March 2016, from http://www.catalaw.com/logic/docs/jk-isps.htm
Kollock, P. and Smith, M. 1999. Communities in Cyberspace, in: M. Smith and P. Kollock (eds), Communities in Cyberspace, London: Routledge, pp. 3-28
Levinson, D. (ed.). 2002. Encyclopedia of Crime and Punishment, Newbury Park, CA: Sage Publications
Li, X. (2008). Cybercrime and Deterrence: Networking Legal Systems in the Networked Information Society. (Univerrsity of Turku). Turku, Finland: University of Turku
Mowrer, E. R. 1942. Disorganization: Personal and Social, Chicago, Philadelphia, New York: J. B. Lippinatt Company
OECD. 2004. Second Organization for Economic Cooperation and Development Workshop on Spam: Report of the Workshop, JT00174847, Busan, Korea, 8-9 September
OECD. 2005. Task Force on Spam, Spam Issues in Developing Countries, DSTI/CP/ICCP/SPAM(2005)6/FINAL, Paris, France, 26 May 2005
Pew Research Center. (2015). Social Networking Fact Sheet. Retrieved 15 February 2016, from http://www.pewinternet.org/fact-sheets/social-networking-fact-sheet/
Quirchmayr, G. 1997. Selected Legal Issues Related to Internet User, The Third International Conference on Reliability, Quality and Safety of Software Intensive System, Athens, 29-30 May
Robertson, S. 2000. The Digital City's Public Library: Support for Community Building and Knowledge Sharing, in Ishida, Toru and Isbister, Katherine eds. Digital Cities: technologies, Experiences, and Future Perspectives, Springer, pp. 246-260
Rogers, L. R. 2001. E-mail: A Postcard Written in Pencil, Pittsburgh, PA: Carnegie Mellon University. Retrieved 15 March 2016, from http://www.cert.org/homeusers/email_postcard.html
Rotenberg, M. 1990. Prepared Testimony and Statement for the Record on Computer Virus Legislation, Computer and Society, volume 20, number 1, pp. 12-25
Rowland, D. 1998. Cyberspace - A Contemporary Utopia? The Journal of Information, Law and Technology, volume 1998, number 3. Retrieved 15 March 2016, from http://www2.warwick.ac.uk/fac/soc/law/elj/jilt/1998_3/rowland/
Sadowsky, G., Dempsey, J. X., Greenberg, A., Mack, B.J., and Schwartz, A. 2003. Information Technology Security Handbook, Washington, DC: The International Bank for Reconstruction and Development
Sikorski, R., and Peters, R. 1999. NET TIP: Digital Security, Part I, Science, 15 January, vol. 283. no. 5400, pp. 348 - 349, DOI: 10.1126/science.283.5400.348b
Siponen, M. T. Five Dimensions of Information Security Awareness, Computers and Society, June 2001, pp. 24-29
Summers, D. (director). 2003. Longman Dictionary of Contemporary English, Essex, England: Pearson Education Limited
Syngress. 2002. Scene of the Cybercrime: Computer Forensics Handbook, Rockland, MA: Syngress Publishing
Tehan, R. 6 February 2002. CRS Report for Congress, Internet Statistics: Explanation and Sources, Order Code RL31270
UN. 2000. Crimes Related to Computer Networks: Background Paper for the Workshop on Crimes Related to the Computer network, Tenth UN Congress on the Prevention of Crime and the Treatment of Offenders, Vienna, 10-17 April. A/CONF. 187/10
Wang, Y. 2001. Hulian Fawang: Zhongguo Wangluo Falv Wenti (Interlink Legal Web: Problem of Chinese Cyberlaw), Economic Management Press
Wilbur. S. 1997. An Archaeology of Cyberspace: Virtuality, Community, Identity, in D. Porter, (ed.), Internet Culture, London: Routledge, pp. 5-22
Zigrus, I. 2001. Our Virtual World: The Transformation of Work, Play, and Life via Technology, IGI Global, 2001