Back to Results
First PageMeta Content
Computer crime / Convention on Cybercrime / Computer fraud / Cyberterrorism / Hacker / Organized crime / Cyberstalking / Computer security / International Cybercrime / Cybercrime / Computer crimes / Crime


A Critical Look at the Regulation of Cybercrime ___________________________________________
Add to Reading List

Document Date: 2005-09-13 11:14:47


Open Document

File Size: 362,50 KB

Share Result on Facebook

City

San Francisco / Chernobyl / Territorially / Berlin / London / /

Company

Digital Equipment Corporation / Philippsohn / Cybercrime / Gartner Group / Law Enforcement Information Management / Microsoft / /

Continent

Europe / /

Country

Switzerland / Hungary / Netherlands / Norway / France / Japan / Brazil / Iceland / Canada / Australia / Portugal / United Kingdom / China / Philippines / Israel / Finland / India / Denmark / Germany / Italy / Mexico / Sweden / Chile / Belgium / Malaysia / Austria / United States / Luxembourg / Spain / Greece / Ireland / /

Currency

USD / DEM / /

/

Event

Judicial Event / Natural Disaster / /

Facility

Roosevelt Dam / Computer Security Institute / /

IndustryTerm

bank account / online stalking / state law / software tools / communication systems / large software / investigative software / communication technologies / high tech crime / data processing area / online security / computer technology / communications technology / substantive criminal law / telephone surveys / classic computer systems / telecommunications technology / Online Auction Fraud / computer network / Internet marketplaces / data processing / copyrighted software / bank / actuarial insurance rate structures / telephone access cards / insurance premiums / personal data processing / computer software / telephone / information technology / secret software / software program / Internet service / legal systems / foreign web page / civil law / Internet worm / telephone services / voice-mail-systems / case computer systems / law-making / economic criminal law / legitimate online e-mails / online behaviour / online victimisation / telephone systems / laptop computing environments / online trade / penal copyright law / programmable systems / civil law regulations / malicious software / Online Fraud All stages / civil unfair competition law / criminal trade secret law / online scam / criminal law protection / large-scale mainframe computer operating systems / clever solution / nationals law / substantive law / computer systems / Internet experts / later audit / criminal law / data using computer services / law-enforcing authorities / Internet code / law / online spaces / online investment e-mails / penal law / /

Movie

I Love You / /

NaturalFeature

Salt River / /

OperatingSystem

UNIX / /

Organization

Liverpool hospital / School of Law / United Nations Congress / Pakistani Hackers Club / National Bureau of Investigation / Audit Commission / Institute for Global Communications / U.S Department of Justice / European Commission / Supervisory Authority / European Union / Council of Europe / G8 / Federal Bureau of Investigation / International Association of Chiefs of Police / Department of Defence / Council of State / Computer Security Institute / /

Person

William Gibson / Fred Cohen / John Naisbitt / Steven Philippsohn / Donn Parker / /

Position

industrial spy / vice president / detective / controller of data protection / magistrate / author / science fiction author / supervisor / CEO / designer / driver / young computer scientist / project manager / Foreign Minister / district attorney / supervisor / the vice president / Senator / vice president in the company / executive assistant / nurse / Attorney General / known drug dealer / general public interest / computer operations supervisor / /

ProvinceOrState

Minnesota / Kashmir / California / Arizona / New Jersey / Florida / /

PublishedMedium

Good Times / /

Region

continental Europe / /

SportsLeague

International Association / /

Technology

information technology / operating system / computer technology / cryptography / communication technologies / ISP / PDA / developing computer technology / UNIX / communications technology / operating systems / data processors / ISDN / laser / DNS / telecommunications technology / animation / /

SocialTag