Download as pdf or txt
Download as pdf or txt
You are on page 1of 56

MINISTRSTVO ZA NOTRANJE ZADEVE RS

.HTML RAZLIČICA JE MNOGO BOLJ FUNKCIONALNA

Računalniška kriminaliteta
Dr. Karl Petrič

Ljubljana, 2012

Kazalo poglavij
Povzetek
1 Uvod
1.1 Cilj dela
2 Reševanje informacijskega problema s področja računalniške kriminalitete

2.1 Priprava in izdelava koncepta


2.2 Slika 1: Koncept reševanja informacijskega problema
3 Izdelava vsebinskega omrežja
3.1 Slika 2: Miselni vzorec informacijskega problema "Računalniška kriminaliteta"
3.2 Slika 3: Klikalni diagram so področja računalniške kriminalitete
4 Zaključek
5 Uporabljena programska orodja
6 Priloga

Povzetek
V hibridnem izdelku na temo "Računalniška kriminaliteta" je avtor prikazal postopek reševanja informacijskega problema, nakar je v klikalnem diagramu združil med sabo naslednje teme
s področja računalniške kriminalitete: digitalna kriminaliteta, kibernetska kriminaliteta, elektronska kriminaliteta, internetna kriminaliteta, spletna kriminaliteta, sistemski vdori,
računalniška forenzika idr. Kot končni izdelek je nastal klikalni diagram z maloprej navedenimi perečimi vsebinami. V tem klikalnem diagramu se nahajajo tudi povezave do spletnih
strani kot npr. COBISS/COBIB in Google. Kot prilogo je avtor dodal aplikacijo v obliki preglednične bibliografije z iskalnikom, ki zajema zadetke s področja računalniške kriminalitete
(COBISS/COBIB in Google učenjak).

Ključne besede: računalniška kriminaliteta, digitalna kriminaliteta, kibernetska kriminaliteta, internetna kriminaliteta, sistemski vdori, računalniška forenzika, preiskovanje kaznivih
dejanj, preprečevanje.

GOR

1 Uvod
Računalniška kriminaliteta je v zadnjih dvajsetih letih izjemno porastla že zaradi dejstva, ker so se računalniki dejansko vgradili ne samo v poslovne in akademske sfere, ampak tudi v
čisto navadne vsakdanje dejavnosti ter dogodke. Š˝e pojmovna analiza računalniške kriminalitete bi zelo zgovorno pokazala njeno razvejenost. Brez informacijske tehnologije si sploh več
ne moremo zamisliti normalno delovanje družbe in s tem posameznika, ki živi v njej. Računalniki so v bistvu zapleteni stroji, ki v veliki meri pozitivno delujejo na delovanje družbe,
vendar navkljub zapisanemu, je potrebno izpostaviti temno stran uporabe računalnikov, ki se kaže še zlasti v sferah družbenega. Po eni strani je povezovanje računalnikov v omrežja
omogočilo hitrejšo komunikacijo med ljudmi, a po drugi strani je prav to povezovanje povečalo sistemske luknje, ki privlačijo razne zlorabe podatkov (npr. kraja podatkov, kraja
identitete, kibernetska špijonaža, pedofilska omrežja, teroristična omrežja, spletni socialni inženiring). Zlorabe so lahko zelo hude in lahko posežejo celo (čeprav posredno) po človeških
življenjih. Drugi večji negativni vpliv, ki ga je potrebno izpostaviti je v spodbujanju osiromašenega socialnega čuta do soljudi in nezdravega fiziološko pasivnega načina življenja.
Prekomerno socialno izolirani ljudje lahko postanejo zelo hitro tarča prekaljenih virtualnih kriminalcev.

GOR

1.1 Cilj dela ali hibridnega izdelka


Reševanje informacijskega problema na temo "Računalniška kriminaliteta", nakar izdelava klikalnega diagrama, ki poleg že pripravljenih poizvedb vsebuje še aplikacijo v obliki
preglednične bibliografije z iskalnikom o računalniški kriminaliteti.
GOR
2 Reševanje informacijskega problema s področja različnih policijskih tem
Na kratko povzeto
Možni koraki pri reševanju informacijskega problema
1. Predstavitev informacijskega problema
2. Priprava in izdelava koncepta
3. Uporaba orodij (npr. iskalniki, zbirke podatkov, orodje za izdelavo miselnih vzorcev)
4. Izdelava klikalnega diagrama (npr. s programskim orodjem Yed graph editor)
5. Predstavitev zanimivih vsebinskih konceptov
V tem E- dokumentu bom najprej predstavil korake pri reševanju informacijskega problema na temo "Računalniška kriminaliteta". Po predstavitvi informacijskega problema bom
pripravil in izdelal slikovni koncept, ki bo predvidel različne vsebinske gradnike. Na podlagi vsebinskih gradnikov bom izdelal klikalni diagram, ki vsebuje pomembne spletne povezave
do E- del in že pripravljenih poizvedb s podatkovnih zbirk (npr. COBISS/COBIB, COBISS/MNZRS) in iskalnikov (npr. Google)
Predstavitev informacijskega problema
Predstavitev informacijskega problema lahko poteka na podlagi naslednjih kazalcev:
Tema: Računalniška kriminaliteta
Ključne besede: računalniška kriminaliteta, digitalna kriminaliteta, kibernetska kriminaliteta, internetna kriminaliteta, sistemski vdori, računalniška forenzika, preiskovanje kaznivih
dejanj, preprečevanje.
Časovna omejitev: ni omejitev
Jezikovna omejitev: slv, eng, ger, scr, scc, bos
Omejitev za število zadetkov (A- članki, M- monografije/knjige, N- neknjižni/elektronski viri):
A --> N ; M --> N
Namen poizvedbe: podpora pri odločanju v delovnem procesu in za izobraževanje
GOR

2.1 Priprava in izdelava koncepta


V tem delu bom predstavil pripravo in izdelavo slikovnega koncepta. S pomočjo modelirnega orodja Microsoft Visio Professional 2007 bom vizualno prikazal tako posamične entitete
informacijskega problema kot tudi proces reševanja informacijskega problema.
2.2 Slika 1: Koncept reševanja informacijskega problema

Slika 1 prikazuje koncept reševanja informacijskega problema (v nadaljevanju IP) po stopnjah od ena do šest:
1. predstavitev IP
2. tema IP, različne policijske teme
3. naslov IP
4. določitev predmetnih oznak ( računalniška kriminaliteta, kibernetska kriminaliteta, internetna kriminaliteta, digitalna kriminaliteta, e-kriminaliteta, virtualna kriminaliteta, kraja
podatkov, kraja identitete, računalniška forenzika)
5. uporaba orodij
6. predstavitev klikalnega diagrama s področja računalniške kriminalitete
Slika 1 vključuje tudi pomembne prvine kot so različne omejitve (npr. za jezik, čas in vrsta virov). V nadaljevanju tega dela bom prikazal vsebinski koncept ali miselni vzorec
kot osnova za izdelavo kasnejšega klikalnega diagrama.
GOR

3 Izdelava vsebinskega omrežja

3.1 Slika 2: Miselni vzorec informacijskega problema "Računalniška kriminaliteta"

Slika 2 prikazuje miselni vzorec oziroma vsebinske koncepte, ki so s temo računalniške kriminalitete povezani. Vsebinski koncepti so naslednji:
Kibernetska kriminaliteta (gl. tudi RK), oprema, komunikacijske naprave, mobilna omrežja, telefonske linije, računalniška omrežja, kazniva dejanja, goljufije, kraja podatkov, kraja
identitete, špijonaža, računalniško piratstvo, poneverbe, finančne prevare, prenašanje virusov, pedofilska omrežja, terorizem na spletu, spletke, mobing, stalking, spletni vandalizem,
Računalniška kriminaliteta (RK), internetna kriminaliteta, digitalna kriminaliteta, virtualna kriminaliteta, e-kriminaliteta, Informacijska kriminaliteta, Računalniška forenzika, odkrivanje,
preiskovanje, preprečevanje. Bralci tega dela si lahko izdelajo še bolj nadrobno sliko s pomočjo spletne aplikacije, ki se imenuje Text2MindMap Converter (kliknite sliko 2).
GOR

3.2 Slika 3: Klikalni diagram na temo računalniške kriminalitete


Slika 3 prikazuje klikalni diagram s področja računalniške kriminalitete. Sleherni gradnik znotraj diagrama vsebuje spletno povezavo do že pripravljene poizvedbe s COBISS/COBIB ali
pa iskalnika Google (v primeru, da z določene teme na COBISS/COBIB ni bilo zadetka, sem v določeno slikovno entiteto vgradil spletno povezavo do pripravljene poizvedbe z Googla).
Poizvedbe so bile izvedene v slovenskem jeziku s pomočjo izbranih predmetnih oznak (gl. geslovnik MNZ in organov v sestavi).

GOR

4 Zaključek

Bralke/-ci bodo lahko ta hibridni izdelek (podobno kot vse poprejšnje) uporabili za naslednje namene: za študij, za raziskave, za interno izobraževanje idr. Prav tako bodo lahko tudi
dopolnili oziroma nadgradili že obstoječe spletne povezave do relevantnih vsebin.

5 Uporabljena programska orodja


1. JabRef 2.7.2 Reference manager (2012-07-24)
2. Microsoft Fronpage 2003
3. Microsoft Visio Professional 2007
4. Publish or perish (2012-07-24)
5. Text2Mindmap converter (2012-07-24)
6. Yed editor (2012-07-24)

GOR

6 Priloga
Spodnja preglednica predstavlja aplikacijo, ki poleg bibliografskih zapisov s COBISS/COBIB in Google učenjaka vsebuje še kakovosten iskalnik (ta iskalnik zajema zadetke znotraj
preglednice). Predstavljeni so ključni podatki o avtorju, naslovu, letu nastanka, reviji/konferenci, tipu reference in ali je delo dosegljivo na spletu (gl. DOI/URL - povsem na desni strani
preglednice).

HITRO ISKANJE: BRISANJE Š TEVILO USTREZNIH ZADETKOV: 1107/1107.

AVTOR NASLOV LETO REVIJA/KONFERENCA TIP DOI/URL


REFERENCE

at1, I.P. & 939 In addition to the formal concerns related to substantive 1941 , pp. - book
laws and procedural laws, international computer crime
investigations are hampered by a variety

Aas, K. Technologies of inSecurity: the surveillance of everyday 2008 , pp. - book


life

Abagnale, F. FBI 2005 Computer Crime Survey 2005 Federal Bureau of Investigation, pp. - article

Abraham, T. & ... Investigative profiling with computer forensic log data 2002 Data Mining, 2002. ICDM 2002. , pp. - article URL
and association rules

Adachi, N., Aoki, S., Komano, Y. & The security problems of Rivest and Shamir's PayWord 2003 E-Commerce, 2003. CEC , pp. - article URL
... scheme

Adams, J. Controlling cyberspace: applying the computer fraud and 1996 Santa Clara Computer & High Tech. LJ, pp. - article URL
abuse act to the internet

Adelstein, F. Live forensics: diagnosing your system without killing it 2006 Communications of the ACM, pp. - article URL
first

Adler, F. A note on teaching  ›international Ą 1996 Journal of Criminal Justice Education, pp. - article URL

Adler, F., Mueller, G.O. & Laufer, Criminology 1998 , pp. XXIII, 552 str.- book
W.S.

Aiziwa, K. Cooperation in Criminal Matters: Mutual Legal 2001 Proceedings of the Asia Cyber Crime Summit. Hong , pp. article
Assistance and Extradition, 24/7 Points of Contact -
Network, and Training in the Field of Computer Crime'

Albanese, J. Tomorrow's thieves 1988 The Futurist, pp. - article URL

Albanese, J. & ... Crime in America: Some existing and emerging issues 1993 No.: ISBN 0-13-191446-4, pp. - article URL

Alderman, T. Computer Crime Journal of Systems Management, pp. - article


Aldrich, R. Cyberterrorism and computer crimes: issues surrounding 2000 , pp. - book
the establishment of an international regime

Alexander, K. & ... Computer crime 1996 Emory Law Journal, pp. - article

Alexander, M. Computer crime: Ugly secret for business 1990 Computerworld, pp. - article

Alexander, M. Computer crime fight stymied 1989 Federal Computer Week, pp. - article

Allegrini, M. Le frodi aziendali. Frodi amministrative, alterazioni di 2003 , pp. - book


bilancio e computer crime

Allen, B. Computer Crime: New Findings, New Insights 1981 notes used at computer Security Institute's Eighth , pp. - article

Allen, B. Embezzler's Guide to the Computer 1975 Harvard Business Review, pp. - article

Allen, W. Computer forensics 2005 Security & Privacy, IEEE, pp. - article URL

Altheide, C. & Carvey, H. Digital forensics with open source tools 2011 , pp. XVII, 264 str.- book

Anderson, D. Aggregate Burden of Crime, The 1999 JL & Econ., pp. - article URL

Anderson, K. Hacktivism and Politically Motivated Computer Crime 2009 Encurve, LLCC, pp. - article

Anderson, K. Intelligence Based Threat Assessments for Information 1999 Global Technology Research, Inc. White paper, n. pag, article
Networks and Infrastructures pp. -

Anderson, R. Liability and computer security: Nine principles 1994 Computer Security—ESORICS 94, pp. - article URL

Anderson, R. & ... Understanding the insider threat 2004 , pp. - book URL

Andreano, F. Evolution of Federal Computer Crime Policy: The Ad Hoc 1999 Am. J. Crim. L., pp. - article URL
Approach to an Ever-Changing Problem, The

Anthes, G. Security plans lag computer crime rate 1995 Computers and Security, pp. - article URL

Armstrong, C. Mastering computer forensics 2003 World Conference on Information Security , pp. - article URL

Armstrong, C. Developing a framework for evaluating computer forensic 2003 Evaluation in Crime Trends and justice: Trends , pp. - article
tools

Armstrong, H. & ... Internet anonymity practices in computer crime 2003 Information management & , pp. - article URL

Armstrong, I. Computer Crime Spreads 2000 SC Magazine, pp. - article

Association, A.B. Task Force on Computer Crime 1984 Criminal Justice, pp. - article

Association, A.B. Task Force on Computer Crime, Section of Criminal 1984 Report On Computer Crime, Washington, DC: ABA, pp. - article
Justice

Attaran, M. Managing legal liability of the Net: a ten step guide for IT 2000 Information management & computer security, pp. - article URL
managers

August, R. Turning the Computer into a Criminal 1983 Barrister, pp. - article URL

AusCERT, M., Rankine, T., Rothery, Australian Computer Crime and Security Survey 2003 , pp. - book
M. & ...
Aycock, J. Computer viruses and malware 2010 , pp. - book

Baase, S. A gift of fire 2003 , pp. - book

Bace, R. A New Look at Perpetrators of Computer Crime 1994 Proc. 16th Department of Energy Computer Security , pp. article
-

Backhouse, J. & ... Managing computer crime: a research outlook 1995 Computers & Security, pp. - article URL

Bagchi, K. & ... An analysis of the growth of computer and Internet 2003 of the Association for Information Systems ( , pp. - article
security breaches

Bailey, D. Attacks on computers: Congressional hearings and 1984 , pp. - book URL
pending legislation

Baker, G. Trespassers will be prosecuted: computer crime in the 1993 Computer/law journal, pp. - article URL
1990s

Baker, R. Computer security handbook 1991 , pp. - book

Baker, W., Hylender, C. & ... 2008 data breach investigations report 2008 Basking Ridge, NJ: Verizon , pp. - article

Ball, L. Computer crime 1982 Technology Review, pp. - article

Bandyopadhyay, T., Mookerjee, V. & Why IT managers don't go for cyber-insurance products 2009 Communications of the , pp. - article URL
...

Bar-Sela, Y. Computer Legislation in Israel: A Proposal Being 1986 Isr. L. Rev., pp. - article URL
Developed by the Ministry of Justice

Barki, H., Rivard, S. & ... A keyword classification scheme for IS research literature: 1993 Mis Quarterly, pp. - article URL
An update

Barlow, J. & ... Crime & Puzzlement 1990 , pp. - book

Barr, R. & ... Crime placement, displacement, and deflection 1990 Crime and Justice, pp. - article URL

Barr, W. Foreword 1991 Am. Crim. L. Rev., pp. - article URL

Barrett, N. Digital crime : policing the cybernation 1997 , pp. 224 str.- book

Barton, B. & ... User-friendly password methods for computer-mediated 1984 Computers & Security, pp. - article URL
information systems

Barton, G. Taking a Byte out of Crime: E-mail Harassment and the 1995 Wash. L. Rev., pp. - article URL
Inefficacy of Existing Law

Barton, P. & ... Cyber-crime--criminal offence or civil wrong? 2003 Computer Law & Security Report, pp. - article URL

Baryamureeba, V. & ... The enhanced digital investigation process model 2004 Proceedings of the 4th Annual Digital , pp. - article

Baskerville, R. Information systems security design methods: implications 1993 ACM Computing Surveys (CSUR), pp. - article URL
for information systems development

Bawden, B. International Symposium on the Prevention and 1992 Computer Law and Security Report, pp. - article
Prosecution of Computer Crime

Bear, G. Teaching Computer Ethics 1986 Computers in the Schools, pp. - article URL
Becker, J. Computer crime career of the future? 1982 SIGCAS Comput. Soc, pp. - article

Becker, J. Who are the computer criminals 1982 ACM SIGCAS Computers and Society, pp. - article URL

Becker, J. Trial of a Computer Crime 1982 Prosecutor, pp. - article URL

Becker, J. The investigation of computer crime 1980 , pp. - book

Becker, J. Rifkin, A Documentary History 1980 COMP. LAW. J., pp. - article URL

Becker, J. Operational Guide to White-Collar Crime Enforcement, 1978 Battelles Law and Justice Center, Seattle, Washington, pp. article
on the Investigation of Computer Crime -

Beebe, N. & ... A hierarchical, objectives-based framework for the digital 2005 Digital Investigation, pp. - article URL
investigations process

Beebe, N. & ... Using situational crime prevention theory to explain the 2005 Proceedings of the 2005 software , pp. - article
effectiveness of information systems security

Belič, I. Okrogla miza o informacijski varnosti in digitalni Zbornik povzetkov [!prispevkov], pp. 2 str.- article
forenziki

Belič, I. Tehnični vidiki odprtih vprašanj v zvezi z dokazovanjem s Problemi dokazovanja v zahtevnih kazenskih postopkih, article
postopki digitalne forenzike pp. Str. 151-162

Belič, I. Ustanovitev enote za boj proti računalniškemu kriminalu 2001 Varstvoslovje article
v Veliki Britaniji (Chloe Palmer, Zapis urednika revije Vol. 3(1/2), pp. str. 125-126
Computer Fraud & Security, maj 2001)

Belič, I. Seminar Računalniško piratstvo - Gotenica 20. in 1999 Varstvoslovje article


21.9.1999 Vol. 1(2), pp. str. 75-76

Bell, R. The prosecution of computer crime 2002 Journal of financial crime, pp. - article URL

Bennett, S. & ... An application of qualitative risk analysis to computer 1992 Computer Security Applications , pp. - article URL
security for the commercial sector

Bennett, W.W. & Hess, K.M. Criminal investigation 1998 , pp. XXI, 730 str.- book

Bequai, A. How to Prevent Computer Crime: A Guide to Forensic 2002 , pp. - book
and Technology

Bequai, A. Employee abuses in cyberspace: Management's legal 1998 Computers & Security, pp. - article URL
quagmire

Bequai, A. Techno-Crimes: The Computerization of Crime and 1987 Lexington: DC Heath and Company, pp. - article URL
Terrorism

Bequai, A. Lack of Ethics as a Cause of Computer Crime' 1984 Computers and People, pp. - article

Bequai, A. How to prevent computer crime: a guide for managers 1983 , pp. - book

Bequai, A. Computer Crime: Expert Witness Manual 1980 , pp. - book

Bequai, A. Organized crime: The fifth estate 1979 , pp. - book

Bequai, A. Problem of Crime in the Electronic Society, The 1978 Com. LJ, pp. - article URL
Bequai, A. Computer crime 1978 , pp. - book

Bequai, A. Computer Crime: A Growing and Serious Problem 1976 Police LQ, pp. - article URL

BEQUAI, A., Utah, U. o. & ... CASHLESS SOCIETY-AN ANALYSIS OF THE 1976 JOURNAL OF , pp. - article URL
THREAT OF CRIME AND THE INVASION OF
PRIVACY

Berg, T. State Criminal Jurisdiction in Cyberspace: Is There a 2000 Michigan Bar Journal, pp. - article
Sheriff on the Electronic Frontier?

Berlim, B. The International Handbook on Computer Crime Chichester, pp. - article

Bernard, J., Selinšek, L., Lesjak, B. Digitalna forenzika v kazenskih postopkih : zbornik 2008 , pp. 138 str.- book
& Š avnik, J. razprav, pripravljenih v okviru projekta Digitalna
forenzika in njena vloga v sodnih postopkih (CRP V2-
0219)

Berqia, A. & ... A distributed approach for intrusion detection systems 2004 Information and Communication , pp. - article URL

Besednjak, A. Tehnični in pravni vidik dokazov v elektronski obliki : 2008 , pp. 81 f.- book
diplomsko delo visokošolskega študija

Best, R. & ... Computer Crime, Abuse, Liability and Security,-A 1970 , pp. - book
Comprehensive Bibliography

Bhaskar, R. State and local law enforcement is not ready for a cyber 2006 Communications of the ACM, pp. - article URL
Katrina

Biggs, S. & ... Cloud computing: The impact on digital forensic 2009 Internet Technology and Secured , pp. - article URL
investigations

Bintliff, R. Complete manual of white collar crime detection and 1993 No.: ISBN 0-13-017260-X, pp. - article URL
prevention

Bishop, M. The insider problem revisited 2005 Proceedings of the 2005 workshop on New security , pp. - article URL

Bistarelli, S. & ... Analysis of integrity policies using soft constraints 2003 Policies for Distributed Systems and , pp. - article URL

Black, D. Computer Hacker-Electronic Vandal or Scout of the 1993 JL & Inf. Sci., pp. - article URL
Networks, The

Blain, M. iCrime cops 2010 Police review article


Vol. 118(6070), pp. str. 26-27

Bliss, A. & ... The threat of computer crime: identifying the problem and 1998 POLICE JOURNAL, pp. - article
formulating a response at force level

Bloom, R. Computer crime: a new white collar crook' 1980 Infosystems, pp. - article

Bloombecker, B. Spectacular Computer Crimes: What They are and how 1990 No.: ISBN 1-55623-256-X, pp. - article URL
They Cost American Business Half a Billion Dollars a
Year!

Bloombecker, B. Computer crime and abuse 1990 The EDP Auditor Journal, II, pp. - article

BloomBecker, J. Buck." Cracking down on Computer Crime." State Legislatures, pp. - article
BloomBecker, J. Computer Crime Laws 1993 , pp. - book

BloomBecker, J. Short-circuiting computer crime 1989 Datamation, pp. - article

BloomBecker, J. Computer ethics: an antidote to despair 1987 ACM SIGCAS Computers and Society, pp. - article URL

BloomBecker, J. Computer Crime, Computer Security, Computer Ethics: 1986 , pp. - book
The First Annual Statistical Report of the National Center
for Computer Crime Data

BloomBecker, J. Computer Crime 1986 National Center for Computer Crime Data. Los Angeles , article
pp. -

BloomBecker, J. Introduction to computer crime 1984 Proceedings of the 2nd IFIP international conference , pp. article
-

BloomBecker, J. Computer crime update: The view as we exit 1984 1984 W. New Eng. L. Rev., pp. - article URL

BloomBecker, J. Conscience in computing: a Law Day perspective on 1983 ACM SIGCAS Computers and Society, pp. - article
computer crime

Bloombecker, J. International computer crime: Where terrorism and 1982 Computers & Security, pp. - article URL
transborder data flow meet

Bloombecker, J. Trial of a Computer Crime, The 1981 Int'l Bus. Law., pp. - article URL

Blythe, S. South pacific computer law: Promoting E-commerce in 2006 Journal of South Pacific Law, pp. - article
Vanuatu and fighting cyber-crime in Tonga

Boedges, P. Air force mounts offensive against computer crime 1988 Government Computer News, pp. - article

Bogen, A. & ... Knowledge discovery and experience modeling in 2004 of the 2004 international symposium on , pp. - article URL
computer forensics media analysis

Bogolea, B. & ... Information security curriculum creation: a case study 2004 Proceedings of the 1st annual conference on , pp. - article URL

Bologna, G., Lindquist, R. & ... ACCOUNTANT'S HANDBOOK OF FRAUD AND 1993 No.: ISBN 0-471-52642-8, pp. - article URL
COMMERCIAL CRIME

Bologna, J. Computer Crime: Wave of the Future 1981 , pp. - book

Boni, W.C. & Kovacich, G.L. Netspionage : the global threat to information 2000 , pp. XX, 260 str.- book

Boockholdt, J., HORVITZ, J. & ... Prosecution of Computer Crime 1978 JOURNAL OF , pp. - article URL

Booth, M. The triads: the Chinese criminal fraternity 1990 , pp. - book

Borchgrave, A.D., Cilluffo, F., Cyber threats and information security meeting the 21st 2001 , pp. - book URL
Cardash, S. & ... century challenge

Bosworth, S. & ... Computer security handbook 2002 , pp. - book

Botha, M. & ... Utilising fuzzy logic and trend analysis for effective 2003 Computers & Security, pp. - article URL
intrusion detection

Bottom, N. & ... Security & loss control 1983 , pp. - book
Bowers, D. Access control and personal identification systems 1988 No.: ISBN 0-409-90083-4, pp. - article URL

Bowker, A. The advent of the computer delinquent 2000 FBI Law Enforcement Bulletin, pp. - article URL

Bowker, A. Juveniles and Computers: Should We Be Concerned 1999 Fed. Probation, pp. - article URL

Bowker, A. & ... Computer Crime in the 21st Century and Its Effect on the 2000 Fed. Probation, pp. - article URL
Probation Officer

Bowker, A.L. The advent of the computer delinquent 2000 FBI law enforcement bulletin article
Vol. 69(12), pp. str. 7-11

Boyd, C. & ... Time and date issues in forensic computing—a 2004 Digital Investigation, pp. - article URL
case study

Bradford, P., Brown, M., Perdue, J. Towards proactive computer-system forensics 2004 Technology: Coding and , pp. - article URL
& ...

Branigan, S. High-tech crimes revealed: cyberwar stories from the 2004 , pp. - book
digital front

Branscomb, A. Rogue computer programs and computer rogues: 1990 Rutgers Computer & Tech. LJ, pp. - article URL
Tailoring the punishment to fit the crime

Brenner, S. Is There Such a Thing as' Virtual Crime'? 2001 California Criminal Law Review, Vol. 4, No. 1, 2001, pp. article URL
-

Brill, A., Pollitt, M. & ... The evolution of computer forensic best practices: an 2006 Journal of Digital Forensic , pp. - article URL
update on programs and publications

Britz, M. Computer forensics and cyber crime 2004 , pp. - book

Britz, M. Computer Forensics and Computer Crime 2003 , pp. - book

Broadhurst, R. Developments in the global law enforcement of cyber- 2006 Policing: An International Journal of Police , pp. - article URL
crime

Bronitt, S. & ... Shifting boundaries of cybercrime: From computer 2003 CRIMINAL LAW JOURNAL- , pp. - article
hacking to cyber-terrorism

Brown, D. & ... Using clustering to discover the preferences of computer 2001 Systems, Man and Cybernetics, , pp. - article URL
criminals

Brown, D., Gunderson, L. & ... Interactive analysis of computer crimes 2000 Computer, pp. - article URL

Brungs, A. & Jamieson, R. Identification of legal issues for computer forensics 2005 Information Systems Management, pp. - article URL

Bržan, D. Računalniška forenzika in računalniško preiskovanje : 2011 , pp. 80 str.- book URL
magistrsko delo

Buckland, J. & ... Combating computer crime: prevention, detection, 1992 , pp. - book
investigation

Budimlić, M. Kompjuterski kriminalitet izmeĂ„â€u teorije i prakse 2003 Sarajevo, Fakultet kriminalitiĂ„Š¤kih nauka, pp. - article
(Transl.: Computer crime between theory and practice)

Bumke, D. Computer Crime 1980 The Saturday Evening Post, pp. - article
Burk, D. Transborder intellectual property issues on the Electronic 1994 Stan. L. & Pol'y Rev., pp. - article URL
Frontier

Burns, R., Whitworth, K. & ... Assessing law enforcement preparedness to address 2004 Journal of Criminal Justice, pp. - article URL
Internet fraud

Bynum, T. Computer ethics: Its birth and its future 2001 Ethics and Information Technology, pp. - article URL

Bynum, T. & ... Computer ethics and professional responsibility 2004 , pp. - book

Cardinali, R. Reinforcing our moral vision: examining the relationship 1995 Work Study, pp. - article URL
between unethical behaviour and computer crime

Carl, G., Kesidis, G., Brooks, R. & ... Denial-of-service attack-detection techniques 2006 Internet Computing, IEEE, pp. - article URL

Carney, M. & ... The Trojan made me do it: A first step in statistical based 2004 International Journal of Digital Evidence, pp. - article
computer forensics event reconstruction

Carrier, B. File system forensic analysis 2005 , pp. XX, 569 str.- book

Carrier, B. & ... Getting physical with the digital investigation process 2003 International Journal of Digital Evidence, pp. - article

Carroll, J.M. Computer security 1996 , pp. - book

Carter, D. Computer crime categories: how techno-criminals operate 1995 FBI law enforcement bulletin, pp. - article

Carter, D. & ... Computer crime and security: The perceptions and 2006 Security Journal, pp. - article URL
experiences of corporate security directors

Carter, D. & ... Computer-related crime 2002 Op. cit, pp. - article

Carter, D. & ... Computer crime: An emerging challenge for law 1996 FBI Law Enforcement Bulletin, pp. - article URL
enforcement

Casabona, P. & ... Computer Fraud: Financial and Ethical Implications 1998 Review of Business, pp. - article URL

Casey, E. Digital Evidence and Computer Crime. 2000 Academic Press, pp. - article

Casey, E. Digital evidence and computer crime: forensic science, 2011 , pp. - other
computers, and the Internet

Casey, E. Investigating sophisticated security breaches 2006 Communications of the ACM, pp. - article URL

CASEY, E. Digital Evidence and Computer Crime, [Sl]: Elsevier 2004 ISBN, pp. - article
Academic Press

Casey, E. Chapter 13: Forensic examination of handheld devices, 2004 , pp. - book
digital evidence and computer crime

Casey, E. ur.(2004) Handbook of computer crime investigation: 2004 London-San Diego: Elsevier , pp. - article
Forensic tools and technology

Casey, E. Digital evidence and computer crime 2003 , pp. - book

Casey, E. Handbook of computer crime investigation: forensic tools 2002 , pp. - book
and technology

Casey, E. Practical approaches to recovering encrypted digital 2002 International Journal of Digital Evidence, pp. - article
evidence

Casey, E. Digital evidence and computer crime : forensic science, 2000 , pp. 279 str.- book
computers and the Internet

Casey, E. Handbook of Computer Crime 2000 Forensic Science, Computer and the Internet, pp. - article

Casey, E. & ... The investigative process in Digital evidence and 2004 , pp. - book
computer crime: forensic science, computers and the
Internet

Castelli, G. & ... Il dolo informatico: come combattere il" computer crime" 1988 , pp. - book

Center, C. How the FBI Investigates Computer Crime 2004 , pp. - book

Cerullo, V. & ... Business continuity planning: A comprehensive approach 2004 Information Systems Management, pp. - article URL

CFE, K. Computer Forensic Case Study: Espionage, Part 1 Just 2001 Information Systems Security, pp. - article URL
Finding the File is Not Enough!

Chambers, A. Computer auditing 1986 , pp. - book

Chan, H. A comparative study of reported and unreported computer 2000 , pp. - book URL
crimes

Chang, W., Chung, W., Chen, H. & An international perspective on fighting cybercrime 2003 Proceedings of the 1st NSF/NIJ , pp. - article URL
...

Charney, S. Christensen O'Connor Johnson Kindness les 9 et 10 1997 Computer Law and Security Report, pp. - article
septembre 1996, Seattle, chapitre 7;" Congress Approves
Electronic Espionage and Computer Crime

Charney, S. The justice department responds to the growing threat of 1992 Computer Security Journal, pp. - article URL
computer crime

Charney, S. & ... Computer Crime 1996 Emory LJ, pp. - article URL

Chaski, C. Who's at the keyboard? Authorship attribution in digital 2005 International Journal of Digital Evidence, pp. - article
evidence investigations

Chen, C. Computer crime and the computer fraud and abuse act of 1990 Computer/Law Journal, pp. - article
1986

Chen, C. & Lindsay, G. Viruses, attacks, and sabotage: It's a computer crime wave 2000 Fortune, pp. - article

Chen, H. Intelligence and security informatics: international 2006 , pp. - book


workshop, WISI 2006, Singapore, April 9, 2006:
proceedings

Chen, H., Chung, W., Xu, J., Wang, Crime data mining: a general framework and some 2004 Computer, pp. - article URL
G., Qin, Y. & ... examples

Chen, T. Intrusion detection for viruses and worms 2004 IEC Annual Review of Communications, pp. - article

Chen, Y., Chen, P., Hwang, J., An analysis of online gaming crime characteristics 2005 Internet , pp. - article URL
Korba, L. & ...

Chen, Y., Chen, P., Song, R. & ... Online gaming crime and security issue-cases and 2004 , pp. - book URL
countermeasures from taiwan

Chen, Y., Lin, S. & ... The influence of computer crime in online gaming on E- 2003 on Innovative Information Technology Policy and E- , pp. article
society-taking example for Taiwan in 2002 -

Cheurprakobkit, S. & ... Computer crime enforcement in Texas: funding, training, 2003 Journal of Police and Criminal Psychology, pp. - article URL
and investigating problems

Chien, E. & Bunker, L. Cyber viruses : how business can win in the battle that is 2000 Intersec article
not yet won Vol. 10(11/12), pp. str. 379-381

Choi, K. Computer crime victimization and integrated theory: An 2008 International Journal of Cyber Criminology, pp. - article
empirical assessment

Chung, W., Chen, H., Chang, W. & Fighting cybercrime: a review and the Taiwan experience 2006 Decision Support Systems, pp. - article URL
...

Ciardhuáin, S. An extended model of cybercrime investigations 2004 International Journal of Digital Evidence, pp. - article

Clark, F. & ... Investigating computer crime 1996 No.: ISBN 0-8493-8158-4, pp. - article URL

Clifford, R. Cybercrime: The investigation, prosecution and defense of 2001 , pp. - book URL
a computer-related crime

Clough, B. Computer Crime 1997 , pp. - book

Clutterbuck, R. Terrorism, drugs and crime in Europe after 1992 1990 No.: ISBN 0-415-05443-5, pp. - article URL

Code, T. Chapter 33 1996 Computer Crime, pp. - article

Cohen, C.L. Growing challenge of computer forensics 2007 The Police chief article
Vol. 74(3), pp. str. 24-29

Cohen, F. Computer viruses: theory and experiments 1987 Computers & security, pp. - article URL

Coldwell, R. Australian attitudes toward legal intervention into hacking 1995 Communications of the ACM, pp. - article URL

Coldwell, R. Perceptions of Computer Crime 1994 Crime against Business, Australian Institute of , pp. - article

Coldwell, R. University students' attitudes towards computer crime: a 1993 ACM SIGCAS Computers and Society, pp. - article URL
research note

Coldwell, R. Some social parameters of computer crime 1990 Australian Computer Journal, pp. - article

Coldwell, R. Non-professional practices in computing: Some thoughts 1987 AUST. COMP. J., pp. - article URL
on the next decade or so.

Coleman, J. The criminal elite: Understanding white-collar crime 2005 , pp. - book

Collier, P. & ... A forensic methodology for countering computer crime 1992 Artificial intelligence review, pp. - article URL

Collier, P. & ... Problems in policing computer crime 1992 Policing and Society: An International , pp. - article URL

Collins, J. Demand for Computer Crime Investigation Increases 1987 Data Management, pp. - article

Colombell, M. The legislative response to the evolution of computer 2002 Rich. JL & Tech., pp. - article
viruses
Colton, K. & ... Computer crime: Electronic fund transfer systems and 1982 , pp. - book
crime

Colvin, B. Computer Crime Investigators-a New Training Field 1979 FBI Law Enforcement Bulletin, pp. - article URL

Commission, S.L. Report on Computer Crime: Presented to Parliament by 1987 , pp. - book
the Lord Advocate by Command of Her Majesty, July
1987

Congress, U. The federal computer crime statute. 18 USCA~ 030 1986 US Congress, Washington, DC, pp. - article

Conley, J. & ... A survey of computer crime legislation in the United 1999 Information and Communications , pp. - article URL
States

Conly, C., (US), N.I. o.J. & ... Organizing for computer crime investigation and 1989 , pp. - book
prosecution

Conly, C. & ... Computer Crime 1990 NIJ Reports, pp. - article

Conly, C.H. Organizing for computer crime investigation and [1998? Issues and Practices in Criminal Justice, pp. VI, 124 str.- book
prosecution ]

Conry-Murray, A. Deciphering the Cost of a Computer Crime 2002 NETWORK MAGAZINE-SAN FRANCISCO-, pp. - article

Conser, J., Carsone, L. & ... Investigating Computer-Related Crimes Involving Small 1988 Critical Issues in Computer Investigation 2nd , pp. - article
Computer Systems

Cooper, J. & ... Computer-security technology 1984 , pp. - book URL

Corbett, P. State and Federal Criminal Cyberlaw and Legislation 2001 TM Cooley L. Rev., pp. - article URL
Survey

Corbett, P. Michigan's Arsenal for Fighting Cybercrime: An 2000 MICHIGAN BAR JOURNAL, pp. - article
Overview of State Laws Relating to Computer Crimes

Cordeiro, W. Suggested management responses to ethical issues raised 1997 Journal of Business Ethics, pp. - article URL
by technological change

Couch, R. Suggested Legislative Approach to the Problem of 1981 Wash. & Lee L. Rev., pp. - article URL
Computer Crime

Couch, R. Suggested Legislative Approach to the Problem of 1981 , pp. - book


Computer Crime, XXXVIII Wash & Lee L

Coutorie, L. The future of high-technology crime: A parallel Delphi 1995 Journal of Criminal Justice, pp. - article URL
study

Cra, D. Two bills equal forewarning 1989 , pp. - book

Craiger, P., Ponte, L., Whitcomb, C. Master's Degree in Digital Forensics 2007 , 2007. HICSS 2007. , pp. - article URL
& ...

Criscuoli, E. What personnel administrators should know about 1981 Personnel Administrator Dated:(September 1981), pp. - article URL
computer crime

Croall, H. White collar crime 1992 No.: ISBN 0-335-09656-5, pp. - article URL

Cronan, T., Foltz, C. & ... Piracy, computer crime, and IS misuse at the university 2006 Communications of the ACM, pp. - article URL
Cronin, B. Strategic intelligence and networked business 2000 Journal of information science, pp. - article URL

CSI, C. Computer Crime and Security Survey 2009 , pp. - book

CSI, C. FBI computer crime and security survey 2001 Computer Security Issues & Trend, pp. - article

Csonka, P. The Council of Europe Convention on Cyber-crime: A 2005 Cyber-crime: The challenge in Asia, pp. - article
response to the challenge of the new age

Csonka, P. INTERNET CRIME: THE DRAFT COUNCIL OF 2000 Computer Law & Security Review, pp. - article URL
EUROPE CONVENTION ON CYBER-CRIME: A
RESPONSE TO THE CHALLENGE OF CRIME IN THE
AGE OF THE

Cumiskey, A. Internet and telecoms security in the EU 1999 Intersec article


Vol. 9(2), pp. str. 42-44

Cunningham, W., Strauchs, J. & ... The Hallcrest Report II: Private Security Trends 1970- 1990 Stoneham, MA: Butterworth , pp. - article URL
2000

Cunningham, W., Strauchs, J. & ... Private security trends, 1970 to 2000: The Hallcrest report 1990 , pp. - book
II

Cutrera, T. Constitution in Cyberspace: The Fundamental Rights of 1991 UMKC L. Rev., pp. - article URL
Computer Users, The

D'Arcy, J., Hovav, A. & ... User awareness of security countermeasures and its 2009 Information Systems Research, pp. - article URL
impact on information systems misuse: a deterrence
approach

David, J., Karl, S. & ... Computer Crime 1999 Reilly Associates Inc. Taiwan Branch, pp. - article

Davies, D. The nature of computer crime 1990 Computers and Law, pp. - article

Davis, B. It's Virus Season again, Has Your Computer Been 1994 Wash. ULQ, pp. - article URL
Vaccinated: A Survey of Computer Crime Legislation as a
Response to Malevolent Software

Davis, J.B. Computer intrusion investigation guidelines 2001 FBI law enforcement bulletin article
Vol. 70(1), pp. str. 8-11

Davis, R. & ... Computer crime in canada 1999 CRIMINAL LAW QUARTERLY, pp. - article

Debelak, B. Računalniška forenzika - organizacijski vidiki : diplomsko 2007 , pp. 49 f.- book
delo visokošolskega študija

DeFrances, C. Prosecutors in state courts, 2001 2002 BJS Bulletin. Washington, DC: US Department of , pp. - article URL

DeLooze, L. Classification of computer attacks using a self-organizing 2004 Workshop, 2004. Proceedings from the Fifth , pp. - article URL
map

DeMarco, J. It's Not Just Fun and 'War Games'-Juveniles and 2001 United States Attorneys' Bulletin, pp. - article
Computer Crime'

Denning, D. Concerning hackers who break into computer systems 1990 High Noon on the Electronic Frontier: Conceptual , pp. - article URL

Denning, D., Neumann, P. & ... Social aspects of computer security 1987 Proceedings of the 10th , pp. - article
Denning, D.E. Information warfare and security 1999 , pp. XVII, 522 str.- book

Denning, P. Computers under attack: intruders, worms, and viruses 1990 , pp. - book

Denning, P. Computers, crime and privacy—a national 1984 Communications of the ACM, pp. - article
dilemma: congressional testimony from the industry

Deutch, M. Computer legislation: Israel's new codified approach 1996 J. Marshall J. Computer & Info. L., pp. - article URL

Dhillon, G. Principles of information systems security: Texts and 2006 Recherche, pp. - article URL
Cases

Dhillon, G. Challenges in managing information security in the new 2001 Information security management: global challenges in , article URL
millennium pp. -

Dhillon, G. Violation of safeguards by trusted personnel and 2001 Computers & Security, pp. - article URL
understanding related information security concerns

Dhillon, G. Computer crime: interpreting violation of safeguards by 1999 information technology resources in organizations in , pp. article
trusted personnel -

Dhillon, G. Managing and controlling computer misuse 1999 Information Management & Computer Security, pp. - article URL

Dhillon, G. & ... Computer crimes: theorizing about the enemy within 2001 Computers & Security, pp. - article URL

Dhillon, G., Silva, L. & ... Computer crime at CEFORMA: a case study 2004 International journal of information , pp. - article URL

DiDio, L. Computer Crime Costs on the Rise 1998 Computerworld, pp. - article

Diehl, E. & ... © watermark: Closing the analog hole 2003 Consumer Electronics, 2003. ICCE. 2003 , pp. - article URL

Dierks, M. Computer network abuse 1992 Harv. JL & Tech., pp. - article URL

Dittrich, D. Developing an effective incident cost analysis mechanism 2002 Security Focus, pp. - article

Dixon, P. An overview of computer forensics 2005 Potentials, IEEE, pp. - article URL

Doney, L. The growing threat of computer crime in small businesses 1998 Business Horizons, pp. - article

DONN, B. Fighting Computer Crime: A New Framework for 1998 , pp. - book
Protecting Information

Douglas, J., Burgess, A., Burgess, A. Crime classification manual: A standard system for 2011 , pp. - book
& ... investigating and classifying violent crimes

Dowland, P., Furnell, S., Illingworth, Computer crime and abuse: A survey of public attitudes 1999 Computers & , pp. - article URL
H. & ... and awareness

Drevenšek, M. Ponarejanje zgoščenk, kreditnih kartic in blagovnih znamk 2000 , pp. 59 f.- book
: diplomska naloga

Duff, L. & ... Computer Crime in the Global Village: Strategies for 1996 International Journal of the Sociology of Law, pp. - article URL
Control and Regulation—in Defence of the Hacker

Dunne, R. Deterring Unauthorized Access to Computers: Controlling 1994 Jurimetrics J., pp. - article URL
Behavior in Cyberspace Through a Contract Law
Paradigm
Durkin, K. Misuse of the Internet by pedophiles: Implications for law 1997 Fed. Probation, pp. - article URL
enforcement and probation practice

Durkin, K. & ...  ›Log on to sex Ą: Some notes on the carnal 1995 , pp. - book URL
computer and erotic cyberspace as an emerging research
frontier

Duyn, J.V. The human factor in computer crime 1985 , pp. - book

Easttom, C. & ... Computer Crime Investigation and the Law 2010 , pp. - book

Eckert, W. Interpretation of bloodstain evidence at crime scenes 1999 , pp. - book

Ekblom, P. Gearing up against crime 1997 International Journal of Risk, Security and , pp. - article

Eliasson, R. Datorbrott (Computer Crime) 1982 Treatise from the UmeĂĄ University, pp. - article

Eltringham, S. Computer Crime and Intellectual Property Section, US 2007 Prosecuting Computer Crimes, pp. - article
Department of Justice

Embar-Seddon, A. Cyberterrorism 2002 American Behavioral Scientist, pp. - article URL

Endicoytt-Popuvsky, B. Ethics and teaching information assurance 2003 Security & Privacy, IEEE, pp. - article URL

Eoghan, C. Handbook of computer crime investigation 2002 , pp. - book

Eoghan, C. Digital evidence and computer crime 2000 San Diego, Calif, pp. - article

Erbschloe, M. Forces of change: ten trends that will impact the internet 2001 Information systems management, pp. - article URL
over the next five years

Esbensen, D. Method and apparatus for automated network-wide 1998 US Patent 5,796,942, pp. - article URL
surveillance and security breach intervention

Esbenshade, P. Hacking: Juveniles and Undeterred Recreational 2002 J. Juv. L., pp. - article URL
Cybercrime

Etter, B. Computer crime 2001 4th National Outlook Symposium on Crime in Australia- , article
pp. -

Etter, B., Research, A.C. f.P. & ... Forensic Challenges of E-Crime 2001 , pp. - book URL

Etter, C. The challenge of the forensic investigation of computer 2001 Platypus Magazine, pp. - article
crime

Evers, J. Computer crime costs $67 billion, FBI says 2006 CNET News. com, pp. - article

Exum, J. Making the Punishment Fit the (Computer) Crime: 2010 Rich. JL & Tech., pp. - article URL
Rebooting Notions of Possession for the Federal
Sentencing of Child Pornography Offenses

Fagin, J. Criminal justice 2007 No.: ISBN 0-205-47893-X, pp. - article URL

Farahmand, F., Navathe, S., Sharp, G. Assessing Damages of Information Security Incidents and 2005 Proceedings of the , pp. - article
& ... Selecting Control Measures, a Case Study Approach

Fedoreck, T. Computers+ Connectivity= New Opportunities for 2004 NY ST. BJ, pp. - article
Criminals and Dilemmas for Investigators
Fifield, K. Smartcards outsmart computer crime 1989 Computers & Security, pp. - article URL

Flanagan, A. The law and computer crime: Reading the Script of 2005 International Journal of Law and Information , pp. - article URL
Reform

Fluendy, S. Phishing targeting online outlets. Computer Crime 2005 , pp. - book
Research Center

Flusche, K. Computer Crime and Analysis of Computer Evidence: It 1998 Information systems security, pp. - article URL
Ain't Just Hackers and Phreakers Anymore!

Foltz, C. Bryan.(2004)," Cyberterrorism, Computer Crime, and 2004 Information Management & Computer Security, pp. - article
Reality

Foltz, C. Cyberterrorism, computer crime, and reality 2004 Information Management & Computer Security, pp. - article URL

Foltz, C., Cronan, T. & ... Have you met your organization's computer usage policy? 2005 Industrial Management & , pp. - article URL

Foltz, C., Cronan, T. & ... Human behavior as a factor in the control of information 2002 Decision Sciences Institute 2002 Annual Meeting , pp. - article
systems misuse and computer crime

Foltz, C., Schwager, P. & ... Why users (fail to) read computer usage policies 2008 Industrial Management & , pp. - article URL

Forcht, K. Assessing the ethical standards and policies in computer- 1991 A Question of Ethics: Developing Information System , article
based environments pp. -

Forcht, K., Thomas, D. & ... Computer crime: Assessing the lawyer's perspective 1989 Journal of Business Ethics, pp. - article URL

Forensic, K. Fraud survey 2003 2003 Montvale, NJ, pp. - article

Forte, D. Strategic aspects in international forensics 2005 Forensic science series, pp. Str. 179-206 article

Fossen, E. Principles of internet investigation: Basic reconnaissance, 2005 Unpublished master's thesis, Norwegian University of , article
geopositioning, and public information sources pp. -

Foster, D. Can the general theory of crime account for computer 2004 , pp. - book URL
offenders: Testing low self-control as a predictor of
computer crime offending

Francia, G. & ... Computer forensics laboratory and tools 2005 Journal of Computing Sciences in Colleges, pp. - article URL

Francis, D. Computer crime 1987 No.: ISBN 0-525-67192-7, pp. - article URL

Freeh, L. speech to the 1997 International Computer Crime 1997 , pp. - book
Conference

Friedman, B. Moral Responsibility and Computer Technology. 1990 , pp. - book URL

Friedman, D. & ... Future imperfect: technology and freedom in an uncertain 2008 , pp. - book
world

Friedrichs, D. Trusted criminals: White collar crime in contemporary 2009 , pp. - book
society

Furnell, S. Cybercrime: Vandalizing the information society 2002 , pp. - book

Furnell, S. The problem of categorising cybercrime and 2001 2nd Australian Information Warfare and Security , pp. - article
cybercriminals

Furnell, S. & ... Computer hacking and cyber terrorism: The real threats in 1999 Computers & Security, pp. - article URL
the new millennium?

Furnell, S. & ... Computer abuse: vandalizing the information society 1997 Internet research, pp. - article URL

Furnell, S., Dowland, P., Illingworth, Authentication and supervision: A survey of user attitudes 2000 Computers & , pp. - article URL
H. & ...

Gabrys, E. The international dimensions of cyber-crime, part 1 2002 Information systems security, pp. - article URL

Gaensslen, R. How do I become a forensic scientist? Educational 2003 Analytical and bioanalytical chemistry, pp. - article URL
pathways to forensic science careers

Gammer, M. Computer Crime 1980 American Criminal Law Review, pp. - article URL

Gardner, E., Samuels, L., Render, B. The importance of ethical standards and computer crime 1989 Information System , pp. - article URL
& ... laws for data security

Garfinkel, S. The FBI's Cybercrime Crackdown 2002 TECHNOLOGY REVIEW-MANCHESTER NH-, pp. - article

Garfinkel, T. & ... When virtual is harder than real: Security challenges in 2005 Proceedings of the 10th conference on Hot , pp. - article URL
virtual machine based computing environments

Garg, A., Curtis, J. & ... Quantifying the financial impact of IT security breaches 2003 Information Management & , pp. - article URL

Garner, B. & ... Black's Law Dictionary Deluxe 8 1999 Auditing, pp. - article

Geary, J. Executive liability for computer crime and how to prevent 1994 Information Management & Computer Security, pp. - article URL
it

Geer, D. Security technologies go phishing 2005 Computer, pp. - article URL

Geer, D. Malicious bots threaten network security 2005 Computer, pp. - article URL

Gemignani, M. What is Computer Crime, and Why Should We Care 1987 UALR LJ, pp. - article URL

Gemignani, M. Computer Crime: The Law in'80 1980 Ind. L. Rev., pp. - article URL

George, B. Contemporary Legislation Governing Computer Crimes 1985 Criminal Law Bulletin, pp. - article URL

George, N. Cyber traps: An overview of crime, misconduct and 2004 Capacity building series, pp. - article URL
security risks in the cyber environment

Geradts, Z.J. Content-based information retrieval from forensic image 2002 , pp. 148 f.- other URL
databases : [dissertation]

Gilbert, J. Criminal investigation 1993 , pp. - book

Gillard, C. & ... Computer crime: a growing threat 1983 BYTE Mag, pp. - article

Gish, J. Computer Crime and Punishment-The View From the 1985 Information Stategy-The Executive's Journal, pp. - article URL
DA's Office

Glynn, E. Computer Abuse: The Emerging Crime and the Need for 1983 Fordham Urb. LJ, pp. - article URL
Legislation
Goldfarb, A. & ... Economic and business dimensions Search engine 2008 Communications of the ACM, pp. - article URL
advertising

Gonzalez, P. Addressing computer crime legislation: Progress and 1983 COMP. LAW J., pp. - article URL
regress.

Goodhue, D. & ... Security concerns of system users* 1:: A study of 1991 Information & Management, pp. - article URL
perceptions of the adequacy of security

Goodhue, D. & ... Security concerns of system users: a proposed study of 1989 System Sciences, 1989. Vol. IV: , pp. - article URL
user preceptions of the adequacy of security measures

Goodman, M. Making computer crime count 2001 FBI Law Enforcement Bulletin, pp. - article URL

Goodman, M. My the Police Don't Care About Computer Crime, 1997 JL & TECH, pp. - article
10HARV

Goodman, M. Why the police don't care about computer crime'(1997) 10 1997 Harvard journal of law and technology, pp. - article

Goodman, M. Why the Police Don't Care About Computer Crime 1996 Harv. JL & Tech., pp. - article URL

Gorden, L. Computer crime and security survey 2004 CSI/FBI, pp. - article

Gordon, G., Hosmer, C., Siedsma, C., Assessing technology, methods, and information for 2002 , pp. - book URL
Rebovich, D. & ... committing and combating cyber crime

Gordon, L., Loeb, G., Lucyshyn, W. 9th Annual FBI/CSI computer crime and security survey 2004 , pp. - book
& ... 2004'

Gordon, L., Loeb, M. & ... The 2005 CSI/FBI computer crime and security survey 2005 Computer Security , pp. - article

Gordon, L., Loeb, M. & ... A framework for using insurance for cyber-risk 2003 Communications of the ACM, pp. - article URL
management

Gordon, L., Loeb, M., Lucyshyn, W. Eleventh annual CSI/FBI computer crime and security 2007 Computer Security Institute, pp. - article
& ... survey 2006

Gordon, L., Loeb, M., Lucyshyn, W. CSI 2006 FBI computer crime and security , pp. - article
& ...

Gordon, L., Loeb, M., Lucyshyn, W. 2006 csi/fbi computer crime and security survey 2006 Computer Security , pp. - article
& ...

Gordon, L., Loeb, M., Lucyshyn, W. Computer crime and security survey, 2006 2006 , pp. - book
& ...

Gordon, L., Loeb, M., Lucyshyn, W. 10th annual CSI/FBI computer crime and security survey 2005 , pp. - book
& ...

Gordon, L., Loeb, M., Lucyshyn, W. The annual CSI/FBI computer crime and security survey 2005 CSI (Ed.), pp. - article
& ...

Gordon, L., Loeb, M., Lucyshyn, W. Ninth CSI/FBI computer crime and security survey 2004 , pp. - book
& ...

Gordon, L., Loeb, M., Lucyshyn, W. 2004 CSI/FBI computer crime and security survey 2004 Computer Security , pp. - article
& ...
Gordon, L., Loeb, M., Lucyshyn, W. The ninth annual 2004 CSI/FBI Computer crime and 2004 /www. gocsi. com/.[Cited 20th Oct , pp. - article
& ... security survey

Gordon, S. & ... On the definition and classification of cybercrime 2006 Journal in Computer Virology, pp. - article URL

Gordon, S. & ... Computer crime revisited: The evolution of definition and 2006 European Institute for Computer Anti-Virus Research ( , article
classification pp. -

Gottschalk, L., Liu, J., Dathan, B., Computer forensics programs in higher education: a 2005 ACM SIGCSE Bulletin, pp. - article URL
Fitzgerald, S. & ... preliminary study

Gould, C. The information web: ethical & social implications of 1988 , pp. - book
computer networking

Grabosky, P. 'Computer Crime: Challenge to Law Enforcement 2000 Law Enforcement Review N, pp. - article

Grabosky, P. Computer crime: A criminological overview 2000 Workshop on Crimes Related to the Computer Network , article
pp. -

Grabosky, P. & ... The Future of Cyber-crime in Asia 2005 Broadhurst, RG, pp. - article

Grabosky, P. & ... Telecommunication fraud in the digital age 2001 Crime and the Internet, pp. - article

Grabosky, P. & ... Crime in the digital age: Controlling telecommunications 1998 , pp. - book
and cyberspace illegalities

Grabosky, P.N. Crime in the digital age : controlling telecommunications 1998 , pp. XI, 259 str.- book
and cyberspace illegalities

Granick, J. Faking It: Calculating Loss in Computer Crime 2005 ISJLP, pp. - article URL
Sentencing

Grant, A., David, F. & ... Child pornography in the digital age 1997 Transnational Organized Crime, pp. - article URL

Grazioli, S. & ... Consumer and business deception on the Internet: Content 2003 International Journal of Electronic Commerce, pp. - article URL
analysis of documentary evidence

Green, G. & ... Introduction to security 1987 , pp. - book

Green, V. State computer crime statutes and the use of traditional 1989 memorandum), Reed, Smith, Shaw, and McClay, , pp. - article
doctrines to prosecute the computer criminal

Gresty, D., Shi, Q. & ... Requirements for a general framework for response to 2001 Computer Security Applications , pp. - article URL
distributed denial-of-service

Griffith, D. Computer Fraud and Abuse Act of 1986: A Measured 1990 Vand. L. Rev., pp. - article URL
Response to a Growing Problem, The

Griffiths, M. Computer Crime and Hacking: A Serious Issue for the 2000 POLICE JOURNAL, pp. - article
Police

Gripman, D. The doors are locked but the thieves and vandals are still 1997 J. Marshall J. Computer & Info. l., pp. - article URL
getting in: A proposal in tort to alleviate corporate
America's cyber-crime problem

Grodzinsky, F. & ... Is Cyberstalking a Special Type of Computer Crime 2001 Proceedings of ETHICPMP, pp. - article

Groover, R. Overcoming obstacles: Preparing for computer-related 1996 FBI Law Enforcement Bulletin, pp. - article URL
crime

Guisnel, J. Guerres dans le cyberespace : services secrets et Internet 1995 Enquetes, pp. 251 str.- book

Gupta, M., Chaturvedi, A., Mehta, S. The experimental analysis of information security 2000 Proceedings of the twenty , pp. - article URL
& ... management issues for online financial services

Haagman, D. & ... Trojan defence: A forensic view 2005 Digital Investigation, pp. - article URL

Hagen, J., Sivertsen, T. & ... Protection against unauthorized access and computer 2008 Journal of Computer Security, pp. - article URL
crime in Norwegian enterprises

Haggerty, J. & ... Managing corporate computer forensics 2006 Computer Fraud & Security, pp. - article URL

Halbert, D. Discourses of danger and the computer hacker 1997 The Information Society, pp. - article URL

Hall, J. & ... The Sarbanes-Oxley Act: implications for large-scale IT 2007 Communications of the ACM, pp. - article URL
outsourcing

Hamilton, C. Risk management and security 1999 Information systems security, pp. - article URL

Hansen, R. The computer virus eradication act of 1989: the war 1990 Software Law Journal, pp. - article
against computer crime continues

Harrington, S. Software piracy: Are Robin Hood and responsibility 2000 of information technology management in the , pp. - article URL
denial at work?

Harrington, S. The effect of codes of ethics and personal denial of 1996 MIS quarterly, pp. - article URL
responsibility on computer abuse judgments and
intentions

Harrington, S. Computer Crime & Abuse by US Employees: Something 1995 Journal of Systems Management, pp. - article
to Worry About?

Harrington, S. Why People Copy Software and Create Computer Viruses 1989 Information Resources Management Journal (IRMJ), pp. - article URL

Harrington, S. & ... Lessons from corporate America applied to training in 1990 ACM SIGSAC Review, pp. - article URL
computer ethics

Harris, A. IS ethical attitudes among college students: A 2000 Proceedings of ISECON, pp. - article
comparative study

Harris, K. & ... Computer Crime: An Overview 1995 Technical Bulletin, pp. - article URL

Hatcher, M., McDannell, J. & ... Computer Crimes 1999 Am. Crim. L. Rev., pp. - article URL

Haugen, S. & ... Identifying and controlling computer crime and employee 1999 Industrial Management & Data Systems, pp. - article URL
fraud

Hearnden, K. Computer crime and people 1990 A handbook of computer crime, London: Kogan Page, pp. article
-

Hearst, M. TileBars: visualization of term distribution information in 1995 Proceedings of the SIGCHI conference on Human , pp. - article URL
full text information access

Heinlein, E. Principles of information systems security 1995 Computers & Security, pp. - article
Held, D. & ... Governing globalization: Power, authority and global 2002 , pp. - book
governance

Henning, J. & ... Insider trading, money laundering and computer crime 2000 Transactions of the Centre for Business , pp. - article

Henry, S. & ... The criminology theory reader 1998 No.: ISBN 0-8147-3551-7, pp. - article URL

Henseler, H. Computer Crime and Computer Forensics 2000 The encyclopedia of forensic science, pp. - article

Herig, J. Computer crime in Florida: 1989 1989 Tallahassee, FL: Florida Department of Law , pp. - article

Hernandez, C. & ... Transnational crime and regional security in the Asia 1999 , pp. - book
Pacific

Herringshaw, C. Detecting attacks on networks 1997 Computer, pp. - article URL

Heymann, S. Legislating Computer Crime 1997 Harv. J. on Legis., pp. - article URL

Higgins, G. Can low self-control help with the understanding of the 2004 Deviant Behavior, pp. - article URL
software piracy problem?

Higgins, G. & ... Does social learning theory condition the effects of low 2004 Journal of Economic Crime Management, pp. - article
self-control on college students' software piracy

Higgins, G. & ... SELF-CONTROL, DEVIANT PEERS, AND 2004 Psychological reports, pp. - article URL
SOFTWARE PIRACY 1

Higgins, G., Wilson, A. & ... An application of deterrence theory to software piracy 2005 Journal of Criminal Justice and , pp. - article

Hinduja, S. Deindividuation and Internet software piracy 2008 CyberPsychology & Behavior, pp. - article URL

Hinduja, S. Investigating computer crime 2008 Crimes of the Internet, Prentice-Hall, Upper Saddle , pp. - article

Hinduja, S. Computer crime investigations in the United States: 2007 International Journal of Cyber Criminology, pp. - article
leveraging knowledge from the past to address the future

Hinduja, S. Perceptions of local and state law enforcement concerning 2004 Policing: An International Journal of Police , pp. - article URL
the role of computer crime investigative teams

Hinduja, S. Trends and patterns among online software pirates 2003 Ethics and Information Technology, pp. - article URL

Hinduja, S. Correlates of Internet software piracy 2001 Journal of Contemporary Criminal Justice, pp. - article URL

Hitchings, J. Deficiencies of the traditional approach to information 1995 Computers & Security, pp. - article URL
security and the requirements for a new methodology

Hollinger, R. Crime, deviance and the computer 1997 , pp. - book

Hollinger, R. Hackers: computer heroes or electronic highwaymen? 1991 ACM SIGCAS Computers and Society, pp. - article URL

Hollinger, R. Computer hackers follow a Guttman-like progression 1988 Sociology and social research, pp. - article

Hollinger, R. & ... THE PROCESS OF CRIMINALIZATION: THE CASE 1988 Criminology, pp. - article URL
OF COMPUTER CRIME LAWS*

Hollinger, R. & ... Criminal Law Formation: The Case of Computer Crime 1986 A paper presented at the 1986 Annual Meetings of , pp. - article
Legislation
Holt, T. Examining a transnational problem: An analysis of 2003 International Journal of Comparative and Applied , pp. - article URL
computer crime victimization in eight countries from 1999
to 2001

Holt, T., Bossler, A. & ... Examining state and local law enforcement perceptions of 2010 Crime On-line: Correlates, Causes, and Context, , pp. - article
computer crime

Hong, H. Hacking Through the Computer Fraud and Abuse Act 1997 UC Davis L. Rev., pp. - article URL

Hoo, K. How much is enough? A risk-management approach to 2000 Workshop on Economics and Information Security, UC , article
computer security pp. -

Hoonakker, P., Bornoe, N. & ... Password authentication from a human factors 2009 Proceedings of the Human , pp. - article URL
perspective: Results of a survey among end-users

Hoonakker, P., Carayon, P., Deb, J. The use of focus groups to examine human factors in 2008 Human Factors in , pp. - article
& ... computer and information security

Horvat, D. Kazenski postopek pri kaznivih dejanjih v zvezi z 2000 , pp. 57 f.- book
računalniki : diplomska naloga

Hosmer, C. Time-lining computer evidence 1998 Information Technology Conference, 1998. IEEE, pp. - article URL

Householder, A., Houle, K. & ... Computer attack trends challenge Internet security 2002 Computer, pp. - article URL

Hovav, A. & ... The impact of virus attack announcements on the market 2004 Information Systems Security, pp. - article URL
value of firms

Howard, J. & ... A common language for computer security incidents 1998 Sandia Report: SAND98-8667, Sandia , pp. - article

Howerton, P. Computer crime (a tutorial) 1985 Proceedings of the 1985 ACM annual conference on , pp. article
-

Huebner, E., Bem, D. & ... Computer forensics: past, present and future 2003 security Technical report, pp. - article

Hughes, G. Computer crime: the liability of hackers 1990 Australian Computer Journal, pp. - article

Hughes, G., Tucker, G., Thompson, Legislative responses to computer crime 1990 , pp. - book
D. & ...

Hughes, K. Comparing pretesting methods: cognitive interviews, 2004 Survey Methodology, pp. - article
respondent debriefing, and behavior coding

Hunt, C. Networking personal computers with TCP/IP 1995 , pp. - book

Husted, B. The impact of national culture on software piracy 2000 Journal of Business Ethics, pp. - article URL

Hutchinson, W. & ... Attacking the Attackers: Attitudes of Australian IT 1999 ACIS (Australasian Conference on , pp. - article
Managers to retaliation against hackers

Hyde-Bales, K., Morris, S. & ... The Policing Recording of Computer Crime 2004 Development and Practitioner Report, pp. - article

Hyde-Bales, K., Morris, S., Charlton, Police Recording of Computer Crime 2004 No.: ISBN 1 84473 488 , pp. - article URL
A. & ...

Icov, D., Seger, K. & ... Computer Crime. A Crimefighter's Handbook, O'Reily & 1995 Inc. Sebastopol, CA, pp. - article
Associates
Icove, D. Collaring the cybercrook: an investigator's view 1997 Spectrum, IEEE, pp. - article URL

Icove, D., Seger, K. & ... Computer crime: a crimefighter's handbook 1995 , pp. - book

Icove, D., Seger, K. & ... Fighting Computer Crime 1995 , pp. - book

Icove, D., Seger, K. & ... Computer Crime. O'Reilley & Associates 1995 Inc., Sebastopol, California, pp. - article

Icove, D., Seger, K. & VonStorch, Computer crime : a crimefighter`s handbook 1995 Computer security, pp. XXI, 437 str.- book
W.

Ignjatović, Ă„. Pojmovno odreĂ„â€enje kompjuterskog kriminaliteta 1991 Anali Pravnog fakulteta u Beogradu, pp. - article URL

III, B.Y. MANAGING E-BUSINESS RISKS 2001 , pp. - book

III, G.F. Digital forensics laboratory projects 2006 Journal of computing Sciences in Colleges, pp. - article URL

Ingraham, D. On Charging Computer Crime"(1980) 1980 Computer Law Journal, pp. - article

Ingraham, D. On charging computer crime 1980 Computer LJ, pp. - article

International Criminal Law Seminar, The alleged transnational criminal : the Second Biennial 1995 International bar association series, pp. XXI, 449 str.- inproceedings
2. International Criminal Law Seminar

Iqbal, M. Defining cyberterrorism 2004 J. Marshall J. Computer & Info. L., pp. - article URL

Irons, A. Computer forensics and records managementâ€â 2006 Records Management Journal, pp. - article URL
€ścompatible disciplines

Jackson, K. Congress pushes computer crime law 1989 Federal Computer Week, pp. - article

Jaishankar, K. Cyber criminology: Evolving a novel discipline with a 2007 International Journal of Cyber Criminology, pp. - article
new journal

Jakšič, B. Kibernetska vojna : (cyberwar) : diplomska naloga 2000 , pp. 55 f.- book

Jambriško, D. Računalniški kriminal in avtorske pravice : diplomska 1999 , pp. 64 f., [17] f. pril.- book
naloga

Jensen, E. Electronic Soapbox: Computer Bulletin Boards and the 1987 Fed. Comm. LJ, pp. - article URL
First Amendment, An

Jessup, L., Valacich, J. & ... Information systems today 2003 , pp. - book

Jewkes, Y. Crime online 2007 , pp. - book

Jinyuan, L. Analysis of computer crime challenge the existing , pp. - book


criminal law and criminal legislation to improve

Johnson, A. The technology acceptance model and the decision to 2005 Southern Association of Information Systems , pp. - article
invest in information security

Johnson, D. Mapping ordinary morals onto the computer society: a 1984 Journal of Social Issues, pp. - article URL
philosophical perspective

Johnson, T. Forensic computer crime investigation 2005 , pp. - book

Johnston, A. & ... Improved security through information security 2009 Communications of the ACM, pp. - article URL
governance

Johnston, J., Eloff, J. & ... Security and human computer interfaces 2003 Computers & Security, pp. - article URL

Jones, R. Computer file protection system 1992 US Patent 5,144,659, pp. - article URL

Jones, T. Child abuse or computer crime? The proactive approach 2003 Policing Paedophiles on the Internet Bristol: New , pp. - article

Joutsen, M. in European Criminal Justice: Corruption, Women in the 1999 No.: ISBN 951-53-1968-4, pp. - article URL
Criminal Justice System, Criminal Policy Indicators,
Community Crime Prevention, and Computer Crime

Jr, D.S. & ... Discovering and disciplining computer abuse in 1990 MIS Quarterly, pp. - article URL
organizations: a field study

Jr, D.S. & ... Key information liability issues facing managers: software 1990 Mis Quarterly, pp. - article URL
piracy, proprietary databases, and individual rights to
privacy

Jr, E.P. Computer abuse: Problems of instrumental control 1987 Deviant Behavior, pp. - article URL

Jr, H.S. Web That Binds Us All: The Future Legal Environment of 1996 Hous. J. Int'l L., pp. - article URL
the Internet, The

Jr, J.T. & ... Computer Crime: Keeping Up with High Tech Criminals 1986 Crim. Just., pp. - article URL

Jr, J.T. & ... The 1984 Federal Computer Crime Statute: A partial 1986 COMP. LAW J., pp. - article URL
answer to a pervasive problem.

Jr, R.V., Bergiel, B. & ... Effects of the electronic Nigerian money fraud on the 2004 Management Research , pp. - article URL
brand equity of Nigeria and Africa

Judson, K. Computer crime: phreaks, spies, and salami slicers 2000 , pp. - book

Judson, K. Computer crime : phreaks, spies, and salami slicers 1994 Issues in focus, pp. 128 str.- book

Jurc, J. Digitalna forenzika in digitalni dokazi : diplomsko delo 2011 , pp. 53 f.- book

Jurkat, M. Computer Crime Legislation: Survey and Analysis 1986 Annual Survey of American Law, pp. - article

Kabay, M. Understanding Studies and surveys of computer Crime 2009 Computer Security Handbook, pp. - article

Kabay, M. Studies and surveys of computer crime 2001 , pp. - book

Kabay, M. ICSA White Paper on Computer Crime Statistics 1998 International Computer Security Association, pp. - article

Kallman, E. & ... Ethical decision making and information technology: An 1996 , pp. - book
introduction with cases

Kanellis, P. Digital crime and forensic science in cyberspace 2006 , pp. - book

Kankanhalli, A., Teo, H., Tan, B. & An integrative study of information systems security 2003 International Journal of , pp. - article URL
... effectiveness

Kapor, M. Civil liberties in cyberspace 1991 Scientific American, pp. - article

Kardoš, Z. Možnosti računalniške forenzike z uporabo 2010 , pp. VI, 70 str.- book URL
nekomercialnih programskih orodij : specialistična naloga
Kaspersen, H.W. Implementation of Recommendation no. R (89) 9 on Council of Europe - European Committee on Crime article
computer-related crime Problems, pp. 114 str.-

Kastelic, T. & Š kraba, M. Digitalni dokazi - metode in izkušnje policije Digitalni dokazi, pp. Str. 29-44 article

Katanović, D. Obvladovanje varnostnih incidentov s pomočjo 2011 , pp. 92 str., [18] f. pril- book
računalniške forenzike : magistrska naloga

Katyal, N. Digital architecture as crime control 2002 Yale LJ, pp. - article URL

Katz, A. Computers: the changing face of criminality 1995 No.:, pp. - article URL

Kay, D. A course in computer law 1992 ACM SIGCSE Bulletin, pp. - article URL

Keefe, B. Computer Crime Research Organization News 2004 , pp. - book

Keefe, P. Computer crime insurance available- for a price 1983 COMPUTERWORLD., pp. - article

Kelly, S. Computer crime losses double 2007 Business Insurance, pp. - article

Kelman, A. Computer Crime in the 1990s: A Barrister's View' 1994 Paper for the Twelfth International Symposium on , pp. - article

Kenny, M. Data encryption: coping with computer crime. Manage, Computer crimes, pp. - article
33: 15-17, April 1981. Descriptors:" Electronic data
processing departments—Security measures

Keromytis, A. Patch on demand saves even more time?[network 2004 Computer, pp. - article URL
security]

Kerr, O. Computer Crime Law 2006 , pp. - book

Kerr, O. Virtual Crime, Virtual Deterrence: A Skeptical View of 2005 JL Econ. & Pol'y, pp. - article URL
Self-Help, Architecture, and Civil Liability

Kerr, O. Cybercrime's Scope: Interpreting Access and 2003 NYUL Rev., pp. - article URL
Authorization in Computer Misuse Statutes

Kerr, O. Lifting the Fog of Internet Surveillance: How a 2002 Hastings Lj, pp. - article URL
Suppression Remedy Would Change Computer Crime
Law

Kesar, S. & ... Developing ethical practices to minimize computer misuse 1998 Social science computer review, pp. - article URL

Kessler, G. An overview of steganography for the computer forensics 2004 Forensic science communications, pp. - article
examiner

Kholfi, S., Habib, M. & ... Best hybrid classifiers for intrusion detection 2006 Journal of Computational Methods in , pp. - article URL

Khoshgoftaar, T. & ... Resource-sensitive intrusion detection models for network 2004 High Assurance Systems , pp. - article URL
traffic

Kim, M. How counties handle computer crime? 1997 Ethics and Law on Electronic Frontier, pp. - article

Kjaerland, M. A classification of computer security incidents based on 2005 Journal of Investigative Psychology and , pp. - article URL
reported attack data

Klanjščak, B. Spopadi velikanov : hekerji in Pentagon Revija obramba article


Vol. 9(2000), pp. str. 44-45

Kling, R. Computer Abuse and Computer Crime as Organized Computer/Law Journal, pp. - article
Activities

Kling, R. When organizations are perpetrators: assumptions about 1991 Computerization and controversy, pp. - article
computer abuse and computer crime

Kling, R. Computer abuse and computer crime as organizational 1981 ACM SIGCAS Computers and Society, pp. - article
activities

Kloster, A. & ... The effects of different types of organizers on students' 1989 Journal of educational psychology, pp. - article URL
learning from text.

Kluth, D. Computer, Virus Threat: A Survey of Current Criminal 1990 Hamline L. Rev., pp. - article URL
Statutes, The

Knightmare Secrets of a super hacker 1994 , pp. - book

Knijff, R. v. d. Embedded Systems Analysis, chapter 11 of Handbook of 2002 , pp. - book


Computer Crime Investigations-Forensic Tools and
Technology, edited by Eoghan Casey

Knijff, R. v. d. Chapter 11: Embedded Systems Analysis, Handbook of 2002 , pp. - book
Computer Crime Investigation, Edited by Eoghan Casey

Knotts, R. & ... Computer Security: Who's Minding the Store? 1989 The Academy of Management Executive (1987- , pp. - article URL

Koch, E.R. & Sperber, J. Die Datenmafia : Geheimdienste, Konzerne, Syndikate - 1995 , pp. 351 str.- book
Computerspionage und neue Informationskartelle

Kohn, M., Eloff, J. & ... Framework for a digital forensic investigation 2006 of Information Security South Africa (ISSA , pp. - article

Kovač, Jože, p. Nekatere nove oblike kaznivih dejanj po širitvi Evropske 2008 , pp. VI., 47 f.- book
unije : diplomsko delo

Kovačič, M. Izračun kontrolne vsote datoteke pomeni v ZDA preiskavo 2008 PP article
: United States v. Crist, 2008 WL 4682806, 22. oktober Vol. 27(47), pp. str. 27-28
2008

Kramarenko, D. Hackers or Cyber-soldiers?, Computer Crime Research 2003 , pp. - book


Center

Kratz, M. Canada's computer crime laws: ten years of experience 1996 Information systems security, pp. - article

Krause, J. Computing Time for Crime 2005 Computing, pp. - article URL

Krauss, L. & ... Computer fraud and countermeasures 1979 , pp. - book

Krauss, L. & ... SAFE-security audit and field evaluation for computer 1972 No.: U, pp. - article URL
facilities and information systems

Krieger, M. Current and Proposed Computer Crime Legislation 1980 COMP. LAW J., pp. - article

Kroczynski, R. Are the current computer crime laws sufficient or should 2007 Fordham Intell. Prop. Media & Ent. LJ, pp. - article URL
the writing of virus code be prohibited

Kruck, S. & ... Computer Security Practices and Perceptions of the Next 2008 International Journal of Information Security and , pp. - article URL
Generation of Corporate Computer Use

Kruse, W. & ... Computer forensics: incident response essentials 2001 , pp. - book

Kruse, Warren G., I. & Heiser, J.G. Computer forensics : incident response essentials 2002 , pp. XIII, 398 str.- book

Kshetri, N. The simple economics of cybercrimes 2006 Security & Privacy, IEEE, pp. - article URL

Kshetri, N. Pattern of global cyber war and crime: A conceptual 2005 Journal of International Management, pp. - article URL
framework

Kuhar, B. Preiskovanje piratstva računalniških programov : 2001 , pp. 71 f.- book


diplomska naloga

Kusserow, R. An Inside Look at Federal Computer Crime 1986 Security Management, pp. - article

Kutz, R. Computer Crime in Virginia William and Mary Law Review, pp. - article

Kutz, R. Computer Crime in Virginia: A Critical Examination of 1985 Wm. & Mary L. Rev., pp. - article URL
the Criminal Offenses in the Virginia Computer Crimes
Act

Lakhina, A., Crovella, M. & ... Detecting distributed attacks using network-wide flow 2005 Proceedings of FloCon 2005 Analysis , pp. - article
traffic

Lam, C. & ... Signature recognition through spectral analysis 1989 Pattern Recognition, pp. - article URL

Lampson, B. Computer security in the real world 2004 Computer, pp. - article URL

Lasden, M. Computer Crime 1981 COMP. DECISIONS, pp. - article

Lawrence, A. & ... Wiliam Lucyshyn and&obert gichardson. 2004 CSVFm 2004 Computer Security Institute, pp. - article
Computer Crime and Security

Lawrence, A., Martin, P., Lucyshyn, CSI/FBI Computer Crime and Security Survey 2004 2004 , pp. - book
W. & ...

Lawrence, G., Loeb, M., Lucyshyn, CSI/FBI computer crime and security survey 2005 Computer Security Institute, pp. - article
W. & ...

LeBlanc, C. & ... Teaching computer security at a small college 2004 ACM SIGCSE Bulletin, pp. - article URL

Lee, H. Cyber crime and challenges for crime investigation in the 2008 Intelligence and Security Informatics, 2008. ISI 2008. , pp. article URL
information era -

Lee, J. & ... A holistic model of computer abuse within organizations 2002 Information management & computer security, pp. - article URL

Lee, J., Segal, G. & ... Positive alternatives: a report on an ACM panel on 1986 Communications of the ACM, pp. - article
hacking

Lee, S., Lee, S. & ... An integrative model of computer abuse based on social 2004 Information & Management, pp. - article URL
control and general deterrence theories

Lee, W. A Deterrent Measure Against Computer Crime: 1997 Singapore Management Review, pp. - article
Knowledge-Based Risk-Analytic Audit

Lee, W. & ... Computer Ethics: an Argument for Rethinking Business 2008 Presented at the 2nd World Business Ethics Forum: , pp. - article
Ethics
Leepson Computer Crime 1978 , pp. - book

Leeson, P. & ... Economics of Computer Hacking, The 2005 JL Econ. & Pol'y, pp. - article URL

Leibholz, S. & ... Users' guide to computer crime: its commission, detection 1974 , pp. - book
& prevention

Leighton, F. & ... Method and system for personal identification using 1991 US Patent 4,995,081, pp. - article URL
proofs of legitimacy

Leinfuss, E. Computer Crime: How Deep Does It Go 1986 MIS Week, pp. - article

Leiwo, J. & ... An analysis of ethics as foundation of information 1998 , 1998., Proceedings of the Thirty-First , pp. - article URL
security in distributed systems

Lending, D. & ... Research in progress: the effects of ethical climate on 2001 Proceedings of the 2001 ACM SIGCPR , pp. - article URL
attitudes and behaviors toward software piracy

Leonard, L. & ... Attitude toward ethical behavior in computer use: a 2005 Industrial Management & Data , pp. - article URL
shifting model

Levenfeld, B. Israel considers comprehensive computer law. 1988 INT. COMP. LAW ADVISER., pp. - article URL

Levi, M., Schlegel, K. & ... White-collar crime victimization 1992 White-Collar Crime , pp. - article URL

Levine, J., LaBella, R., Owen, H. & The use of honeynets to detect exploited systems across 2003 , 2003. IEEE Systems, , pp. - article URL
... large enterprise networks

Levy, E. Criminals become tech savvy 2004 Security & Privacy, IEEE, pp. - article URL

Lewis, B. Preventing of Computer Crime Amidst International , pp. - book


Anarchy. 2004 [cited 2008 17 November]

Lewis, B. Prevention of computer crime amidst international 2004 Am. Crim. L. Rev., pp. - article URL
anarchy

Lewis, B. Prevention of Computer Crime Amidst International 2004 American Criminal Law Review, pp. - article
Anarchy Ą(2004)

Lewis, J. & ... Assessing the risks of cyber terrorism, cyber war and 2002 , pp. - book
other cyber threats

Lewis, M. Computer Crime: Theft in Bits and Bytes 1985 Nation's Business, pp. - article

Li, Z. & ... The Present Situation of Computer Crime in China and Its 2006 Journal of Railway Police College, pp. - article
Technical Defense [J]

Liebholz, S. & ... User's Guide to Computer Crime 1974 Chilton Book Company, pp. - article

Lilleng, S. Datakriminalitet (Computer Crime) 1995 , pp. - book

Litt, R. Crime in the computer age: The law enforcement 1999 Tex. Rev. L. & Pol., pp. - article URL
perspective

Livshits, V. & Lam, M. Finding security vulnerabilities in Java applications with 2005 Proceedings of the 14th conference on USENIX , pp. - article URL
static analysis
fakulteta v Ljubljani, P. Strokovno gradivo za posvet "Računalniška kriminaliteta" 1997 , pp. 41 str. loč pag.- book

Lloyd, I. Information technology law 2005 Recherche, pp. - article URL

Lo, A. Computer Crime a Magnet for Teens 1999 South China Morning Post, pp. - article

Lobel, J. Foiling the system breakers: computer security and access 1986 , pp. - book
control

Logar, J. Elektronsko poslovanje in kriminaliteta : podjetja na 2000 Delo article


izzive niso dovolj pripravljena Vol. 42(38), pp. str. 15-

Loia, V., Mattiucci, M. & ... Veniero: Computer Crime Investigation by Means of 2009 Web Intelligence and Intelligent Agent , pp. - article
Fuzzy Semantic Maps, M

LUCYSHYN, W. RICHARDSON., R.(2005) 2005 CSI/FBI COMPUTER 2005 Computer Security Institute, pp. - article
CRIME AND SECURITY SURVEY

Ludlow, P. High noon on the electronic frontier: Conceptual issues in 1996 , pp. - book
cyberspace

Lynch, J. Identity theft in cyberspace: Crime control methods and 2005 Berkeley Tech. LJ, pp. - article URL
their effectiveness in combating phishing attacks

Ma, L. & ... Query length impact on misuse detection in information 2005 Proceedings of the 2005 ACM symposium on , pp. - article URL
retrieval systems

Magklaras, G. & ... A preliminary model of end user sophistication for insider 2005 Computers & Security, pp. - article URL
threat prediction in IT systems

Malone, R. & ... Computer Viruses: Legal Aspects 1993 U. Miami Bus. LJ, pp. - article URL

Mandell, S. Computer crime 1990 Computers, ethics, & society, pp. - article

Mandia, K. Incident Response: Investigating Computer Crime 2001 , pp. - book

Mandia, K., Prosise, C. & ... ÄşŠźâ€ťÄ‡â‚¬Ä„ĺ“Š¤ÄşŠźâ€ťč®ˇç®â 2002 Incident Response: Investigating Computer Crime. , pp. - article
€”抛ŠźĂ§Š Š»Ă§ËťŠžč° 抺Ą

Manili, B. & ... Police chiefs and sheriffs rank their criminal justice needs 1988 Washington, DC: National Institute of Justice, US , pp. - article URL

Manion, M. & ... Terrorism or civil disobedience: toward a hacktivist ethic 2000 ACM SIGCAS Computers and Society, pp. - article URL

Marbach, W., Conant, J. & ... New wave computer crime. 1983 Newsweek, pp. - article

Marcella, A. & ... Cyber forensics: a field manual for collecting, examining, 2002 , pp. - book
and preserving evidence of computer crimes

Marion, C. Computer viruses and the law 1988 Dick. L. Rev., pp. - article URL

Marks, R. Security, Privacy, and Free Expression in the New World 1995 Hous. L. Rev., pp. - article URL
of Broadband Networks

Marsh, R. With criminal intent: The changing face of crime in South 1999 , pp. - book
Africa

Martonoši, P. Kriminaliteta v zvezi z računalniki v novi slovenski Podjetje in delo : revija za gospodarsko, delovno in article
kazenski zakonodaji socialno pravo, pp. str. 498-500
Massingale, C. & ... Risk Allocation for Computer System Security Breaches: 1990 W. New Eng. L. Rev., pp. - article URL
Potential Liability for Providers of Computer Services

Mastnak, Š˝. Računalniško piratstvo : diplomska naloga 1999 , pp. 71 f.- book

Matsumoto, Y. Ruby in a nutshell: a desktop quick reference 2002 , pp. - book

May, M. & ... Federal computer crime laws 2004 The SANS Institute. Retrieved October, pp. - article

McCall, C. Computer crime statutes: Are they bridging the gap 1988 Crim. Just. J., pp. - article URL
between law and technology

McCausland, J. Regulating Computer Crime After Reno v. ACLU: The 1997 Fla. L. Rev., pp. - article URL
Myth of Additional Regulation

McCollum, T. Computer crime 1997 Nation's Business, pp. - article

McCombie, S. & ... Computer Forensic: An Issue of Definitions 2003 Proceedings of 1st Australian , pp. - article

McEwen, J., Fester, D. & ... Dedicated computer crime units 1989 , pp. - book

McEwen, T. The growing threat of computer crime 1990 Detective (Summer), pp. - article

McHugh, J. & ... An incentive system for reducing malware attacks 2005 Communications of the ACM, pp. - article URL

McKemmish, R. What is forensic computing 1999 Trends and issues in crime and criminal justice, pp. - article

McKnight, G. Computer crime 1973 , pp. - book

McLaughlin, G. & ... Computer Crime: The Ribicoff Amendment to United 1978 Crim. Just. J., pp. - article URL
States Code, Title 18

McLoughlin, G. & ... Computer Crime and Security 1987 , pp. - book

McMullan, J. & ... Technologies of crime: The cyber-attacks on electronic 2003 Canadian Journal of Criminology and Criminal , pp. - article URL
gambling machines

McNeil, J. The Consultant: A Novel of Computer Crime 1978 , pp. - book

Meall, L. Computer crime: foiling the fraudsters 1992 Accountancy, November, pp. - article

Mello, S. Administering the Antidote to Computer Viruses: A 1993 Rutgers Computer & Tech. LJ, pp. - article URL
Comment on United States v. Morris

Mencin, R. Rekonstrukcija podatkov v računalniški forenziki 2010 , pp. 57 f.- book URL

Mendell, R. Investigating Computer Crime in the 21st Century 2004 No.: ISBN 0-398-07525-5, pp. - article URL

Mendell, R. Investigating Computer Crime: a Primer for Security 1998 , pp. - book
Managers

Mendell, R. Investigating Computer Crime: A Primer for Security 1998 , pp. - book
Managers. Springfield, Illinois: Charles C

Mennecke, B., Roche, E., Bray, D. & Second Life and other virtual worlds: A roadmap for 2007 Systems (ICIS), 2007, pp. - article URL
... research
Merrill, P., Hammons, K., Computers in education 1996 Recherche, pp. - article URL
VINCENT, B., REYNOLDS, P. & ...

Merritt, M.P. U.S. Secret Service's computer forensic training for state 2009 The Police chief article URL
and local agencies Vol. 76(7), pp. str. 16-17

Merwe, A.V.D., Loock, M. & ... Characteristics and responsibilities involved in a Phishing 2005 Proceedings of the 4th , pp. - article URL
attack

Meyer, G. The social organization of the computer underground 1989 , pp. - book URL

Meyer, G. & ... The baudy world of the byte bandit: A postmodernist 1990 ,(also published in SCHMALLEGER, F.(ed.), , pp. - article
interpretation of the computer underground

Meyer, J. & ... Investigating computer crime: Concerns voiced by local 1998 Police Chief, pp. - article URL
law enforcement agencies

Meyers, M. & ... Computer forensics: the need for standardization and 2004 International Journal of Digital Evidence, pp. - article
certification

Michalowski, R. & ... Technology, property, and law 1991 Crime, Law and Social Change, pp. - article URL

Millard, C. Legal protection of computer programs and data 1985 , pp. - book

Mobbs, P. Computer Crime The law on the misuse of computers and , pp. - book
networks. 2003, GreenNet Civil Society Internet Rights
Project

Mohay, G. Technical challenges and directions for digital forensics 2005 Approaches to Digital Forensic Engineering, 2005. , pp. - article URL

Mohay, G. Computer and intrusion forensics 2003 , pp. - book

Mohr, J. & ... Fighting Computer Crime with Software Risk Analysis 1984 INFORMATION SYSTEM MANAGEMENT, pp. - article URL

Monson-Haefel, R. & ... Java message service 2001 , pp. - book

Montana, J. Viruses and the law: Why the law is ineffective 2000 The Information Management Journal, pp. - article URL

Montgomery, J. Computer Crime 1986 Am. Crim. L. Rev., pp. - article URL

Moon, B., McCluskey, J. & ... A general theory of crime and computer crime: An 2010 Journal of Criminal Justice, pp. - article URL
empirical test

Moore, R. Cybercrime: Investigating high-technology computer 2010 , pp. - book


crime

Moore, T., Clayton, R. & ... The economics of online crime 2009 The Journal of Economic , pp. - article URL

Moores, T. & ... Do privacy seals in e-commerce really work? 2003 Communications of the ACM, pp. - article URL

Morris, D. Tracking a computer hacker 2001 United States Attorneys' Bulletin,(Internet Fraud , pp. - article

Morris, R. & Blackburn, A. Cracking the code: An empirical exploration of social 2009 Journal of Crime and Justice, pp. - article URL
learning theory and computer crime

Morris, S. Crime and prevention: a Treasury viewpoint 1997 Spectrum, IEEE, pp. - article URL

Morrison, P. Computer ethics: cautionary tales and ethical dilemmas in 1994 , pp. - book
computing

Morth, T. Considering our position: Viewing information warfare as 1998 Case W. Res. J. Int'l L., pp. - article URL
a use of force prohibited by Article 2 (4) of the UN
Charter

Mostéfaoui, G. Security in Pervasive Environments, What's Next? 2003 Security and Management Journal, pp. - article

Mršević, Z. Kompjuterski kriminalitet i potreba koncipiranja kriviĂ„Š 1991 Jugoslovenska revija za kriminologiju i kriviĂ„Š¤no article URL
¤nog dela kompjuterske zloupotrebe pravo, pp. -

Mršević, Z. Zaštita privatnosti zloupotreba kompjutera - potreba Jugoslovenska revija za kriminologiju i krivično pravo, article
krivičnopravne regulative pp. 29, št. 4 (1991), str.131-146

Myers, L. & ... Preparing for high technology crime: An educational 2002 Journal of Criminal Justice Education, pp. - article URL
assessment of criminal justice and criminology academic
programs

Nasheri, H. & ... Crime and technology: New rules in a new world* 1998 Information and Communications , pp. - article URL

Nasuti, F. Investigating computer crime 1986 Journal of Accounting and EDP, pp. - article

Nawrocki, J. There are too many loopholes" current computer crime 1987 Data Management, pp. - article
laws require clearer definition

Nelson, B. Strain ing the Capacity of the Law: The Idea of Computer 1991 Computer LJ, pp. - article
Crime in the Age of the Computer Worm

Nelson, B., Phillips, A. & ... Guide to computer forensics and investigations 2010 , pp. - book

Nemerofsky, J. The Crime of" Interruption of Computer Services to 2000 Rich. JL & Tech., pp. - article URL
Authorized Users" Have You Ever Heard of It?

Newman, G. & Clarke, R. Superhighway Robbery: Preventing e-commerce crime 2003 , pp. - book

Nichols, R. & ... Wireless security 2002 , pp. - book

Nigri, D.F. Investigating computer crime in the UK 1992 Computer Law & Security Report, pp. - article URL

Nolan, J. FBI Agent Accountants Intensify'Campaign Against 1974 Journal of Accountancy, pp. - article URL
White Collar'Crime

Nycum, S. & ... Prosecutorial experience with state computer crime laws 1990 , pp. - book
in the United States

Nycum, S. & ... Prosecutorial Experience with State Computer Crime 1985 Gaston, Snow, & Ely Bartlett, Palo Alto, California, and , article
Laws pp. -

Nycum, S., University, R. & ... CRIMINAL LAW ASPECTS OF COMPUTER ABUSE- 1976 Rutgers Journal of , pp. - article URL
PART 1-STATE PENAL LAWS

Nykodym, N., Kahle†Piasecki, The managers guide to understanding, detecting, and 2010 Performance , pp. - article URL
L. & ... thwarting computer crime: An international performance
issue

Nykodym, N., Taylor, R. & ... Criminal profiling and insider cyber crime 2005 Digital Investigation, pp. - article URL

O'Ballance, E. From sarin to cyber warfare 2001 Intersec article


Vol. 11(2), pp. str. 52-53

O'Brien, J. & ... Introduction to information systems 2005 , pp. - book

O'Donoghue, J. Strategies found to be effective in the control of computer 1987 ACM SIGSAC Review, pp. - article URL
crime in the Forbes 500 Corporations

Ognibene, R. & ... Computers and the schools: Unused and misused 1990 Action in Teacher Education, pp. - article URL

Olivenbaum, J. : Rethinking Federal Computer Crime Legislation 1996 Seton Hall L. Rev., pp. - article URL

Onwubiko, C. & ... Managing security threats and vulnerabilities for small to 2007 Intelligence and Security , pp. - article URL
medium enterprises

Ottaviano, C. Computer Crime 1985 Idea, pp. - article URL

Overill, R. Trends in Computer Crime 1998 Journal of Financial Crime, pp. - article URL

Overill, R. Computer crime-an historical survey 1997 Defence Systems International, pp. - article

Oz, E. Ethics for an Information Age 1994 , pp. - book

Park, Y., Moon, S., Kim, S., Kang, S. A study on prevention scheme for communication network 1994 Journal of Data Communication , pp. - article
& ... from computer crime

Parker, D. The dark side of computing: SRI International and the 2007 Annals of the History of Computing, IEEE, pp. - article URL
study of computer crime

Parker, D. Computer crime 2003 , pp. - book URL

Parker, D. Fighting computer crime: A new framework for protecting 1998 , pp. - book
information

Parker, D. Consequential loss from computer crime 1989 Security and Protection in Information Systems, , pp. - article

Parker, D. Computer Crime: Criminal Justice Resource Manual . 1989 , pp. - book URL

Parker, D. Ethics for Information Systems Personnel 1988 INFORMATION SYSTEM MANAGEMENT, pp. - article URL

Parker, D. How Much Computer Abuse is There? 1983 EDPACS: The EDP Audit, Control, and Security , pp. - article URL

Parker, D. Fighting computer crime 1983 , pp. - book

Parker, D. Chapter 43: Public Key Cryptosystems 1983 Fighting Computer Crime, Charles Scribner's Sons, , pp. - article

Parker, D. Computer security management 1981 , pp. - book

Parker, D. & ... Computer crime 1984 Communications of the ACM, pp. - article

Parker, D., Nycum, S. & ... Computer abuse 1973 No.: SR12501, pp. - article URL

Parker, R. Computer-related crime: ethical considerations 1990 ACM SIGSAC Review, pp. - article URL

Parsons, M. Protecting children on the electronic frontier : a law 2000 FBI law enforcement bulletin article
enforcement challenge Vol. 69(10), pp. str. 22-26

Parsons, M. Crime prevention and the electronic frontier 1998 FBI Law Enforcement Bulletin, pp. - article URL
Patel, A. & ... The impact of forensic computing on telecommunications 2000 Communications Magazine, IEEE, pp. - article URL

Pawar, M. & ... Computer crime in Bombay: Efforts to alter this problem 1994 International Journal of Offender Therapy , pp. - article URL

Peng, N. On Electronic Evidence in Computer Crime 2004 Hebei Law Science, pp. - article

Perenič, A. Odkrivanje in preiskovanje računalniške kriminalitete : 2008 , pp. V, 54 f.- book


diplomsko delo

Perry, R. Computer Crime. New York: Franklin Watts 1986 , pp. - book

Perry, R. Computer Crime 1986 , pp. - book

Perry, T. & ... Can computer crime be stopped?. 1984 IEEE Spectrum, pp. - article URL

Peters, S. CSI Computer Crime and Security Survey 2009 Computer Security Institute (December 2009), pp. - article

Petersen, J.P. Forensic examination of log files : [master] thesis 2005 , pp. 60 f., 5 f. pril.- other URL

Petrović, S. Neki aspekti nacionalne bezbednosti u informacionom 2001 Nauka, tehnika, bezbednost, pp. - article URL
dobu

Pfitzmann, A., Pfitzmann, B., Trusting mobile user devices and security modules 1997 Computer, pp. - article URL
Schunter, M. & ...

Philippsohn, S. An overview of electronic crime in the 21st century 2000 Intersec article
Vol. 10(4), pp. str. 114-116

Phillips, P., Martin, A., Wilson, C. & An introduction evaluating biometric systems 2000 Computer, pp. - article URL
...

Pickard, R. Computer crime 1989 Information Center, pp. - article

Pilant, L. Fighting crime in cyberspace 1997 The Police Chief, pp. - article URL

Podgor, E. Cybercrime: National, Transnational, or International 2004 Wayne L. Rev., pp. - article URL

Podgor, E. Computer crimes and the USA patriot act 2002 Crim. Just., pp. - article URL

Podgor, E. International computer fraud: A paradigm for limiting 2001 UC Davis L. Rev., pp. - article URL
national jurisdiction

Police, R. Computer crime, can it affect you? 2000 Retrieved November, pp. - article

Police, V. & ... Computer Crime and Security Survey 1999 Victoria Police Computer Crime Squad and Deloitte , pp. - article

Politi, A. European Security: the new transnational risks 1997 , pp. - book

Pollak, R. Implications of international terrorism on security of 1983 Proceedings of IEEE INFOCOM, pp. - article
information systems

Pollet, J. Developing a solid SCADA security strategy 2002 Sensors for Industry Conference, 2002. 2nd ISA/IEEE, pp. article URL
-

Pollitt, M. An ad hoc review of digital forensic models 2007 Approaches to Digital Forensic Engineering, 2007 , pp. - article URL

Pollitt, M. Cyberterrorism--fact or fancy? 1998 Computer Fraud & Security, pp. - article URL
Post, D. Governing Cyberspace 1996 Wayne L. Rev., pp. - article URL

Post, J. The dangerous information system insider: Psychological 1996 Available HTTP: Hostname: infowar. com, pp. - article
perspectives

Potaczala, M. Computer forensics 2001 Retrieved June, pp. - article

Poulsen, K. Hacker penetrates T-Mobile systems 2005 Security Focus. http://www. securityfocus. com/news/ , article
pp. -

Power, R. 2002 CSI/FBI computer crime and security survey 2002 , pp. - book

Power, R. Computer security issues & trends 2002 CSI/FBI Computer Crime and Society Survey, CSI, pp. - article

Power, R. CSI/FBI computer crime and security survey 2001 Computer Security Journal, pp. - article

Power, R. 2000 CSI/FBI computer crime and security survey 2000 COMPUT SECUR J, pp. - article

Power, R. CSI/FBI Computer Crime and Security Survey, 1999 1999 Computer Security Issues & Trends, pp. - article URL

Power, R. 1998 CSI/FBI Computer Crime and Security Survey 1998 COMPUTER SECURITY JOURNAL, pp. - article

Power, R. CSI/FBI Computer Crime and Security Survey, 1997 1997 Computer Security Issues and Trends, pp. - article URL

Power, R. 2002 CSI/FBI Computer Crime and Security Survey 1996 Computer Securlly: Issues and Treno fi: i (Spring , pp. - article

Power, R. Current and Future Danger: A CSI Primer on Computer 1996 , pp. - book
Crime & Information Warfare

Power, R. Current and future danger: A CSI primer on computer 1995 , pp. - book
crime & information warfare

Powers, R. Computer Security Issues & Trends: 2002 CSI/FBI 2002 Computer Security Institute. Available on-line at: http:// , article
Computer Crime and Security Survey pp. -

Prew, M. Minimizing the impact of Computer Crime on Your 1984 Wigham Poland (Corporation of Lloyds), pp. - article
Earnings

Prichard, J. & ... Cyber terrorism: A study of the extent of coverage in 2004 Journal of Information Technology Education, pp. - article
computer Security Textbooks

Procise, C. & ... Incident response: investigating computer crime 2001 Berkley (CA): McGraw Hill Osborne Media, pp. - article

PROP., C.C. &.I. & ... Prosecuting Intellectual Property Crimes 2001 , pp. - book

Prosise, C. & ... Incident response: computer forensics 2003 Recherche, pp. - article URL

Purdy, S. Computer Crime Investigations 1988 Draft monograph. Federal Computer Investigations , pp. - article

Quarantiello, L. Cyber crime: How to protect yourself from computer 1997 No.: ISBN 0-936653-74-4, pp. - article URL
criminals

Quinn, K. Second annual New Zealand computer crime and security 2006 , pp. - book URL
survey

Quirk, P. & Forder, J. Electronic commerce & the law 2003 , pp. - book
Rahanu, H. Teaching professional and ethical aspects of computing: a 1999 ACM SIGCAS Computers and Society, pp. - article URL
case study approach

Ransbotham, S. & ... Choice and chance: A conceptual model of paths to 2009 Information Systems Research, pp. - article URL
information security compromise

Rapalus, P. Issues and Trends: 1998 CSI/FBI Computer Crime and 1998 , pp. - book
Security Survey

Raskin, X. & ... Computer crimes 1995 Am. Crim. L. Rev., pp. - article URL

Reed, C. & ... Computer law 2003 Recherche, pp. - article URL

Reichel, P. Handbook of transnational crime and justice 2004 , pp. - book

Reid, L. Expert opinion: Interview with Amanda M. Hubbard, JD, 2006 Journal of Information Privacy and Security, pp. - article
Fulbright Scholar, former trial attorney, Computer Crime
and Intellectual Property Section, US

Reith, M., Carr, C. & ... An examination of digital forensic models 2002 International Journal of Digital , pp. - article

Response, I. Investigation Computer Crime. MANDIA, K. y PROSISE, 2001 , pp. - book


C

Rhodes, W. Computer Crime Is No Crime At All 1979 , pp. - book

Richards, T. A computer fraud survey 1984 ACM SIGSAC Review, pp. - article URL

Richardson, R. CSI Survey 2007: The 12th Annual Computer Crime and Computer Security Institute, pp. - article
Security Survey. 2007

Richardson, R. 15th annual 2010/2011 computer crime and security 2011 , pp. - book
survey

Richardson, R. 14th Annual CSI computer crime and security survey. 2009 CSI Computer Crime and Security SurveyComputer, pp. - article
Executive summary

RICHARDSON, R. CSI/FBI Computer Crime and Security Survey 2008 , pp. - book
(Documento en LÄ‚Ânea)

Richardson, R. csi computer crime & security survey, 2008. i. cmpnet. 2008 CSIsurvey2008. pdf, pp. - article
com/v2. gocsi. com/pdf

Richardson, R. CSI computer crime and security survey 2008 Computer Security Institute, pp. - article

Richardson, R. 12th Annual CSI Computer Crime and Security Survey 2007 Computer Security Institute, pp. - article

Richardson, R. CSI/FBI Computer Crime Survey 2007 Twelfth Annual Computer Crime and Security, pp. - article

Richardson, R. CSI Computer Crime and Security Survey, GoCSI. com 2007 Last accessed July, pp. - article

Richardson, R. The 12th annual computer crime and security survey 2007 , pp. - book

Richardson, R. CSI computer crime and security survey, CSI Survey 2007 2007 , pp. - book

Richardson, R. Eighth annual CSI/FBI computer crime and security 2003 Computer Security Institute, pp. - article
survey
Richardson, R. 8th Annual Computer Security Institute (CSI) and Federal 2003 , pp. - book
Bureau of Investigation (FBI) Computer Crime and
Security Survey

Richardson, R. CSI 2003 FBI Computer crime and security survey, pp. - article

Richardson, R. Eighth Annual CSI/FBI Computer Crime and Security 2003 Comput. Security Inst./Federal Bureau of Investigation, , article
Survey. 2003 pp. -

Richardson, R. Issues and Trends: 2003 CSI/FBI Computer Crime and 2003 , pp. - book
Security Survey

Richardson, R. CSI/FBI 2003 computer crime survey 2003 Retrieved June, pp. - article

Richardson, R. CSI/FBI Computer Crime and Security Survey [R/OL] 2003 , pp. - book

Richardson, R. Computer Crime Bleeds US Corporations, Survey Shows; 2002 on-line]. Available from the Internet: URL Http://www. , article
Financial losses from attacks pp. -

Richardson, R. & ... CSI &FBI CSI Computer Crime & Security Survey 2008 , pp. - book

Richtel, M. Study finds rise in computer crime 1998 The New York Times, pp. - article URL

Rivlin Computer Crime 1980 Student Law., pp. - article

Roache, J. Computer Crime Deterrence 1985 Am. J. Crim. L., pp. - article URL

Roberson, R. CSI/FBI Computer Crime Survey 2003 Computer Security Institute, pp. - article

Roche, E. Internet and Computer Related Crime: Economic and 2006 Miss. LJ, pp. - article URL
Other Harms to Organizational Entities

Roche, E. & ... Information Systems, Computer Crime and Criminal 2004 , pp. - book
Justice

Rogers, M. A two-dimensional circumplex approach to the 2006 digital investigation, pp. - article URL
development of a hacker taxonomy

Rogers, M. The role of criminal profiling in the computer forensics 2003 Computers & Security, pp. - article URL
process

Rogers, M. A social learning theory and moral disengagement 2001 , pp. - book
analysis of criminal computer behavior: An exploratory
study

Rogers, M. Organized computer crime and more sophisticated 1999 Telematic Journal of Clinical Criminology, pp. - article
security controls: which came first the chicken or the egg?

Rogers, M. & ... The future of computer forensics: a needs analysis survey 2004 Computers & Security, pp. - article URL

Rogers, M., Goldman, J., Mislan, R. Computer forensics field triage process model 2006 Proceeding of the , pp. - article
& ...

Rogers, M., Robin, M., Moral, H. & Modern-day Robin Hood or Moral Disengagement: 1999 , pp. - book URL
... understanding the justification for criminal computer
activity

Rogers, M., Seigfried, K. & ... Self-reported computer criminal behavior: A 2006 digital investigation, pp. - article URL
psychological analysis

Rogers, M., Smoak, N. & ... Self-reported deviant computer behavior: A big-5, moral 2006 Deviant behavior, pp. - article URL
choice, and manipulative exploitive behavior analysis

Rosenblatt, K. High-Technology Crime: Investigating Cases Involving 1995 No.: ISBN 0-9648171-0-1, pp. - article URL
Computers

Rosenblatt, K. Deterring computer crime 1990 Technology Review, pp. - article URL

Rosoff, S., Pontell, H. & ... Profit without honor: White-collar crime and the looting 1998 , pp. - book
of America

Ross, S., Jr, R.C., Parker, D. & ... Computer Security Issues-A Roundtable 1985 Computer Security , pp. - article URL

Rossi, S. Aust tops computer crime stats 2002 Computerworld, pp. - article

Roush, W. Hackers taking a byte out of computer crime 1994 Technology Review, pp. - article

Rushinek, A. & ... Using experts for detecting and litigating computer crime 1993 Managerial Auditing Journal, pp. - article URL

Russell, D. & ... Computer security basics 1991 , pp. - book

Ružić, I. Izbira osnovnega nabora metod za izvajanje programske 2007 , pp. 76 str.- book
računalniške forenzike : magistrska naloga

Ružić, I., Marijanović, D. & Selection of the base set of methods for computer forensic SoftCOM 2009, pp. Str. 1-7 article
Ciglarič, M.

Saari, J. Computer crime--numbers lie 1987 Computers & Security, pp. - article URL

Sackman, H. Computer Crime Prevention 1999 , pp. - book

Sanderson, E. & ... Information security in business environments 1996 Information Management & , pp. - article URL

Sarzana, C. CriminalitÄ‚ e tecnologia: il caso del computer crime 1979 Rassegna Penitenziaria e CriminologÄ‚Âa, pp. - article

Saydjari, O.S. Defending cyberspace 2002 Computer, pp. - article URL

Schabeck, T. Computer Crime Investigation Manual 1980 , pp. - book

Schaffer, G. Worms and viruses and botnets, oh my! Rational 2006 Security & Privacy, IEEE, pp. - article URL
responses to emerging Internet threats

Schjolberg, S. Computer-related offences 2004 Council of Europe Octopus Interface, pp. - article

Schjølberg, S., International, S. & Computers and penal legislation: A study of the legal 1983 , pp. - book
... politics of a new technology

Schmalleger, F. Criminal Justice Today: An Introductory Text for the 21st 1995 No.: ISBN 0-13-302985-9, pp. - article URL
Century

Schmidt, H. The changing face of computer crime 1998 The Police chief article
Vol. 65(5), pp. str. 38-45

Scholberg, S. & ... Computer Crime 1983 Encyclopedia of Crime and Justice, pp. - article

Schonlau, M. & ... Detecting masquerades in intrusion detection based on 2000 Information Processing Letters, pp. - article URL
unpopular commands

Schonlau, M., DuMouchel, W., Ju, Computer intrusion: Detecting masquerades 2001 Statistical Science, pp. - article URL
W., Karr, A. & ...

Schrager, B. Outwitting 2-bit Thieves and Arresting Computer Crime 1982 Data Communications, pp. - article

Schuck, P. Electronic funds transfer: A technology in search of a 1975 Md. L. Rev., pp. - article URL
market

Schultz, E. Security views 2003 Computers & Security, pp. - article URL

Schultz, E. A framework for understanding and predicting insider 2002 Computers & Security, pp. - article URL
attacks

Schultz, E. & ... Incident response: a strategic guide to handling system 2001 , pp. - book
and network security breaches

Schweitzer, D. & ... Incident response: computer forensics toolkit 2003 , pp. - book

Schweitzer, J. Computer crime and business information: a practical 1986 , pp. - book
guide for managers

Schweitzer, J. Protecting information in the electronic workplace: a 1983 , pp. - book


guide for managers

Scientist, N. Computer Crime a Growing Threat, Warns FBI 2008 , pp. - book

Scott, A. Computer and intellectual property crime: federal and 2001 , pp. - book
state law

Scottberg, B., Yurcik, W. & ... Internet honeypots: Protection or entrapment? 2002 Technology and Society, 2002 , pp. - article URL

Selinšek, L. Odprta pravna vprašanja v zvezi z dokazovanjem s Problemi dokazovanja v zahtevnih kazenskih postopkih, article
postopki digitalne forenzike pp. Str. 139-149

Selinšek, L. Preiskovanje zaščitenih elektronskih podatkov - britanski Zbornik povzetkov, pp. Str. 69- other
pristop

Selinšek, L. "Digitalni forenzični forum" jan. Revija za kriminalistiko in kriminologijo article


Vol. 59(1), pp. str. 89-91

Selinšek, L. Računalniška kriminaliteta in reševanje problemov iz 2011 Pravosodni bilten article


prakse Vol. 32(2), pp. str. 223-237

Selinšek, L. Electronic evidence in the Slovene criminal procedure act 2010 Digital evidence and electronic signature law review(7), article
pp. str. 77-81

Selinšek, L. Ekonomska upravičenost uporabe metod digitalne 2009 Lexonomica article


forenzike Vol. 1(1), pp. str. 51-58

Selinšek, L. Computer forensics in criminal procedure : (needed new 2008 Zbornik Pravne fakultete Univerze v Mariboru article
approaches in Slovenia) Vol. 4(1), pp. str. 237-248

Selinšek, L. NÄ›kterĂ© právnĂ aspekty forenznĂ analĂ˝zy 2008 Acta Universitatis Carolinae(4), pp. str. 131-140 article
digitálnĂch dat

Selinšek, L. Kazenskopravni vidiki računalniške forenzike : predavanje 2008 , pp. - unpublished


na konferenci INFOSEK 2008 - FORUM, Nova Gorica,
9.-11. junij 2008

Selinšek, L. Legal collecting of digital evidence 2007 Zbornik Pravne fakultete Univerze v Mariboru(3), pp. str. article
217-230

Selinšek, L. & Malovrh, M. Digitalni dokaz - med pravom in tehniko Nekateri praktični problemi dokazovanja v kazenskih incollection
postopkih, pp. Str. 57-78

Selinšek, L. & Oparnica, G. Legal aspects of digital forensics in public and private 2010 , pp. - unpublished
sector : predavanje na konferenci Euroforensics - Forensic
Sciences, 26.-28.3.2010, Istanbul

Senjo, S. An analysis of computer-related crime: comparing police 2004 Security Journal, pp. - article URL
officer perceptions with empirical data

Serra, C. & Strano, M. Nuove frontiere della criminalita : la criminalita 1997 , pp. VII, 145 str.- book
tecnologica

Seymour, T., Seifert, C., Shafto, M. Using response time measures to assess" guilty 2000 Journal of Applied , pp. - article URL
& ... knowledge".

Sh, M., D'Amico, E., Tomlinson, K. Teenagers self-reported motivations for participating in 2002 8th International Conference on , pp. - article
& ... computer crime

Shackelford, S. Computer-related crime: an international problem in need 1992 Tex. Int'l LJ, pp. - article URL
of an international solution

Shaw, E., Ruby, K. & ... The Insider Threat to Information Systems1 1998 , pp. - book

Sherizan, S. The globalization of computer crime and information 1992 Computer Security Journal, pp. - article URL
security

Sherizen, S. Can computer crime be deterred 1995 Computers and Security, pp. - article URL

Sherizen, S. Criminological concepts and research findings relevant for 1990 Computers & Security, pp. - article URL
improving computer crime control

Sherizen, S. Federal Computers and Telecommunications: Security and 1985 , pp. - book
Reliability Considerations and Computer Crime
Legislative Options

Shinder, D. & ... Scene of the cybercrime: Computer forensics handbook 2002 , pp. - book

Sieber, U. Computer Crime and Criminal Information Law-New 1996 Statement for the Hearing on Security in Cyberspace of , article
Trends in the International Risk and Information Society pp. -

Sieber, U. Information technology crime: national legislations and 1994 , pp. - book
international initiatives

Sieber, U. General Report on 'Computer Crime': the emergence of 1990 13th International Congress of International Academy , article
criminal information law pp. -

Sieber, U. The international handbook on computer crime: computer- 1986 , pp. - book
related economic crime and the infringements of privacy

Silverglate, H. Computer Crime in Massachusetts: How Best to Meet the 1994 BBJ, pp. - article
Future?
Sim, S. Effective countermeasures against economic crime and 2000 Resource material series, pp. - article
computer crime

Simkin, M. Computer Crime: Lessons and Direction 1981 CPA Journal, pp. - article

Sinangin, D. Computer forensics investigations in a corporate 2002 Computer Fraud & Security, pp. - article URL
environment

Sinrod, E. & ... Cyber-crimes: A practical approach to the application of 2012 Santa Clara Computer & High , pp. - article
federal computer crime laws

Sinrod, E. & ... Cyber-Crimes: A Practical Approach to the Application of 2000 Santa Clara Computer and High Technology Law , pp. - article
Federal Computer Crime Laws, Ą(2000) 16

Sinrod, E. & ... Cyber-Crimes: A Practical Approach to the Application of 2000 Santa Clara Computer & High Tech. LJ, pp. - article URL
Federal Computer Crime Laws

Sinrod, E. & ... Hacking your way to hard time: application of computer 2000 Journal of Internet Laws, pp. - article
crime laws to specific types of hacking attacks

Skaggs, B., Blackburn, B., Manes, G. Network vulnerability analysis 2002 Circuits and Systems, , pp. - article URL
& ...

Skibell, R. Cybercrime & (and) Misdemeanors: A Reevaluation of 2003 Berkeley Tech. LJ, pp. - article URL
the Computer Fraud and Abuse Act

Skibell, R. The myth of the computer hacker 2002 Information, Communication & Society, pp. - article URL

Skinner, W. & ... A social learning theory analysis of computer crime 1997 Journal of Research in Crime and , pp. - article URL
among college students

SKORODUMOVA, O. Hackers as information space phenomenon 2004 Social Sciences, pp. - article

Sloan, I. The computer and the law 1984 , pp. - book

Smaha, S. Haystack: An intrusion detection system 1988 Aerospace Computer Security Applications , pp. - article URL

Smith, A. & ... Issues in cybersecurity; understanding the potential risks 2002 Information management & computer , pp. - article URL
associated with hackers/crackers

Smith, D. Who is Calling Your Computer Next--Hacker 1985 Crim. Just. J., pp. - article URL

Smith, G. An Electronic Pearl Harbor? Not Likely 1998 Issues in Science and Technology, pp. - article URL

Smith, M. Commonsense computer security 1994 , pp. - book

Smith, R. Identity-related economic crime: Risks and 1998 Victoria, pp. - article
countermeasures

Smith, R. & ... Organisations as Victims of Fraud and how They Deal 1999 , pp. - book
with it

Smrkolj, S. Računalniška kriminaliteta : (oblike in preiskovanje) : 2000 , pp. 58 f.- book


diplomska naloga

Soi, G. Tracce informatiche 2010 Polizia moderna article


Vol. 62(11), pp. str. 30-33
Sokolik, S. Computer Crime–the Need for Deterrent 1980 Computer Law Journal, pp. - article
Legislation"(1980)

Sokolik, S. Computer Crime-The Need for Deterrent Legislation 1980 Computer LJ, pp. - article

Solarz, A. Computer-related embezzlement 1987 Computers & Security, pp. - article URL

Solarz, A. Computer Technology and Computer Crime 1981 , pp. - book

Solarz, A. & ... Computer Technology and Computer Crime:(aetiological 1981 , pp. - book
and Phenomenological Aspects)

Solomon, M.G., Barrett, D. & Computer forensics jumpstart : [computer forensics 2005 , pp. XVII, 283 str.- book URL
Broom, N. basics]

Soma, J., Banker, E. & ... Computer Crime: Substantive Statutes & (and) Technical 1995 AFL Rev., pp. - article URL
& (and) Legal Search Considerations

Soma, J., Jr, T.M. & ... Transnational extradition for computer crimes: Are new 1997 Harv. J. on Legis., pp. - article URL
treaties and laws needed

Somers, L. Economic Crimes: Investigative Principles and 1984 New York: Clark Boardman Co, pp. - article URL
Techniques

Sommer, P. The future for the policing of cybercrime 2004 Computer Fraud & Security, pp. - article URL

Sommer, P. Intrusion detection systems as evidence 1999 Computer Networks, pp. - article URL

Sommer, P. Digital footprints: Assessing computer evidence 1998 Criminal Law Review, pp. - article

Sr, W.S. Redefining National Security in Today's World of 1998 Duke J. Comp. & Int'l L., pp. - article URL
Information Technology and Emergment Threats

Stallard, T. & ... Automated analysis for digital forensic science: Semantic 2003 Computer Security Applications , pp. - article URL
integrity checking

Stambaugh, H. & ... Electronic crime needs assessment for state and local law 2001 , pp. - book
enforcement

Stambaugh, H. & ... State and local law enforcement needs to combat 2000 , pp. - book
electronic crime

Standler, R. Computer crime 2002 Retrieved February, pp. - article

Stanley, P. A methodology for the investigation of computer crime 1992 Proceedings of the IFIP TC11, Eigth International , pp. - article

Stanley, P. Educating computer crime investigators 1986 Computers & Security, pp. - article

Stanley, P. Computer crime investigation and investigators 1986 Computers & Security, pp. - article URL

Stanley, P. Computer Crime Investigation-The Lessons Learned from 1986 IFIP/SEC'86, pp. - article
Experience

Statistics, U.S.B. o.J. & ... Computer Crime: Computer Security Techniques 1982 , pp. - book

Steffensmeier, D. Organization properties and sex-segregation in the 1983 Social Forces, pp. - article URL
underworld: Building a sociological theory of sex
differences in crime
Steinhauer, J. Verdict in MySpace suicide case 2008 The New York Times, pp. - article

Stephenson, P. Investigating computer-related crime 2000 , pp. - book

Stephenson, P. Investigating Computer Crime 2000 , pp. - book

Stevenson, G. Computer Fraud: Detection and Prevention 2000 Computer Fraud & Security, pp. - article URL

Stewart, H. & ... One-at-a-time versus grouped presentation of mug book 2001 Journal of applied psychology, pp. - article URL
pictures: Some surprising results.

Strader, J. Understanding white collar crime 2002 , pp. - book

Strano, M. Computer crime: manuale di criminologia informatica 2000 Edizioni Apogeo, Milano, pp. - article

Strano, M. Computer crime 2000 , pp. - book

Straub, D. Validating instruments in MIS research 1989 MIS quarterly, pp. - article URL

Straub, D. & ... Coping with systems risk: security planning models for 1998 Mis Quarterly, pp. - article URL
management decision making

Straub, D. & ... Effective IS security 1990 Information Systems Research, pp. - article

Sugarman, R. On foiling computer crime 1979 IEEE Spectrum, pp. - article

Sukhai, N. Hacking and cybercrime 2004 Proceedings of the 1st annual conference on , pp. - article URL

Sullivan, P. Australian attitudes towards computer crime 1995 , pp. - book URL

Sussmann, M. Critical Challenges from International High-Tech and 1998 Duke J. Comp. & Int'l L., pp. - article URL
Computer-Related Crime at the Millenium, The

Swanson, C. & ... Computer Crime-Dimensions, Types, Causes, and 1980 Journal of Police Science and Administration, pp. - article URL
Investigation

Swanson, C.R., Chamelin, N.C. & Criminal investigation 1996 , pp. X, 801 str.- book
Territo, L.

Swartz, H. Taking the bite out of computer crime 1982 Business Computer Systems, pp. - article

Sykes, J. Computer Crime: A Spanner in the Works 1992 Management Accounting, pp. - article

Taber, J. A Survey of Computer Crime Studies"(1980) 1980 Computer LJ, pp. - article

Taber, J. A survey of computer crime studies 1980 Computer/Law Journal, pp. - article

Taber, J. On Computer Crime (Senate Bill S. 240) 1979 Computer LJ, pp. - article

Tan, K. Prosecuting foreign-based computer crime: international 2000 Symposium on Rule of Law in the Global Village, , pp. - article
law and technology collide

Tan, K. The application of neural networks to UNIX computer 1995 1995. Proceedings., IEEE International Conference on, article URL
security pp. -

Tan, K. & ... Detection and classification of TCP/IP network services 1997 Computer Security Applications , pp. - article URL
Tapper, C. Computer law 1989 , pp. - book

Tapper, C. Computer Crime": Scotch Mist?',(1987) 1987 Criminal Law Review, pp. - article

Tapper, C. Computer Crime": Scotch Mist? 1987 Crim L Rev, pp. - article

Tassel, D.V. Computer security management 1972 , pp. - book

Tassel, D.V. Computer crime 1970 Proceedings of the November 17-19, 1970, fall joint , pp. article URL
-

Tavani, H. The uniqueness debate in computer ethics: What exactly is 2002 Ethics and Information Technology, pp. - article URL
at issue, and why does it matter?

Tavani, H. Defining the boundaries of computer crime: piracy, break- 2000 ACM SIGCAS Computers and Society, pp. - article URL
ins, and sabotage in cyberspace

Tavani, H. A computer ethics bibliography 1995 ACM SIGCAS Computers and Society, pp. - article

Taylor, P. Hackers: crime in the digital sublime 1999 , pp. - book

Taylor, R. & ... Computer crime 2003 Criminal Investigation, pp. - article

Taylor, R., Caeti, T., Loper, D., Digital crime and digital terrorism 2006 , pp. - book
Fritsch, E. & ...

Teer, F., Kruck, S. & ... EMPIRACAL STUDY OF STUDENTS'COMPUTER 2007 Journal of Computer Information , pp. - article
SECURITY-PRACTICES/PERCEPTIONS

Telem, M. Computer crimes in schools 1984 Programmed Learning and Educational Technology, pp. - article URL

Tenhunen, M. Updating computer crime and information security 1994 Kriminalistik und forensische Wissenscqften, , pp. - article
strategies

Thackeray, G. Computer-Related Crimes-An Outline 1984 Jurimetrics J., pp. - article URL

Theoharidou, M., Kokolakis, S., The insider threat to information systems and the 2005 Computers & , pp. - article URL
Karyda, M. & ... effectiveness of ISO17799

Thomas, D. Criminality on the electronic frontier: corporality and the 1998 Information Communication & Society, pp. - article URL
judicial construction of the hacker

Thomas, D. & ... Legal methods of using computer forensics techniques for 2004 Retrieved September, pp. - article
computer crime analysis and investigation

Thomas, T. Al Qaeda and the Internet: The Danger of'Cyberplanning' 2003 , pp. - book URL

Thompson, D. 1997 computer crime and security survey 1998 Information management & computer security, pp. - article URL

Thompson, R. Chasing after  ›petty Ą computer crime 1999 Potentials, IEEE, pp. - article URL

Thornhill, W. Risk management for financial institutions: applying cost- 1990 , pp. - book
effective controls and procedures

Tohmatsu, D. & ... Computer Crime & Security Survey 1999 Victoria Police Computer Crime Squad and Deloitte , pp. - article

Tohmatsu, D. & ... Computer Crime & Security Survey–1999 1999 , pp. - book
Tompkins Joseph B Jr," An Analysis of the 1984 Federal Computer Law/Technology, pp. - article
Crime Provisions,"[1985]

Toren, P. Internet: A Safe Haven for Anonymous Information 1995 . John's J. Legal Comment., pp. - article URL
Thieves

Trdina, R. Preiskovanje kaznivih dejanj s področja otroške 2009 , pp. VII, 72 f.- book
pornografije : diplomsko delo

Tribbensee, N. Privacy and security in higher education computing 2003 Journal of College and University , pp. - article
environments after the USA PATRIOT Act

Trites, G. Director responsibility for IT governance 2004 International Journal of Accounting Information , pp. - article URL

Troutner, J. Computer Literacy: Teaching Computer Ethics. 1986 Journal of Computers in Mathematics and Science , pp. - article URL

Trček, D., Abie, H., Skomedal, A. & Advanced framework for digital forensic technologies and 2010 Journal of forensic sciences article URL
Starc, I. procedures Vol. 55(6), pp. str. 1471-1480

Tully, E. The Near Future: Implications for Law Enforcement 1986 FBI Law Enforcement Bulletin, pp. - article URL

Tunick, D. People v. Versaggi: A Conviction for a Computer Crime 1997 CRIMINAL LAW BULLETIN- , pp. - article
That was not Committed

Tunick, D. Computer Law: An Overview 1979 Loy. LAL Rev., pp. - article URL

Turnbull, L., Hendrix, E. & ... Atlas of crime: mapping the criminal landscape 2000 No.: ISBN 1-57356-241-6, pp. - article URL

Umphress, D. & ... Identity verification through keyboard characteristics 1985 International journal of man-machine studies, pp. - article URL

Upchurch, J. Combating Computer Crime 2003 , pp. - book

Urbas, G. & ... Computer Crime Legislation in Australia' 2004 Internet Law Bulletin (, pp. - article

Urek, R. Računalniška forenzika v predkazenskem postopku : 2012 , pp. 56 str.- book URL
diplomsko delo visokošolskega strokovnega študija
Varnost in notranje zadeve

Vacca, J. Computer forensics: computer crime scene investigation 2005 , pp. - book

Vacca, J. Computer Forensics: Computer Crime Scene Investigation 2005 Inc., Rockland, MA, pp. - article
(Networking Series)(Networking Series), Charles River
Media

Vacca, J. Digital forensics–Computer Crime Scene 2002 Charles River Media, pp. - article
Investigation

Valeriano, G. Pitfalls In Insurance Coverage for Computer Crimes 1992 Def. Counsel J., pp. - article URL

Vasiu, L. & ... Dissecting computer fraud: from definitional issues to a 2004 System Sciences, 2004. Proceedings of the , pp. - article URL
taxonomy

Vaughn, R. & ... Integration of computer security into the software 1999 Journal of Systems and Software, pp. - article URL
engineering and computer science programs

Verduyn, B. FBI computer crime survey 2005 Retrieved April, pp. - article
Vidovič, S. Praktični vidiki ugotavljanja in dokazovanja komunikacij 2010 , pp. VI, 50 f.- book
po mobilnem telefonu in računalniku : diplomsko delo

Vidovič, S. Praktični vidiki ugotavljanja in dokazovanja komunikacij 2010 , pp. VI, 50 f.- book
po mobilnem telefonu in računalniku : diplomsko delo

VINCENT, F. & ... Correlates of computer misuse: Data from a self-reporting 1990 Behaviour & Information Technology, pp. - article URL
sample

Voiskounsky, A. Current problems of moral research and education in the 2004 Human perspectives in the Internet society: , pp. - article URL
IT environment

Voiskounsky, A. & ... Flow-based model of computer hackers' motivation 2003 CyberPsychology & , pp. - article URL

Volgyes, M. The investigation, prosecution, and prevention of 1980 Computer LJ, pp. - article
computer crime: A state-of-the-art review

Volokh, E. Crime Severity and Constitutional Line-Drawing 2004 bepress Legal Series, pp. - article URL

Volonino, L. & ... Principles and practice of information security 2003 , pp. - book

Volonino, L. & Anzaldua, R. Computer forensics for dummies 2008 , pp. 360 str.- book

Volonino, L., Anzaldua, R., Godwin, Computer forensics: principles and practices 2007 , pp. - book
J. & ...

Waal, P. Keeping Hackers at Bay 1986 Telecommunication Technology, pp. - article URL

Wagner, A. Challenge of Computer-Crime Legislation: How Should 1984 Buff. L. Rev., pp. - article URL
New York Respond, The

Wahlert, G. & ... Crime in cyberspace: Trends in computer crime in 1998 Platypus Magazine, pp. - article
Australia

Walden, I. Harmonising computer crime laws in Europe 2004 European Journal of Crime, Criminal Law and , pp. - article URL

Walden, I., Reed, C. & ... Computer crime 2003 Computer law, pp. - article

Walker, K. Federal criminal remedies for the theft of intellectual 1993 Hastings Comm. & Ent. LJ, pp. - article URL
property

Wall, D. Crime and the Internet 2001 , pp. - book

Wall, D. 1 Cybercrimes and the Internet 2001 Crime and the Internet, pp. - article

Wall, D. Cybercrimes: New wine, no bottles 1999 Davies & Francis P. & Jupp V.(Eds), Invisible Crimes: , article
pp. -

Wan, H. & ... An analysis of Chinese laws against computer crimes 1997 Journal of Global Information Management (JGIM), pp. - article URL

Wang, D. & ... Application of Ant Colony Clustering in Computer 2009 and Computing Science, 2009. ICIC'09. , pp. - article URL
Forensics

Wang, S. Measures of retaining digital evidence to prosecute 2007 Computer Standards & Interfaces, pp. - article URL
computer-based cyber-crimes

Wang, Y., Cannady, J. & ... Foundations of computer forensics: A technology for the 2005 Computer Law & Security Review, pp. - article URL
fight against computer crime
Warkentin, M. & ... Behavioral and policy issues in information systems 2009 European Journal of Information Systems, pp. - article
security: the insider threat

Warren, M. Security practice: survey evidence from three countries 2002 Logistics information management, pp. - article URL

Wasik, M. Crime and the Computer 1991 No.: ISBN 0-19-825621-3, pp. - article URL

Watkins, P. Computer Crime: Separating the Myth from the Reality 1981 Chartered Accountant) Magazine, pp. - article

Webber, C. Computer Crime or Jay-Walking on the Electronic 1983 Crim. LQ, pp. - article URL
Highway

Webber, C. Computer Crime, or Jay-Walking on the Electronic 1983 Crim. LQ, pp. - article
Highway"(1983)

Webster, W. Technology Transfer, Industrial Espionage, and Computer 1985 Computer Security Journal, pp. - article URL
Crime: The FBI's Activities

Webster, W. Examination of FBI Theory and Methodology Regarding 1979 Am. Crim. L. Rev., pp. - article URL
White-Collar Crime Investigation and Prevention, An

Wei, H., Frinke, D., Carter, O. & ... Cost-benefit analysis for network intrusion detection 2001 , pp. - book URL
systems

Weiler, N. Honeypots for distributed denial-of-service attacks 2002 for Collaborative Enterprises, 2002. WET ICE 2002 , pp. article URL
-

Weisburd, D. & ... Crime mapping and crime prevention 1997 No.: ISBN 1-881798-08-9, pp. - article URL

Weiss, H. Computer Security: An Overview 1974 Datamation, pp. - article URL

Weissinger, A. ASP in a nutshell: a desktop quick reference 2000 , pp. - book

Welch, T. Computer crime investigation and computer forensics 1997 Information Systems Security, pp. - article URL

Weller, H., Repman, J. & ... The relationship of learning, behavior, and cognitive style 1995 Computers in the Schools, pp. - article URL
in hypermedia-based instruction

Wessels, J. & Hillenkamp, T. Strafrecht : Straftaten gegen Vermogenswerte 1999 book


Vol. 8Schwerpunkte, pp. XXVII, 347 str.-

Westland, C. A rational choice model of computer and network crime 1996 International Journal of Electronic Commerce, pp. - article URL

Wetter, D. Erste Hilfe in Digitaler Forensik [2007? , pp. - other URL


]

Wharton, L. Legislative Issues in Computer Crime 1984 Harv. J. on Legis., pp. - article URL

White, M. Current issues and controversies in policing 2007 , pp. - book

Whiteside, T. Computer capers: Tales of electronic thievery, 1978 , pp. - book


embezzlement, and fraud

Whitman, M. In defense of the realm: understanding the threats to 2004 International Journal of Information Management, pp. - article URL
information security

Whitman, M. Enemy at the gate: threats to information security 2003 Communications of the ACM, pp. - article URL
Wible, B. A Site Where Hackers Are Welcome: Using Hacking 2003 The Yale Law Journal, pp. - article
Contests To Shape Preferences and Deter Computer
Crime

Wible, B. Site Where Hackers Are Welcome: Using Hack-in 2002 Yale LJ, pp. - article URL
Contests to Shape Preferences and Deter Computer Crime,
A

Wilding, E. Information risk and security: preventing and 2006 , pp. - book
investigating workplace computer crime

Wilding, E. Computer evidence : a forensic investigations handbook 1997 , pp. XI, 236 str.- book

Wilkinson, D., Harries, G., Thelwall, Motivations for academic Web site interlinking: Evidence 2003 Journal of Information , pp. - article URL
M. & ... for the Web as a novel source of information on informal
scholarly communication

Williams, K. Using Tittle's control balance theory to understand 2008 International Review of Law Computers & , pp. - article URL
computer crime and deviance

Williams, P. Organized Crime and Cybercrime: Synergies, Trends and 2001 Global Issues, pp. - article URL
Responses

Williams, W. The National Cybercrime Training Partnership 1999 Police Chief, pp. - article URL

Willison, R. Understanding the perpetration of employee computer 2006 Information and organization, pp. - article URL
crime in the organisational context

Willison, R. Understanding the offender/environment dynamic for 2006 Information Technology & People, pp. - article URL
computer crimes

Willison, R. Opportunities for computer abuse: assessing a crime 2002 , pp. - book
specific approach in the case of Barings Bank

Willison, R. & ... Motivations for Employee Computer Crime: 2009 IFIP TC 8 International Workshop on Information , pp. - article
Understanding and Addressing Workplace Disgruntlement
through the Application of Organisational Justice

Willison, R. & ... Overcoming the insider: reducing employee computer 2009 Communications of the ACM, pp. - article URL
crime through situational crime prevention

Willison, R. & ... Considering the offender: addressing the procedural stages 2005 , pp. - book
of computer crime in an organisational context

Willison, R. & Backhouse, J. Opportunities for computer crime: considering systems 2006 European journal of information , pp. - article URL
risk from a criminological perspective

Wilson, C. Holding management accountable: a new policy for 2000 and Electronics Conference, 2000. NAECON 2000. , pp. - article URL
protection against computer crime

Wilson, D. Viewing computer crime: Where does the systems error 1991 COMP. LAW J., pp. - article URL
really exist?.

Winchester, J. Computer-printed documents as part of a computer crime 1981 Journal of Forensic Sciences, pp. - article URL
investigation

Winkler, I. The changing face of computer crime 2005 The ISSA Journal, pp. - article
Wise, E. Criminal Law: Sex, Crime, and Cyberspace 1996 Wayne L. Rev., pp. - article URL

Wold, G. & ... Computer crime: techniques, prevention 1989 , pp. - book

Wold, G. & ... Computer Crime: Techniques for Preventing and 1989 Rolling Meadows, IL: Bankers Publishing Company, pp. - article
Detecting Crime in Financial Institutions

Wolf, J. War games meets the internet: Chasing 21st century 2000 Am. J. Crim. L., pp. - article URL
cybercriminals with old laws and little money

Wong, D. Computer Crime in the UK 1984 EDPACS: The EDP Audit, Control, and Security , pp. - article URL

Wong, K. Computer crime—risk management and computer 1985 Computers & Security, pp. - article URL
security

Wong, K. & ... Computer Crime Casebook 1987 , pp. - book

Woodhouse, S. Information security: end user behavior and corporate 2007 and Information Technology, 2007. CIT 2007. , pp. - article URL
culture

Wright, M. The need for information security education 1998 Computer Fraud & Security, pp. - article URL

Wright, T. The Field Guide For Investigating Computer Crime: 2000 Security Focus, May, pp. - article
Overview of a Methodology for the Application of
Computer Forensics Part II

Xiang, Y. & ... A defense system against DDoS attacks by large-scale IP 2005 and Applications, 2005. ICITA 2005. Third , pp. - article URL
traceback

Yang, C. & Ng, T. Terrorism and crime related weblog social network: Link, 2007 Intelligence and Security Informatics, 2007 , pp. - article URL
content analysis and information visualization

Yang, D. & ... Countering the Cyber-Crime Threat 2006 Am. Crim. L. Rev., pp. - article URL

Yar, M. Computer Hacking: Just Another Case of Juvenile 2005 The Howard Journal of Criminal Justice, pp. - article URL
Delinquency?

Yasinsac, A. & ... Policies to enhance computer and network forensics 2001 Proceedings of the 2001 IEEE Workshop on , pp. - article

Yasinsac, A., Erbacher, R., Marks, D. Computer forensics education 2003 Security & Privacy, , pp. - article URL
& ...

Yeager, R. Criminal computer forensics management 2006 Proceedings of the 3rd annual conference on , pp. - article URL

Yee, H. Juvenile Computer Crime-Hacking: Criminal and Civil 1984 Comm/Ent LJ, pp. - article URL
Liability

Young, J. Spies like us 1996 Forbes, pp. - article

Young, L. United States computer crime laws, criminals and 1995 International Review of Law, Computers & Technology, article URL
deterrence pp. -

Young, R., Zhang, L. & ... Hacking into the minds of hackers 2007 Information Systems , pp. - article URL

Zajac, B. Legal Options to Computer Viruses Ą 1989 Computers & Security, pp. - article

Zakelšek, J. Informacijska varnost : diplomska naloga 2010 , pp. X, 48 str.- book


Završnik, A. Digital forensics and open internet : referat na Cyberspace Brno , pp. - unpublished
Conference 2009, Brno, 20.-21. 11. 2009

Završnik, A. Towards an overregulated cyberspace : criminal law 2010 Masaryk University journal of law and technology article
perspective Vol. 4(2), pp. str. 173-190

Završnik, A. Cyberbullying in Slovenia : legal framework and 2010 , pp. - unpublished


supralegal initiatives : [referat na posvetu] The legal
aspects of cyberbullying, Antwerp, 26 May 2010

Završnik, A. Kriminaliteta in informacijska tehnologija : predstavitev 2009 , pp. - unpublished


raziskovalnega področja : referat na konferenci
Kibernetska kriminaliteta in digitalna forenzika, Ljubljana,
4. junij 2009

Zelin, H. & ... On Bylaw Limitation in Criminal Law for Computer 2005 Jianghai Academic Journal (Bimonthly), pp. - article URL
Crimes and Its Theoretical Response [J]

Zhijun, L. & ... Developing a computer forensics program in police higher 2009 Science & Education, 2009. ICCSE'09. 4th , pp. - article URL
education

Zidanšek, V. Računalniška forenzika v okolju Windows XP : 2006 , pp. V, 66 f.- book


diplomsko delo

Zou, J., Lu, K. & ... Architecture and fuzzy adaptive security algorithm in 2002 MILCOM 2002. Proceedings, pp. - article URL
intelligent firewall

Zupančič, M. Računalniško piratstvo - oblike in pravnovarstveni vidiki 1998 Revija za kriminalistiko in kriminologijo article
Vol. 49(4), pp. str.334-345

Zupančič, M. Kriminaliteta v globalni komunikacijski mreži (internet) 1997 Revija za kriminalistiko in kriminologijo article
Vol. 48(2), pp. str.179-188

Zviran, M. & ... Password security: an empirical study 1999 Journal of Management Information Systems, pp. - article URL

, (Calif., N.C. f.C.C.D. & ... The Computer Crime Law Reporter 1994 , pp. - book

, Crime, A.B.A.P. &.C. & ... International guide to privacy 2004 , pp. - book URL

, Crime, U.S.D. o.J.C. & ... Searching and seizing computers and obtaining electronic 2001 , pp. - book
evidence in criminal investigations

Šavnik, J. Vloga sodnega izvedenca za računalniško forenziko v Digitalni dokazi, pp. Str. 75-87 article
kazenskih postopkih

Šavnik, J. Prihodnost računalniške forenzike 2009 Varnostni forum article


Vol. 4(5), pp. str. 28-29

Šavnik, J. Principi, metodologija in orodja računalniške forenzike s 2006 , pp. 101 f.- book
praktičnim primerom : specialistična naloga

Škufca, M. Goljufije na svetovnem spletu : diplomsko delo 2010 , pp. 47 str.- book URL

Digital forensics for network, Internet, and cloud 2010 , pp. XII, 353 str.- book
computing : a forensic evidence guide for moving targets
and data

Open source software for digital forensics 2010 , pp. VII, 124 str.- book URL
Law and the internet 2009 , pp. IL, 713 str.- book

ENISA quarterly 2005 ENISA quarterly, pp. - other URL

Invisible crimes : their victims and their regulation 1999 , pp. 264 str.- book

Computers in society 1998 Annual editions series, pp. X, 245 str.- book

Crime, criminal justice and the Internet 1998 , pp. 91 str.- book

Journal of financial crime : the official journal of the 1995 J. financ. crime, pp. - other
Cambridge International Symposium on economic crime

Prawne aspekty naduzyć popelnianych z 1994 , pp. 384 str.- book


wykorzystaniem nowoczesnych technologii przetwarzania
informacji

Criminal and civil investigation handbook 1993 , pp. 1 zv. (loč. pag.)- book

Izdelano s pomočjo programskega orodja JabRef dne 24/07/2012.

GOR

You might also like