Professional Documents
Culture Documents
Racunalniska Kriminaliteta
Racunalniska Kriminaliteta
Računalniška kriminaliteta
Dr. Karl Petrič
Ljubljana, 2012
Kazalo poglavij
Povzetek
1 Uvod
1.1 Cilj dela
2 Reševanje informacijskega problema s področja računalniške kriminalitete
Povzetek
V hibridnem izdelku na temo "Računalniška kriminaliteta" je avtor prikazal postopek reševanja informacijskega problema, nakar je v klikalnem diagramu združil med sabo naslednje teme
s področja računalniške kriminalitete: digitalna kriminaliteta, kibernetska kriminaliteta, elektronska kriminaliteta, internetna kriminaliteta, spletna kriminaliteta, sistemski vdori,
računalniška forenzika idr. Kot končni izdelek je nastal klikalni diagram z maloprej navedenimi perečimi vsebinami. V tem klikalnem diagramu se nahajajo tudi povezave do spletnih
strani kot npr. COBISS/COBIB in Google. Kot prilogo je avtor dodal aplikacijo v obliki preglednične bibliografije z iskalnikom, ki zajema zadetke s področja računalniške kriminalitete
(COBISS/COBIB in Google učenjak).
Ključne besede: računalniška kriminaliteta, digitalna kriminaliteta, kibernetska kriminaliteta, internetna kriminaliteta, sistemski vdori, računalniška forenzika, preiskovanje kaznivih
dejanj, preprečevanje.
GOR
1 Uvod
Računalniška kriminaliteta je v zadnjih dvajsetih letih izjemno porastla že zaradi dejstva, ker so se računalniki dejansko vgradili ne samo v poslovne in akademske sfere, ampak tudi v
čisto navadne vsakdanje dejavnosti ter dogodke. Š˝e pojmovna analiza računalniške kriminalitete bi zelo zgovorno pokazala njeno razvejenost. Brez informacijske tehnologije si sploh več
ne moremo zamisliti normalno delovanje družbe in s tem posameznika, ki živi v njej. Računalniki so v bistvu zapleteni stroji, ki v veliki meri pozitivno delujejo na delovanje družbe,
vendar navkljub zapisanemu, je potrebno izpostaviti temno stran uporabe računalnikov, ki se kaže še zlasti v sferah družbenega. Po eni strani je povezovanje računalnikov v omrežja
omogočilo hitrejšo komunikacijo med ljudmi, a po drugi strani je prav to povezovanje povečalo sistemske luknje, ki privlačijo razne zlorabe podatkov (npr. kraja podatkov, kraja
identitete, kibernetska špijonaža, pedofilska omrežja, teroristična omrežja, spletni socialni inženiring). Zlorabe so lahko zelo hude in lahko posežejo celo (čeprav posredno) po človeških
življenjih. Drugi večji negativni vpliv, ki ga je potrebno izpostaviti je v spodbujanju osiromašenega socialnega čuta do soljudi in nezdravega fiziološko pasivnega načina življenja.
Prekomerno socialno izolirani ljudje lahko postanejo zelo hitro tarča prekaljenih virtualnih kriminalcev.
GOR
Slika 1 prikazuje koncept reševanja informacijskega problema (v nadaljevanju IP) po stopnjah od ena do šest:
1. predstavitev IP
2. tema IP, različne policijske teme
3. naslov IP
4. določitev predmetnih oznak ( računalniška kriminaliteta, kibernetska kriminaliteta, internetna kriminaliteta, digitalna kriminaliteta, e-kriminaliteta, virtualna kriminaliteta, kraja
podatkov, kraja identitete, računalniška forenzika)
5. uporaba orodij
6. predstavitev klikalnega diagrama s področja računalniške kriminalitete
Slika 1 vključuje tudi pomembne prvine kot so različne omejitve (npr. za jezik, čas in vrsta virov). V nadaljevanju tega dela bom prikazal vsebinski koncept ali miselni vzorec
kot osnova za izdelavo kasnejšega klikalnega diagrama.
GOR
Slika 2 prikazuje miselni vzorec oziroma vsebinske koncepte, ki so s temo računalniške kriminalitete povezani. Vsebinski koncepti so naslednji:
Kibernetska kriminaliteta (gl. tudi RK), oprema, komunikacijske naprave, mobilna omrežja, telefonske linije, računalniška omrežja, kazniva dejanja, goljufije, kraja podatkov, kraja
identitete, špijonaža, računalniško piratstvo, poneverbe, finančne prevare, prenašanje virusov, pedofilska omrežja, terorizem na spletu, spletke, mobing, stalking, spletni vandalizem,
Računalniška kriminaliteta (RK), internetna kriminaliteta, digitalna kriminaliteta, virtualna kriminaliteta, e-kriminaliteta, Informacijska kriminaliteta, Računalniška forenzika, odkrivanje,
preiskovanje, preprečevanje. Bralci tega dela si lahko izdelajo še bolj nadrobno sliko s pomočjo spletne aplikacije, ki se imenuje Text2MindMap Converter (kliknite sliko 2).
GOR
GOR
4 Zaključek
Bralke/-ci bodo lahko ta hibridni izdelek (podobno kot vse poprejšnje) uporabili za naslednje namene: za študij, za raziskave, za interno izobraževanje idr. Prav tako bodo lahko tudi
dopolnili oziroma nadgradili že obstoječe spletne povezave do relevantnih vsebin.
GOR
6 Priloga
Spodnja preglednica predstavlja aplikacijo, ki poleg bibliografskih zapisov s COBISS/COBIB in Google učenjaka vsebuje še kakovosten iskalnik (ta iskalnik zajema zadetke znotraj
preglednice). Predstavljeni so ključni podatki o avtorju, naslovu, letu nastanka, reviji/konferenci, tipu reference in ali je delo dosegljivo na spletu (gl. DOI/URL - povsem na desni strani
preglednice).
at1, I.P. & 939 In addition to the formal concerns related to substantive 1941 , pp. - book
laws and procedural laws, international computer crime
investigations are hampered by a variety
Abagnale, F. FBI 2005 Computer Crime Survey 2005 Federal Bureau of Investigation, pp. - article
Abraham, T. & ... Investigative profiling with computer forensic log data 2002 Data Mining, 2002. ICDM 2002. , pp. - article URL
and association rules
Adachi, N., Aoki, S., Komano, Y. & The security problems of Rivest and Shamir's PayWord 2003 E-Commerce, 2003. CEC , pp. - article URL
... scheme
Adams, J. Controlling cyberspace: applying the computer fraud and 1996 Santa Clara Computer & High Tech. LJ, pp. - article URL
abuse act to the internet
Adelstein, F. Live forensics: diagnosing your system without killing it 2006 Communications of the ACM, pp. - article URL
first
Adler, F. A note on teaching  ›international Ą 1996 Journal of Criminal Justice Education, pp. - article URL
Adler, F., Mueller, G.O. & Laufer, Criminology 1998 , pp. XXIII, 552 str.- book
W.S.
Aiziwa, K. Cooperation in Criminal Matters: Mutual Legal 2001 Proceedings of the Asia Cyber Crime Summit. Hong , pp. article
Assistance and Extradition, 24/7 Points of Contact -
Network, and Training in the Field of Computer Crime'
Albanese, J. & ... Crime in America: Some existing and emerging issues 1993 No.: ISBN 0-13-191446-4, pp. - article URL
Alexander, K. & ... Computer crime 1996 Emory Law Journal, pp. - article
Alexander, M. Computer crime: Ugly secret for business 1990 Computerworld, pp. - article
Alexander, M. Computer crime fight stymied 1989 Federal Computer Week, pp. - article
Allen, B. Computer Crime: New Findings, New Insights 1981 notes used at computer Security Institute's Eighth , pp. - article
Allen, B. Embezzler's Guide to the Computer 1975 Harvard Business Review, pp. - article
Allen, W. Computer forensics 2005 Security & Privacy, IEEE, pp. - article URL
Altheide, C. & Carvey, H. Digital forensics with open source tools 2011 , pp. XVII, 264 str.- book
Anderson, D. Aggregate Burden of Crime, The 1999 JL & Econ., pp. - article URL
Anderson, K. Hacktivism and Politically Motivated Computer Crime 2009 Encurve, LLCC, pp. - article
Anderson, K. Intelligence Based Threat Assessments for Information 1999 Global Technology Research, Inc. White paper, n. pag, article
Networks and Infrastructures pp. -
Anderson, R. Liability and computer security: Nine principles 1994 Computer Security—ESORICS 94, pp. - article URL
Anderson, R. & ... Understanding the insider threat 2004 , pp. - book URL
Andreano, F. Evolution of Federal Computer Crime Policy: The Ad Hoc 1999 Am. J. Crim. L., pp. - article URL
Approach to an Ever-Changing Problem, The
Anthes, G. Security plans lag computer crime rate 1995 Computers and Security, pp. - article URL
Armstrong, C. Mastering computer forensics 2003 World Conference on Information Security , pp. - article URL
Armstrong, C. Developing a framework for evaluating computer forensic 2003 Evaluation in Crime Trends and justice: Trends , pp. - article
tools
Armstrong, H. & ... Internet anonymity practices in computer crime 2003 Information management & , pp. - article URL
Association, A.B. Task Force on Computer Crime 1984 Criminal Justice, pp. - article
Association, A.B. Task Force on Computer Crime, Section of Criminal 1984 Report On Computer Crime, Washington, DC: ABA, pp. - article
Justice
Attaran, M. Managing legal liability of the Net: a ten step guide for IT 2000 Information management & computer security, pp. - article URL
managers
August, R. Turning the Computer into a Criminal 1983 Barrister, pp. - article URL
AusCERT, M., Rankine, T., Rothery, Australian Computer Crime and Security Survey 2003 , pp. - book
M. & ...
Aycock, J. Computer viruses and malware 2010 , pp. - book
Bace, R. A New Look at Perpetrators of Computer Crime 1994 Proc. 16th Department of Energy Computer Security , pp. article
-
Backhouse, J. & ... Managing computer crime: a research outlook 1995 Computers & Security, pp. - article URL
Bagchi, K. & ... An analysis of the growth of computer and Internet 2003 of the Association for Information Systems ( , pp. - article
security breaches
Bailey, D. Attacks on computers: Congressional hearings and 1984 , pp. - book URL
pending legislation
Baker, G. Trespassers will be prosecuted: computer crime in the 1993 Computer/law journal, pp. - article URL
1990s
Baker, W., Hylender, C. & ... 2008 data breach investigations report 2008 Basking Ridge, NJ: Verizon , pp. - article
Bandyopadhyay, T., Mookerjee, V. & Why IT managers don't go for cyber-insurance products 2009 Communications of the , pp. - article URL
...
Bar-Sela, Y. Computer Legislation in Israel: A Proposal Being 1986 Isr. L. Rev., pp. - article URL
Developed by the Ministry of Justice
Barki, H., Rivard, S. & ... A keyword classification scheme for IS research literature: 1993 Mis Quarterly, pp. - article URL
An update
Barr, R. & ... Crime placement, displacement, and deflection 1990 Crime and Justice, pp. - article URL
Barrett, N. Digital crime : policing the cybernation 1997 , pp. 224 str.- book
Barton, B. & ... User-friendly password methods for computer-mediated 1984 Computers & Security, pp. - article URL
information systems
Barton, G. Taking a Byte out of Crime: E-mail Harassment and the 1995 Wash. L. Rev., pp. - article URL
Inefficacy of Existing Law
Barton, P. & ... Cyber-crime--criminal offence or civil wrong? 2003 Computer Law & Security Report, pp. - article URL
Baryamureeba, V. & ... The enhanced digital investigation process model 2004 Proceedings of the 4th Annual Digital , pp. - article
Baskerville, R. Information systems security design methods: implications 1993 ACM Computing Surveys (CSUR), pp. - article URL
for information systems development
Bawden, B. International Symposium on the Prevention and 1992 Computer Law and Security Report, pp. - article
Prosecution of Computer Crime
Bear, G. Teaching Computer Ethics 1986 Computers in the Schools, pp. - article URL
Becker, J. Computer crime career of the future? 1982 SIGCAS Comput. Soc, pp. - article
Becker, J. Who are the computer criminals 1982 ACM SIGCAS Computers and Society, pp. - article URL
Becker, J. Rifkin, A Documentary History 1980 COMP. LAW. J., pp. - article URL
Becker, J. Operational Guide to White-Collar Crime Enforcement, 1978 Battelles Law and Justice Center, Seattle, Washington, pp. article
on the Investigation of Computer Crime -
Beebe, N. & ... A hierarchical, objectives-based framework for the digital 2005 Digital Investigation, pp. - article URL
investigations process
Beebe, N. & ... Using situational crime prevention theory to explain the 2005 Proceedings of the 2005 software , pp. - article
effectiveness of information systems security
Belič, I. Okrogla miza o informacijski varnosti in digitalni Zbornik povzetkov [!prispevkov], pp. 2 str.- article
forenziki
Belič, I. Tehnični vidiki odprtih vprašanj v zvezi z dokazovanjem s Problemi dokazovanja v zahtevnih kazenskih postopkih, article
postopki digitalne forenzike pp. Str. 151-162
Belič, I. Ustanovitev enote za boj proti računalniškemu kriminalu 2001 Varstvoslovje article
v Veliki Britaniji (Chloe Palmer, Zapis urednika revije Vol. 3(1/2), pp. str. 125-126
Computer Fraud & Security, maj 2001)
Bell, R. The prosecution of computer crime 2002 Journal of financial crime, pp. - article URL
Bennett, S. & ... An application of qualitative risk analysis to computer 1992 Computer Security Applications , pp. - article URL
security for the commercial sector
Bennett, W.W. & Hess, K.M. Criminal investigation 1998 , pp. XXI, 730 str.- book
Bequai, A. How to Prevent Computer Crime: A Guide to Forensic 2002 , pp. - book
and Technology
Bequai, A. Employee abuses in cyberspace: Management's legal 1998 Computers & Security, pp. - article URL
quagmire
Bequai, A. Techno-Crimes: The Computerization of Crime and 1987 Lexington: DC Heath and Company, pp. - article URL
Terrorism
Bequai, A. Lack of Ethics as a Cause of Computer Crime' 1984 Computers and People, pp. - article
Bequai, A. How to prevent computer crime: a guide for managers 1983 , pp. - book
Bequai, A. Problem of Crime in the Electronic Society, The 1978 Com. LJ, pp. - article URL
Bequai, A. Computer crime 1978 , pp. - book
Bequai, A. Computer Crime: A Growing and Serious Problem 1976 Police LQ, pp. - article URL
BEQUAI, A., Utah, U. o. & ... CASHLESS SOCIETY-AN ANALYSIS OF THE 1976 JOURNAL OF , pp. - article URL
THREAT OF CRIME AND THE INVASION OF
PRIVACY
Berg, T. State Criminal Jurisdiction in Cyberspace: Is There a 2000 Michigan Bar Journal, pp. - article
Sheriff on the Electronic Frontier?
Bernard, J., Selinšek, L., Lesjak, B. Digitalna forenzika v kazenskih postopkih : zbornik 2008 , pp. 138 str.- book
& Š avnik, J. razprav, pripravljenih v okviru projekta Digitalna
forenzika in njena vloga v sodnih postopkih (CRP V2-
0219)
Berqia, A. & ... A distributed approach for intrusion detection systems 2004 Information and Communication , pp. - article URL
Besednjak, A. Tehnični in pravni vidik dokazov v elektronski obliki : 2008 , pp. 81 f.- book
diplomsko delo visokošolskega študija
Best, R. & ... Computer Crime, Abuse, Liability and Security,-A 1970 , pp. - book
Comprehensive Bibliography
Bhaskar, R. State and local law enforcement is not ready for a cyber 2006 Communications of the ACM, pp. - article URL
Katrina
Biggs, S. & ... Cloud computing: The impact on digital forensic 2009 Internet Technology and Secured , pp. - article URL
investigations
Bintliff, R. Complete manual of white collar crime detection and 1993 No.: ISBN 0-13-017260-X, pp. - article URL
prevention
Bishop, M. The insider problem revisited 2005 Proceedings of the 2005 workshop on New security , pp. - article URL
Bistarelli, S. & ... Analysis of integrity policies using soft constraints 2003 Policies for Distributed Systems and , pp. - article URL
Black, D. Computer Hacker-Electronic Vandal or Scout of the 1993 JL & Inf. Sci., pp. - article URL
Networks, The
Bliss, A. & ... The threat of computer crime: identifying the problem and 1998 POLICE JOURNAL, pp. - article
formulating a response at force level
Bloom, R. Computer crime: a new white collar crook' 1980 Infosystems, pp. - article
Bloombecker, B. Spectacular Computer Crimes: What They are and how 1990 No.: ISBN 1-55623-256-X, pp. - article URL
They Cost American Business Half a Billion Dollars a
Year!
Bloombecker, B. Computer crime and abuse 1990 The EDP Auditor Journal, II, pp. - article
BloomBecker, J. Buck." Cracking down on Computer Crime." State Legislatures, pp. - article
BloomBecker, J. Computer Crime Laws 1993 , pp. - book
BloomBecker, J. Computer ethics: an antidote to despair 1987 ACM SIGCAS Computers and Society, pp. - article URL
BloomBecker, J. Computer Crime, Computer Security, Computer Ethics: 1986 , pp. - book
The First Annual Statistical Report of the National Center
for Computer Crime Data
BloomBecker, J. Computer Crime 1986 National Center for Computer Crime Data. Los Angeles , article
pp. -
BloomBecker, J. Introduction to computer crime 1984 Proceedings of the 2nd IFIP international conference , pp. article
-
BloomBecker, J. Computer crime update: The view as we exit 1984 1984 W. New Eng. L. Rev., pp. - article URL
BloomBecker, J. Conscience in computing: a Law Day perspective on 1983 ACM SIGCAS Computers and Society, pp. - article
computer crime
Bloombecker, J. International computer crime: Where terrorism and 1982 Computers & Security, pp. - article URL
transborder data flow meet
Bloombecker, J. Trial of a Computer Crime, The 1981 Int'l Bus. Law., pp. - article URL
Blythe, S. South pacific computer law: Promoting E-commerce in 2006 Journal of South Pacific Law, pp. - article
Vanuatu and fighting cyber-crime in Tonga
Boedges, P. Air force mounts offensive against computer crime 1988 Government Computer News, pp. - article
Bogen, A. & ... Knowledge discovery and experience modeling in 2004 of the 2004 international symposium on , pp. - article URL
computer forensics media analysis
Bogolea, B. & ... Information security curriculum creation: a case study 2004 Proceedings of the 1st annual conference on , pp. - article URL
Bologna, G., Lindquist, R. & ... ACCOUNTANT'S HANDBOOK OF FRAUD AND 1993 No.: ISBN 0-471-52642-8, pp. - article URL
COMMERCIAL CRIME
Boni, W.C. & Kovacich, G.L. Netspionage : the global threat to information 2000 , pp. XX, 260 str.- book
Boockholdt, J., HORVITZ, J. & ... Prosecution of Computer Crime 1978 JOURNAL OF , pp. - article URL
Booth, M. The triads: the Chinese criminal fraternity 1990 , pp. - book
Borchgrave, A.D., Cilluffo, F., Cyber threats and information security meeting the 21st 2001 , pp. - book URL
Cardash, S. & ... century challenge
Botha, M. & ... Utilising fuzzy logic and trend analysis for effective 2003 Computers & Security, pp. - article URL
intrusion detection
Bottom, N. & ... Security & loss control 1983 , pp. - book
Bowers, D. Access control and personal identification systems 1988 No.: ISBN 0-409-90083-4, pp. - article URL
Bowker, A. The advent of the computer delinquent 2000 FBI Law Enforcement Bulletin, pp. - article URL
Bowker, A. Juveniles and Computers: Should We Be Concerned 1999 Fed. Probation, pp. - article URL
Bowker, A. & ... Computer Crime in the 21st Century and Its Effect on the 2000 Fed. Probation, pp. - article URL
Probation Officer
Bowker, A.L. The advent of the computer delinquent 2000 FBI law enforcement bulletin article
Vol. 69(12), pp. str. 7-11
Boyd, C. & ... Time and date issues in forensic computing—a 2004 Digital Investigation, pp. - article URL
case study
Bradford, P., Brown, M., Perdue, J. Towards proactive computer-system forensics 2004 Technology: Coding and , pp. - article URL
& ...
Branigan, S. High-tech crimes revealed: cyberwar stories from the 2004 , pp. - book
digital front
Branscomb, A. Rogue computer programs and computer rogues: 1990 Rutgers Computer & Tech. LJ, pp. - article URL
Tailoring the punishment to fit the crime
Brenner, S. Is There Such a Thing as' Virtual Crime'? 2001 California Criminal Law Review, Vol. 4, No. 1, 2001, pp. article URL
-
Brill, A., Pollitt, M. & ... The evolution of computer forensic best practices: an 2006 Journal of Digital Forensic , pp. - article URL
update on programs and publications
Broadhurst, R. Developments in the global law enforcement of cyber- 2006 Policing: An International Journal of Police , pp. - article URL
crime
Bronitt, S. & ... Shifting boundaries of cybercrime: From computer 2003 CRIMINAL LAW JOURNAL- , pp. - article
hacking to cyber-terrorism
Brown, D. & ... Using clustering to discover the preferences of computer 2001 Systems, Man and Cybernetics, , pp. - article URL
criminals
Brown, D., Gunderson, L. & ... Interactive analysis of computer crimes 2000 Computer, pp. - article URL
Brungs, A. & Jamieson, R. Identification of legal issues for computer forensics 2005 Information Systems Management, pp. - article URL
Bržan, D. Računalniška forenzika in računalniško preiskovanje : 2011 , pp. 80 str.- book URL
magistrsko delo
Buckland, J. & ... Combating computer crime: prevention, detection, 1992 , pp. - book
investigation
Budimlić, M. Kompjuterski kriminalitet izmeĂ„â€u teorije i prakse 2003 Sarajevo, Fakultet kriminalitiĂ„Š¤kih nauka, pp. - article
(Transl.: Computer crime between theory and practice)
Bumke, D. Computer Crime 1980 The Saturday Evening Post, pp. - article
Burk, D. Transborder intellectual property issues on the Electronic 1994 Stan. L. & Pol'y Rev., pp. - article URL
Frontier
Burns, R., Whitworth, K. & ... Assessing law enforcement preparedness to address 2004 Journal of Criminal Justice, pp. - article URL
Internet fraud
Bynum, T. Computer ethics: Its birth and its future 2001 Ethics and Information Technology, pp. - article URL
Bynum, T. & ... Computer ethics and professional responsibility 2004 , pp. - book
Cardinali, R. Reinforcing our moral vision: examining the relationship 1995 Work Study, pp. - article URL
between unethical behaviour and computer crime
Carl, G., Kesidis, G., Brooks, R. & ... Denial-of-service attack-detection techniques 2006 Internet Computing, IEEE, pp. - article URL
Carney, M. & ... The Trojan made me do it: A first step in statistical based 2004 International Journal of Digital Evidence, pp. - article
computer forensics event reconstruction
Carrier, B. File system forensic analysis 2005 , pp. XX, 569 str.- book
Carrier, B. & ... Getting physical with the digital investigation process 2003 International Journal of Digital Evidence, pp. - article
Carter, D. Computer crime categories: how techno-criminals operate 1995 FBI law enforcement bulletin, pp. - article
Carter, D. & ... Computer crime and security: The perceptions and 2006 Security Journal, pp. - article URL
experiences of corporate security directors
Carter, D. & ... Computer-related crime 2002 Op. cit, pp. - article
Carter, D. & ... Computer crime: An emerging challenge for law 1996 FBI Law Enforcement Bulletin, pp. - article URL
enforcement
Casabona, P. & ... Computer Fraud: Financial and Ethical Implications 1998 Review of Business, pp. - article URL
Casey, E. Digital Evidence and Computer Crime. 2000 Academic Press, pp. - article
Casey, E. Digital evidence and computer crime: forensic science, 2011 , pp. - other
computers, and the Internet
Casey, E. Investigating sophisticated security breaches 2006 Communications of the ACM, pp. - article URL
CASEY, E. Digital Evidence and Computer Crime, [Sl]: Elsevier 2004 ISBN, pp. - article
Academic Press
Casey, E. Chapter 13: Forensic examination of handheld devices, 2004 , pp. - book
digital evidence and computer crime
Casey, E. ur.(2004) Handbook of computer crime investigation: 2004 London-San Diego: Elsevier , pp. - article
Forensic tools and technology
Casey, E. Handbook of computer crime investigation: forensic tools 2002 , pp. - book
and technology
Casey, E. Practical approaches to recovering encrypted digital 2002 International Journal of Digital Evidence, pp. - article
evidence
Casey, E. Digital evidence and computer crime : forensic science, 2000 , pp. 279 str.- book
computers and the Internet
Casey, E. Handbook of Computer Crime 2000 Forensic Science, Computer and the Internet, pp. - article
Casey, E. & ... The investigative process in Digital evidence and 2004 , pp. - book
computer crime: forensic science, computers and the
Internet
Castelli, G. & ... Il dolo informatico: come combattere il" computer crime" 1988 , pp. - book
Center, C. How the FBI Investigates Computer Crime 2004 , pp. - book
Cerullo, V. & ... Business continuity planning: A comprehensive approach 2004 Information Systems Management, pp. - article URL
CFE, K. Computer Forensic Case Study: Espionage, Part 1 Just 2001 Information Systems Security, pp. - article URL
Finding the File is Not Enough!
Chan, H. A comparative study of reported and unreported computer 2000 , pp. - book URL
crimes
Chang, W., Chung, W., Chen, H. & An international perspective on fighting cybercrime 2003 Proceedings of the 1st NSF/NIJ , pp. - article URL
...
Charney, S. Christensen O'Connor Johnson Kindness les 9 et 10 1997 Computer Law and Security Report, pp. - article
septembre 1996, Seattle, chapitre 7;" Congress Approves
Electronic Espionage and Computer Crime
Charney, S. The justice department responds to the growing threat of 1992 Computer Security Journal, pp. - article URL
computer crime
Charney, S. & ... Computer Crime 1996 Emory LJ, pp. - article URL
Chaski, C. Who's at the keyboard? Authorship attribution in digital 2005 International Journal of Digital Evidence, pp. - article
evidence investigations
Chen, C. Computer crime and the computer fraud and abuse act of 1990 Computer/Law Journal, pp. - article
1986
Chen, C. & Lindsay, G. Viruses, attacks, and sabotage: It's a computer crime wave 2000 Fortune, pp. - article
Chen, H., Chung, W., Xu, J., Wang, Crime data mining: a general framework and some 2004 Computer, pp. - article URL
G., Qin, Y. & ... examples
Chen, T. Intrusion detection for viruses and worms 2004 IEC Annual Review of Communications, pp. - article
Chen, Y., Chen, P., Hwang, J., An analysis of online gaming crime characteristics 2005 Internet , pp. - article URL
Korba, L. & ...
Chen, Y., Chen, P., Song, R. & ... Online gaming crime and security issue-cases and 2004 , pp. - book URL
countermeasures from taiwan
Chen, Y., Lin, S. & ... The influence of computer crime in online gaming on E- 2003 on Innovative Information Technology Policy and E- , pp. article
society-taking example for Taiwan in 2002 -
Cheurprakobkit, S. & ... Computer crime enforcement in Texas: funding, training, 2003 Journal of Police and Criminal Psychology, pp. - article URL
and investigating problems
Chien, E. & Bunker, L. Cyber viruses : how business can win in the battle that is 2000 Intersec article
not yet won Vol. 10(11/12), pp. str. 379-381
Choi, K. Computer crime victimization and integrated theory: An 2008 International Journal of Cyber Criminology, pp. - article
empirical assessment
Chung, W., Chen, H., Chang, W. & Fighting cybercrime: a review and the Taiwan experience 2006 Decision Support Systems, pp. - article URL
...
Ciardhuáin, S. An extended model of cybercrime investigations 2004 International Journal of Digital Evidence, pp. - article
Clark, F. & ... Investigating computer crime 1996 No.: ISBN 0-8493-8158-4, pp. - article URL
Clifford, R. Cybercrime: The investigation, prosecution and defense of 2001 , pp. - book URL
a computer-related crime
Clutterbuck, R. Terrorism, drugs and crime in Europe after 1992 1990 No.: ISBN 0-415-05443-5, pp. - article URL
Cohen, C.L. Growing challenge of computer forensics 2007 The Police chief article
Vol. 74(3), pp. str. 24-29
Cohen, F. Computer viruses: theory and experiments 1987 Computers & security, pp. - article URL
Coldwell, R. Australian attitudes toward legal intervention into hacking 1995 Communications of the ACM, pp. - article URL
Coldwell, R. Perceptions of Computer Crime 1994 Crime against Business, Australian Institute of , pp. - article
Coldwell, R. University students' attitudes towards computer crime: a 1993 ACM SIGCAS Computers and Society, pp. - article URL
research note
Coldwell, R. Some social parameters of computer crime 1990 Australian Computer Journal, pp. - article
Coldwell, R. Non-professional practices in computing: Some thoughts 1987 AUST. COMP. J., pp. - article URL
on the next decade or so.
Coleman, J. The criminal elite: Understanding white-collar crime 2005 , pp. - book
Collier, P. & ... A forensic methodology for countering computer crime 1992 Artificial intelligence review, pp. - article URL
Collier, P. & ... Problems in policing computer crime 1992 Policing and Society: An International , pp. - article URL
Collins, J. Demand for Computer Crime Investigation Increases 1987 Data Management, pp. - article
Colombell, M. The legislative response to the evolution of computer 2002 Rich. JL & Tech., pp. - article
viruses
Colton, K. & ... Computer crime: Electronic fund transfer systems and 1982 , pp. - book
crime
Colvin, B. Computer Crime Investigators-a New Training Field 1979 FBI Law Enforcement Bulletin, pp. - article URL
Commission, S.L. Report on Computer Crime: Presented to Parliament by 1987 , pp. - book
the Lord Advocate by Command of Her Majesty, July
1987
Congress, U. The federal computer crime statute. 18 USCA~ 030 1986 US Congress, Washington, DC, pp. - article
Conley, J. & ... A survey of computer crime legislation in the United 1999 Information and Communications , pp. - article URL
States
Conly, C., (US), N.I. o.J. & ... Organizing for computer crime investigation and 1989 , pp. - book
prosecution
Conly, C. & ... Computer Crime 1990 NIJ Reports, pp. - article
Conly, C.H. Organizing for computer crime investigation and [1998? Issues and Practices in Criminal Justice, pp. VI, 124 str.- book
prosecution ]
Conry-Murray, A. Deciphering the Cost of a Computer Crime 2002 NETWORK MAGAZINE-SAN FRANCISCO-, pp. - article
Conser, J., Carsone, L. & ... Investigating Computer-Related Crimes Involving Small 1988 Critical Issues in Computer Investigation 2nd , pp. - article
Computer Systems
Corbett, P. State and Federal Criminal Cyberlaw and Legislation 2001 TM Cooley L. Rev., pp. - article URL
Survey
Corbett, P. Michigan's Arsenal for Fighting Cybercrime: An 2000 MICHIGAN BAR JOURNAL, pp. - article
Overview of State Laws Relating to Computer Crimes
Cordeiro, W. Suggested management responses to ethical issues raised 1997 Journal of Business Ethics, pp. - article URL
by technological change
Couch, R. Suggested Legislative Approach to the Problem of 1981 Wash. & Lee L. Rev., pp. - article URL
Computer Crime
Coutorie, L. The future of high-technology crime: A parallel Delphi 1995 Journal of Criminal Justice, pp. - article URL
study
Craiger, P., Ponte, L., Whitcomb, C. Master's Degree in Digital Forensics 2007 , 2007. HICSS 2007. , pp. - article URL
& ...
Criscuoli, E. What personnel administrators should know about 1981 Personnel Administrator Dated:(September 1981), pp. - article URL
computer crime
Croall, H. White collar crime 1992 No.: ISBN 0-335-09656-5, pp. - article URL
Cronan, T., Foltz, C. & ... Piracy, computer crime, and IS misuse at the university 2006 Communications of the ACM, pp. - article URL
Cronin, B. Strategic intelligence and networked business 2000 Journal of information science, pp. - article URL
CSI, C. FBI computer crime and security survey 2001 Computer Security Issues & Trend, pp. - article
Csonka, P. The Council of Europe Convention on Cyber-crime: A 2005 Cyber-crime: The challenge in Asia, pp. - article
response to the challenge of the new age
Csonka, P. INTERNET CRIME: THE DRAFT COUNCIL OF 2000 Computer Law & Security Review, pp. - article URL
EUROPE CONVENTION ON CYBER-CRIME: A
RESPONSE TO THE CHALLENGE OF CRIME IN THE
AGE OF THE
Cunningham, W., Strauchs, J. & ... The Hallcrest Report II: Private Security Trends 1970- 1990 Stoneham, MA: Butterworth , pp. - article URL
2000
Cunningham, W., Strauchs, J. & ... Private security trends, 1970 to 2000: The Hallcrest report 1990 , pp. - book
II
Cutrera, T. Constitution in Cyberspace: The Fundamental Rights of 1991 UMKC L. Rev., pp. - article URL
Computer Users, The
D'Arcy, J., Hovav, A. & ... User awareness of security countermeasures and its 2009 Information Systems Research, pp. - article URL
impact on information systems misuse: a deterrence
approach
David, J., Karl, S. & ... Computer Crime 1999 Reilly Associates Inc. Taiwan Branch, pp. - article
Davies, D. The nature of computer crime 1990 Computers and Law, pp. - article
Davis, B. It's Virus Season again, Has Your Computer Been 1994 Wash. ULQ, pp. - article URL
Vaccinated: A Survey of Computer Crime Legislation as a
Response to Malevolent Software
Davis, J.B. Computer intrusion investigation guidelines 2001 FBI law enforcement bulletin article
Vol. 70(1), pp. str. 8-11
Davis, R. & ... Computer crime in canada 1999 CRIMINAL LAW QUARTERLY, pp. - article
Debelak, B. Računalniška forenzika - organizacijski vidiki : diplomsko 2007 , pp. 49 f.- book
delo visokošolskega študija
DeFrances, C. Prosecutors in state courts, 2001 2002 BJS Bulletin. Washington, DC: US Department of , pp. - article URL
DeLooze, L. Classification of computer attacks using a self-organizing 2004 Workshop, 2004. Proceedings from the Fifth , pp. - article URL
map
DeMarco, J. It's Not Just Fun and 'War Games'-Juveniles and 2001 United States Attorneys' Bulletin, pp. - article
Computer Crime'
Denning, D. Concerning hackers who break into computer systems 1990 High Noon on the Electronic Frontier: Conceptual , pp. - article URL
Denning, D., Neumann, P. & ... Social aspects of computer security 1987 Proceedings of the 10th , pp. - article
Denning, D.E. Information warfare and security 1999 , pp. XVII, 522 str.- book
Denning, P. Computers under attack: intruders, worms, and viruses 1990 , pp. - book
Denning, P. Computers, crime and privacy—a national 1984 Communications of the ACM, pp. - article
dilemma: congressional testimony from the industry
Deutch, M. Computer legislation: Israel's new codified approach 1996 J. Marshall J. Computer & Info. L., pp. - article URL
Dhillon, G. Principles of information systems security: Texts and 2006 Recherche, pp. - article URL
Cases
Dhillon, G. Challenges in managing information security in the new 2001 Information security management: global challenges in , article URL
millennium pp. -
Dhillon, G. Violation of safeguards by trusted personnel and 2001 Computers & Security, pp. - article URL
understanding related information security concerns
Dhillon, G. Computer crime: interpreting violation of safeguards by 1999 information technology resources in organizations in , pp. article
trusted personnel -
Dhillon, G. Managing and controlling computer misuse 1999 Information Management & Computer Security, pp. - article URL
Dhillon, G. & ... Computer crimes: theorizing about the enemy within 2001 Computers & Security, pp. - article URL
Dhillon, G., Silva, L. & ... Computer crime at CEFORMA: a case study 2004 International journal of information , pp. - article URL
DiDio, L. Computer Crime Costs on the Rise 1998 Computerworld, pp. - article
Diehl, E. & ... © watermark: Closing the analog hole 2003 Consumer Electronics, 2003. ICCE. 2003 , pp. - article URL
Dierks, M. Computer network abuse 1992 Harv. JL & Tech., pp. - article URL
Dittrich, D. Developing an effective incident cost analysis mechanism 2002 Security Focus, pp. - article
Dixon, P. An overview of computer forensics 2005 Potentials, IEEE, pp. - article URL
Doney, L. The growing threat of computer crime in small businesses 1998 Business Horizons, pp. - article
DONN, B. Fighting Computer Crime: A New Framework for 1998 , pp. - book
Protecting Information
Douglas, J., Burgess, A., Burgess, A. Crime classification manual: A standard system for 2011 , pp. - book
& ... investigating and classifying violent crimes
Dowland, P., Furnell, S., Illingworth, Computer crime and abuse: A survey of public attitudes 1999 Computers & , pp. - article URL
H. & ... and awareness
Drevenšek, M. Ponarejanje zgoščenk, kreditnih kartic in blagovnih znamk 2000 , pp. 59 f.- book
: diplomska naloga
Duff, L. & ... Computer Crime in the Global Village: Strategies for 1996 International Journal of the Sociology of Law, pp. - article URL
Control and Regulation—in Defence of the Hacker
Dunne, R. Deterring Unauthorized Access to Computers: Controlling 1994 Jurimetrics J., pp. - article URL
Behavior in Cyberspace Through a Contract Law
Paradigm
Durkin, K. Misuse of the Internet by pedophiles: Implications for law 1997 Fed. Probation, pp. - article URL
enforcement and probation practice
Durkin, K. & ...  ›Log on to sex Ą: Some notes on the carnal 1995 , pp. - book URL
computer and erotic cyberspace as an emerging research
frontier
Duyn, J.V. The human factor in computer crime 1985 , pp. - book
Easttom, C. & ... Computer Crime Investigation and the Law 2010 , pp. - book
Ekblom, P. Gearing up against crime 1997 International Journal of Risk, Security and , pp. - article
Eliasson, R. Datorbrott (Computer Crime) 1982 Treatise from the UmeĂĄ University, pp. - article
Eltringham, S. Computer Crime and Intellectual Property Section, US 2007 Prosecuting Computer Crimes, pp. - article
Department of Justice
Endicoytt-Popuvsky, B. Ethics and teaching information assurance 2003 Security & Privacy, IEEE, pp. - article URL
Eoghan, C. Digital evidence and computer crime 2000 San Diego, Calif, pp. - article
Erbschloe, M. Forces of change: ten trends that will impact the internet 2001 Information systems management, pp. - article URL
over the next five years
Esbensen, D. Method and apparatus for automated network-wide 1998 US Patent 5,796,942, pp. - article URL
surveillance and security breach intervention
Esbenshade, P. Hacking: Juveniles and Undeterred Recreational 2002 J. Juv. L., pp. - article URL
Cybercrime
Etter, B. Computer crime 2001 4th National Outlook Symposium on Crime in Australia- , article
pp. -
Etter, B., Research, A.C. f.P. & ... Forensic Challenges of E-Crime 2001 , pp. - book URL
Etter, C. The challenge of the forensic investigation of computer 2001 Platypus Magazine, pp. - article
crime
Evers, J. Computer crime costs $67 billion, FBI says 2006 CNET News. com, pp. - article
Exum, J. Making the Punishment Fit the (Computer) Crime: 2010 Rich. JL & Tech., pp. - article URL
Rebooting Notions of Possession for the Federal
Sentencing of Child Pornography Offenses
Fagin, J. Criminal justice 2007 No.: ISBN 0-205-47893-X, pp. - article URL
Farahmand, F., Navathe, S., Sharp, G. Assessing Damages of Information Security Incidents and 2005 Proceedings of the , pp. - article
& ... Selecting Control Measures, a Case Study Approach
Fedoreck, T. Computers+ Connectivity= New Opportunities for 2004 NY ST. BJ, pp. - article
Criminals and Dilemmas for Investigators
Fifield, K. Smartcards outsmart computer crime 1989 Computers & Security, pp. - article URL
Flanagan, A. The law and computer crime: Reading the Script of 2005 International Journal of Law and Information , pp. - article URL
Reform
Fluendy, S. Phishing targeting online outlets. Computer Crime 2005 , pp. - book
Research Center
Flusche, K. Computer Crime and Analysis of Computer Evidence: It 1998 Information systems security, pp. - article URL
Ain't Just Hackers and Phreakers Anymore!
Foltz, C. Bryan.(2004)," Cyberterrorism, Computer Crime, and 2004 Information Management & Computer Security, pp. - article
Reality
Foltz, C. Cyberterrorism, computer crime, and reality 2004 Information Management & Computer Security, pp. - article URL
Foltz, C., Cronan, T. & ... Have you met your organization's computer usage policy? 2005 Industrial Management & , pp. - article URL
Foltz, C., Cronan, T. & ... Human behavior as a factor in the control of information 2002 Decision Sciences Institute 2002 Annual Meeting , pp. - article
systems misuse and computer crime
Foltz, C., Schwager, P. & ... Why users (fail to) read computer usage policies 2008 Industrial Management & , pp. - article URL
Forcht, K. Assessing the ethical standards and policies in computer- 1991 A Question of Ethics: Developing Information System , article
based environments pp. -
Forcht, K., Thomas, D. & ... Computer crime: Assessing the lawyer's perspective 1989 Journal of Business Ethics, pp. - article URL
Forte, D. Strategic aspects in international forensics 2005 Forensic science series, pp. Str. 179-206 article
Fossen, E. Principles of internet investigation: Basic reconnaissance, 2005 Unpublished master's thesis, Norwegian University of , article
geopositioning, and public information sources pp. -
Foster, D. Can the general theory of crime account for computer 2004 , pp. - book URL
offenders: Testing low self-control as a predictor of
computer crime offending
Francia, G. & ... Computer forensics laboratory and tools 2005 Journal of Computing Sciences in Colleges, pp. - article URL
Francis, D. Computer crime 1987 No.: ISBN 0-525-67192-7, pp. - article URL
Freeh, L. speech to the 1997 International Computer Crime 1997 , pp. - book
Conference
Friedman, B. Moral Responsibility and Computer Technology. 1990 , pp. - book URL
Friedman, D. & ... Future imperfect: technology and freedom in an uncertain 2008 , pp. - book
world
Friedrichs, D. Trusted criminals: White collar crime in contemporary 2009 , pp. - book
society
Furnell, S. The problem of categorising cybercrime and 2001 2nd Australian Information Warfare and Security , pp. - article
cybercriminals
Furnell, S. & ... Computer hacking and cyber terrorism: The real threats in 1999 Computers & Security, pp. - article URL
the new millennium?
Furnell, S. & ... Computer abuse: vandalizing the information society 1997 Internet research, pp. - article URL
Furnell, S., Dowland, P., Illingworth, Authentication and supervision: A survey of user attitudes 2000 Computers & , pp. - article URL
H. & ...
Gabrys, E. The international dimensions of cyber-crime, part 1 2002 Information systems security, pp. - article URL
Gaensslen, R. How do I become a forensic scientist? Educational 2003 Analytical and bioanalytical chemistry, pp. - article URL
pathways to forensic science careers
Gammer, M. Computer Crime 1980 American Criminal Law Review, pp. - article URL
Gardner, E., Samuels, L., Render, B. The importance of ethical standards and computer crime 1989 Information System , pp. - article URL
& ... laws for data security
Garfinkel, S. The FBI's Cybercrime Crackdown 2002 TECHNOLOGY REVIEW-MANCHESTER NH-, pp. - article
Garfinkel, T. & ... When virtual is harder than real: Security challenges in 2005 Proceedings of the 10th conference on Hot , pp. - article URL
virtual machine based computing environments
Garg, A., Curtis, J. & ... Quantifying the financial impact of IT security breaches 2003 Information Management & , pp. - article URL
Garner, B. & ... Black's Law Dictionary Deluxe 8 1999 Auditing, pp. - article
Geary, J. Executive liability for computer crime and how to prevent 1994 Information Management & Computer Security, pp. - article URL
it
Geer, D. Malicious bots threaten network security 2005 Computer, pp. - article URL
Gemignani, M. What is Computer Crime, and Why Should We Care 1987 UALR LJ, pp. - article URL
Gemignani, M. Computer Crime: The Law in'80 1980 Ind. L. Rev., pp. - article URL
George, B. Contemporary Legislation Governing Computer Crimes 1985 Criminal Law Bulletin, pp. - article URL
George, N. Cyber traps: An overview of crime, misconduct and 2004 Capacity building series, pp. - article URL
security risks in the cyber environment
Geradts, Z.J. Content-based information retrieval from forensic image 2002 , pp. 148 f.- other URL
databases : [dissertation]
Gillard, C. & ... Computer crime: a growing threat 1983 BYTE Mag, pp. - article
Gish, J. Computer Crime and Punishment-The View From the 1985 Information Stategy-The Executive's Journal, pp. - article URL
DA's Office
Glynn, E. Computer Abuse: The Emerging Crime and the Need for 1983 Fordham Urb. LJ, pp. - article URL
Legislation
Goldfarb, A. & ... Economic and business dimensions Search engine 2008 Communications of the ACM, pp. - article URL
advertising
Gonzalez, P. Addressing computer crime legislation: Progress and 1983 COMP. LAW J., pp. - article URL
regress.
Goodhue, D. & ... Security concerns of system users* 1:: A study of 1991 Information & Management, pp. - article URL
perceptions of the adequacy of security
Goodhue, D. & ... Security concerns of system users: a proposed study of 1989 System Sciences, 1989. Vol. IV: , pp. - article URL
user preceptions of the adequacy of security measures
Goodman, M. Making computer crime count 2001 FBI Law Enforcement Bulletin, pp. - article URL
Goodman, M. My the Police Don't Care About Computer Crime, 1997 JL & TECH, pp. - article
10HARV
Goodman, M. Why the police don't care about computer crime'(1997) 10 1997 Harvard journal of law and technology, pp. - article
Goodman, M. Why the Police Don't Care About Computer Crime 1996 Harv. JL & Tech., pp. - article URL
Gorden, L. Computer crime and security survey 2004 CSI/FBI, pp. - article
Gordon, G., Hosmer, C., Siedsma, C., Assessing technology, methods, and information for 2002 , pp. - book URL
Rebovich, D. & ... committing and combating cyber crime
Gordon, L., Loeb, G., Lucyshyn, W. 9th Annual FBI/CSI computer crime and security survey 2004 , pp. - book
& ... 2004'
Gordon, L., Loeb, M. & ... The 2005 CSI/FBI computer crime and security survey 2005 Computer Security , pp. - article
Gordon, L., Loeb, M. & ... A framework for using insurance for cyber-risk 2003 Communications of the ACM, pp. - article URL
management
Gordon, L., Loeb, M., Lucyshyn, W. Eleventh annual CSI/FBI computer crime and security 2007 Computer Security Institute, pp. - article
& ... survey 2006
Gordon, L., Loeb, M., Lucyshyn, W. CSI 2006 FBI computer crime and security , pp. - article
& ...
Gordon, L., Loeb, M., Lucyshyn, W. 2006 csi/fbi computer crime and security survey 2006 Computer Security , pp. - article
& ...
Gordon, L., Loeb, M., Lucyshyn, W. Computer crime and security survey, 2006 2006 , pp. - book
& ...
Gordon, L., Loeb, M., Lucyshyn, W. 10th annual CSI/FBI computer crime and security survey 2005 , pp. - book
& ...
Gordon, L., Loeb, M., Lucyshyn, W. The annual CSI/FBI computer crime and security survey 2005 CSI (Ed.), pp. - article
& ...
Gordon, L., Loeb, M., Lucyshyn, W. Ninth CSI/FBI computer crime and security survey 2004 , pp. - book
& ...
Gordon, L., Loeb, M., Lucyshyn, W. 2004 CSI/FBI computer crime and security survey 2004 Computer Security , pp. - article
& ...
Gordon, L., Loeb, M., Lucyshyn, W. The ninth annual 2004 CSI/FBI Computer crime and 2004 /www. gocsi. com/.[Cited 20th Oct , pp. - article
& ... security survey
Gordon, S. & ... On the definition and classification of cybercrime 2006 Journal in Computer Virology, pp. - article URL
Gordon, S. & ... Computer crime revisited: The evolution of definition and 2006 European Institute for Computer Anti-Virus Research ( , article
classification pp. -
Gottschalk, L., Liu, J., Dathan, B., Computer forensics programs in higher education: a 2005 ACM SIGCSE Bulletin, pp. - article URL
Fitzgerald, S. & ... preliminary study
Gould, C. The information web: ethical & social implications of 1988 , pp. - book
computer networking
Grabosky, P. 'Computer Crime: Challenge to Law Enforcement 2000 Law Enforcement Review N, pp. - article
Grabosky, P. Computer crime: A criminological overview 2000 Workshop on Crimes Related to the Computer Network , article
pp. -
Grabosky, P. & ... The Future of Cyber-crime in Asia 2005 Broadhurst, RG, pp. - article
Grabosky, P. & ... Telecommunication fraud in the digital age 2001 Crime and the Internet, pp. - article
Grabosky, P. & ... Crime in the digital age: Controlling telecommunications 1998 , pp. - book
and cyberspace illegalities
Grabosky, P.N. Crime in the digital age : controlling telecommunications 1998 , pp. XI, 259 str.- book
and cyberspace illegalities
Granick, J. Faking It: Calculating Loss in Computer Crime 2005 ISJLP, pp. - article URL
Sentencing
Grant, A., David, F. & ... Child pornography in the digital age 1997 Transnational Organized Crime, pp. - article URL
Grazioli, S. & ... Consumer and business deception on the Internet: Content 2003 International Journal of Electronic Commerce, pp. - article URL
analysis of documentary evidence
Green, V. State computer crime statutes and the use of traditional 1989 memorandum), Reed, Smith, Shaw, and McClay, , pp. - article
doctrines to prosecute the computer criminal
Gresty, D., Shi, Q. & ... Requirements for a general framework for response to 2001 Computer Security Applications , pp. - article URL
distributed denial-of-service
Griffith, D. Computer Fraud and Abuse Act of 1986: A Measured 1990 Vand. L. Rev., pp. - article URL
Response to a Growing Problem, The
Griffiths, M. Computer Crime and Hacking: A Serious Issue for the 2000 POLICE JOURNAL, pp. - article
Police
Gripman, D. The doors are locked but the thieves and vandals are still 1997 J. Marshall J. Computer & Info. l., pp. - article URL
getting in: A proposal in tort to alleviate corporate
America's cyber-crime problem
Grodzinsky, F. & ... Is Cyberstalking a Special Type of Computer Crime 2001 Proceedings of ETHICPMP, pp. - article
Groover, R. Overcoming obstacles: Preparing for computer-related 1996 FBI Law Enforcement Bulletin, pp. - article URL
crime
Guisnel, J. Guerres dans le cyberespace : services secrets et Internet 1995 Enquetes, pp. 251 str.- book
Gupta, M., Chaturvedi, A., Mehta, S. The experimental analysis of information security 2000 Proceedings of the twenty , pp. - article URL
& ... management issues for online financial services
Haagman, D. & ... Trojan defence: A forensic view 2005 Digital Investigation, pp. - article URL
Hagen, J., Sivertsen, T. & ... Protection against unauthorized access and computer 2008 Journal of Computer Security, pp. - article URL
crime in Norwegian enterprises
Haggerty, J. & ... Managing corporate computer forensics 2006 Computer Fraud & Security, pp. - article URL
Halbert, D. Discourses of danger and the computer hacker 1997 The Information Society, pp. - article URL
Hall, J. & ... The Sarbanes-Oxley Act: implications for large-scale IT 2007 Communications of the ACM, pp. - article URL
outsourcing
Hamilton, C. Risk management and security 1999 Information systems security, pp. - article URL
Hansen, R. The computer virus eradication act of 1989: the war 1990 Software Law Journal, pp. - article
against computer crime continues
Harrington, S. Software piracy: Are Robin Hood and responsibility 2000 of information technology management in the , pp. - article URL
denial at work?
Harrington, S. The effect of codes of ethics and personal denial of 1996 MIS quarterly, pp. - article URL
responsibility on computer abuse judgments and
intentions
Harrington, S. Computer Crime & Abuse by US Employees: Something 1995 Journal of Systems Management, pp. - article
to Worry About?
Harrington, S. Why People Copy Software and Create Computer Viruses 1989 Information Resources Management Journal (IRMJ), pp. - article URL
Harrington, S. & ... Lessons from corporate America applied to training in 1990 ACM SIGSAC Review, pp. - article URL
computer ethics
Harris, A. IS ethical attitudes among college students: A 2000 Proceedings of ISECON, pp. - article
comparative study
Harris, K. & ... Computer Crime: An Overview 1995 Technical Bulletin, pp. - article URL
Hatcher, M., McDannell, J. & ... Computer Crimes 1999 Am. Crim. L. Rev., pp. - article URL
Haugen, S. & ... Identifying and controlling computer crime and employee 1999 Industrial Management & Data Systems, pp. - article URL
fraud
Hearnden, K. Computer crime and people 1990 A handbook of computer crime, London: Kogan Page, pp. article
-
Hearst, M. TileBars: visualization of term distribution information in 1995 Proceedings of the SIGCHI conference on Human , pp. - article URL
full text information access
Heinlein, E. Principles of information systems security 1995 Computers & Security, pp. - article
Held, D. & ... Governing globalization: Power, authority and global 2002 , pp. - book
governance
Henning, J. & ... Insider trading, money laundering and computer crime 2000 Transactions of the Centre for Business , pp. - article
Henry, S. & ... The criminology theory reader 1998 No.: ISBN 0-8147-3551-7, pp. - article URL
Henseler, H. Computer Crime and Computer Forensics 2000 The encyclopedia of forensic science, pp. - article
Herig, J. Computer crime in Florida: 1989 1989 Tallahassee, FL: Florida Department of Law , pp. - article
Hernandez, C. & ... Transnational crime and regional security in the Asia 1999 , pp. - book
Pacific
Heymann, S. Legislating Computer Crime 1997 Harv. J. on Legis., pp. - article URL
Higgins, G. Can low self-control help with the understanding of the 2004 Deviant Behavior, pp. - article URL
software piracy problem?
Higgins, G. & ... Does social learning theory condition the effects of low 2004 Journal of Economic Crime Management, pp. - article
self-control on college students' software piracy
Higgins, G. & ... SELF-CONTROL, DEVIANT PEERS, AND 2004 Psychological reports, pp. - article URL
SOFTWARE PIRACY 1
Higgins, G., Wilson, A. & ... An application of deterrence theory to software piracy 2005 Journal of Criminal Justice and , pp. - article
Hinduja, S. Deindividuation and Internet software piracy 2008 CyberPsychology & Behavior, pp. - article URL
Hinduja, S. Investigating computer crime 2008 Crimes of the Internet, Prentice-Hall, Upper Saddle , pp. - article
Hinduja, S. Computer crime investigations in the United States: 2007 International Journal of Cyber Criminology, pp. - article
leveraging knowledge from the past to address the future
Hinduja, S. Perceptions of local and state law enforcement concerning 2004 Policing: An International Journal of Police , pp. - article URL
the role of computer crime investigative teams
Hinduja, S. Trends and patterns among online software pirates 2003 Ethics and Information Technology, pp. - article URL
Hinduja, S. Correlates of Internet software piracy 2001 Journal of Contemporary Criminal Justice, pp. - article URL
Hitchings, J. Deficiencies of the traditional approach to information 1995 Computers & Security, pp. - article URL
security and the requirements for a new methodology
Hollinger, R. Hackers: computer heroes or electronic highwaymen? 1991 ACM SIGCAS Computers and Society, pp. - article URL
Hollinger, R. Computer hackers follow a Guttman-like progression 1988 Sociology and social research, pp. - article
Hollinger, R. & ... THE PROCESS OF CRIMINALIZATION: THE CASE 1988 Criminology, pp. - article URL
OF COMPUTER CRIME LAWS*
Hollinger, R. & ... Criminal Law Formation: The Case of Computer Crime 1986 A paper presented at the 1986 Annual Meetings of , pp. - article
Legislation
Holt, T. Examining a transnational problem: An analysis of 2003 International Journal of Comparative and Applied , pp. - article URL
computer crime victimization in eight countries from 1999
to 2001
Holt, T., Bossler, A. & ... Examining state and local law enforcement perceptions of 2010 Crime On-line: Correlates, Causes, and Context, , pp. - article
computer crime
Hong, H. Hacking Through the Computer Fraud and Abuse Act 1997 UC Davis L. Rev., pp. - article URL
Hoo, K. How much is enough? A risk-management approach to 2000 Workshop on Economics and Information Security, UC , article
computer security pp. -
Hoonakker, P., Bornoe, N. & ... Password authentication from a human factors 2009 Proceedings of the Human , pp. - article URL
perspective: Results of a survey among end-users
Hoonakker, P., Carayon, P., Deb, J. The use of focus groups to examine human factors in 2008 Human Factors in , pp. - article
& ... computer and information security
Horvat, D. Kazenski postopek pri kaznivih dejanjih v zvezi z 2000 , pp. 57 f.- book
računalniki : diplomska naloga
Hosmer, C. Time-lining computer evidence 1998 Information Technology Conference, 1998. IEEE, pp. - article URL
Householder, A., Houle, K. & ... Computer attack trends challenge Internet security 2002 Computer, pp. - article URL
Hovav, A. & ... The impact of virus attack announcements on the market 2004 Information Systems Security, pp. - article URL
value of firms
Howard, J. & ... A common language for computer security incidents 1998 Sandia Report: SAND98-8667, Sandia , pp. - article
Howerton, P. Computer crime (a tutorial) 1985 Proceedings of the 1985 ACM annual conference on , pp. article
-
Huebner, E., Bem, D. & ... Computer forensics: past, present and future 2003 security Technical report, pp. - article
Hughes, G. Computer crime: the liability of hackers 1990 Australian Computer Journal, pp. - article
Hughes, G., Tucker, G., Thompson, Legislative responses to computer crime 1990 , pp. - book
D. & ...
Hughes, K. Comparing pretesting methods: cognitive interviews, 2004 Survey Methodology, pp. - article
respondent debriefing, and behavior coding
Husted, B. The impact of national culture on software piracy 2000 Journal of Business Ethics, pp. - article URL
Hutchinson, W. & ... Attacking the Attackers: Attitudes of Australian IT 1999 ACIS (Australasian Conference on , pp. - article
Managers to retaliation against hackers
Hyde-Bales, K., Morris, S. & ... The Policing Recording of Computer Crime 2004 Development and Practitioner Report, pp. - article
Hyde-Bales, K., Morris, S., Charlton, Police Recording of Computer Crime 2004 No.: ISBN 1 84473 488 , pp. - article URL
A. & ...
Icov, D., Seger, K. & ... Computer Crime. A Crimefighter's Handbook, O'Reily & 1995 Inc. Sebastopol, CA, pp. - article
Associates
Icove, D. Collaring the cybercrook: an investigator's view 1997 Spectrum, IEEE, pp. - article URL
Icove, D., Seger, K. & ... Computer crime: a crimefighter's handbook 1995 , pp. - book
Icove, D., Seger, K. & ... Fighting Computer Crime 1995 , pp. - book
Icove, D., Seger, K. & ... Computer Crime. O'Reilley & Associates 1995 Inc., Sebastopol, California, pp. - article
Icove, D., Seger, K. & VonStorch, Computer crime : a crimefighter`s handbook 1995 Computer security, pp. XXI, 437 str.- book
W.
Ignjatović, Ă„. Pojmovno odreĂ„â€enje kompjuterskog kriminaliteta 1991 Anali Pravnog fakulteta u Beogradu, pp. - article URL
III, G.F. Digital forensics laboratory projects 2006 Journal of computing Sciences in Colleges, pp. - article URL
Ingraham, D. On Charging Computer Crime"(1980) 1980 Computer Law Journal, pp. - article
International Criminal Law Seminar, The alleged transnational criminal : the Second Biennial 1995 International bar association series, pp. XXI, 449 str.- inproceedings
2. International Criminal Law Seminar
Iqbal, M. Defining cyberterrorism 2004 J. Marshall J. Computer & Info. L., pp. - article URL
Irons, A. Computer forensics and records managementâ€â 2006 Records Management Journal, pp. - article URL
€ścompatible disciplines
Jackson, K. Congress pushes computer crime law 1989 Federal Computer Week, pp. - article
Jaishankar, K. Cyber criminology: Evolving a novel discipline with a 2007 International Journal of Cyber Criminology, pp. - article
new journal
Jakšič, B. Kibernetska vojna : (cyberwar) : diplomska naloga 2000 , pp. 55 f.- book
Jambriško, D. Računalniški kriminal in avtorske pravice : diplomska 1999 , pp. 64 f., [17] f. pril.- book
naloga
Jensen, E. Electronic Soapbox: Computer Bulletin Boards and the 1987 Fed. Comm. LJ, pp. - article URL
First Amendment, An
Jessup, L., Valacich, J. & ... Information systems today 2003 , pp. - book
Johnson, A. The technology acceptance model and the decision to 2005 Southern Association of Information Systems , pp. - article
invest in information security
Johnson, D. Mapping ordinary morals onto the computer society: a 1984 Journal of Social Issues, pp. - article URL
philosophical perspective
Johnston, A. & ... Improved security through information security 2009 Communications of the ACM, pp. - article URL
governance
Johnston, J., Eloff, J. & ... Security and human computer interfaces 2003 Computers & Security, pp. - article URL
Jones, R. Computer file protection system 1992 US Patent 5,144,659, pp. - article URL
Jones, T. Child abuse or computer crime? The proactive approach 2003 Policing Paedophiles on the Internet Bristol: New , pp. - article
Joutsen, M. in European Criminal Justice: Corruption, Women in the 1999 No.: ISBN 951-53-1968-4, pp. - article URL
Criminal Justice System, Criminal Policy Indicators,
Community Crime Prevention, and Computer Crime
Jr, D.S. & ... Discovering and disciplining computer abuse in 1990 MIS Quarterly, pp. - article URL
organizations: a field study
Jr, D.S. & ... Key information liability issues facing managers: software 1990 Mis Quarterly, pp. - article URL
piracy, proprietary databases, and individual rights to
privacy
Jr, E.P. Computer abuse: Problems of instrumental control 1987 Deviant Behavior, pp. - article URL
Jr, H.S. Web That Binds Us All: The Future Legal Environment of 1996 Hous. J. Int'l L., pp. - article URL
the Internet, The
Jr, J.T. & ... Computer Crime: Keeping Up with High Tech Criminals 1986 Crim. Just., pp. - article URL
Jr, J.T. & ... The 1984 Federal Computer Crime Statute: A partial 1986 COMP. LAW J., pp. - article URL
answer to a pervasive problem.
Jr, R.V., Bergiel, B. & ... Effects of the electronic Nigerian money fraud on the 2004 Management Research , pp. - article URL
brand equity of Nigeria and Africa
Judson, K. Computer crime: phreaks, spies, and salami slicers 2000 , pp. - book
Judson, K. Computer crime : phreaks, spies, and salami slicers 1994 Issues in focus, pp. 128 str.- book
Jurc, J. Digitalna forenzika in digitalni dokazi : diplomsko delo 2011 , pp. 53 f.- book
Jurkat, M. Computer Crime Legislation: Survey and Analysis 1986 Annual Survey of American Law, pp. - article
Kabay, M. Understanding Studies and surveys of computer Crime 2009 Computer Security Handbook, pp. - article
Kabay, M. ICSA White Paper on Computer Crime Statistics 1998 International Computer Security Association, pp. - article
Kallman, E. & ... Ethical decision making and information technology: An 1996 , pp. - book
introduction with cases
Kanellis, P. Digital crime and forensic science in cyberspace 2006 , pp. - book
Kankanhalli, A., Teo, H., Tan, B. & An integrative study of information systems security 2003 International Journal of , pp. - article URL
... effectiveness
Kardoš, Z. Možnosti računalniške forenzike z uporabo 2010 , pp. VI, 70 str.- book URL
nekomercialnih programskih orodij : specialistična naloga
Kaspersen, H.W. Implementation of Recommendation no. R (89) 9 on Council of Europe - European Committee on Crime article
computer-related crime Problems, pp. 114 str.-
Kastelic, T. & Š kraba, M. Digitalni dokazi - metode in izkušnje policije Digitalni dokazi, pp. Str. 29-44 article
Katanović, D. Obvladovanje varnostnih incidentov s pomočjo 2011 , pp. 92 str., [18] f. pril- book
računalniške forenzike : magistrska naloga
Katyal, N. Digital architecture as crime control 2002 Yale LJ, pp. - article URL
Katz, A. Computers: the changing face of criminality 1995 No.:, pp. - article URL
Kay, D. A course in computer law 1992 ACM SIGCSE Bulletin, pp. - article URL
Keefe, P. Computer crime insurance available- for a price 1983 COMPUTERWORLD., pp. - article
Kelly, S. Computer crime losses double 2007 Business Insurance, pp. - article
Kelman, A. Computer Crime in the 1990s: A Barrister's View' 1994 Paper for the Twelfth International Symposium on , pp. - article
Kenny, M. Data encryption: coping with computer crime. Manage, Computer crimes, pp. - article
33: 15-17, April 1981. Descriptors:" Electronic data
processing departments—Security measures
Keromytis, A. Patch on demand saves even more time?[network 2004 Computer, pp. - article URL
security]
Kerr, O. Virtual Crime, Virtual Deterrence: A Skeptical View of 2005 JL Econ. & Pol'y, pp. - article URL
Self-Help, Architecture, and Civil Liability
Kerr, O. Cybercrime's Scope: Interpreting Access and 2003 NYUL Rev., pp. - article URL
Authorization in Computer Misuse Statutes
Kerr, O. Lifting the Fog of Internet Surveillance: How a 2002 Hastings Lj, pp. - article URL
Suppression Remedy Would Change Computer Crime
Law
Kesar, S. & ... Developing ethical practices to minimize computer misuse 1998 Social science computer review, pp. - article URL
Kessler, G. An overview of steganography for the computer forensics 2004 Forensic science communications, pp. - article
examiner
Kholfi, S., Habib, M. & ... Best hybrid classifiers for intrusion detection 2006 Journal of Computational Methods in , pp. - article URL
Khoshgoftaar, T. & ... Resource-sensitive intrusion detection models for network 2004 High Assurance Systems , pp. - article URL
traffic
Kim, M. How counties handle computer crime? 1997 Ethics and Law on Electronic Frontier, pp. - article
Kjaerland, M. A classification of computer security incidents based on 2005 Journal of Investigative Psychology and , pp. - article URL
reported attack data
Kling, R. Computer Abuse and Computer Crime as Organized Computer/Law Journal, pp. - article
Activities
Kling, R. When organizations are perpetrators: assumptions about 1991 Computerization and controversy, pp. - article
computer abuse and computer crime
Kling, R. Computer abuse and computer crime as organizational 1981 ACM SIGCAS Computers and Society, pp. - article
activities
Kloster, A. & ... The effects of different types of organizers on students' 1989 Journal of educational psychology, pp. - article URL
learning from text.
Kluth, D. Computer, Virus Threat: A Survey of Current Criminal 1990 Hamline L. Rev., pp. - article URL
Statutes, The
Knijff, R. v. d. Chapter 11: Embedded Systems Analysis, Handbook of 2002 , pp. - book
Computer Crime Investigation, Edited by Eoghan Casey
Knotts, R. & ... Computer Security: Who's Minding the Store? 1989 The Academy of Management Executive (1987- , pp. - article URL
Koch, E.R. & Sperber, J. Die Datenmafia : Geheimdienste, Konzerne, Syndikate - 1995 , pp. 351 str.- book
Computerspionage und neue Informationskartelle
Kohn, M., Eloff, J. & ... Framework for a digital forensic investigation 2006 of Information Security South Africa (ISSA , pp. - article
Kovač, Jože, p. Nekatere nove oblike kaznivih dejanj po širitvi Evropske 2008 , pp. VI., 47 f.- book
unije : diplomsko delo
Kovačič, M. Izračun kontrolne vsote datoteke pomeni v ZDA preiskavo 2008 PP article
: United States v. Crist, 2008 WL 4682806, 22. oktober Vol. 27(47), pp. str. 27-28
2008
Kratz, M. Canada's computer crime laws: ten years of experience 1996 Information systems security, pp. - article
Krause, J. Computing Time for Crime 2005 Computing, pp. - article URL
Krauss, L. & ... Computer fraud and countermeasures 1979 , pp. - book
Krauss, L. & ... SAFE-security audit and field evaluation for computer 1972 No.: U, pp. - article URL
facilities and information systems
Krieger, M. Current and Proposed Computer Crime Legislation 1980 COMP. LAW J., pp. - article
Kroczynski, R. Are the current computer crime laws sufficient or should 2007 Fordham Intell. Prop. Media & Ent. LJ, pp. - article URL
the writing of virus code be prohibited
Kruck, S. & ... Computer Security Practices and Perceptions of the Next 2008 International Journal of Information Security and , pp. - article URL
Generation of Corporate Computer Use
Kruse, W. & ... Computer forensics: incident response essentials 2001 , pp. - book
Kruse, Warren G., I. & Heiser, J.G. Computer forensics : incident response essentials 2002 , pp. XIII, 398 str.- book
Kshetri, N. The simple economics of cybercrimes 2006 Security & Privacy, IEEE, pp. - article URL
Kshetri, N. Pattern of global cyber war and crime: A conceptual 2005 Journal of International Management, pp. - article URL
framework
Kusserow, R. An Inside Look at Federal Computer Crime 1986 Security Management, pp. - article
Kutz, R. Computer Crime in Virginia William and Mary Law Review, pp. - article
Kutz, R. Computer Crime in Virginia: A Critical Examination of 1985 Wm. & Mary L. Rev., pp. - article URL
the Criminal Offenses in the Virginia Computer Crimes
Act
Lakhina, A., Crovella, M. & ... Detecting distributed attacks using network-wide flow 2005 Proceedings of FloCon 2005 Analysis , pp. - article
traffic
Lam, C. & ... Signature recognition through spectral analysis 1989 Pattern Recognition, pp. - article URL
Lampson, B. Computer security in the real world 2004 Computer, pp. - article URL
Lawrence, A. & ... Wiliam Lucyshyn and&obert gichardson. 2004 CSVFm 2004 Computer Security Institute, pp. - article
Computer Crime and Security
Lawrence, A., Martin, P., Lucyshyn, CSI/FBI Computer Crime and Security Survey 2004 2004 , pp. - book
W. & ...
Lawrence, G., Loeb, M., Lucyshyn, CSI/FBI computer crime and security survey 2005 Computer Security Institute, pp. - article
W. & ...
LeBlanc, C. & ... Teaching computer security at a small college 2004 ACM SIGCSE Bulletin, pp. - article URL
Lee, H. Cyber crime and challenges for crime investigation in the 2008 Intelligence and Security Informatics, 2008. ISI 2008. , pp. article URL
information era -
Lee, J. & ... A holistic model of computer abuse within organizations 2002 Information management & computer security, pp. - article URL
Lee, J., Segal, G. & ... Positive alternatives: a report on an ACM panel on 1986 Communications of the ACM, pp. - article
hacking
Lee, S., Lee, S. & ... An integrative model of computer abuse based on social 2004 Information & Management, pp. - article URL
control and general deterrence theories
Lee, W. A Deterrent Measure Against Computer Crime: 1997 Singapore Management Review, pp. - article
Knowledge-Based Risk-Analytic Audit
Lee, W. & ... Computer Ethics: an Argument for Rethinking Business 2008 Presented at the 2nd World Business Ethics Forum: , pp. - article
Ethics
Leepson Computer Crime 1978 , pp. - book
Leeson, P. & ... Economics of Computer Hacking, The 2005 JL Econ. & Pol'y, pp. - article URL
Leibholz, S. & ... Users' guide to computer crime: its commission, detection 1974 , pp. - book
& prevention
Leighton, F. & ... Method and system for personal identification using 1991 US Patent 4,995,081, pp. - article URL
proofs of legitimacy
Leinfuss, E. Computer Crime: How Deep Does It Go 1986 MIS Week, pp. - article
Leiwo, J. & ... An analysis of ethics as foundation of information 1998 , 1998., Proceedings of the Thirty-First , pp. - article URL
security in distributed systems
Lending, D. & ... Research in progress: the effects of ethical climate on 2001 Proceedings of the 2001 ACM SIGCPR , pp. - article URL
attitudes and behaviors toward software piracy
Leonard, L. & ... Attitude toward ethical behavior in computer use: a 2005 Industrial Management & Data , pp. - article URL
shifting model
Levenfeld, B. Israel considers comprehensive computer law. 1988 INT. COMP. LAW ADVISER., pp. - article URL
Levi, M., Schlegel, K. & ... White-collar crime victimization 1992 White-Collar Crime , pp. - article URL
Levine, J., LaBella, R., Owen, H. & The use of honeynets to detect exploited systems across 2003 , 2003. IEEE Systems, , pp. - article URL
... large enterprise networks
Levy, E. Criminals become tech savvy 2004 Security & Privacy, IEEE, pp. - article URL
Lewis, B. Prevention of computer crime amidst international 2004 Am. Crim. L. Rev., pp. - article URL
anarchy
Lewis, B. Prevention of Computer Crime Amidst International 2004 American Criminal Law Review, pp. - article
Anarchy Ą(2004)
Lewis, J. & ... Assessing the risks of cyber terrorism, cyber war and 2002 , pp. - book
other cyber threats
Lewis, M. Computer Crime: Theft in Bits and Bytes 1985 Nation's Business, pp. - article
Li, Z. & ... The Present Situation of Computer Crime in China and Its 2006 Journal of Railway Police College, pp. - article
Technical Defense [J]
Liebholz, S. & ... User's Guide to Computer Crime 1974 Chilton Book Company, pp. - article
Litt, R. Crime in the computer age: The law enforcement 1999 Tex. Rev. L. & Pol., pp. - article URL
perspective
Livshits, V. & Lam, M. Finding security vulnerabilities in Java applications with 2005 Proceedings of the 14th conference on USENIX , pp. - article URL
static analysis
fakulteta v Ljubljani, P. Strokovno gradivo za posvet "Računalniška kriminaliteta" 1997 , pp. 41 str. loč pag.- book
Lo, A. Computer Crime a Magnet for Teens 1999 South China Morning Post, pp. - article
Lobel, J. Foiling the system breakers: computer security and access 1986 , pp. - book
control
Loia, V., Mattiucci, M. & ... Veniero: Computer Crime Investigation by Means of 2009 Web Intelligence and Intelligent Agent , pp. - article
Fuzzy Semantic Maps, M
LUCYSHYN, W. RICHARDSON., R.(2005) 2005 CSI/FBI COMPUTER 2005 Computer Security Institute, pp. - article
CRIME AND SECURITY SURVEY
Ludlow, P. High noon on the electronic frontier: Conceptual issues in 1996 , pp. - book
cyberspace
Lynch, J. Identity theft in cyberspace: Crime control methods and 2005 Berkeley Tech. LJ, pp. - article URL
their effectiveness in combating phishing attacks
Ma, L. & ... Query length impact on misuse detection in information 2005 Proceedings of the 2005 ACM symposium on , pp. - article URL
retrieval systems
Magklaras, G. & ... A preliminary model of end user sophistication for insider 2005 Computers & Security, pp. - article URL
threat prediction in IT systems
Malone, R. & ... Computer Viruses: Legal Aspects 1993 U. Miami Bus. LJ, pp. - article URL
Mandell, S. Computer crime 1990 Computers, ethics, & society, pp. - article
Mandia, K., Prosise, C. & ... ÄşŠźâ€ťÄ‡â‚¬Ä„ĺ“Š¤ÄşŠźâ€ťč®ˇç®â 2002 Incident Response: Investigating Computer Crime. , pp. - article
€”抛ŠźĂ§Š Š»Ă§ËťŠžč° 抺Ą
Manili, B. & ... Police chiefs and sheriffs rank their criminal justice needs 1988 Washington, DC: National Institute of Justice, US , pp. - article URL
Manion, M. & ... Terrorism or civil disobedience: toward a hacktivist ethic 2000 ACM SIGCAS Computers and Society, pp. - article URL
Marbach, W., Conant, J. & ... New wave computer crime. 1983 Newsweek, pp. - article
Marcella, A. & ... Cyber forensics: a field manual for collecting, examining, 2002 , pp. - book
and preserving evidence of computer crimes
Marion, C. Computer viruses and the law 1988 Dick. L. Rev., pp. - article URL
Marks, R. Security, Privacy, and Free Expression in the New World 1995 Hous. L. Rev., pp. - article URL
of Broadband Networks
Marsh, R. With criminal intent: The changing face of crime in South 1999 , pp. - book
Africa
Martonoši, P. Kriminaliteta v zvezi z računalniki v novi slovenski Podjetje in delo : revija za gospodarsko, delovno in article
kazenski zakonodaji socialno pravo, pp. str. 498-500
Massingale, C. & ... Risk Allocation for Computer System Security Breaches: 1990 W. New Eng. L. Rev., pp. - article URL
Potential Liability for Providers of Computer Services
Mastnak, Š˝. Računalniško piratstvo : diplomska naloga 1999 , pp. 71 f.- book
May, M. & ... Federal computer crime laws 2004 The SANS Institute. Retrieved October, pp. - article
McCall, C. Computer crime statutes: Are they bridging the gap 1988 Crim. Just. J., pp. - article URL
between law and technology
McCausland, J. Regulating Computer Crime After Reno v. ACLU: The 1997 Fla. L. Rev., pp. - article URL
Myth of Additional Regulation
McCombie, S. & ... Computer Forensic: An Issue of Definitions 2003 Proceedings of 1st Australian , pp. - article
McEwen, J., Fester, D. & ... Dedicated computer crime units 1989 , pp. - book
McEwen, T. The growing threat of computer crime 1990 Detective (Summer), pp. - article
McHugh, J. & ... An incentive system for reducing malware attacks 2005 Communications of the ACM, pp. - article URL
McKemmish, R. What is forensic computing 1999 Trends and issues in crime and criminal justice, pp. - article
McLaughlin, G. & ... Computer Crime: The Ribicoff Amendment to United 1978 Crim. Just. J., pp. - article URL
States Code, Title 18
McLoughlin, G. & ... Computer Crime and Security 1987 , pp. - book
McMullan, J. & ... Technologies of crime: The cyber-attacks on electronic 2003 Canadian Journal of Criminology and Criminal , pp. - article URL
gambling machines
Meall, L. Computer crime: foiling the fraudsters 1992 Accountancy, November, pp. - article
Mello, S. Administering the Antidote to Computer Viruses: A 1993 Rutgers Computer & Tech. LJ, pp. - article URL
Comment on United States v. Morris
Mencin, R. Rekonstrukcija podatkov v računalniški forenziki 2010 , pp. 57 f.- book URL
Mendell, R. Investigating Computer Crime in the 21st Century 2004 No.: ISBN 0-398-07525-5, pp. - article URL
Mendell, R. Investigating Computer Crime: a Primer for Security 1998 , pp. - book
Managers
Mendell, R. Investigating Computer Crime: A Primer for Security 1998 , pp. - book
Managers. Springfield, Illinois: Charles C
Mennecke, B., Roche, E., Bray, D. & Second Life and other virtual worlds: A roadmap for 2007 Systems (ICIS), 2007, pp. - article URL
... research
Merrill, P., Hammons, K., Computers in education 1996 Recherche, pp. - article URL
VINCENT, B., REYNOLDS, P. & ...
Merritt, M.P. U.S. Secret Service's computer forensic training for state 2009 The Police chief article URL
and local agencies Vol. 76(7), pp. str. 16-17
Merwe, A.V.D., Loock, M. & ... Characteristics and responsibilities involved in a Phishing 2005 Proceedings of the 4th , pp. - article URL
attack
Meyer, G. The social organization of the computer underground 1989 , pp. - book URL
Meyer, G. & ... The baudy world of the byte bandit: A postmodernist 1990 ,(also published in SCHMALLEGER, F.(ed.), , pp. - article
interpretation of the computer underground
Meyer, J. & ... Investigating computer crime: Concerns voiced by local 1998 Police Chief, pp. - article URL
law enforcement agencies
Meyers, M. & ... Computer forensics: the need for standardization and 2004 International Journal of Digital Evidence, pp. - article
certification
Michalowski, R. & ... Technology, property, and law 1991 Crime, Law and Social Change, pp. - article URL
Millard, C. Legal protection of computer programs and data 1985 , pp. - book
Mobbs, P. Computer Crime The law on the misuse of computers and , pp. - book
networks. 2003, GreenNet Civil Society Internet Rights
Project
Mohay, G. Technical challenges and directions for digital forensics 2005 Approaches to Digital Forensic Engineering, 2005. , pp. - article URL
Mohr, J. & ... Fighting Computer Crime with Software Risk Analysis 1984 INFORMATION SYSTEM MANAGEMENT, pp. - article URL
Montana, J. Viruses and the law: Why the law is ineffective 2000 The Information Management Journal, pp. - article URL
Montgomery, J. Computer Crime 1986 Am. Crim. L. Rev., pp. - article URL
Moon, B., McCluskey, J. & ... A general theory of crime and computer crime: An 2010 Journal of Criminal Justice, pp. - article URL
empirical test
Moore, T., Clayton, R. & ... The economics of online crime 2009 The Journal of Economic , pp. - article URL
Moores, T. & ... Do privacy seals in e-commerce really work? 2003 Communications of the ACM, pp. - article URL
Morris, D. Tracking a computer hacker 2001 United States Attorneys' Bulletin,(Internet Fraud , pp. - article
Morris, R. & Blackburn, A. Cracking the code: An empirical exploration of social 2009 Journal of Crime and Justice, pp. - article URL
learning theory and computer crime
Morris, S. Crime and prevention: a Treasury viewpoint 1997 Spectrum, IEEE, pp. - article URL
Morrison, P. Computer ethics: cautionary tales and ethical dilemmas in 1994 , pp. - book
computing
Morth, T. Considering our position: Viewing information warfare as 1998 Case W. Res. J. Int'l L., pp. - article URL
a use of force prohibited by Article 2 (4) of the UN
Charter
Mostéfaoui, G. Security in Pervasive Environments, What's Next? 2003 Security and Management Journal, pp. - article
Mršević, Z. Kompjuterski kriminalitet i potreba koncipiranja kriviĂ„Š 1991 Jugoslovenska revija za kriminologiju i kriviĂ„Š¤no article URL
¤nog dela kompjuterske zloupotrebe pravo, pp. -
Mršević, Z. Zaštita privatnosti zloupotreba kompjutera - potreba Jugoslovenska revija za kriminologiju i krivično pravo, article
krivičnopravne regulative pp. 29, št. 4 (1991), str.131-146
Myers, L. & ... Preparing for high technology crime: An educational 2002 Journal of Criminal Justice Education, pp. - article URL
assessment of criminal justice and criminology academic
programs
Nasheri, H. & ... Crime and technology: New rules in a new world* 1998 Information and Communications , pp. - article URL
Nasuti, F. Investigating computer crime 1986 Journal of Accounting and EDP, pp. - article
Nawrocki, J. There are too many loopholes" current computer crime 1987 Data Management, pp. - article
laws require clearer definition
Nelson, B. Strain ing the Capacity of the Law: The Idea of Computer 1991 Computer LJ, pp. - article
Crime in the Age of the Computer Worm
Nelson, B., Phillips, A. & ... Guide to computer forensics and investigations 2010 , pp. - book
Nemerofsky, J. The Crime of" Interruption of Computer Services to 2000 Rich. JL & Tech., pp. - article URL
Authorized Users" Have You Ever Heard of It?
Newman, G. & Clarke, R. Superhighway Robbery: Preventing e-commerce crime 2003 , pp. - book
Nigri, D.F. Investigating computer crime in the UK 1992 Computer Law & Security Report, pp. - article URL
Nolan, J. FBI Agent Accountants Intensify'Campaign Against 1974 Journal of Accountancy, pp. - article URL
White Collar'Crime
Nycum, S. & ... Prosecutorial experience with state computer crime laws 1990 , pp. - book
in the United States
Nycum, S. & ... Prosecutorial Experience with State Computer Crime 1985 Gaston, Snow, & Ely Bartlett, Palo Alto, California, and , article
Laws pp. -
Nycum, S., University, R. & ... CRIMINAL LAW ASPECTS OF COMPUTER ABUSE- 1976 Rutgers Journal of , pp. - article URL
PART 1-STATE PENAL LAWS
Nykodym, N., Kahle†Piasecki, The managers guide to understanding, detecting, and 2010 Performance , pp. - article URL
L. & ... thwarting computer crime: An international performance
issue
Nykodym, N., Taylor, R. & ... Criminal profiling and insider cyber crime 2005 Digital Investigation, pp. - article URL
O'Donoghue, J. Strategies found to be effective in the control of computer 1987 ACM SIGSAC Review, pp. - article URL
crime in the Forbes 500 Corporations
Ognibene, R. & ... Computers and the schools: Unused and misused 1990 Action in Teacher Education, pp. - article URL
Olivenbaum, J. : Rethinking Federal Computer Crime Legislation 1996 Seton Hall L. Rev., pp. - article URL
Onwubiko, C. & ... Managing security threats and vulnerabilities for small to 2007 Intelligence and Security , pp. - article URL
medium enterprises
Overill, R. Trends in Computer Crime 1998 Journal of Financial Crime, pp. - article URL
Overill, R. Computer crime-an historical survey 1997 Defence Systems International, pp. - article
Park, Y., Moon, S., Kim, S., Kang, S. A study on prevention scheme for communication network 1994 Journal of Data Communication , pp. - article
& ... from computer crime
Parker, D. The dark side of computing: SRI International and the 2007 Annals of the History of Computing, IEEE, pp. - article URL
study of computer crime
Parker, D. Fighting computer crime: A new framework for protecting 1998 , pp. - book
information
Parker, D. Consequential loss from computer crime 1989 Security and Protection in Information Systems, , pp. - article
Parker, D. Computer Crime: Criminal Justice Resource Manual . 1989 , pp. - book URL
Parker, D. Ethics for Information Systems Personnel 1988 INFORMATION SYSTEM MANAGEMENT, pp. - article URL
Parker, D. How Much Computer Abuse is There? 1983 EDPACS: The EDP Audit, Control, and Security , pp. - article URL
Parker, D. Chapter 43: Public Key Cryptosystems 1983 Fighting Computer Crime, Charles Scribner's Sons, , pp. - article
Parker, D. & ... Computer crime 1984 Communications of the ACM, pp. - article
Parker, D., Nycum, S. & ... Computer abuse 1973 No.: SR12501, pp. - article URL
Parker, R. Computer-related crime: ethical considerations 1990 ACM SIGSAC Review, pp. - article URL
Parsons, M. Protecting children on the electronic frontier : a law 2000 FBI law enforcement bulletin article
enforcement challenge Vol. 69(10), pp. str. 22-26
Parsons, M. Crime prevention and the electronic frontier 1998 FBI Law Enforcement Bulletin, pp. - article URL
Patel, A. & ... The impact of forensic computing on telecommunications 2000 Communications Magazine, IEEE, pp. - article URL
Pawar, M. & ... Computer crime in Bombay: Efforts to alter this problem 1994 International Journal of Offender Therapy , pp. - article URL
Peng, N. On Electronic Evidence in Computer Crime 2004 Hebei Law Science, pp. - article
Perry, R. Computer Crime. New York: Franklin Watts 1986 , pp. - book
Perry, T. & ... Can computer crime be stopped?. 1984 IEEE Spectrum, pp. - article URL
Peters, S. CSI Computer Crime and Security Survey 2009 Computer Security Institute (December 2009), pp. - article
Petersen, J.P. Forensic examination of log files : [master] thesis 2005 , pp. 60 f., 5 f. pril.- other URL
Petrović, S. Neki aspekti nacionalne bezbednosti u informacionom 2001 Nauka, tehnika, bezbednost, pp. - article URL
dobu
Pfitzmann, A., Pfitzmann, B., Trusting mobile user devices and security modules 1997 Computer, pp. - article URL
Schunter, M. & ...
Philippsohn, S. An overview of electronic crime in the 21st century 2000 Intersec article
Vol. 10(4), pp. str. 114-116
Phillips, P., Martin, A., Wilson, C. & An introduction evaluating biometric systems 2000 Computer, pp. - article URL
...
Pilant, L. Fighting crime in cyberspace 1997 The Police Chief, pp. - article URL
Podgor, E. Cybercrime: National, Transnational, or International 2004 Wayne L. Rev., pp. - article URL
Podgor, E. Computer crimes and the USA patriot act 2002 Crim. Just., pp. - article URL
Podgor, E. International computer fraud: A paradigm for limiting 2001 UC Davis L. Rev., pp. - article URL
national jurisdiction
Police, R. Computer crime, can it affect you? 2000 Retrieved November, pp. - article
Police, V. & ... Computer Crime and Security Survey 1999 Victoria Police Computer Crime Squad and Deloitte , pp. - article
Politi, A. European Security: the new transnational risks 1997 , pp. - book
Pollak, R. Implications of international terrorism on security of 1983 Proceedings of IEEE INFOCOM, pp. - article
information systems
Pollet, J. Developing a solid SCADA security strategy 2002 Sensors for Industry Conference, 2002. 2nd ISA/IEEE, pp. article URL
-
Pollitt, M. An ad hoc review of digital forensic models 2007 Approaches to Digital Forensic Engineering, 2007 , pp. - article URL
Pollitt, M. Cyberterrorism--fact or fancy? 1998 Computer Fraud & Security, pp. - article URL
Post, D. Governing Cyberspace 1996 Wayne L. Rev., pp. - article URL
Post, J. The dangerous information system insider: Psychological 1996 Available HTTP: Hostname: infowar. com, pp. - article
perspectives
Poulsen, K. Hacker penetrates T-Mobile systems 2005 Security Focus. http://www. securityfocus. com/news/ , article
pp. -
Power, R. 2002 CSI/FBI computer crime and security survey 2002 , pp. - book
Power, R. Computer security issues & trends 2002 CSI/FBI Computer Crime and Society Survey, CSI, pp. - article
Power, R. CSI/FBI computer crime and security survey 2001 Computer Security Journal, pp. - article
Power, R. 2000 CSI/FBI computer crime and security survey 2000 COMPUT SECUR J, pp. - article
Power, R. CSI/FBI Computer Crime and Security Survey, 1999 1999 Computer Security Issues & Trends, pp. - article URL
Power, R. 1998 CSI/FBI Computer Crime and Security Survey 1998 COMPUTER SECURITY JOURNAL, pp. - article
Power, R. CSI/FBI Computer Crime and Security Survey, 1997 1997 Computer Security Issues and Trends, pp. - article URL
Power, R. 2002 CSI/FBI Computer Crime and Security Survey 1996 Computer Securlly: Issues and Treno fi: i (Spring , pp. - article
Power, R. Current and Future Danger: A CSI Primer on Computer 1996 , pp. - book
Crime & Information Warfare
Power, R. Current and future danger: A CSI primer on computer 1995 , pp. - book
crime & information warfare
Powers, R. Computer Security Issues & Trends: 2002 CSI/FBI 2002 Computer Security Institute. Available on-line at: http:// , article
Computer Crime and Security Survey pp. -
Prew, M. Minimizing the impact of Computer Crime on Your 1984 Wigham Poland (Corporation of Lloyds), pp. - article
Earnings
Prichard, J. & ... Cyber terrorism: A study of the extent of coverage in 2004 Journal of Information Technology Education, pp. - article
computer Security Textbooks
Procise, C. & ... Incident response: investigating computer crime 2001 Berkley (CA): McGraw Hill Osborne Media, pp. - article
PROP., C.C. &.I. & ... Prosecuting Intellectual Property Crimes 2001 , pp. - book
Prosise, C. & ... Incident response: computer forensics 2003 Recherche, pp. - article URL
Purdy, S. Computer Crime Investigations 1988 Draft monograph. Federal Computer Investigations , pp. - article
Quarantiello, L. Cyber crime: How to protect yourself from computer 1997 No.: ISBN 0-936653-74-4, pp. - article URL
criminals
Quinn, K. Second annual New Zealand computer crime and security 2006 , pp. - book URL
survey
Quirk, P. & Forder, J. Electronic commerce & the law 2003 , pp. - book
Rahanu, H. Teaching professional and ethical aspects of computing: a 1999 ACM SIGCAS Computers and Society, pp. - article URL
case study approach
Ransbotham, S. & ... Choice and chance: A conceptual model of paths to 2009 Information Systems Research, pp. - article URL
information security compromise
Rapalus, P. Issues and Trends: 1998 CSI/FBI Computer Crime and 1998 , pp. - book
Security Survey
Raskin, X. & ... Computer crimes 1995 Am. Crim. L. Rev., pp. - article URL
Reed, C. & ... Computer law 2003 Recherche, pp. - article URL
Reid, L. Expert opinion: Interview with Amanda M. Hubbard, JD, 2006 Journal of Information Privacy and Security, pp. - article
Fulbright Scholar, former trial attorney, Computer Crime
and Intellectual Property Section, US
Reith, M., Carr, C. & ... An examination of digital forensic models 2002 International Journal of Digital , pp. - article
Richards, T. A computer fraud survey 1984 ACM SIGSAC Review, pp. - article URL
Richardson, R. CSI Survey 2007: The 12th Annual Computer Crime and Computer Security Institute, pp. - article
Security Survey. 2007
Richardson, R. 15th annual 2010/2011 computer crime and security 2011 , pp. - book
survey
Richardson, R. 14th Annual CSI computer crime and security survey. 2009 CSI Computer Crime and Security SurveyComputer, pp. - article
Executive summary
RICHARDSON, R. CSI/FBI Computer Crime and Security Survey 2008 , pp. - book
(Documento en LÄ‚Ânea)
Richardson, R. csi computer crime & security survey, 2008. i. cmpnet. 2008 CSIsurvey2008. pdf, pp. - article
com/v2. gocsi. com/pdf
Richardson, R. CSI computer crime and security survey 2008 Computer Security Institute, pp. - article
Richardson, R. 12th Annual CSI Computer Crime and Security Survey 2007 Computer Security Institute, pp. - article
Richardson, R. CSI/FBI Computer Crime Survey 2007 Twelfth Annual Computer Crime and Security, pp. - article
Richardson, R. CSI Computer Crime and Security Survey, GoCSI. com 2007 Last accessed July, pp. - article
Richardson, R. The 12th annual computer crime and security survey 2007 , pp. - book
Richardson, R. CSI computer crime and security survey, CSI Survey 2007 2007 , pp. - book
Richardson, R. Eighth annual CSI/FBI computer crime and security 2003 Computer Security Institute, pp. - article
survey
Richardson, R. 8th Annual Computer Security Institute (CSI) and Federal 2003 , pp. - book
Bureau of Investigation (FBI) Computer Crime and
Security Survey
Richardson, R. CSI 2003 FBI Computer crime and security survey, pp. - article
Richardson, R. Eighth Annual CSI/FBI Computer Crime and Security 2003 Comput. Security Inst./Federal Bureau of Investigation, , article
Survey. 2003 pp. -
Richardson, R. Issues and Trends: 2003 CSI/FBI Computer Crime and 2003 , pp. - book
Security Survey
Richardson, R. CSI/FBI 2003 computer crime survey 2003 Retrieved June, pp. - article
Richardson, R. CSI/FBI Computer Crime and Security Survey [R/OL] 2003 , pp. - book
Richardson, R. Computer Crime Bleeds US Corporations, Survey Shows; 2002 on-line]. Available from the Internet: URL Http://www. , article
Financial losses from attacks pp. -
Richardson, R. & ... CSI &FBI CSI Computer Crime & Security Survey 2008 , pp. - book
Richtel, M. Study finds rise in computer crime 1998 The New York Times, pp. - article URL
Roache, J. Computer Crime Deterrence 1985 Am. J. Crim. L., pp. - article URL
Roberson, R. CSI/FBI Computer Crime Survey 2003 Computer Security Institute, pp. - article
Roche, E. Internet and Computer Related Crime: Economic and 2006 Miss. LJ, pp. - article URL
Other Harms to Organizational Entities
Roche, E. & ... Information Systems, Computer Crime and Criminal 2004 , pp. - book
Justice
Rogers, M. A two-dimensional circumplex approach to the 2006 digital investigation, pp. - article URL
development of a hacker taxonomy
Rogers, M. The role of criminal profiling in the computer forensics 2003 Computers & Security, pp. - article URL
process
Rogers, M. A social learning theory and moral disengagement 2001 , pp. - book
analysis of criminal computer behavior: An exploratory
study
Rogers, M. Organized computer crime and more sophisticated 1999 Telematic Journal of Clinical Criminology, pp. - article
security controls: which came first the chicken or the egg?
Rogers, M. & ... The future of computer forensics: a needs analysis survey 2004 Computers & Security, pp. - article URL
Rogers, M., Goldman, J., Mislan, R. Computer forensics field triage process model 2006 Proceeding of the , pp. - article
& ...
Rogers, M., Robin, M., Moral, H. & Modern-day Robin Hood or Moral Disengagement: 1999 , pp. - book URL
... understanding the justification for criminal computer
activity
Rogers, M., Seigfried, K. & ... Self-reported computer criminal behavior: A 2006 digital investigation, pp. - article URL
psychological analysis
Rogers, M., Smoak, N. & ... Self-reported deviant computer behavior: A big-5, moral 2006 Deviant behavior, pp. - article URL
choice, and manipulative exploitive behavior analysis
Rosenblatt, K. High-Technology Crime: Investigating Cases Involving 1995 No.: ISBN 0-9648171-0-1, pp. - article URL
Computers
Rosenblatt, K. Deterring computer crime 1990 Technology Review, pp. - article URL
Rosoff, S., Pontell, H. & ... Profit without honor: White-collar crime and the looting 1998 , pp. - book
of America
Ross, S., Jr, R.C., Parker, D. & ... Computer Security Issues-A Roundtable 1985 Computer Security , pp. - article URL
Rossi, S. Aust tops computer crime stats 2002 Computerworld, pp. - article
Roush, W. Hackers taking a byte out of computer crime 1994 Technology Review, pp. - article
Rushinek, A. & ... Using experts for detecting and litigating computer crime 1993 Managerial Auditing Journal, pp. - article URL
Ružić, I. Izbira osnovnega nabora metod za izvajanje programske 2007 , pp. 76 str.- book
računalniške forenzike : magistrska naloga
Ružić, I., Marijanović, D. & Selection of the base set of methods for computer forensic SoftCOM 2009, pp. Str. 1-7 article
Ciglarič, M.
Saari, J. Computer crime--numbers lie 1987 Computers & Security, pp. - article URL
Sanderson, E. & ... Information security in business environments 1996 Information Management & , pp. - article URL
Sarzana, C. CriminalitÄ‚ e tecnologia: il caso del computer crime 1979 Rassegna Penitenziaria e CriminologÄ‚Âa, pp. - article
Schaffer, G. Worms and viruses and botnets, oh my! Rational 2006 Security & Privacy, IEEE, pp. - article URL
responses to emerging Internet threats
Schjolberg, S. Computer-related offences 2004 Council of Europe Octopus Interface, pp. - article
Schjølberg, S., International, S. & Computers and penal legislation: A study of the legal 1983 , pp. - book
... politics of a new technology
Schmalleger, F. Criminal Justice Today: An Introductory Text for the 21st 1995 No.: ISBN 0-13-302985-9, pp. - article URL
Century
Schmidt, H. The changing face of computer crime 1998 The Police chief article
Vol. 65(5), pp. str. 38-45
Scholberg, S. & ... Computer Crime 1983 Encyclopedia of Crime and Justice, pp. - article
Schonlau, M. & ... Detecting masquerades in intrusion detection based on 2000 Information Processing Letters, pp. - article URL
unpopular commands
Schonlau, M., DuMouchel, W., Ju, Computer intrusion: Detecting masquerades 2001 Statistical Science, pp. - article URL
W., Karr, A. & ...
Schrager, B. Outwitting 2-bit Thieves and Arresting Computer Crime 1982 Data Communications, pp. - article
Schuck, P. Electronic funds transfer: A technology in search of a 1975 Md. L. Rev., pp. - article URL
market
Schultz, E. Security views 2003 Computers & Security, pp. - article URL
Schultz, E. A framework for understanding and predicting insider 2002 Computers & Security, pp. - article URL
attacks
Schultz, E. & ... Incident response: a strategic guide to handling system 2001 , pp. - book
and network security breaches
Schweitzer, D. & ... Incident response: computer forensics toolkit 2003 , pp. - book
Schweitzer, J. Computer crime and business information: a practical 1986 , pp. - book
guide for managers
Scientist, N. Computer Crime a Growing Threat, Warns FBI 2008 , pp. - book
Scott, A. Computer and intellectual property crime: federal and 2001 , pp. - book
state law
Scottberg, B., Yurcik, W. & ... Internet honeypots: Protection or entrapment? 2002 Technology and Society, 2002 , pp. - article URL
Selinšek, L. Odprta pravna vprašanja v zvezi z dokazovanjem s Problemi dokazovanja v zahtevnih kazenskih postopkih, article
postopki digitalne forenzike pp. Str. 139-149
Selinšek, L. Preiskovanje zaščitenih elektronskih podatkov - britanski Zbornik povzetkov, pp. Str. 69- other
pristop
Selinšek, L. Electronic evidence in the Slovene criminal procedure act 2010 Digital evidence and electronic signature law review(7), article
pp. str. 77-81
Selinšek, L. Computer forensics in criminal procedure : (needed new 2008 Zbornik Pravne fakultete Univerze v Mariboru article
approaches in Slovenia) Vol. 4(1), pp. str. 237-248
Selinšek, L. NÄ›kterĂ© právnĂ aspekty forenznĂ analĂ˝zy 2008 Acta Universitatis Carolinae(4), pp. str. 131-140 article
digitálnĂch dat
Selinšek, L. Legal collecting of digital evidence 2007 Zbornik Pravne fakultete Univerze v Mariboru(3), pp. str. article
217-230
Selinšek, L. & Malovrh, M. Digitalni dokaz - med pravom in tehniko Nekateri praktični problemi dokazovanja v kazenskih incollection
postopkih, pp. Str. 57-78
Selinšek, L. & Oparnica, G. Legal aspects of digital forensics in public and private 2010 , pp. - unpublished
sector : predavanje na konferenci Euroforensics - Forensic
Sciences, 26.-28.3.2010, Istanbul
Senjo, S. An analysis of computer-related crime: comparing police 2004 Security Journal, pp. - article URL
officer perceptions with empirical data
Serra, C. & Strano, M. Nuove frontiere della criminalita : la criminalita 1997 , pp. VII, 145 str.- book
tecnologica
Seymour, T., Seifert, C., Shafto, M. Using response time measures to assess" guilty 2000 Journal of Applied , pp. - article URL
& ... knowledge".
Sh, M., D'Amico, E., Tomlinson, K. Teenagers self-reported motivations for participating in 2002 8th International Conference on , pp. - article
& ... computer crime
Shackelford, S. Computer-related crime: an international problem in need 1992 Tex. Int'l LJ, pp. - article URL
of an international solution
Shaw, E., Ruby, K. & ... The Insider Threat to Information Systems1 1998 , pp. - book
Sherizan, S. The globalization of computer crime and information 1992 Computer Security Journal, pp. - article URL
security
Sherizen, S. Can computer crime be deterred 1995 Computers and Security, pp. - article URL
Sherizen, S. Criminological concepts and research findings relevant for 1990 Computers & Security, pp. - article URL
improving computer crime control
Sherizen, S. Federal Computers and Telecommunications: Security and 1985 , pp. - book
Reliability Considerations and Computer Crime
Legislative Options
Shinder, D. & ... Scene of the cybercrime: Computer forensics handbook 2002 , pp. - book
Sieber, U. Computer Crime and Criminal Information Law-New 1996 Statement for the Hearing on Security in Cyberspace of , article
Trends in the International Risk and Information Society pp. -
Sieber, U. Information technology crime: national legislations and 1994 , pp. - book
international initiatives
Sieber, U. General Report on 'Computer Crime': the emergence of 1990 13th International Congress of International Academy , article
criminal information law pp. -
Sieber, U. The international handbook on computer crime: computer- 1986 , pp. - book
related economic crime and the infringements of privacy
Silverglate, H. Computer Crime in Massachusetts: How Best to Meet the 1994 BBJ, pp. - article
Future?
Sim, S. Effective countermeasures against economic crime and 2000 Resource material series, pp. - article
computer crime
Simkin, M. Computer Crime: Lessons and Direction 1981 CPA Journal, pp. - article
Sinangin, D. Computer forensics investigations in a corporate 2002 Computer Fraud & Security, pp. - article URL
environment
Sinrod, E. & ... Cyber-crimes: A practical approach to the application of 2012 Santa Clara Computer & High , pp. - article
federal computer crime laws
Sinrod, E. & ... Cyber-Crimes: A Practical Approach to the Application of 2000 Santa Clara Computer and High Technology Law , pp. - article
Federal Computer Crime Laws, Ą(2000) 16
Sinrod, E. & ... Cyber-Crimes: A Practical Approach to the Application of 2000 Santa Clara Computer & High Tech. LJ, pp. - article URL
Federal Computer Crime Laws
Sinrod, E. & ... Hacking your way to hard time: application of computer 2000 Journal of Internet Laws, pp. - article
crime laws to specific types of hacking attacks
Skaggs, B., Blackburn, B., Manes, G. Network vulnerability analysis 2002 Circuits and Systems, , pp. - article URL
& ...
Skibell, R. Cybercrime & (and) Misdemeanors: A Reevaluation of 2003 Berkeley Tech. LJ, pp. - article URL
the Computer Fraud and Abuse Act
Skibell, R. The myth of the computer hacker 2002 Information, Communication & Society, pp. - article URL
Skinner, W. & ... A social learning theory analysis of computer crime 1997 Journal of Research in Crime and , pp. - article URL
among college students
SKORODUMOVA, O. Hackers as information space phenomenon 2004 Social Sciences, pp. - article
Smaha, S. Haystack: An intrusion detection system 1988 Aerospace Computer Security Applications , pp. - article URL
Smith, A. & ... Issues in cybersecurity; understanding the potential risks 2002 Information management & computer , pp. - article URL
associated with hackers/crackers
Smith, D. Who is Calling Your Computer Next--Hacker 1985 Crim. Just. J., pp. - article URL
Smith, G. An Electronic Pearl Harbor? Not Likely 1998 Issues in Science and Technology, pp. - article URL
Smith, R. Identity-related economic crime: Risks and 1998 Victoria, pp. - article
countermeasures
Smith, R. & ... Organisations as Victims of Fraud and how They Deal 1999 , pp. - book
with it
Sokolik, S. Computer Crime-The Need for Deterrent Legislation 1980 Computer LJ, pp. - article
Solarz, A. Computer-related embezzlement 1987 Computers & Security, pp. - article URL
Solarz, A. & ... Computer Technology and Computer Crime:(aetiological 1981 , pp. - book
and Phenomenological Aspects)
Solomon, M.G., Barrett, D. & Computer forensics jumpstart : [computer forensics 2005 , pp. XVII, 283 str.- book URL
Broom, N. basics]
Soma, J., Banker, E. & ... Computer Crime: Substantive Statutes & (and) Technical 1995 AFL Rev., pp. - article URL
& (and) Legal Search Considerations
Soma, J., Jr, T.M. & ... Transnational extradition for computer crimes: Are new 1997 Harv. J. on Legis., pp. - article URL
treaties and laws needed
Somers, L. Economic Crimes: Investigative Principles and 1984 New York: Clark Boardman Co, pp. - article URL
Techniques
Sommer, P. The future for the policing of cybercrime 2004 Computer Fraud & Security, pp. - article URL
Sommer, P. Intrusion detection systems as evidence 1999 Computer Networks, pp. - article URL
Sommer, P. Digital footprints: Assessing computer evidence 1998 Criminal Law Review, pp. - article
Sr, W.S. Redefining National Security in Today's World of 1998 Duke J. Comp. & Int'l L., pp. - article URL
Information Technology and Emergment Threats
Stallard, T. & ... Automated analysis for digital forensic science: Semantic 2003 Computer Security Applications , pp. - article URL
integrity checking
Stambaugh, H. & ... Electronic crime needs assessment for state and local law 2001 , pp. - book
enforcement
Stambaugh, H. & ... State and local law enforcement needs to combat 2000 , pp. - book
electronic crime
Stanley, P. A methodology for the investigation of computer crime 1992 Proceedings of the IFIP TC11, Eigth International , pp. - article
Stanley, P. Educating computer crime investigators 1986 Computers & Security, pp. - article
Stanley, P. Computer crime investigation and investigators 1986 Computers & Security, pp. - article URL
Stanley, P. Computer Crime Investigation-The Lessons Learned from 1986 IFIP/SEC'86, pp. - article
Experience
Statistics, U.S.B. o.J. & ... Computer Crime: Computer Security Techniques 1982 , pp. - book
Steffensmeier, D. Organization properties and sex-segregation in the 1983 Social Forces, pp. - article URL
underworld: Building a sociological theory of sex
differences in crime
Steinhauer, J. Verdict in MySpace suicide case 2008 The New York Times, pp. - article
Stevenson, G. Computer Fraud: Detection and Prevention 2000 Computer Fraud & Security, pp. - article URL
Stewart, H. & ... One-at-a-time versus grouped presentation of mug book 2001 Journal of applied psychology, pp. - article URL
pictures: Some surprising results.
Strano, M. Computer crime: manuale di criminologia informatica 2000 Edizioni Apogeo, Milano, pp. - article
Straub, D. Validating instruments in MIS research 1989 MIS quarterly, pp. - article URL
Straub, D. & ... Coping with systems risk: security planning models for 1998 Mis Quarterly, pp. - article URL
management decision making
Straub, D. & ... Effective IS security 1990 Information Systems Research, pp. - article
Sukhai, N. Hacking and cybercrime 2004 Proceedings of the 1st annual conference on , pp. - article URL
Sullivan, P. Australian attitudes towards computer crime 1995 , pp. - book URL
Sussmann, M. Critical Challenges from International High-Tech and 1998 Duke J. Comp. & Int'l L., pp. - article URL
Computer-Related Crime at the Millenium, The
Swanson, C. & ... Computer Crime-Dimensions, Types, Causes, and 1980 Journal of Police Science and Administration, pp. - article URL
Investigation
Swanson, C.R., Chamelin, N.C. & Criminal investigation 1996 , pp. X, 801 str.- book
Territo, L.
Swartz, H. Taking the bite out of computer crime 1982 Business Computer Systems, pp. - article
Sykes, J. Computer Crime: A Spanner in the Works 1992 Management Accounting, pp. - article
Taber, J. A Survey of Computer Crime Studies"(1980) 1980 Computer LJ, pp. - article
Taber, J. A survey of computer crime studies 1980 Computer/Law Journal, pp. - article
Taber, J. On Computer Crime (Senate Bill S. 240) 1979 Computer LJ, pp. - article
Tan, K. Prosecuting foreign-based computer crime: international 2000 Symposium on Rule of Law in the Global Village, , pp. - article
law and technology collide
Tan, K. The application of neural networks to UNIX computer 1995 1995. Proceedings., IEEE International Conference on, article URL
security pp. -
Tan, K. & ... Detection and classification of TCP/IP network services 1997 Computer Security Applications , pp. - article URL
Tapper, C. Computer law 1989 , pp. - book
Tapper, C. Computer Crime": Scotch Mist?',(1987) 1987 Criminal Law Review, pp. - article
Tapper, C. Computer Crime": Scotch Mist? 1987 Crim L Rev, pp. - article
Tassel, D.V. Computer crime 1970 Proceedings of the November 17-19, 1970, fall joint , pp. article URL
-
Tavani, H. The uniqueness debate in computer ethics: What exactly is 2002 Ethics and Information Technology, pp. - article URL
at issue, and why does it matter?
Tavani, H. Defining the boundaries of computer crime: piracy, break- 2000 ACM SIGCAS Computers and Society, pp. - article URL
ins, and sabotage in cyberspace
Tavani, H. A computer ethics bibliography 1995 ACM SIGCAS Computers and Society, pp. - article
Taylor, R. & ... Computer crime 2003 Criminal Investigation, pp. - article
Taylor, R., Caeti, T., Loper, D., Digital crime and digital terrorism 2006 , pp. - book
Fritsch, E. & ...
Teer, F., Kruck, S. & ... EMPIRACAL STUDY OF STUDENTS'COMPUTER 2007 Journal of Computer Information , pp. - article
SECURITY-PRACTICES/PERCEPTIONS
Telem, M. Computer crimes in schools 1984 Programmed Learning and Educational Technology, pp. - article URL
Tenhunen, M. Updating computer crime and information security 1994 Kriminalistik und forensische Wissenscqften, , pp. - article
strategies
Thackeray, G. Computer-Related Crimes-An Outline 1984 Jurimetrics J., pp. - article URL
Theoharidou, M., Kokolakis, S., The insider threat to information systems and the 2005 Computers & , pp. - article URL
Karyda, M. & ... effectiveness of ISO17799
Thomas, D. Criminality on the electronic frontier: corporality and the 1998 Information Communication & Society, pp. - article URL
judicial construction of the hacker
Thomas, D. & ... Legal methods of using computer forensics techniques for 2004 Retrieved September, pp. - article
computer crime analysis and investigation
Thomas, T. Al Qaeda and the Internet: The Danger of'Cyberplanning' 2003 , pp. - book URL
Thompson, D. 1997 computer crime and security survey 1998 Information management & computer security, pp. - article URL
Thompson, R. Chasing after  ›petty Ą computer crime 1999 Potentials, IEEE, pp. - article URL
Thornhill, W. Risk management for financial institutions: applying cost- 1990 , pp. - book
effective controls and procedures
Tohmatsu, D. & ... Computer Crime & Security Survey 1999 Victoria Police Computer Crime Squad and Deloitte , pp. - article
Tohmatsu, D. & ... Computer Crime & Security Survey–1999 1999 , pp. - book
Tompkins Joseph B Jr," An Analysis of the 1984 Federal Computer Law/Technology, pp. - article
Crime Provisions,"[1985]
Toren, P. Internet: A Safe Haven for Anonymous Information 1995 . John's J. Legal Comment., pp. - article URL
Thieves
Trdina, R. Preiskovanje kaznivih dejanj s področja otroške 2009 , pp. VII, 72 f.- book
pornografije : diplomsko delo
Tribbensee, N. Privacy and security in higher education computing 2003 Journal of College and University , pp. - article
environments after the USA PATRIOT Act
Trites, G. Director responsibility for IT governance 2004 International Journal of Accounting Information , pp. - article URL
Troutner, J. Computer Literacy: Teaching Computer Ethics. 1986 Journal of Computers in Mathematics and Science , pp. - article URL
Trček, D., Abie, H., Skomedal, A. & Advanced framework for digital forensic technologies and 2010 Journal of forensic sciences article URL
Starc, I. procedures Vol. 55(6), pp. str. 1471-1480
Tully, E. The Near Future: Implications for Law Enforcement 1986 FBI Law Enforcement Bulletin, pp. - article URL
Tunick, D. People v. Versaggi: A Conviction for a Computer Crime 1997 CRIMINAL LAW BULLETIN- , pp. - article
That was not Committed
Tunick, D. Computer Law: An Overview 1979 Loy. LAL Rev., pp. - article URL
Turnbull, L., Hendrix, E. & ... Atlas of crime: mapping the criminal landscape 2000 No.: ISBN 1-57356-241-6, pp. - article URL
Umphress, D. & ... Identity verification through keyboard characteristics 1985 International journal of man-machine studies, pp. - article URL
Urbas, G. & ... Computer Crime Legislation in Australia' 2004 Internet Law Bulletin (, pp. - article
Urek, R. Računalniška forenzika v predkazenskem postopku : 2012 , pp. 56 str.- book URL
diplomsko delo visokošolskega strokovnega študija
Varnost in notranje zadeve
Vacca, J. Computer forensics: computer crime scene investigation 2005 , pp. - book
Vacca, J. Computer Forensics: Computer Crime Scene Investigation 2005 Inc., Rockland, MA, pp. - article
(Networking Series)(Networking Series), Charles River
Media
Vacca, J. Digital forensics–Computer Crime Scene 2002 Charles River Media, pp. - article
Investigation
Valeriano, G. Pitfalls In Insurance Coverage for Computer Crimes 1992 Def. Counsel J., pp. - article URL
Vasiu, L. & ... Dissecting computer fraud: from definitional issues to a 2004 System Sciences, 2004. Proceedings of the , pp. - article URL
taxonomy
Vaughn, R. & ... Integration of computer security into the software 1999 Journal of Systems and Software, pp. - article URL
engineering and computer science programs
Verduyn, B. FBI computer crime survey 2005 Retrieved April, pp. - article
Vidovič, S. Praktični vidiki ugotavljanja in dokazovanja komunikacij 2010 , pp. VI, 50 f.- book
po mobilnem telefonu in računalniku : diplomsko delo
Vidovič, S. Praktični vidiki ugotavljanja in dokazovanja komunikacij 2010 , pp. VI, 50 f.- book
po mobilnem telefonu in računalniku : diplomsko delo
VINCENT, F. & ... Correlates of computer misuse: Data from a self-reporting 1990 Behaviour & Information Technology, pp. - article URL
sample
Voiskounsky, A. Current problems of moral research and education in the 2004 Human perspectives in the Internet society: , pp. - article URL
IT environment
Voiskounsky, A. & ... Flow-based model of computer hackers' motivation 2003 CyberPsychology & , pp. - article URL
Volgyes, M. The investigation, prosecution, and prevention of 1980 Computer LJ, pp. - article
computer crime: A state-of-the-art review
Volokh, E. Crime Severity and Constitutional Line-Drawing 2004 bepress Legal Series, pp. - article URL
Volonino, L. & ... Principles and practice of information security 2003 , pp. - book
Volonino, L. & Anzaldua, R. Computer forensics for dummies 2008 , pp. 360 str.- book
Volonino, L., Anzaldua, R., Godwin, Computer forensics: principles and practices 2007 , pp. - book
J. & ...
Waal, P. Keeping Hackers at Bay 1986 Telecommunication Technology, pp. - article URL
Wagner, A. Challenge of Computer-Crime Legislation: How Should 1984 Buff. L. Rev., pp. - article URL
New York Respond, The
Wahlert, G. & ... Crime in cyberspace: Trends in computer crime in 1998 Platypus Magazine, pp. - article
Australia
Walden, I. Harmonising computer crime laws in Europe 2004 European Journal of Crime, Criminal Law and , pp. - article URL
Walden, I., Reed, C. & ... Computer crime 2003 Computer law, pp. - article
Walker, K. Federal criminal remedies for the theft of intellectual 1993 Hastings Comm. & Ent. LJ, pp. - article URL
property
Wall, D. 1 Cybercrimes and the Internet 2001 Crime and the Internet, pp. - article
Wall, D. Cybercrimes: New wine, no bottles 1999 Davies & Francis P. & Jupp V.(Eds), Invisible Crimes: , article
pp. -
Wan, H. & ... An analysis of Chinese laws against computer crimes 1997 Journal of Global Information Management (JGIM), pp. - article URL
Wang, D. & ... Application of Ant Colony Clustering in Computer 2009 and Computing Science, 2009. ICIC'09. , pp. - article URL
Forensics
Wang, S. Measures of retaining digital evidence to prosecute 2007 Computer Standards & Interfaces, pp. - article URL
computer-based cyber-crimes
Wang, Y., Cannady, J. & ... Foundations of computer forensics: A technology for the 2005 Computer Law & Security Review, pp. - article URL
fight against computer crime
Warkentin, M. & ... Behavioral and policy issues in information systems 2009 European Journal of Information Systems, pp. - article
security: the insider threat
Warren, M. Security practice: survey evidence from three countries 2002 Logistics information management, pp. - article URL
Wasik, M. Crime and the Computer 1991 No.: ISBN 0-19-825621-3, pp. - article URL
Watkins, P. Computer Crime: Separating the Myth from the Reality 1981 Chartered Accountant) Magazine, pp. - article
Webber, C. Computer Crime or Jay-Walking on the Electronic 1983 Crim. LQ, pp. - article URL
Highway
Webber, C. Computer Crime, or Jay-Walking on the Electronic 1983 Crim. LQ, pp. - article
Highway"(1983)
Webster, W. Technology Transfer, Industrial Espionage, and Computer 1985 Computer Security Journal, pp. - article URL
Crime: The FBI's Activities
Webster, W. Examination of FBI Theory and Methodology Regarding 1979 Am. Crim. L. Rev., pp. - article URL
White-Collar Crime Investigation and Prevention, An
Wei, H., Frinke, D., Carter, O. & ... Cost-benefit analysis for network intrusion detection 2001 , pp. - book URL
systems
Weiler, N. Honeypots for distributed denial-of-service attacks 2002 for Collaborative Enterprises, 2002. WET ICE 2002 , pp. article URL
-
Weisburd, D. & ... Crime mapping and crime prevention 1997 No.: ISBN 1-881798-08-9, pp. - article URL
Welch, T. Computer crime investigation and computer forensics 1997 Information Systems Security, pp. - article URL
Weller, H., Repman, J. & ... The relationship of learning, behavior, and cognitive style 1995 Computers in the Schools, pp. - article URL
in hypermedia-based instruction
Westland, C. A rational choice model of computer and network crime 1996 International Journal of Electronic Commerce, pp. - article URL
Wharton, L. Legislative Issues in Computer Crime 1984 Harv. J. on Legis., pp. - article URL
Whitman, M. In defense of the realm: understanding the threats to 2004 International Journal of Information Management, pp. - article URL
information security
Whitman, M. Enemy at the gate: threats to information security 2003 Communications of the ACM, pp. - article URL
Wible, B. A Site Where Hackers Are Welcome: Using Hacking 2003 The Yale Law Journal, pp. - article
Contests To Shape Preferences and Deter Computer
Crime
Wible, B. Site Where Hackers Are Welcome: Using Hack-in 2002 Yale LJ, pp. - article URL
Contests to Shape Preferences and Deter Computer Crime,
A
Wilding, E. Information risk and security: preventing and 2006 , pp. - book
investigating workplace computer crime
Wilding, E. Computer evidence : a forensic investigations handbook 1997 , pp. XI, 236 str.- book
Wilkinson, D., Harries, G., Thelwall, Motivations for academic Web site interlinking: Evidence 2003 Journal of Information , pp. - article URL
M. & ... for the Web as a novel source of information on informal
scholarly communication
Williams, K. Using Tittle's control balance theory to understand 2008 International Review of Law Computers & , pp. - article URL
computer crime and deviance
Williams, P. Organized Crime and Cybercrime: Synergies, Trends and 2001 Global Issues, pp. - article URL
Responses
Williams, W. The National Cybercrime Training Partnership 1999 Police Chief, pp. - article URL
Willison, R. Understanding the perpetration of employee computer 2006 Information and organization, pp. - article URL
crime in the organisational context
Willison, R. Understanding the offender/environment dynamic for 2006 Information Technology & People, pp. - article URL
computer crimes
Willison, R. Opportunities for computer abuse: assessing a crime 2002 , pp. - book
specific approach in the case of Barings Bank
Willison, R. & ... Motivations for Employee Computer Crime: 2009 IFIP TC 8 International Workshop on Information , pp. - article
Understanding and Addressing Workplace Disgruntlement
through the Application of Organisational Justice
Willison, R. & ... Overcoming the insider: reducing employee computer 2009 Communications of the ACM, pp. - article URL
crime through situational crime prevention
Willison, R. & ... Considering the offender: addressing the procedural stages 2005 , pp. - book
of computer crime in an organisational context
Willison, R. & Backhouse, J. Opportunities for computer crime: considering systems 2006 European journal of information , pp. - article URL
risk from a criminological perspective
Wilson, C. Holding management accountable: a new policy for 2000 and Electronics Conference, 2000. NAECON 2000. , pp. - article URL
protection against computer crime
Wilson, D. Viewing computer crime: Where does the systems error 1991 COMP. LAW J., pp. - article URL
really exist?.
Winchester, J. Computer-printed documents as part of a computer crime 1981 Journal of Forensic Sciences, pp. - article URL
investigation
Winkler, I. The changing face of computer crime 2005 The ISSA Journal, pp. - article
Wise, E. Criminal Law: Sex, Crime, and Cyberspace 1996 Wayne L. Rev., pp. - article URL
Wold, G. & ... Computer crime: techniques, prevention 1989 , pp. - book
Wold, G. & ... Computer Crime: Techniques for Preventing and 1989 Rolling Meadows, IL: Bankers Publishing Company, pp. - article
Detecting Crime in Financial Institutions
Wolf, J. War games meets the internet: Chasing 21st century 2000 Am. J. Crim. L., pp. - article URL
cybercriminals with old laws and little money
Wong, D. Computer Crime in the UK 1984 EDPACS: The EDP Audit, Control, and Security , pp. - article URL
Wong, K. Computer crime—risk management and computer 1985 Computers & Security, pp. - article URL
security
Woodhouse, S. Information security: end user behavior and corporate 2007 and Information Technology, 2007. CIT 2007. , pp. - article URL
culture
Wright, M. The need for information security education 1998 Computer Fraud & Security, pp. - article URL
Wright, T. The Field Guide For Investigating Computer Crime: 2000 Security Focus, May, pp. - article
Overview of a Methodology for the Application of
Computer Forensics Part II
Xiang, Y. & ... A defense system against DDoS attacks by large-scale IP 2005 and Applications, 2005. ICITA 2005. Third , pp. - article URL
traceback
Yang, C. & Ng, T. Terrorism and crime related weblog social network: Link, 2007 Intelligence and Security Informatics, 2007 , pp. - article URL
content analysis and information visualization
Yang, D. & ... Countering the Cyber-Crime Threat 2006 Am. Crim. L. Rev., pp. - article URL
Yar, M. Computer Hacking: Just Another Case of Juvenile 2005 The Howard Journal of Criminal Justice, pp. - article URL
Delinquency?
Yasinsac, A. & ... Policies to enhance computer and network forensics 2001 Proceedings of the 2001 IEEE Workshop on , pp. - article
Yasinsac, A., Erbacher, R., Marks, D. Computer forensics education 2003 Security & Privacy, , pp. - article URL
& ...
Yeager, R. Criminal computer forensics management 2006 Proceedings of the 3rd annual conference on , pp. - article URL
Yee, H. Juvenile Computer Crime-Hacking: Criminal and Civil 1984 Comm/Ent LJ, pp. - article URL
Liability
Young, L. United States computer crime laws, criminals and 1995 International Review of Law, Computers & Technology, article URL
deterrence pp. -
Young, R., Zhang, L. & ... Hacking into the minds of hackers 2007 Information Systems , pp. - article URL
Zajac, B. Legal Options to Computer Viruses Ą 1989 Computers & Security, pp. - article
Završnik, A. Towards an overregulated cyberspace : criminal law 2010 Masaryk University journal of law and technology article
perspective Vol. 4(2), pp. str. 173-190
Zelin, H. & ... On Bylaw Limitation in Criminal Law for Computer 2005 Jianghai Academic Journal (Bimonthly), pp. - article URL
Crimes and Its Theoretical Response [J]
Zhijun, L. & ... Developing a computer forensics program in police higher 2009 Science & Education, 2009. ICCSE'09. 4th , pp. - article URL
education
Zou, J., Lu, K. & ... Architecture and fuzzy adaptive security algorithm in 2002 MILCOM 2002. Proceedings, pp. - article URL
intelligent firewall
Zupančič, M. Računalniško piratstvo - oblike in pravnovarstveni vidiki 1998 Revija za kriminalistiko in kriminologijo article
Vol. 49(4), pp. str.334-345
Zupančič, M. Kriminaliteta v globalni komunikacijski mreži (internet) 1997 Revija za kriminalistiko in kriminologijo article
Vol. 48(2), pp. str.179-188
Zviran, M. & ... Password security: an empirical study 1999 Journal of Management Information Systems, pp. - article URL
, (Calif., N.C. f.C.C.D. & ... The Computer Crime Law Reporter 1994 , pp. - book
, Crime, A.B.A.P. &.C. & ... International guide to privacy 2004 , pp. - book URL
, Crime, U.S.D. o.J.C. & ... Searching and seizing computers and obtaining electronic 2001 , pp. - book
evidence in criminal investigations
Šavnik, J. Vloga sodnega izvedenca za računalniško forenziko v Digitalni dokazi, pp. Str. 75-87 article
kazenskih postopkih
Šavnik, J. Principi, metodologija in orodja računalniške forenzike s 2006 , pp. 101 f.- book
praktičnim primerom : specialistična naloga
Škufca, M. Goljufije na svetovnem spletu : diplomsko delo 2010 , pp. 47 str.- book URL
Digital forensics for network, Internet, and cloud 2010 , pp. XII, 353 str.- book
computing : a forensic evidence guide for moving targets
and data
Open source software for digital forensics 2010 , pp. VII, 124 str.- book URL
Law and the internet 2009 , pp. IL, 713 str.- book
Invisible crimes : their victims and their regulation 1999 , pp. 264 str.- book
Computers in society 1998 Annual editions series, pp. X, 245 str.- book
Crime, criminal justice and the Internet 1998 , pp. 91 str.- book
Journal of financial crime : the official journal of the 1995 J. financ. crime, pp. - other
Cambridge International Symposium on economic crime
Criminal and civil investigation handbook 1993 , pp. 1 zv. (loč. pag.)- book
GOR