Cover image for Cyber Criminals on Trial.
Cyber Criminals on Trial.
Title:
Cyber Criminals on Trial.
Author:
Smith, Russell G.
ISBN:
9780511210846
Personal Author:
Physical Description:
1 online resource (263 pages)
Contents:
Cover -- Half-Title -- Title -- Copyright -- Foreword -- Contents -- Figures and Tables -- Acknowledgments -- Preface -- Abbreviations -- Australia -- Canada -- Hong Kong -- New Zealand -- United Kingdom -- United States of America -- US Federal Courts -- Currency exchange rates -- CHAPTER ONE Introduction -- Structure and Plan -- Conclusion -- CHAPTER TWO Defining and Measuring Cyber Crime -- Cyber Crime Not Cybercrime -- A Classification of Cyber Crime -- Causal Connection -- Cyber Crime and Economic Crime -- Cyber Crime and White Collar Crime -- Cyber Crime and Corporate Crime -- Cyber Crime and Electronic Commerce -- Cyber Crime and Intellectual Property Infringement -- Cross-Border Cyber Crime -- Cyber Crime and Civil Wrongs -- Surveying Cyber Crime -- Organisational Victimisation Surveys -- Intellectual Property Loss Surveys -- Consumer Victimisation Surveys -- Administrative Data on Criminal Justice Procedures -- United States -- Canada -- United Kingdom -- Australia -- Impediments to Prosecution and Punishment -- Conclusion -- CHAPTER THREE The Prosecutor as Gatekeeper -- Prosecuting Cyber Crime -- Deciding whether to prosecute -- Civil Remedies or Criminal Prosecution -- Patterns and Trends in Prosecution -- Prosecutorial Priorities -- Determining the Identity of the Offender -- Framing the Charge -- Prosecuting Juveniles -- Conclusions -- Cyber crime vs conventional crime -- Cross-national comparisons -- CHAPTER FOUR Cross-Border Issues -- Introduction -- Jurisdiction -- Where was the Crime? -- Foreign Prosecution -- Practicalities -- Conclusions -- CHAPTER FIVE Strategies of Cyber Crime Litigation -- Introduction -- Determining the Identity of the Offender -- Challenging the Admissibility of the Evidence -- Managing Large Volumes of Evidence -- Managing Encrypted Evidence -- Lack of Criminal Intent -- Possession -- Control -- Knowledge.

Challenging Private Involvement in Criminal Investigation -- Imaginative Defences -- Accident -- Legitimate Research -- Fantasy -- Addiction -- Therapy -- 'Higher Purpose' -- Covert Facilitation and Entrapment -- Challenges to the Integrity of Evidence -- Struggles over Discovery -- Standard Forensic Procedures -- Errors in computer program -- Conclusion -- Cyber crime versus terrestrial crime -- The United States versus common law countries -- CHAPTER SIX The Quest for Harmonisation of Cyber Crime Laws -- The Need for Adequate Cyber Crime Laws -- Extending Existing Criminal Offences -- Crimes against the Person -- Crimes against Property -- Crimes against Morality -- Crimes against the Administration of Justice and Crimes against the State -- Creating New Computer-Related Offences -- Privacy -- Economic Crime -- Intellectual Property Protection -- Illegal and Harmful Content -- Criminal Procedural Law -- Security Law -- National Harmonisation -- Australia's Model Criminal Code Project -- The Emergence of International Harmonisation -- Minimum Requirements for Cyber Crime Laws -- The OECD -- The Council of Europe -- The United Nations -- The Council of Europe's Convention on Cybercrime -- Title 1 - Offences against the confidentiality, integrity and availability of computer data and systems -- Title 2 - Computer-related offences -- Title 3 - Content-related offences -- Title 4 - Offences related to infringements of copyright and related rights -- Title 5 - Ancillary liability and sanctions -- Title 1 - Common provisions -- Title 2 - Expedited preservation of stored computer data -- Title 3 - Production order -- Title 4 - Search and seizure of stored computer data -- Title 5 - Real-time collection of computer data -- Conclusion -- CHAPTER SEVEN Judicial Punishment in Cyberspace -- The Definition of Judicial Punishment.

The Objectives of Judicial Punishment -- Retributive approaches -- Proportionality -- Denunciation -- Consequentialist approaches -- Incapacitation -- Deterrence -- Rehabilitation -- Restitution -- The Choice of Appropriate Punishment -- Individual Punishments for Cyber Crime -- Capital Punishment -- Restitution -- Forfeiture of Computer Equipment -- Restricted Access to Computers -- Monitoring Computer Usage -- Home Confinement/Tagging -- Community Service -- Adverse Publicity and Apologies -- Conclusions -- CHAPTER EIGHT Sentencing Cyber Criminals -- Introduction -- The Use of Individual Sentences -- Aggravating Factors -- United States Sentencing Commission Guidelines -- Aggravating Factors Found in Surveyed Cases -- Financial Loss -- Extent of Conduct -- Breaching Government Agency's Systems -- Breach of Trust -- Effects on Victims -- Special Skills -- Sophistication, Planning and Expertise -- Mitigating Factors -- Previous Good Character and Absence of Prior Convictions -- Guilty Plea and Cooperation -- Absence of Harm to Victims -- Mental Health Problems Including Computer / Internet Addiction -- Youth -- Lack of Malicious Intent and Non-Acceptance of Illegality of Conduct -- Delay in Investigation and Trial -- The Effect of Computer Involvement on Sentence -- Conclusions -- CHAPTER NINE Conclusions -- Principal Conclusions -- Does Cyber Crime Raise Unique Problems? -- Are There Differences of Approach Between Jurisdictions? -- Are Cyber Crimes Treated More Seriously Than Conventional Crimes? -- Policy Implications -- Avenues for Further Investigation -- Improved Knowledge Base -- Keeping Pace with Technological Developments -- Further Investigation of Cases -- Explaining Attrition -- Police-Prosecutor Interactions -- Defence Tactics -- Global Cooperative Action -- References -- APPENDIX A Case Summaries 1972-2003 -- [Case No. 1].

[Case No. 2] -- [Case No. 3] -- [Case No. 4] -- [Case No. 5] -- [Case No. 6] -- [Case No. 7] -- [Case No. 8] -- [Case No. 9] -- [Case No. 10] -- [Case No. 11] -- [Case No. 12] -- [Case No. 13] -- [Case No. 14] -- [Case No. 15] -- [Case No. 16] -- [Case No. 17] -- [Case No. 18] -- [Case No. 19] -- [Case No. 20] -- [Case No. 21] -- [Case No. 22] -- [Case No. 23] -- [Case No. 24] -- [Case No. 25] -- [Case No. 26] -- [Case No. 27] -- [Case No. 28] -- [Case No. 29] -- [Case No. 30] -- [Case No. 31] -- [Case No. 32] -- [Case No. 33] -- [Case No. 34] -- [Case No. 35] -- [Case No. 36] -- [Case No. 37] -- [Case No. 38] -- [Case No. 39] -- [Case No. 40] -- [Case No. 41] -- [Case No. 42] -- [Case No. 43] -- [Case No. 44] -- [Case No. 45] -- [Case No. 46] -- [Case No. 47] -- [Case No. 48] -- [Case No. 49] -- [Case No. 50] -- [Case No. 51] -- [Case No. 52] -- [Case No. 53] -- [Case No. 54] -- [Case No. 55] -- [Case No. 56] -- [Case No. 57] -- [Case No. 58] -- [Case No. 59] -- [Case No. 60] -- [Case No. 61] -- [Case No. 62] -- [Case No. 63] -- [Case No. 64] -- [Case No. 65] -- [Case No. 66] -- [Case No. 67] -- [Case No. 68] -- [Case No. 69] -- [Case No. 70] -- [Case No. 71] -- [Case No. 72] -- [Case No. 73] -- [Case No. 74] -- [Case No. 75] -- [Case No. 76] -- [Case No. 77] -- [Case No. 78] -- [Case No. 79] -- [Case No. 80] -- [Case No. 81] -- [Case No. 82] -- [Case No. 83] -- [Case No. 84] -- [Case No. 85] -- [Case No. 86] -- [Case No. 87] -- [Case No. 88] -- [Case No. 89] -- [Case No. 90] -- [Case No. 91] -- [Case No. 92] -- [Case No. 93] -- [Case No. 94] -- [Case No. 95] -- [Case No. 96] -- [Case No. 97] -- [Case No. 98] -- [Case No. 99] -- [Case No. 100] -- [Case No. 101] -- [Case No. 102] -- [Case No. 103] -- [Case No. 104] -- [Case No. 105] -- [Case No. 106] -- [Case No. 107] -- [Case No. 108] -- [Case No. 109] -- [Case No. 110] -- [Case No. 111].

[Case No. 112] -- [Case No. 113] -- [Case No. 114] -- [Case No. 115] -- [Case No. 116] -- [Case No. 117] -- [Case No. 118] -- [Case No. 119] -- [Case No. 120] -- [Case No. 121] -- [Case No. 122] -- [Case No. 123] -- [Case No. 124] -- [Case No. 125] -- [Case No. 126] -- [Case No. 127] -- [Case No. 128] -- [Case No. 129] -- [Case No. 130] -- [Case No. 131] -- [Case No. 132] -- [Case No. 133] -- [Case No. 134] -- [Case No. 135] -- [Case No. 136] -- [Case No. 137] -- [Case No. 138] -- [Case No. 139] -- [Case No. 140] -- [Case No. 141] -- [Case No. 142] -- [Case No. 143] -- [Case No. 144] -- [Case No. 145] -- [Case No. 146] -- [Case No. 147] -- [Case No. 148] -- [Case No. 149] -- [Case No. 150] -- [Case No. 151] -- [Case No. 152] -- [Case No. 153] -- [Case No. 154] -- [Case No. 155] -- [Case No. 156] -- [Case No. 157] -- [Case No. 158] -- [Case No. 159] -- [Case No. 160] -- [Case No. 161] -- [Case No. 162] -- [Case No. 163] -- [Case No. 164] -- APPENDIX B Selected Legislative Summaries -- Index.
Abstract:
This 2004 book provides an international study of the manner in which cyber criminals are dealt with by the judicial process.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: