前言
PREFACE
LIST OF FIGURES
LIST OF TABLES
TABLE OF CASES
ABBREVIATIONS
CHAPTER 1 INTRODUCTION
1.1 Social context of cybersecurity and cybercrime
1.2 Structure of this book
CHAPTER 2 DECIPHERING THE PHENOMENON OF CYBERCRIME
2.1 Introduction
2.2 Development of definition of computer crime
2.3 Analysis of the previous shortcomings in defining cybercrime
2.4 How to define cybercrime?
2.5 Reading of the "cyber" label of criminal phenomenon
2.6 The necessity of a broad definition of cybercrime
2.7 A definition based on roles of information systems
CHAPTER 3 CLASSIFICATION OF CYBERCRIME
3.1 What roles can information systems play in cybercrime?
3.2 Comparison with other conceptions
3.3 Conclusion
CHAPTER 4 SUBJECTS AND SUBJECTIVE ASPECTS OF CYBERCRIME
4.1 Introduction
4.2 What's special with cybercriminals?
4.3 The perceived context of the perpetrators
4.4 Forms of organization
4.5 Age and cybercrime
4.6 Psychological features of cybercrime
4.7 What motivates a cybercrime?
4.8 Conclusion
CHAPTER 5 RECOGNIZING CRITICAL FACTORS IN COMBATING CYBERCRIME
5.1 Introduction
5.2 Victimization in cybercrime
5.3 Time in cybercrime
5.4 Space in cybercrime
5.5 The technological nature
5.6 The complexity of cybercrime
5.7 The costs of cybercrime
5.8 The anonymity of the perpetrators
5.9 Hidden victims
5.10 The concealment of cybercrime traces
5.11 The trans-territoriality of cybercrime coverage
5.12 The rampancy of cybercriminal phenomena
5.13 Rent-seeking from the exaggeration of insecurity
5.14 Conclusions
CHAPTER 6 THE HISTORICAL DEVELOPMENT OF CYBERCRIME AND DETERRENCE
6.1 Basic observations on the development of criminal phenomena
6.2 Computer hackers' discovery of a lawless new frontier
6.3 The rise of the law against the increasing number of cybercrimes
6.4 A legal system wrestling with networked adversaries
6.5 The equilibrium between cybercrime and deterrence
6.6 Conclusion
CHAPTER 7 LIABILITY FOR CYBERCRIME
7.1 Introduction
7.2 Criminal liability, civil liability and administrative liability
7.3 Individual liability and corporate liability
7.4 Liability based on law and liability based on contract
7.5 Intentional liability, negligent liability and reckless liability
7.6 Direct liability and indirect liability
7.7 Trespasser's liability, third parties' liability, and victim's liability
7.8 Domestic liability, trans-national liability, and international liability
7.9 Offensive liability and defensive liability
7.10 Punitive liability, exemplary liability and compensatory liability
7.11 Conclusion
CHAPTER 8 CYBERJURISDICTION
8.1 Introduction
8.2 The legal basis for cybercriminal jurisdiction
8.3 "Separate" or "international" jurisdiction?
8.4 The specific space -- the determination of the location of conduct
8.5 The specific player -- the determination of the location of the person
8.6 Liability-based cybercriminal jurisdiction
8.7 Critical factors in cybercriminal jurisdiction
8.8 Conclusion
CHAPTER 9 INTERNATIONAL ACTIONS AGAINST CRIMINALITY
9.1 Introduction
9.2 From domestic legislation to international harmonization
9.3 Professional efforts of the International Criminal Police Organization (Interpol)
9.4 Regional efforts
9.5 Multi-national efforts
9.6 Global efforts by the United Nations (UN)
9.7 The focuses of international harmonization
9.8 From conversation to the European Convention
9.9 Limited progress in international harmonization
9.10 Conclusion
CHAPTER 10 CONCLUSIONS
10.1 Dilemmas of cybercrime control
10.2 The primary factors benefiting cybercrime
10.3 The primary factors preventing cybercrime
REFERENCES
展开