Cyber Criminals on Trial: List of figures and tables

1. Introduction 2. Defining and measuring cyber crime 3. The prosecutor as gatekeeper 4. Cross-border issues 5. Strategies of cyber crime litigation 6. The quest for harmonisation of cyber crime laws 7. Judicial punishment in cyberspace 8. Sentencing cyber criminals 9. Conclusions Appendixes.

[1]  E. Sutherland,et al.  White-collar criminality. , 1940 .

[2]  A. Flew “The Justification of Punishment” , 1954, Philosophy.

[3]  H. L. A. Hart,et al.  Punishment and Responsibility: Essays in the Philosophy of Law , 1968 .

[4]  James O’Connor,et al.  The fiscal crisis of the state , 1973 .

[5]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[6]  M. Foucault,et al.  Discipline and Punish: The Birth of the Prison. , 1978 .

[7]  Barbara Boland,et al.  The effect of the police on crime , 1979 .

[8]  H. Marshall Jarrett,et al.  Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations , 1979 .

[9]  Elizabeth A. Stanko The Impact of Victim Assessment on Prosecutors' Screening Decisions: The Case of the New York County District Attorney's Office , 1981 .

[10]  M. Foucault,et al.  Discipline and Punish: The Birth of the Prison , 2020, On Violence.

[11]  Donn B. Parker,et al.  Fighting computer crime , 1983 .

[12]  P. Grabosky Corporate Crime in Australia: An Agenda for Research , 1984 .

[13]  Stephen Reinhardt Pieter Spierenburg — The Spectacle of Suffering. Executions and the Evolution of Repression: From Preindustrial Metropolis to the European Experience. , 1987 .

[14]  P. Grabosky,et al.  The myth of community tolerance toward white-collar crime , 1987 .

[15]  The Response of the Criminal Law in Australia to Computer Abuse , 1988 .

[16]  Clifford Stoll,et al.  The Cuckoo's Egg , 1989 .

[17]  Gilbert Geis White-Collar Crime: What Is It? , 1991 .

[18]  John Braithwaite,et al.  Responsive Regulation: Transcending the Deregulation Debate , 1992 .

[19]  J. Standen Plea Bargaining in the Shadow of the Guidelines , 1993 .

[20]  R. Holland Public perceptions of white collar crime seriousness: A survey of an Australian sample , 1995 .

[21]  Peter Grabosky,et al.  Regulation by Reward: On the Use of Incentives as Regulatory Instruments* , 1995 .

[22]  Caught in the Web: Entrapment in Cyberspace , 1996 .

[23]  Lisa Frohmann,et al.  Convictability and discordant locales: Reproducing race, class, and gender ideologies in prosecutorial decisionmaking. , 1997 .

[24]  Crime in a Shrinking World , 1998 .

[25]  William J. Leonhirth Crime in the Digital Age: Controlling Telecommunications and Cyberspace Illegalities , 1999 .

[26]  Russell G. Smith,et al.  Nigerian Advance Fee Fraud , 1999 .

[27]  Public enforcement of intellectual property rights , 2000 .

[28]  Frontiers of Jurisdiction: From Isolation to Connectedness , 2000 .

[29]  E. Ogilvie Stalking: Policing and Prosecuting Practices in Three Australian Jurisdictions , 2000 .

[30]  Gregor Urbas The age of criminal responsibility , 2000 .

[31]  B. Chatterjee Last of the Rainmacs? : Thinking about pornography in cyberspace. , 2003 .

[32]  David T. Johnson The Japanese Way of Justice: Prosecuting Crime in Japan , 2001 .

[33]  M. Williams,et al.  The language of cybercrime , 2001 .

[34]  Hazel Glenn Beh,et al.  Physical Losses in Cyberspace , 2001 .

[35]  Can You Yahoo!? The Internet’s Digital Fences , 2001 .

[36]  Entrapment, the Art of Police Deception , 2001 .

[37]  Susan W. Brenner,et al.  Computer Searches and Seizures: Some Unresolved Issues , 2002 .

[38]  Ellen S. Podgor International Computer Fraud: A Paradigm for Limiting National Jurisdiction , 2002 .

[39]  Brandon C. Welsh,et al.  Evidence-Based Crime Prevention , 2002 .

[40]  Virtual Child Pornography on the Internet: A “Virtual” Victim? , 2002 .

[41]  R. E. Bell The Prosecution of Computer Crime , 2002 .

[42]  Joseph J. Schwerha,et al.  Transnational evidence gathering and local prosecution of international cybercrime , 2002 .

[43]  Sally S. Simpson,et al.  Corporate Crime, Law, and Social Control , 2002 .

[44]  Marc D. Goodman,et al.  The Emerging Consensus on Criminal Conduct in Cyberspace , 2002, Int. J. Law Inf. Technol..

[45]  The Prosecution of Corporations , 2003 .

[46]  Seagrumn Smith,et al.  From Napster to Kazaa: The Battle Over Peer-To-Peer Filesharing Goes International , 2003 .

[47]  Patricia L. Bellia Chasing Bits Across Borders , 2004 .

[48]  Wim Vandenberghe,et al.  Electronic Theft: Unlawful Acquisition In Cyberspace , 2004, Int. J. Law Inf. Technol..