MINISTRSTVO ZA NOTRANJE ZADEVE RS .HTML RAZLICICA JE MNOGO BOLJ FUNKCIONALNA Računalniška kriminaliteta Dr. Karl Petrič Ljubljana, 2012 Kazalo poglavij Povzetek 1 Uvod 1.1 Cilj dela 2 Reševanje informacijskega problema s področja računalniške kriminalitete 2.1 Priprava in izdelava koncepta 2.2 Slika 1: Koncept reševanja informacijskega problema 3 Izdelava vsebinskega omrežja 3.1 Slika 2: Miselni vzorec informacijskega problema "Računalniška kriminaliteta" 3.2 Slika 3: Klikalni diagram so področja računalniške kriminalitete 4 Zaključek 5 Uporabljena programska orodja 6 Priloga Povzetek V hibridnem izdelku na temo "Računalniška kriminaliteta" je avtor prikazal postopek reševanja informacijskega problema, nakar je v klikalnem diagramu združil med sabo naslednje teme s področja računalniške kriminalitete: digitalna kriminaliteta, kibernetska kriminaliteta, elektronska kriminaliteta, internetna kriminaliteta, spletna kriminaliteta, sistemski vdori, računalniška forenzika idr. Kot končni izdelek je nastal klikalni diagram z maloprej navedenimi perečimi vsebinami. V tem klikalnem diagramu se nahajajo tudi povezave do spletnih strani kot npr. COBISS/COBIB in Google. Kot prilogo je avtor dodal aplikacijo v obliki preglednične bibliografije z iskalnikom, ki zajema zadetke s področja računalniške kriminalitete (COBISS/COBIB in Google učenjak). Ključne besede: računalniška kriminaliteta, digitalna kriminaliteta, kibernetska kriminaliteta, internetna kriminaliteta, sistemski vdori, računalniška forenzika, preiskovanje kaznivih dejanj, preprečevanje. GOR 1 Uvod Računalniška kriminaliteta je v zadnjih dvajsetih letih izjemno porastla že zaradi dejstva, ker so se računalniki dejansko vgradili ne samo v poslovne in akademske sfere, ampak tudi v čisto navadne vsakdanje dejavnosti ter dogodke. S"e pojmovna analiza računalniške kriminalitete bi zelo zgovorno pokazala njeno razvejenost. Brez informacijske tehnologije si sploh več ne moremo zamisliti normalno delovanje družbe in s tem posameznika, ki živi v njej. Računalniki so v bistvu zapleteni stroji, ki v veliki meri pozitivno delujejo na delovanje družbe, vendar navkljub zapisanemu, je potrebno izpostaviti temno stran uporabe računalnikov, ki se kaže še zlasti v sferah družbenega. Po eni strani je povezovanje računalnikov v omrežja omogočilo hitrejšo komunikacijo med ljudmi, a po drugi strani je prav to povezovanje povečalo sistemske luknje, ki privlačijo razne zlorabe podatkov (npr. kraja podatkov, kraja identitete, kibernetska špijonaža, pedofilska omrežja, teroristična omrežja, spletni socialni inženiring). Zlorabe so lahko zelo hude in lahko posežejo celo (čeprav posredno) po človeških življenjih. Drugi večji negativni vpliv, ki ga je potrebno izpostaviti je v spodbujanju osiromašenega socialnega čuta do soljudi in nezdravega fiziološko pasivnega načina življenja. Prekomerno socialno izolirani ljudje lahko postanejo zelo hitro tarča prekaljenih virtualnih kriminalcev. GOR 1.1 Cilj dela ali hibridnega izdelka Reševanje informacijskega problema na temo "Računalniška kriminaliteta", nakar izdelava klikalnega diagrama, ki poleg že pripravljenih poizvedb vsebuje še aplikacijo v obliki preglednične bibliografije z iskalnikom o računalniški kriminaliteti. GOR 2 Reševanje informacijskega problema s področja različnih policijskih tem Na kratko povzeto Možni koraki pri reševanju informacijskega problema 1. Predstavitev informacijskega problema 2. Priprava in izdelava koncepta 3. Uporaba orodij (npr. iskalniki, zbirke podatkov, orodje za izdelavo miselnih vzorcev) 4. Izdelava klikalnega diagrama (npr. s programskim orodjem Yed graph editor) 5. Predstavitev zanimivih vsebinskih konceptov V tem E- dokumentu bom najprej predstavil korake pri reševanju informacijskega problema na temo "Računalniška kriminaliteta". Po predstavitvi informacijskega problema bom pripravil in izdelal slikovni koncept, ki bo predvidel različne vsebinske gradnike. Na podlagi vsebinskih gradnikov bom izdelal klikalni diagram, ki vsebuje pomembne spletne povezave do E- del in že pripravljenih poizvedb s podatkovnih zbirk (npr. COBISS/COBIB, COBISS/MNZRS) in iskalnikov (npr. Google) Predstavitev informacijskega problema Predstavitev informacijskega problema lahko poteka na podlagi naslednjih kazalcev: Tema: Računalniška kriminaliteta Ključne besede: računalniška kriminaliteta, digitalna kriminaliteta, kibernetska kriminaliteta, internetna kriminaliteta, sistemski vdori, računalniška forenzika, preiskovanje kaznivih dejanj, preprečevanje. Časovna omejitev: ni omejitev Jezikovna omejitev: slv, eng, ger, scr, scc, bos Omejitev za število zadetkov (A- članki, M- monografije/knjige, N- neknjižni/elektronski viri): A --> N ; M --> N Namen poizvedbe: podpora pri odločanju v delovnem procesu in za izobraževanje GOR 2.1 Priprava in izdelava koncepta V tem delu bom predstavil pripravo in izdelavo slikovnega koncepta. S pomočjo modelirnega orodja Microsoft Visio Professional 2007 bom vizualno prikazal tako posamične entitete informacijskega problema kot tudi proces reševanja informacijskega problema. 2.2 Slika 1: Koncept reševanja informacijskega problema Slika 1 prikazuje koncept reševanja informacijskega problema (v nadaljevanju IP) po stopnjah od ena do šest: 1. predstavitev IP 2. tema IP, različne policijske teme 3. naslov IP 4. določitev predmetnih oznak (računalniška kriminaliteta, kibernetska kriminaliteta, internetna kriminaliteta, digitalna kriminaliteta, e-kriminaliteta, virtualna kriminaliteta, kraja podatkov, kraja identitete, računalniška forenzika) 5. uporaba orodij 6. predstavitev klikalnega diagrama s področja računalniške kriminalitete Slika 1 vključuje tudi pomembne prvine kot so različne omejitve (npr. za jezik, čas in vrsta virov). V nadaljevanju tega dela bom prikazal vsebinski koncept ali miselni vzorec kot osnova za izdelavo kasnejšega klikalnega diagrama. GOR 3 Izdelava vsebinskega omrežja 3.1 Slika 2: Miselni vzorec informacijskega problema "Računalniška kriminaliteta" Slika 2 prikazuje miselni vzorec oziroma vsebinske koncepte, ki so s temo računalniške kriminalitete povezani. Vsebinski koncepti so naslednji: Kibemetska kriminaliteta (gl. tudi RK), oprema, komunikacijske naprave, mobilna omrežja, telefonske linije, računalniška omrežja, kazniva dejanja, goljufije, kraja podatkov, kraja identitete, špijonaža, računalniško piratstvo, poneverbe, finančne prevare, prenašanje virusov, pedofilska omrežja, terorizem na spletu, spletke, mobing, stalking, spletni vandalizem, Računalniška kriminaliteta (RK), internetna kriminaliteta, digitalna kriminaliteta, virtualna kriminaliteta, e-kriminaliteta, Informacijska kriminaliteta, Računalniška forenzika, odkrivanje, preiskovanje, preprečevanje. Bralci tega dela si lahko izdelajo še bolj nadrobno sliko s pomočjo spletne aplikacije, ki se imenuje Text2MindMap Converter (kliknite sliko 2). GOR 3.2 Slika 3: Klikalni diagram na temo računalniške kriminalitete Slika 3 prikazuje klikalni diagram s področja računalniške kriminalitete. Sleherni gradnik znotraj diagrama vsebuje spletno povezavo do že pripravljene poizvedbe s COBISS/COBIB ali pa iskalnika Google (v primeru, da z določene teme na COBISS/COBIB ni bilo zadetka, sem v določeno slikovno entiteto vgradil spletno povezavo do pripravljene poizvedbe z Googla). Poizvedbe so bile izvedene v slovenskem jeziku s pomočjo izbranih predmetnih oznak (gl. geslovnik MNZ in organov v sestavi). GOR 4 Zaključek Bralke/-ci bodo lahko ta hibridni izdelek (podobno kot vse poprejšnje) uporabili za naslednje namene: za študij, za raziskave, za interno izobraževanje idr. Prav tako bodo lahko tudi dopolnili oziroma nadgradili že obstoječe spletne povezave do relevantnih vsebin. 5 Uporabljena programska orodja 1. JabRef 2.7.2 Reference manager (2012-07-24) 2. Microsoft Fronpage 2003 3. Microsoft Visio Professional 2007 4. Publish or perish (2012-07-24) 5. Text2Mindmap converter (2012-07-24) 6. Yed editor (2012-07-24) GOR 6 Priloga Spodnja preglednica predstavlja aplikacijo, ki poleg bibliografskih zapisov s COBISS/COBIB in Google učenjaka vsebuje še kakovosten iskalnik (ta iskalnik zajema zadetke znotraj preglednice). Predstavljeni so ključni podatki o avtorju, naslovu, letu nastanka, reviji/konferenci, tipu reference in ali je delo dosegljivo na spletu (gl. DOI/URL - povsem na desni strani preglednice). TEVILO USTREZNIH ZADETKOV: 1107/1107. HITRO ISKANJE: | b« | Š AVTOR NASLOV LETO REVIJA/KONFERENCA TIP REFERENCE DOI/URL at1, I.P. & 939 In addition to the formal concerns related to substantive laws and procedural laws, international computer crime investigations are hampered by a variety 1941 , pp. - book Aas, K. Technologies of inSecurity: the surveillance of everyday life 2008 , pp. - book Abagnale, F. FBI 2005 Computer Crime Survey 2005 Federal Bureau of Investigation, pp. - article Abraham, T. & ... Investigative profiling with computer forensic log data and association rules 2002 Data Mining, 2002. ICDM 2002. , pp. - article URL Adachi, N., Aoki, S., Komano, Y. & The security problems of Rivest and Shamir's PayWord scheme 2003 E-Commerce, 2003. CEC , pp. - article URL Adams, J. Controlling cyberspace: applying the computer fraud and abuse act to the internet 1996 Santa Clara Computer & High Tech. LJ, pp. - article URL Adelstein, F. Live forensics: diagnosing your system without killing it first 2006 Communications of the ACM, pp. - article URL Adler, F. A note on teaching A~a,-S>internationalA~a,-S^ 1996 Journal of Criminal Justice Education, pp. - article URL Adler, F., Mueller, G.O. & Laufer, W.S. Criminology 1998 , pp. XXIII, 552 str.- book Aiziwa, K. Cooperation in Criminal Matters: Mutual Legal Assistance and Extradition, 24/7 Points of Contact Network, and Training in the Field of Computer Crime' 2001 Proceedings of the Asia Cyber Crime Summit. Hong , pp. article Albanese, J. Tomorrow's thieves 1988 The Futurist, pp. - article URL Albanese, J. & ... Crime in America: Some existing and emerging issues 1993 No.: ISBN 0-13-191446-4, pp. - article URL Alderman, T. Computer Crime Journal of Systems Management, pp. - article Aldrich, R. Cyberterrorism and computer crimes: issues surrounding the establishment of an international regime 2000 , pp. - book Alexander, K. & ... Computer crime 1996 Emory Law Journal, pp. - article Alexander, M. Computer crime: Ugly secret for business 1990 Computerworld, pp. - article Alexander, M. Computer crime fight stymied 1989 Federal Computer Week, pp. - article Allegrini, M. Le frodi aziendali. Frodi amministrative, alterazioni di bilancio e computer crime 2003 , pp. - book Allen, B. Computer Crime: New Findings, New Insights 1981 notes used at computer Security Institute's Eighth , pp. - article Allen, B. Embezzler's Guide to the Computer 1975 Harvard Business Review, pp. - article Allen, W. Computer forensics 2005 Security & Privacy, IEEE, pp. - article URL Altheide, C. & Carvey, H. Digital forensics with open source tools 2011 , pp. XVII, 264 str.- book Anderson, D. Aggregate Burden of Crime, The 1999 JL & Econ., pp. - article URL Anderson, K. Hacktivism and Politically Motivated Computer Crime 2009 Encurve, LLCC, pp. - article Anderson, K. Intelligence Based Threat Assessments for Information Networks and Infrastructures 1999 Global Technology Research, Inc. White paper, n. pag, pp. - article Anderson, R. Liability and computer security: Nine principles 1994 Computer SecurityA"a,-a€fESORICS 94, pp. - article URL Anderson, R. & ... Understanding the insider threat 2004 , pp. - book URL Andreano, F. Evolution of Federal Computer Crime Policy: The Ad Hoc Approach to an Ever-Changing Problem, The 1999 Am. J. Crim. L., pp. - article URL Anthes, G. Security plans lag computer crime rate 1995 Computers and Security, pp. - article URL Armstrong, C. Mastering computer forensics 2003 World Conference on Information Security , pp. - article URL Armstrong, C. Developing a framework for evaluating computer forensic tools 2003 Evaluation in Crime Trends and justice: Trends , pp. - article Armstrong, H. & ... Internet anonymity practices in computer crime 2003 Information management & , pp. - article URL Armstrong, I. Computer Crime Spreads 2000 SC Magazine, pp. - article Association, A.B. Task Force on Computer Crime 1984 Criminal Justice, pp. - article Association, A.B. Task Force on Computer Crime, Section of Criminal Justice 1984 Report On Computer Crime, Washington, DC: ABA, pp. - article Attaran, M. Managing legal liability of the Net: a ten step guide for IT managers 2000 Information management & computer security, pp. - article URL August, R. Turning the Computer into a Criminal 1983 Barrister, pp. - article URL AusCERT, M., Rankine, T., Rothery, M. & ... 1 Australian Computer Crime and Security Survey 2003 , pp. - book 1 Aycock, J. Computer viruses and malware 2010 , pp. - book Baase, S. A gift of fire 2003 , pp. - book Bace, R. A New Look at Perpetrators of Computer Crime 1994 Proc. 16th Department of Energy Computer Security , pp. article Backhouse, J. & ... Managing computer crime: a research outlook 1995 Computers & Security, pp. - article URL Bagchi, K. & ... An analysis of the growth of computer and Internet security breaches 2003 of the Association for Information Systems ( , pp. - article Bailey, D. Attacks on computers: Congressional hearings and pending legislation 1984 , pp. - book URL Baker, G. Trespassers will be prosecuted: computer crime in the 1990s 1993 Computer/law journal, pp. - article URL Baker, R. Computer security handbook 1991 , pp. - book Baker, W., Hylender, C. & ... 2008 data breach investigations report 2008 Basking Ridge, NJ: Verizon , pp. - article Ball, L. Computer crime 1982 Technology Review, pp. - article Bandyopadhyay, T., Mookerjee, V. & Why IT managers don't go for cyber-insurance products 2009 Communications of the , pp. - article URL Bar-Sela, Y. Computer Legislation in Israel: A Proposal Being Developed by the Ministry of Justice 1986 Isr. L. Rev., pp. - article URL Barki, H., Rivard, S. & ... A keyword classification scheme for IS research literature: An update 1993 Mis Quarterly, pp. - article URL Barlow, J. & ... Crime & Puzzlement 1990 , pp. - book Barr, R. & ... Crime placement, displacement, and deflection 1990 Crime and Justice, pp. - article URL Barr, W. Foreword 1991 Am. Crim. L. Rev., pp. - article URL Barrett, N. Digital crime : policing the cybernation 1997 , pp. 224 str.- book Barton, B. & ... User-friendly password methods for computer-mediated information systems 1984 Computers & Security, pp. - article URL Barton, G. Taking a Byte out of Crime: E-mail Harassment and the Inefficacy of Existing Law 1995 Wash. L. Rev., pp. - article URL Barton, P. & ... Cyber-crime--criminal offence or civil wrong? 2003 Computer Law & Security Report, pp. - article URL Baryamureeba, V. & ... The enhanced digital investigation process model 2004 Proceedings of the 4th Annual Digital , pp. - article Baskerville, R. Information systems security design methods: implications for information systems development 1993 ACM Computing Surveys (CSUR), pp. - article URL Bawden, B. International Symposium on the Prevention and Prosecution of Computer Crime 1992 Computer Law and Security Report, pp. - article Bear, G. Teaching Computer Ethics 1986 Computers in the Schools, pp. - article URL I II__II__IL Becker, J. Computer crime career of the future? 1982 SIGCAS Comput. Soc, pp. - article Becker, J. Who are the computer criminals 1982 ACM SIGCAS Computers and Society, pp. - article URL Becker, J. Trial of a Computer Crime 1982 Prosecutor, pp. - article URL Becker, J. The investigation of computer crime 1980 , pp. - book Becker, J. Rifkin, A Documentary History 1980 COMP. LAW. J., pp. - article URL Becker, J. Operational Guide to White-Collar Crime Enforcement, on the Investigation of Computer Crime 1978 Battelles Law and Justice Center, Seattle, Washington, pp. article Beebe, N. & ... A hierarchical, objectives-based framework for the digital investigations process 2005 Digital Investigation, pp. - article URL Beebe, N. & ... Using situational crime prevention theory to explain the effectiveness of information systems security 2005 Proceedings of the 2005 software , pp. - article Belič, I. Okrogla miza o informacijski varnosti in digitalni forenziki Zbornik povzetkov [!prispevkov], pp. 2 str.- article Belič, I. Tehnični vidiki odprtih vprašanj v zvezi z dokazovanjem s postopki digitalne forenzike Problemi dokazovanja v zahtevnih kazenskih postopkih, pp. Str. 151-162 article Belič, I. Ustanovitev enote za boj proti računalniškemu kriminalu v Veliki Britaniji (Chloe Palmer, Zapis urednika revije Computer Fraud & Security, maj 2001) 2001 Varstvoslovje Vol. 3(1/2), pp. str. 125-126 article Belič, I. Seminar Računalniško piratstvo - Gotenica 20. in 21.9.1999 1999 Varstvoslovje Vol. 1(2), pp. str. 75-76 article Bell, R. The prosecution of computer crime 2002 Journal of financial crime, pp. - article URL Bennett, S. & ... An application of qualitative risk analysis to computer security for the commercial sector 1992 Computer Security Applications , pp. - article URL Bennett, W.W. & Hess, K.M. Criminal investigation 1998 , pp. XXI, 730 str.- book Bequai, A. How to Prevent Computer Crime: A Guide to Forensic and Technology 2002 , pp. - book Bequai, A. Employee abuses in cyberspace: Management's legal quagmire 1998 Computers & Security, pp. - article URL Bequai, A. Techno-Crimes: The Computerization of Crime and Terrorism 1987 Lexington: DC Heath and Company, pp. - article URL Bequai, A. Lack of Ethics as a Cause of Computer Crime' 1984 Computers and People, pp. - article Bequai, A. How to prevent computer crime: a guide for managers 1983 , pp. - book Bequai, A. Computer Crime: Expert Witness Manual 1980 , pp. - book Bequai, A. Organized crime: The fifth estate 1979 , pp. - book Bequai, A. Problem of Crime in the Electronic Society, The 1978 Com. LJ, pp. - article URL Bequai, A. Computer crime 1978 , pp. - book Bequai, A. Computer Crime: A Growing and Serious Problem 1976 Police LQ, pp. - article URL BEQUAI, A., Utah, U. o. & ... CASHLESS SOCIETY-AN ANALYSIS OF THE THREAT OF CRIME AND THE INVASION OF PRIVACY 1976 JOURNAL OF , pp. - article URL Berg, T. State Criminal Jurisdiction in Cyberspace: Is There a Sheriff on the Electronic Frontier? 2000 Michigan Bar Journal, pp. - article Berlim, B. The International Handbook on Computer Crime Chichester, pp. - article Bernard, J., Selinšek, L., Lesjak, B. & Š avnik, J. Digitalna forenzika v kazenskih postopkih : zbornik razprav, pripravljenih v okviru projekta Digitalna forenzika in njena vloga v sodnih postopkih (CRP V2-0219) 2008 , pp. 138 str.- book Berqia, A. & ... A distributed approach for intrusion detection systems 2004 Information and Communication , pp. - article URL Besednjak, A. Tehnični in pravni vidik dokazov v elektronski obliki : diplomsko delo visokošolskega študija 2008 , pp. 81 f.- book Best, R. & ... Computer Crime, Abuse, Liability and Security,-A Comprehensive Bibliography 1970 , pp. - book Bhaskar, R. State and local law enforcement is not ready for a cyber Katrina 2006 Communications of the ACM, pp. - article URL Biggs, S. & ... Cloud computing: The impact on digital forensic investigations 2009 Internet Technology and Secured , pp. - article URL Bintliff, R. Complete manual of white collar crime detection and prevention 1993 No.: ISBN 0-13-017260-X, pp. - article URL Bishop, M. The insider problem revisited 2005 Proceedings of the 2005 workshop on New security , pp. - article URL Bistarelli, S. & ... Analysis of integrity policies using soft constraints 2003 Policies for Distributed Systems and , pp. - article URL Black, D. Computer Hacker-Electronic Vandal or Scout of the Networks, The 1993 JL & Inf. Sci., pp. - article URL Blain, M. iCrime cops 2010 Police review Vol. 118(6070), pp. str. 26-27 article Bliss, A. & ... The threat of computer crime: identifying the problem and formulating a response at force level 1998 POLICE JOURNAL, pp. - article Bloom, R. Computer crime: a new white collar crook' 1980 Infosystems, pp. - article Bloombecker, B. Spectacular Computer Crimes: What They are and how They Cost American Business Half a Billion Dollars a Year! 1990 No.: ISBN 1-55623-256-X, pp. - article URL Bloombecker, B. Computer crime and abuse 1990 The EDP Auditor Journal, II, pp. - article BloomBecker, J. Buck." Cracking down on Computer Crime." State Legislatures, pp. - article I l|___|l II II H BloomBecker, J. Computer Crime Laws 1993 , pp. - book BloomBecker, J. Short-circuiting computer crime 1989 Datamation, pp. - article BloomBecker, J. Computer ethics: an antidote to despair 1987 ACM SIGCAS Computers and Society, pp. - article URL BloomBecker, J. Computer Crime, Computer Security, Computer Ethics: The First Annual Statistical Report of the National Center for Computer Crime Data 1986 , pp. - book BloomBecker, J. Computer Crime 1986 National Center for Computer Crime Data. Los Angeles , pp. - article BloomBecker, J. Introduction to computer crime 1984 Proceedings of the 2nd IFIP international conference , pp. article BloomBecker, J. Computer crime update: The view as we exit 1984 1984 W. New Eng. L. Rev., pp. - article URL BloomBecker, J. Conscience in computing: a Law Day perspective on computer crime 1983 ACM SIGCAS Computers and Society, pp. - article Bloombecker, J. International computer crime: Where terrorism and transborder data flow meet 1982 Computers & Security, pp. - article URL Bloombecker, J. Trial of a Computer Crime, The 1981 Int'l Bus. Law., pp. - article URL Blythe, S. South pacific computer law: Promoting E-commerce in Vanuatu and fighting cyber-crime in Tonga 2006 Journal of South Pacific Law, pp. - article Boedges, P. Air force mounts offensive against computer crime 1988 Government Computer News, pp. - article Bogen, A. & ... Knowledge discovery and experience modeling in computer forensics media analysis 2004 of the 2004 international symposium on , pp. - article URL Bogolea, B. & ... Information security curriculum creation: a case study 2004 Proceedings of the 1st annual conference on , pp. - article URL Bologna, G., Lindquist, R. & ... ACCOUNTANT'S HANDBOOK OF FRAUD AND COMMERCIAL CRIME 1993 No.: ISBN 0-471-52642-8, pp. - article URL Bologna, J. Computer Crime: Wave of the Future 1981 , pp. - book Boni, W.C. & Kovacich, G.L. Netspionage : the global threat to information 2000 , pp. XX, 260 str.- book Boockholdt, J., HORVITZ, J. & ... Prosecution of Computer Crime 1978 JOURNAL OF , pp. - article URL Booth, M. The triads: the Chinese criminal fraternity 1990 , pp. - book Borchgrave, A.D., Cilluffo, F., Cardash, S. & ... Cyber threats and information security meeting the 21st century challenge 2001 , pp. - book URL Bosworth, S. & ... Computer security handbook 2002 , pp. - book Botha, M. & ... Utilising fuzzy logic and trend analysis for effective intrusion detection 2003 Computers & Security, pp. - article URL Bottom, N. & ... Security & loss control 1983 , pp. - book II-II-II-II-If Bowers, D. Access control and personal identification systems 1988 No.: ISBN 0-409-90083-4, pp. - article URL Bowker, A. The advent of the computer delinquent 2000 FBI Law Enforcement Bulletin, pp. - article URL Bowker, A. Juveniles and Computers: Should We Be Concerned 1999 Fed. Probation, pp. - article URL Bowker, A. & ... Computer Crime in the 21st Century and Its Effect on the Probation Officer 2000 Fed. Probation, pp. - article URL Bowker, A.L. The advent of the computer delinquent 2000 FBI law enforcement bulletin Vol. 69(12), pp. str. 7-11 article Boyd, C. & ... Time and date issues in forensic computingA~a,-a€t'a case study 2004 Digital Investigation, pp. - article URL Bradford, P., Brown, M., Perdue, J. & ... Towards proactive computer-system forensics 2004 Technology: Coding and , pp. - article URL Branigan, S. High-tech crimes revealed: cyberwar stories from the digital front 2004 , pp. - book Branscomb, A. Rogue computer programs and computer rogues: Tailoring the punishment to fit the crime 1990 Rutgers Computer & Tech. LJ, pp. - article URL Brenner, S. Is There Such a Thing as' Virtual Crime'? 2001 California Criminal Law Review, Vol. 4, No. 1, 2001, pp. article URL Brill, A., Pollitt, M. & ... The evolution of computer forensic best practices: an update on programs and publications 2006 Journal of Digital Forensic , pp. - article URL Britz, M. Computer forensics and cyber crime 2004 , pp. - book Britz, M. Computer Forensics and Computer Crime 2003 , pp. - book Broadhurst, R. Developments in the global law enforcement of cybercrime 2006 Policing: An International Journal of Police , pp. - article URL Bronitt, S. & ... Shifting boundaries of cybercrime: From computer hacking to cyber-terrorism 2003 CRIMINAL LAW JOURNAL- , pp. - article Brown, D. & ... Using clustering to discover the preferences of computer criminals 2001 Systems, Man and Cybernetics, , pp. - article URL Brown, D., Gunderson, L. & ... Interactive analysis of computer crimes 2000 Computer, pp. - article URL Brungs, A. & Jamieson, R. Identification of legal issues for computer forensics 2005 Information Systems Management, pp. - article URL Bržan, D. Računalniška forenzika in računalniško preiskovanje : magistrsko delo 2011 , pp. 80 str.- book URL Buckland, J. & ... Combating computer crime: prevention, detection, investigation 1992 , pp. - book BudimliA„a€", M. Kompjuterski kriminalitet izmeA„a€u teorije i prakse (Transl.: Computer crime between theory and practice) 2003 Sarajevo, Fakultet kriminalitiA„Šokih nauka, pp. - article Bumke, D. Computer Crime 1980 The Saturday Evening Post, pp. - article Burk, D. Transborder intellectual property issues on the Electronic Frontier 1994 Stan. L. & Pol'y Rev., pp. - article URL Burns, R., Whitworth, K. & ... Assessing law enforcement preparedness to address Internet fraud 2004 Journal of Criminal Justice, pp. - article URL Bynum, T. Computer ethics: Its birth and its future 2001 Ethics and Information Technology, pp. - article URL Bynum, T. & ... Computer ethics and professional responsibility 2004 , pp. - book Cardinali, R. Reinforcing our moral vision: examining the relationship between unethical behaviour and computer crime 1995 Work Study, pp. - article URL Carl, G., Kesidis, G., Brooks, R. & ... Denial-of-service attack-detection techniques 2006 Internet Computing, IEEE, pp. - article URL Carney, M. & ... The Trojan made me do it: A first step in statistical based computer forensics event reconstruction 2004 International Journal of Digital Evidence, pp. - article Carrier, B. File system forensic analysis 2005 , pp. XX, 569 str.- book Carrier, B. & ... Getting physical with the digital investigation process 2003 International Journal of Digital Evidence, pp. - article Carroll, J.M. Computer security 1996 , pp. - book Carter, D. Computer crime categories: how techno-criminals operate 1995 FBI law enforcement bulletin, pp. - article Carter, D. & ... Computer crime and security: The perceptions and experiences of corporate security directors 2006 Security Journal, pp. - article URL Carter, D. & ... Computer-related crime 2002 Op. cit, pp. - article Carter, D. & ... Computer crime: An emerging challenge for law enforcement 1996 FBI Law Enforcement Bulletin, pp. - article URL Casabona, P. & ... Computer Fraud: Financial and Ethical Implications 1998 Review of Business, pp. - article URL Casey, E. Digital Evidence and Computer Crime. 2000 Academic Press, pp. - article Casey, E. Digital evidence and computer crime: forensic science, computers, and the Internet 2011 , pp. - other Casey, E. Investigating sophisticated security breaches 2006 Communications of the ACM, pp. - article URL CASEY, E. Digital Evidence and Computer Crime, [Sl]: Elsevier Academic Press 2004 ISBN, pp. - article Casey, E. Chapter 13: Forensic examination of handheld devices, digital evidence and computer crime 2004 , pp. - book Casey, E. ur.(2004) Handbook of computer crime investigation: Forensic tools and technology 2004 London-San Diego: Elsevier , pp. - article Casey, E. Digital evidence and computer crime 2003 , pp. - book Casey, E. Handbook of computer crime investigation: forensic tools and technology 2002 , pp. - book Casey, E. Practical approaches to recovering encrypted digital 2002 International Journal of Digital Evidence, pp. - article evidence Casey, E. Digital evidence and computer crime : forensic science, computers and the Internet 2000 , pp. 279 str.- book Casey, E. Handbook of Computer Crime 2000 Forensic Science, Computer and the Internet, pp. - article Casey, E. & ... The investigative process in Digital evidence and computer crime: forensic science, computers and the Internet 2004 , pp. - book Castelli, G. & ... Il dolo informatico: come combattere il" computer crime" 1988 , pp. - book Center, C. How the FBI Investigates Computer Crime 2004 , pp. - book Cerullo, V. & ... Business continuity planning: A comprehensive approach 2004 Information Systems Management, pp. - article URL CFE, K. Computer Forensic Case Study: Espionage, Part 1 Just Finding the File is Not Enough! 2001 Information Systems Security, pp. - article URL Chambers, A. Computer auditing 1986 , pp. - book Chan, H. A comparative study of reported and unreported computer crimes 2000 , pp. - book URL Chang, W., Chung, W., Chen, H. & An international perspective on fighting cybercrime 2003 Proceedings of the 1st NSF/NIJ , pp. - article URL Charney, S. Christensen O'Connor Johnson Kindness les 9 et 10 septembre 1996, Seattle, chapitre 7;" Congress Approves Electronic Espionage and Computer Crime 1997 Computer Law and Security Report, pp. - article Charney, S. The justice department responds to the growing threat of computer crime 1992 Computer Security Journal, pp. - article URL Charney, S. & ... Computer Crime 1996 Emory LJ, pp. - article URL Chaski, C. Who's at the keyboard? Authorship attribution in digital evidence investigations 2005 International Journal of Digital Evidence, pp. - article Chen, C. Computer crime and the computer fraud and abuse act of 1986 1990 Computer/Law Journal, pp. - article Chen, C. & Lindsay, G. Viruses, attacks, and sabotage: It's a computer crime wave 2000 Fortune, pp. - article Chen, H. Intelligence and security informatics: international workshop, WISI 2006, Singapore, April 9, 2006: proceedings 2006 , pp. - book Chen, H., Chung, W., Xu, J., Wang, G., Qin, Y. & ... Crime data mining: a general framework and some examples 2004 Computer, pp. - article URL Chen, T. Intrusion detection for viruses and worms 2004 IEC Annual Review of Communications, pp. - article Chen, Y., Chen, P., Hwang, J., Korba, L. & ... An analysis of online gaming crime characteristics 2005 Internet , pp. - article URL Chen, Y., Chen, P., Song, R. & ... Online gaming crime and security issue-cases and 2004 , pp. - book URL countermeasures from taiwan Chen, Y., Lin, S. & ... The influence of computer crime in online gaming on E-society-taking example for Taiwan in 2002 2003 on Innovative Information Technology Policy and E- , pp. article Cheurprakobkit, S. & ... Computer crime enforcement in Texas: funding, training, and investigating problems 2003 Journal of Police and Criminal Psychology, pp. - article URL Chien, E. & Bunker, L. Cyber viruses : how business can win in the battle that is not yet won 2000 Intersec Vol. 10(11/12), pp. str. 379-381 article Choi, K. Computer crime victimization and integrated theory: An empirical assessment 2008 International Journal of Cyber Criminology, pp. - article Chung, W., Chen, H., Chang, W. & Fighting cybercrime: a review and the Taiwan experience 2006 Decision Support Systems, pp. - article URL CiardhuA,E$in, S. An extended model of cybercrime investigations 2004 International Journal of Digital Evidence, pp. - article Clark, F. & ... Investigating computer crime 1996 No.: ISBN 0-8493-8158-4, pp. - article URL Clifford, R. Cybercrime: The investigation, prosecution and defense of a computer-related crime 2001 , pp. - book URL Clough, B. Computer Crime 1997 , pp. - book Clutterbuck, R. Terrorism, drugs and crime in Europe after 1992 1990 No.: ISBN 0-415-05443-5, pp. - article URL Code, T. Chapter 33 1996 Computer Crime, pp. - article Cohen, C.L. Growing challenge of computer forensics 2007 The Police chief Vol. 74(3), pp. str. 24-29 article Cohen, F. Computer viruses: theory and experiments 1987 Computers & security, pp. - article URL Coldwell, R. Australian attitudes toward legal intervention into hacking 1995 Communications of the ACM, pp. - article URL Coldwell, R. Perceptions of Computer Crime 1994 Crime against Business, Australian Institute of , pp. - article Coldwell, R. University students' attitudes towards computer crime: a research note 1993 ACM SIGCAS Computers and Society, pp. - article URL Coldwell, R. Some social parameters of computer crime 1990 Australian Computer Journal, pp. - article Coldwell, R. Non-professional practices in computing: Some thoughts on the next decade or so. 1987 AUST. COMP. J., pp. - article URL Coleman, J. The criminal elite: Understanding white-collar crime 2005 , pp. - book Collier, P. & ... A forensic methodology for countering computer crime 1992 Artificial intelligence review, pp. - article URL Collier, P. & ... Problems in policing computer crime 1992 Policing and Society: An International , pp. - article URL Collins, J. Demand for Computer Crime Investigation Increases 1987 Data Management, pp. - article Colombell, M. The legislative response to the evolution of computer viruses 2002 Rich. JL & Tech., pp. - article 1 II II II II II 1 Colton, K. & ... Computer crime: Electronic fund transfer systems and crime 1982 , pp. - book Colvin, B. Computer Crime Investigators-a New Training Field 1979 FBI Law Enforcement Bulletin, pp. - article URL Commission, S.L. Report on Computer Crime: Presented to Parliament by the Lord Advocate by Command of Her Majesty, July 1987 1987 , pp. - book Congress, U. The federal computer crime statute. 18 USCA~ 030 1986 US Congress, Washington, DC, pp. - article Conley, J. & ... A survey of computer crime legislation in the United States 1999 Information and Communications , pp. - article URL Conly, C., (US), N.I. o.J. & ... Organizing for computer crime investigation and prosecution 1989 , pp. - book Conly, C. & ... Computer Crime 1990 NIJ Reports, pp. - article Conly, C.H. Organizing for computer crime investigation and prosecution [1998? ] Issues and Practices in Criminal Justice, pp. VI, 124 str.- book Conry-Murray, A. Deciphering the Cost of a Computer Crime 2002 NETWORK MAGAZINE-SAN FRANCISCO-, pp. - article Conser, J., Carsone, L. & ... Investigating Computer-Related Crimes Involving Small Computer Systems 1988 Critical Issues in Computer Investigation 2nd , pp. - article Cooper, J. & ... Computer-security technology 1984 , pp. - book URL Corbett, P. State and Federal Criminal Cyberlaw and Legislation Survey 2001 TM Cooley L. Rev., pp. - article URL Corbett, P. Michigan's Arsenal for Fighting Cybercrime: An Overview of State Laws Relating to Computer Crimes 2000 MICHIGAN BAR JOURNAL, pp. - article Cordeiro, W. Suggested management responses to ethical issues raised by technological change 1997 Journal of Business Ethics, pp. - article URL Couch, R. Suggested Legislative Approach to the Problem of Computer Crime 1981 Wash. & Lee L. Rev., pp. - article URL Couch, R. Suggested Legislative Approach to the Problem of Computer Crime, XXXVIII Wash & Lee L 1981 , pp. - book Coutorie, L. The future of high-technology crime: A parallel Delphi study 1995 Journal of Criminal Justice, pp. - article URL Cra, D. Two bills equal forewarning 1989 , pp. - book Craiger, P., Ponte, L., Whitcomb, C. & ... Master's Degree in Digital Forensics 2007 , 2007. HICSS 2007. , pp. - article URL Criscuoli, E. What personnel administrators should know about computer crime 1981 Personnel Administrator Dated:(September 1981), pp. - article URL Croall, H. White collar crime 1992 No.: ISBN 0-335-09656-5, pp. - article URL Cronan, T., Foltz, C. & ... Piracy, computer crime, and IS misuse at the university 2006 Communications of the ACM, pp. - article URL Cronin, B. Strategic intelligence and networked business 2000 Journal of information science, pp. - article URL CSI, C. Computer Crime and Security Survey 2009 , pp. - book CSI, C. FBI computer crime and security survey 2001 Computer Security Issues & Trend, pp. - article Csonka, P. The Council of Europe Convention on Cyber-crime: A response to the challenge of the new age 2005 Cyber-crime: The challenge in Asia, pp. - article Csonka, P. INTERNET CRIME: THE DRAFT COUNCIL OF EUROPE CONVENTION ON CYBER-CRIME: A RESPONSE TO THE CHALLENGE OF CRIME IN THE AGE OF THE 2000 Computer Law & Security Review, pp. - article URL Cumiskey, A. Internet and telecoms security in the EU 1999 Intersec Vol. 9(2), pp. str. 42-44 article Cunningham, W., Strauchs, J. & ... The Hallcrest Report II: Private Security Trends 19702000 1990 Stoneham, MA: Butterworth , pp. - article URL Cunningham, W., Strauchs, J. & ... Private security trends, 1970 to 2000: The Hallcrest report II 1990 , pp. - book Cutrera, T. Constitution in Cyberspace: The Fundamental Rights of Computer Users, The 1991 UMKC L. Rev., pp. - article URL D'Arcy, J., Hovav, A. & ... User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach 2009 Information Systems Research, pp. - article URL David, J., Karl, S. & ... Computer Crime 1999 Reilly Associates Inc. Taiwan Branch, pp. - article Davies, D. The nature of computer crime 1990 Computers and Law, pp. - article Davis, B. It's Virus Season again, Has Your Computer Been Vaccinated: A Survey of Computer Crime Legislation as a Response to Malevolent Software 1994 Wash. ULQ, pp. - article URL Davis, J.B. Computer intrusion investigation guidelines 2001 FBI law enforcement bulletin Vol. 70(1), pp. str. 8-11 article Davis, R. & ... Computer crime in canada 1999 CRIMINAL LAW QUARTERLY, pp. - article Debelak, B. Računalniška forenzika - organizacijski vidiki : diplomsko delo visokošolskega študija 2007 , pp. 49 f.- book DeFrances, C. Prosecutors in state courts, 2001 2002 BJS Bulletin. Washington, DC: US Department of , pp. - article URL DeLooze, L. Classification of computer attacks using a self-organizing map 2004 Workshop, 2004. Proceedings from the Fifth , pp. - article URL DeMarco, J. It's Not Just Fun and 'War Games'-Juveniles and Computer Crime' 2001 United States Attorneys' Bulletin, pp. - article Denning, D. Concerning hackers who break into computer systems 1990 High Noon on the Electronic Frontier: Conceptual , pp. - article URL Denning, D., Neumann, P. & ... Social aspects of computer security 1987 Proceedings of the 10th , pp. - article I-II-II-II-II-II-1 Denning, D.E. Information warfare and security 1999 , pp. XVII, 522 str.- book Denning, P. Computers under attack: intruders, worms, and viruses 1990 , pp. - book Denning, P. Computers, crime and privacyA~a,-a€t'a national dilemma: congressional testimony from the industry 1984 Communications of the ACM, pp. - article Deutch, M. Computer legislation: Israel's new codified approach 1996 J. Marshall J. Computer & Info. L., pp. - article URL Dhillon, G. Principles of information systems security: Texts and Cases 2006 Recherche, pp. - article URL Dhillon, G. Challenges in managing information security in the new millennium 2001 Information security management: global challenges in , pp. - article URL Dhillon, G. Violation of safeguards by trusted personnel and understanding related information security concerns 2001 Computers & Security, pp. - article URL Dhillon, G. Computer crime: interpreting violation of safeguards by trusted personnel 1999 information technology resources in organizations in , pp. article Dhillon, G. Managing and controlling computer misuse 1999 Information Management & Computer Security, pp. - article URL Dhillon, G. & ... Computer crimes: theorizing about the enemy within 2001 Computers & Security, pp. - article URL Dhillon, G., Silva, L. & ... Computer crime at CEFORMA: a case study 2004 International journal of information , pp. - article URL DiDio, L. Computer Crime Costs on the Rise 1998 Computerworld, pp. - article Diehl, E. & ... A,A© watermark: Closing the analog hole 2003 Consumer Electronics, 2003. ICCE. 2003 , pp. - article URL Dierks, M. Computer network abuse 1992 Harv. JL & Tech., pp. - article URL Dittrich, D. Developing an effective incident cost analysis mechanism 2002 Security Focus, pp. - article Dixon, P. An overview of computer forensics 2005 Potentials, IEEE, pp. - article URL Doney, L. The growing threat of computer crime in small businesses 1998 Business Horizons, pp. - article DONN, B. Fighting Computer Crime: A New Framework for Protecting Information 1998 , pp. - book Douglas, J., Burgess, A., Burgess, A. & ... Crime classification manual: A standard system for investigating and classifying violent crimes 2011 , pp. - book Dowland, P., Furnell, S., Illingworth, H. & ... Computer crime and abuse: A survey of public attitudes and awareness 1999 Computers & , pp. - article URL Drevenšek, M. Ponarejanje zgoščenk, kreditnih kartic in blagovnih znamk : diplomska naloga 2000 , pp. 59 f.- book Duff, L. & ... Computer Crime in the Global Village: Strategies for Control and RegulationA~a,-a€t'in Defence of the Hacker 1996 International Journal of the Sociology of Law, pp. - article URL Dunne, R. Deterring Unauthorized Access to Computers: Controlling Behavior in Cyberspace Through a Contract Law Paradigm 1994 Jurimetrics J., pp. - article URL 1 II II II II II 1 Durkin, K. Misuse of the Internet by pedophiles: Implications for law enforcement and probation practice 1997 Fed. Probation, pp. - article URL Durkin, K. & ... A~a,-Š>Log on to sexA~a,-Ši\: Some notes on the carnal computer and erotic cyberspace as an emerging research frontier 1995 , pp. - book URL Duyn, J.V. The human factor in computer crime 1985 , pp. - book Easttom, C. & ... Computer Crime Investigation and the Law 2010 , pp. - book Eckert, W. Interpretation of bloodstain evidence at crime scenes 1999 , pp. - book Ekblom, P. Gearing up against crime 1997 International Journal of Risk, Security and , pp. - article Eliasson, R. Datorbrott (Computer Crime) 1982 Treatise from the UmeA,A„ University, pp. - article Eltringham, S. Computer Crime and Intellectual Property Section, US Department of Justice 2007 Prosecuting Computer Crimes, pp. - article Embar-Seddon, A. Cyberterrorism 2002 American Behavioral Scientist, pp. - article URL Endicoytt-Popuvsky, B. Ethics and teaching information assurance 2003 Security & Privacy, IEEE, pp. - article URL Eoghan, C. Handbook of computer crime investigation 2002 , pp. - book Eoghan, C. Digital evidence and computer crime 2000 San Diego, Calif, pp. - article Erbschloe, M. Forces of change: ten trends that will impact the internet over the next five years 2001 Information systems management, pp. - article URL Esbensen, D. Method and apparatus for automated network-wide surveillance and security breach intervention 1998 US Patent 5,796,942, pp. - article URL Esbenshade, P. Hacking: Juveniles and Undeterred Recreational Cybercrime 2002 J. Juv. L., pp. - article URL Etter, B. Computer crime 2001 4th National Outlook Symposium on Crime in Australia- , pp. - article Etter, B., Research, A.C. f.P. & ... Forensic Challenges of E-Crime 2001 , pp. - book URL Etter, C. The challenge of the forensic investigation of computer crime 2001 Platypus Magazine, pp. - article Evers, J. Computer crime costs $67 billion, FBI says 2006 CNET News. com, pp. - article Exum, J. Making the Punishment Fit the (Computer) Crime: Rebooting Notions of Possession for the Federal Sentencing of Child Pornography Offenses 2010 Rich. JL & Tech., pp. - article URL Fagin, J. Criminal justice 2007 No.: ISBN 0-205-47893-X, pp. - article URL Farahmand, F., Navathe, S., Sharp, G. & ... Assessing Damages of Information Security Incidents and Selecting Control Measures, a Case Study Approach 2005 Proceedings of the , pp. - article Fedoreck, T. Computers+ Connectivity= New Opportunities for Criminals and Dilemmas for Investigators 2004 NY ST. BJ, pp. - article Fifield, K. Smartcards outsmart computer crime 1989 Computers & Security, pp. - article URL Flanagan, A. The law and computer crime: Reading the Script of Reform 2005 International Journal of Law and Information , pp. - article URL Fluendy, S. Phishing targeting online outlets. Computer Crime Research Center 2005 , pp. - book Flusche, K. Computer Crime and Analysis of Computer Evidence: It Ain't Just Hackers and Phreakers Anymore! 1998 Information systems security, pp. - article URL Foltz, C. Bryan.(2004)," Cyberterrorism, Computer Crime, and Reality 2004 Information Management & Computer Security, pp. - article Foltz, C. Cyberterrorism, computer crime, and reality 2004 Information Management & Computer Security, pp. - article URL Foltz, C., Cronan, T. & ... Have you met your organization's computer usage policy? 2005 Industrial Management & , pp. - article URL Foltz, C., Cronan, T. & ... Human behavior as a factor in the control of information systems misuse and computer crime 2002 Decision Sciences Institute 2002 Annual Meeting , pp. - article Foltz, C., Schwager, P. & ... Why users (fail to) read computer usage policies 2008 Industrial Management & , pp. - article URL Forcht, K. Assessing the ethical standards and policies in computer-based environments 1991 A Question of Ethics: Developing Information System , pp. - article Forcht, K., Thomas, D. & ... Computer crime: Assessing the lawyer's perspective 1989 Journal of Business Ethics, pp. - article URL Forensic, K. Fraud survey 2003 2003 Montvale, NJ, pp. - article Forte, D. Strategic aspects in international forensics 2005 Forensic science series, pp. Str. 179-206 article Fossen, E. Principles of internet investigation: Basic reconnaissance, geopositioning, and public information sources 2005 Unpublished master's thesis, Norwegian University of , pp. - article Foster, D. Can the general theory of crime account for computer offenders: Testing low self-control as a predictor of computer crime offending 2004 , pp. - book URL Francia, G. & ... Computer forensics laboratory and tools 2005 Journal of Computing Sciences in Colleges, pp. - article URL Francis, D. Computer crime 1987 No.: ISBN 0-525-67192-7, pp. - article URL Freeh, L. speech to the 1997 International Computer Crime Conference 1997 , pp. - book Friedman, B. Moral Responsibility and Computer Technology. 1990 , pp. - book URL Friedman, D. & ... Future imperfect: technology and freedom in an uncertain world 2008 , pp. - book Friedrichs, D. Trusted criminals: White collar crime in contemporary society 2009 , pp. - book Furnell, S. Cybercrime: Vandalizing the information society 2002 , pp. - book Furnell, S. The problem of categorising cybercrime and 2001 2nd Australian Information Warfare and Security , pp. - article cybercriminals Furnell, S. & ... Computer hacking and cyber terrorism: The real threats in the new millennium? 1999 Computers & Security, pp. - article URL Furnell, S. & ... Computer abuse: vandalizing the information society 1997 Internet research, pp. - article URL Furnell, S., Dowland, P., Illingworth, H. & ... Authentication and supervision: A survey of user attitudes 2000 Computers & , pp. - article URL Gabrys, E. The international dimensions of cyber-crime, part 1 2002 Information systems security, pp. - article URL Gaensslen, R. How do I become a forensic scientist? Educational pathways to forensic science careers 2003 Analytical and bioanalytical chemistry, pp. - article URL Gammer, M. Computer Crime 1980 American Criminal Law Review, pp. - article URL Gardner, E., Samuels, L., Render, B. & ... The importance of ethical standards and computer crime laws for data security 1989 Information System , pp. - article URL Garfinkel, S. The FBI's Cybercrime Crackdown 2002 TECHNOLOGY REVIEW-MANCHESTER NH-, pp. - article Garfinkel, T. & ... When virtual is harder than real: Security challenges in virtual machine based computing environments 2005 Proceedings of the 10th conference on Hot , pp. - article URL Garg, A., Curtis, J. & ... Quantifying the financial impact of IT security breaches 2003 Information Management & , pp. - article URL Garner, B. & ... Black's Law Dictionary Deluxe 8 1999 Auditing, pp. - article Geary, J. Executive liability for computer crime and how to prevent it 1994 Information Management & Computer Security, pp. - article URL Geer, D. Security technologies go phishing 2005 Computer, pp. - article URL Geer, D. Malicious bots threaten network security 2005 Computer, pp. - article URL Gemignani, M. What is Computer Crime, and Why Should We Care 1987 UALR LJ, pp. - article URL Gemignani, M. Computer Crime: The Law in'80 1980 Ind. L. Rev., pp. - article URL George, B. Contemporary Legislation Governing Computer Crimes 1985 Criminal Law Bulletin, pp. - article URL George, N. Cyber traps: An overview of crime, misconduct and security risks in the cyber environment 2004 Capacity building series, pp. - article URL Geradts, Z.J. Content-based information retrieval from forensic image databases : [dissertation] 2002 , pp. 148 f.- other URL Gilbert, J. Criminal investigation 1993 , pp. - book Gillard, C. & ... Computer crime: a growing threat 1983 BYTE Mag, pp. - article Gish, J. Computer Crime and Punishment-The View From the DA's Office 1985 Information Stategy-The Executive's Journal, pp. - article URL Glynn, E. Computer Abuse: The Emerging Crime and the Need for Legislation 1983 Fordham Urb. LJ, pp. - article URL 1 II II II II II 1 Goldfarb, A. & ... Economic and business dimensions Search engine advertising 2008 Communications of the ACM, pp. - article URL Gonzalez, P. Addressing computer crime legislation: Progress and regress. 1983 COMP. LAW J., pp. - article URL Goodhue, D. & ... Security concerns of system users* 1:: A study of perceptions of the adequacy of security 1991 Information & Management, pp. - article URL Goodhue, D. & ... Security concerns of system users: a proposed study of user preceptions of the adequacy of security measures 1989 System Sciences, 1989. Vol. IV: , pp. - article URL Goodman, M. Making computer crime count 2001 FBI Law Enforcement Bulletin, pp. - article URL Goodman, M. My the Police Don't Care About Computer Crime, 10HARV 1997 JL & TECH, pp. - article Goodman, M. Why the police don't care about computer crime'(1997) 10 1997 Harvard journal of law and technology, pp. - article Goodman, M. Why the Police Don't Care About Computer Crime 1996 Harv. JL & Tech., pp. - article URL Gorden, L. Computer crime and security survey 2004 CSI/FBI, pp. - article Gordon, G., Hosmer, C., Siedsma, C., Rebovich, D. & ... Assessing technology, methods, and information for committing and combating cyber crime 2002 , pp. - book URL Gordon, L., Loeb, G., Lucyshyn, W. & ... 9th Annual FBI/CSI computer crime and security survey 2004' 2004 , pp. - book Gordon, L., Loeb, M. & ... The 2005 CSI/FBI computer crime and security survey 2005 Computer Security , pp. - article Gordon, L., Loeb, M. & ... A framework for using insurance for cyber-risk management 2003 Communications of the ACM, pp. - article URL Gordon, L., Loeb, M., Lucyshyn, W. & ... Eleventh annual CSI/FBI computer crime and security survey 2006 2007 Computer Security Institute, pp. - article Gordon, L., Loeb, M., Lucyshyn, W. & ... CSI 2006 FBI computer crime and security , pp. - article Gordon, L., Loeb, M., Lucyshyn, W. & ... 2006 csi/fbi computer crime and security survey 2006 Computer Security , pp. - article Gordon, L., Loeb, M., Lucyshyn, W. & ... Computer crime and security survey, 2006 2006 , pp. - book Gordon, L., Loeb, M., Lucyshyn, W. & ... 10th annual CSI/FBI computer crime and security survey 2005 , pp. - book Gordon, L., Loeb, M., Lucyshyn, W. & ... The annual CSI/FBI computer crime and security survey 2005 CSI (Ed.), pp. - article Gordon, L., Loeb, M., Lucyshyn, W. & ... Ninth CSI/FBI computer crime and security survey 2004 , pp. - book Gordon, L., Loeb, M., Lucyshyn, W. & ... 2004 CSI/FBI computer crime and security survey 2004 Computer Security , pp. - article Gordon, L., Loeb, M., Lucyshyn, W. & ... The ninth annual 2004 CSI/FBI Computer crime and security survey 2004 /www. gocsi. com/.[Cited 20th Oct , pp. - article Gordon, S. & ... On the definition and classification of cybercrime 2006 Journal in Computer Virology, pp. - article URL Gordon, S. & ... Computer crime revisited: The evolution of definition and classification 2006 European Institute for Computer Anti-Virus Research ( , pp. - article Gottschalk, L., Liu, J., Dathan, B., Fitzgerald, S. & ... Computer forensics programs in higher education: a preliminary study 2005 ACM SIGCSE Bulletin, pp. - article URL Gould, C. The information web: ethical & social implications of computer networking 1988 , pp. - book Grabosky, P. 'Computer Crime: Challenge to Law Enforcement 2000 Law Enforcement Review N, pp. - article Grabosky, P. Computer crime: A criminological overview 2000 Workshop on Crimes Related to the Computer Network , pp. - article Grabosky, P. & ... The Future of Cyber-crime in Asia 2005 Broadhurst, RG, pp. - article Grabosky, P. & ... Telecommunication fraud in the digital age 2001 Crime and the Internet, pp. - article Grabosky, P. & ... Crime in the digital age: Controlling telecommunications and cyberspace illegalities 1998 , pp. - book Grabosky, P.N. Crime in the digital age : controlling telecommunications and cyberspace illegalities 1998 , pp. XI, 259 str.- book Granick, J. Faking It: Calculating Loss in Computer Crime Sentencing 2005 ISJLP, pp. - article URL Grant, A., David, F. & ... Child pornography in the digital age 1997 Transnational Organized Crime, pp. - article URL Grazioli, S. & ... Consumer and business deception on the Internet: Content analysis of documentary evidence 2003 International Journal of Electronic Commerce, pp. - article URL Green, G. & ... Introduction to security 1987 , pp. - book Green, V. State computer crime statutes and the use of traditional doctrines to prosecute the computer criminal 1989 memorandum), Reed, Smith, Shaw, and McClay, , pp. - article Gresty, D., Shi, Q. & ... Requirements for a general framework for response to distributed denial-of-service 2001 Computer Security Applications , pp. - article URL Griffith, D. Computer Fraud and Abuse Act of 1986: A Measured Response to a Growing Problem, The 1990 Vand. L. Rev., pp. - article URL Griffiths, M. Computer Crime and Hacking: A Serious Issue for the Police 2000 POLICE JOURNAL, pp. - article Gripman, D. The doors are locked but the thieves and vandals are still getting in: A proposal in tort to alleviate corporate America's cyber-crime problem 1997 J. Marshall J. Computer & Info. l., pp. - article URL Grodzinsky, F. & ... Is Cyberstalking a Special Type of Computer Crime 2001 Proceedings of ETHICPMP, pp. - article Groover, R. Overcoming obstacles: Preparing for computer-related 1996 FBI Law Enforcement Bulletin, pp. - article URL crime Guisnel, J. Guerres dans le cyberespace : services secrets et Internet 1995 Enquetes, pp. 251 str.- book Gupta, M., Chaturvedi, A., Mehta, S. & ... The experimental analysis of information security management issues for online financial services 2000 Proceedings of the twenty , pp. - article URL Haagman, D. & ... Trojan defence: A forensic view 2005 Digital Investigation, pp. - article URL Hagen, J., Sivertsen, T. & ... Protection against unauthorized access and computer crime in Norwegian enterprises 2008 Journal of Computer Security, pp. - article URL Haggerty, J. & ... Managing corporate computer forensics 2006 Computer Fraud & Security, pp. - article URL Halbert, D. Discourses of danger and the computer hacker 1997 The Information Society, pp. - article URL Hall, J. & ... The Sarbanes-Oxley Act: implications for large-scale IT outsourcing 2007 Communications of the ACM, pp. - article URL Hamilton, C. Risk management and security 1999 Information systems security, pp. - article URL Hansen, R. The computer virus eradication act of 1989: the war against computer crime continues 1990 Software Law Journal, pp. - article Harrington, S. Software piracy: Are Robin Hood and responsibility denial at work? 2000 of information technology management in the , pp. - article URL Harrington, S. The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions 1996 MIS quarterly, pp. - article URL Harrington, S. Computer Crime & Abuse by US Employees: Something to Worry About? 1995 Journal of Systems Management, pp. - article Harrington, S. Why People Copy Software and Create Computer Viruses 1989 Information Resources Management Journal (IRMJ), pp. - article URL Harrington, S. & ... Lessons from corporate America applied to training in computer ethics 1990 ACM SIGSAC Review, pp. - article URL Harris, A. IS ethical attitudes among college students: A comparative study 2000 Proceedings of ISECON, pp. - article Harris, K. & ... Computer Crime: An Overview 1995 Technical Bulletin, pp. - article URL Hatcher, M., McDannell, J. & ... Computer Crimes 1999 Am. Crim. L. Rev., pp. - article URL Haugen, S. & ... Identifying and controlling computer crime and employee fraud 1999 Industrial Management & Data Systems, pp. - article URL Hearnden, K. Computer crime and people 1990 A handbook of computer crime, London: Kogan Page, pp. article Hearst, M. TileBars: visualization of term distribution information in full text information access 1995 Proceedings of the SIGCHI conference on Human , pp. - article URL Heinlein, E. Principles of information systems security 1995 Computers & Security, pp. - article Held, D. & ... Governing globalization: Power, authority and global governance 2002 , pp. - book Henning, J. & ... Insider trading, money laundering and computer crime 2000 Transactions of the Centre for Business , pp. - article Henry, S. & ... The criminology theory reader 1998 No.: ISBN 0-8147-3551-7, pp. - article URL Henseler, H. Computer Crime and Computer Forensics 2000 The encyclopedia of forensic science, pp. - article Herig, J. Computer crime in Florida: 1989 1989 Tallahassee, FL: Florida Department of Law , pp. - article Hernandez, C. & ... Transnational crime and regional security in the Asia Pacific 1999 , pp. - book Herringshaw, C. Detecting attacks on networks 1997 Computer, pp. - article URL Heymann, S. Legislating Computer Crime 1997 Harv. J. on Legis., pp. - article URL Higgins, G. Can low self-control help with the understanding of the software piracy problem? 2004 Deviant Behavior, pp. - article URL Higgins, G. & ... Does social learning theory condition the effects of low self-control on college students' software piracy 2004 Journal of Economic Crime Management, pp. - article Higgins, G. & ... SELF-CONTROL, DEVIANT PEERS, AND SOFTWARE PIRACY 1 2004 Psychological reports, pp. - article URL Higgins, G., Wilson, A. & ... An application of deterrence theory to software piracy 2005 Journal of Criminal Justice and , pp. - article Hinduja, S. Deindividuation and Internet software piracy 2008 CyberPsychology & Behavior, pp. - article URL Hinduja, S. Investigating computer crime 2008 Crimes of the Internet, Prentice-Hall, Upper Saddle , pp. - article Hinduja, S. Computer crime investigations in the United States: leveraging knowledge from the past to address the future 2007 International Journal of Cyber Criminology, pp. - article Hinduja, S. Perceptions of local and state law enforcement concerning the role of computer crime investigative teams 2004 Policing: An International Journal of Police , pp. - article URL Hinduja, S. Trends and patterns among online software pirates 2003 Ethics and Information Technology, pp. - article URL Hinduja, S. Correlates of Internet software piracy 2001 Journal of Contemporary Criminal Justice, pp. - article URL Hitchings, J. Deficiencies of the traditional approach to information security and the requirements for a new methodology 1995 Computers & Security, pp. - article URL Hollinger, R. Crime, deviance and the computer 1997 , pp. - book Hollinger, R. Hackers: computer heroes or electronic highwaymen? 1991 ACM SIGCAS Computers and Society, pp. - article URL Hollinger, R. Computer hackers follow a Guttman-like progression 1988 Sociology and social research, pp. - article Hollinger, R. & ... THE PROCESS OF CRIMINALIZATION: THE CASE OF COMPUTER CRIME LAWS* 1988 Criminology, pp. - article URL Hollinger, R. & ... Criminal Law Formation: The Case of Computer Crime Legislation 1986 A paper presented at the 1986 Annual Meetings of , pp. - article 1 II II II II II 1 Holt, T. Examining a transnational problem: An analysis of computer crime victimization in eight countries from 1999 to 2001 2003 International Journal of Comparative and Applied , pp. - article URL Holt, T., Bossler, A. & ... Examining state and local law enforcement perceptions of computer crime 2010 Crime On-line: Correlates, Causes, and Context, , pp. - article Hong, H. Hacking Through the Computer Fraud and Abuse Act 1997 UC Davis L. Rev., pp. - article URL Hoo, K. How much is enough? A risk-management approach to computer security 2000 Workshop on Economics and Information Security, UC , pp. - article Hoonakker, P., Bornoe, N. & ... Password authentication from a human factors perspective: Results of a survey among end-users 2009 Proceedings of the Human , pp. - article URL Hoonakker, P., Carayon, P., Deb, J. & ... The use of focus groups to examine human factors in computer and information security 2008 Human Factors in , pp. - article Horvat, D. Kazenski postopek pri kaznivih dejanjih v zvezi z računalniki : diplomska naloga 2000 , pp. 57 f.- book Hosmer, C. Time-lining computer evidence 1998 Information Technology Conference, 1998. IEEE, pp. - article URL Householder, A., Houle, K. & ... Computer attack trends challenge Internet security 2002 Computer, pp. - article URL Hovav, A. & ... The impact of virus attack announcements on the market value of firms 2004 Information Systems Security, pp. - article URL Howard, J. & ... A common language for computer security incidents 1998 Sandia Report: SAND98-8667, Sandia , pp. - article Howerton, P. Computer crime (a tutorial) 1985 Proceedings of the 1985 ACM annual conference on , pp. article Huebner, E., Bem, D. & ... Computer forensics: past, present and future 2003 security Technical report, pp. - article Hughes, G. Computer crime: the liability of hackers 1990 Australian Computer Journal, pp. - article Hughes, G., Tucker, G., Thompson, D. & ... Legislative responses to computer crime 1990 , pp. - book Hughes, K. Comparing pretesting methods: cognitive interviews, respondent debriefing, and behavior coding 2004 Survey Methodology, pp. - article Hunt, C. Networking personal computers with TCP/IP 1995 , pp. - book Husted, B. The impact of national culture on software piracy 2000 Journal of Business Ethics, pp. - article URL Hutchinson, W. & ... Attacking the Attackers: Attitudes of Australian IT Managers to retaliation against hackers 1999 ACIS (Australasian Conference on , pp. - article Hyde-Bales, K., Morris, S. & ... The Policing Recording of Computer Crime 2004 Development and Practitioner Report, pp. - article Hyde-Bales, K., Morris, S., Charlton, A. & ... Police Recording of Computer Crime 2004 No.: ISBN 1 84473 488 , pp. - article URL Icov, D., Seger, K. & ... Computer Crime. A Crimefighter's Handbook, O'Reily & Associates 1995 Inc. Sebastopol, CA, pp. - article Icove, D. Collaring the cybercrook: an investigator's view 1997 Spectrum, IEEE, pp. - article URL Icove, D., Seger, K. & ... Computer crime: a crimefighter's handbook 1995 , pp. - book Icove, D., Seger, K. & ... Fighting Computer Crime 1995 , pp. - book Icove, D., Seger, K. & ... Computer Crime. O'Reilley & Associates 1995 Inc., Sebastopol, California, pp. - article Icove, D., Seger, K. & VonStorch, W. Computer crime : a crimefighter's handbook 1995 Computer security, pp. XXI, 437 str.- book IgnjatoviA„a€", A„. Pojmovno odreA„a€enje kompjuterskog kriminaliteta 1991 Anali Pravnog fakulteta u Beogradu, pp. - article URL III, B.Y. MANAGING E-BUSINESS RISKS 2001 , pp. - book III, G.F. Digital forensics laboratory projects 2006 Journal of computing Sciences in Colleges, pp. - article URL Ingraham, D. On Charging Computer Crime"(1980) 1980 Computer Law Journal, pp. - article Ingraham, D. On charging computer crime 1980 Computer LJ, pp. - article International Criminal Law Seminar, 2. The alleged transnational criminal : the Second Biennial International Criminal Law Seminar 1995 International bar association series, pp. XXI, 449 str.- inproceedings Iqbal, M. Defining cyberterrorism 2004 J. Marshall J. Computer & Info. L., pp. - article URL Irons, A. Computer forensics and records managementA~a,-a €scompatible disciplines 2006 Records Management Journal, pp. - article URL Jackson, K. Congress pushes computer crime law 1989 Federal Computer Week, pp. - article Jaishankar, K. Cyber criminology: Evolving a novel discipline with a new journal 2007 International Journal of Cyber Criminology, pp. - article Jakšič, B. Kibernetska vojna : (cyberwar) : diplomska naloga 2000 , pp. 55 f.- book Jambriško, D. Računalniški kriminal in avtorske pravice : diplomska naloga 1999 , pp. 64 f., [17] f. pril.- book Jensen, E. Electronic Soapbox: Computer Bulletin Boards and the First Amendment, An 1987 Fed. Comm. LJ, pp. - article URL Jessup, L., Valacich, J. & ... Information systems today 2003 , pp. - book Jewkes, Y. Crime online 2007 , pp. - book Jinyuan, L. Analysis of computer crime challenge the existing criminal law and criminal legislation to improve , pp. - book Johnson, A. The technology acceptance model and the decision to invest in information security 2005 Southern Association of Information Systems , pp. - article Johnson, D. Mapping ordinary morals onto the computer society: a philosophical perspective 1984 Journal of Social Issues, pp. - article URL Johnson, T. Forensic computer crime investigation 2005 , pp. - book Johnston, A. & ... Improved security through information security 2009 Communications of the ACM, pp. - article URL governance Johnston, J., Eloff, J. & ... Security and human computer interfaces 2003 Computers & Security, pp. - article URL Jones, R. Computer file protection system 1992 US Patent 5,144,659, pp. - article URL Jones, T. Child abuse or computer crime? The proactive approach 2003 Policing Paedophiles on the Internet Bristol: New , pp. - article Joutsen, M. in European Criminal Justice: Corruption, Women in the Criminal Justice System, Criminal Policy Indicators, Community Crime Prevention, and Computer Crime 1999 No.: ISBN 951-53-1968-4, pp. - article URL Jr, D.S. & ... Discovering and disciplining computer abuse in organizations: a field study 1990 MIS Quarterly, pp. - article URL Jr, D.S. & ... Key information liability issues facing managers: software piracy, proprietary databases, and individual rights to privacy 1990 Mis Quarterly, pp. - article URL Jr, E.P. Computer abuse: Problems of instrumental control 1987 Deviant Behavior, pp. - article URL Jr, H.S. Web That Binds Us All: The Future Legal Environment of the Internet, The 1996 Hous. J. Int'l L., pp. - article URL Jr, J.T. & ... Computer Crime: Keeping Up with High Tech Criminals 1986 Crim. Just., pp. - article URL Jr, J.T. & ... The 1984 Federal Computer Crime Statute: A partial answer to a pervasive problem. 1986 COMP. LAW J., pp. - article URL Jr, R.V., Bergiel, B. & ... Effects of the electronic Nigerian money fraud on the brand equity of Nigeria and Africa 2004 Management Research , pp. - article URL Judson, K. Computer crime: phreaks, spies, and salami slicers 2000 , pp. - book Judson, K. Computer crime : phreaks, spies, and salami slicers 1994 Issues in focus, pp. 128 str.- book Jurc, J. Digitalna forenzika in digitalni dokazi : diplomsko delo 2011 , pp. 53 f.- book Jurkat, M. Computer Crime Legislation: Survey and Analysis 1986 Annual Survey of American Law, pp. - article Kabay, M. Understanding Studies and surveys of computer Crime 2009 Computer Security Handbook, pp. - article Kabay, M. Studies and surveys of computer crime 2001 , pp. - book Kabay, M. ICSA White Paper on Computer Crime Statistics 1998 International Computer Security Association, pp. - article Kallman, E. & ... Ethical decision making and information technology: An introduction with cases 1996 , pp. - book Kanellis, P. Digital crime and forensic science in cyberspace 2006 , pp. - book Kankanhalli, A., Teo, H., Tan, B. & An integrative study of information systems security effectiveness 2003 International Journal of , pp. - article URL Kapor, M. Civil liberties in cyberspace 1991 Scientific American, pp. - article Kardoš, Z. Možnosti računalniške forenzike z uporabo nekomercialnih programskih orodij : specialistična naloga 2010 , pp. VI, 70 str.- book URL Kaspersen, H.W. Implementation of Recommendation no. R (89) 9 on computer-related crime Council of Europe - European Committee on Crime Problems, pp. 114 str.- article Kastelic, T. & Š kraba, M. Digitalni dokazi - metode in izkušnje policije Digitalni dokazi, pp. Str. 29-44 article KatanoviAj, D. Obvladovanje varnostnih incidentov s pomočjo računalniške forenzike : magistrska naloga 2011 , pp. 92 str., [18] f. pril- book Katyal, N. Digital architecture as crime control 2002 Yale LJ, pp. - article URL Katz, A. Computers: the changing face of criminality 1995 No.:, pp. - article URL Kay, D. A course in computer law 1992 ACM SIGCSE Bulletin, pp. - article URL Keefe, B. Computer Crime Research Organization News 2004 , pp. - book Keefe, P. Computer crime insurance available- for a price 1983 COMPUTERWORLD., pp. - article Kelly, S. Computer crime losses double 2007 Business Insurance, pp. - article Kelman, A. Computer Crime in the 1990s: A Barrister's View' 1994 Paper for the Twelfth International Symposium on , pp. - article Kenny, M. Data encryption: coping with computer crime. Manage, 33: 15-17, April 1981. Descriptors:" Electronic data processing departmentsA~a,-a€t'Security measures Computer crimes, pp. - article Keromytis, A. Patch on demand saves even more time?[network security] 2004 Computer, pp. - article URL Kerr, O. Computer Crime Law 2006 , pp. - book Kerr, O. Virtual Crime, Virtual Deterrence: A Skeptical View of Self-Help, Architecture, and Civil Liability 2005 JL Econ. & Pol'y, pp. - article URL Kerr, O. Cybercrime's Scope: Interpreting Access and Authorization in Computer Misuse Statutes 2003 NYUL Rev., pp. - article URL Kerr, O. Lifting the Fog of Internet Surveillance: How a Suppression Remedy Would Change Computer Crime Law 2002 Hastings Lj, pp. - article URL Kesar, S. & ... Developing ethical practices to minimize computer misuse 1998 Social science computer review, pp. - article URL Kessler, G. An overview of steganography for the computer forensics examiner 2004 Forensic science communications, pp. - article Kholfi, S., Habib, M. & ... Best hybrid classifiers for intrusion detection 2006 Journal of Computational Methods in , pp. - article URL Khoshgoftaar, T. & ... Resource-sensitive intrusion detection models for network traffic 2004 High Assurance Systems , pp. - article URL Kim, M. How counties handle computer crime? 1997 Ethics and Law on Electronic Frontier, pp. - article Kjaerland, M. A classification of computer security incidents based on reported attack data 2005 Journal of Investigative Psychology and , pp. - article URL Klanjščak, B. Spopadi velikanov : hekerji in Pentagon Revija obramba article Vol. 9(2000), pp. str. 44-45 Kling, R. Computer Abuse and Computer Crime as Organized Activities Computer/Law Journal, pp. - article Kling, R. When organizations are perpetrators: assumptions about computer abuse and computer crime 1991 Computerization and controversy, pp. - article Kling, R. Computer abuse and computer crime as organizational activities 1981 ACM SIGCAS Computers and Society, pp. - article Kloster, A. & ... The effects of different types of organizers on students' learning from text. 1989 Journal of educational psychology, pp. - article URL Kluth, D. Computer, Virus Threat: A Survey of Current Criminal Statutes, The 1990 Hamline L. Rev., pp. - article URL Knightmare Secrets of a super hacker 1994 , pp. - book Knijff R. v. d. Embedded Systems Analysis, chapter 11 of Handbook of Computer Crime Investigations-Forensic Tools and Technology, edited by Eoghan Casey 2002 , pp. - book Knijff R. v. d. Chapter 11: Embedded Systems Analysis, Handbook of Computer Crime Investigation, Edited by Eoghan Casey 2002 , pp. - book Knotts, R. & ... Computer Security: Who's Minding the Store? 1989 The Academy of Management Executive (1987- , pp. - article URL Koch, E.R. & Sperber, J. Die Datenmafia : Geheimdienste, Konzerne, Syndikate -Computerspionage und neue Informationskartelle 1995 , pp. 351 str.- book Kohn, M., Eloff J. & ... Framework for a digital forensic investigation 2006 of Information Security South Africa (ISSA , pp. - article Kovač, Jože, p. Nekatere nove oblike kaznivih dejanj po širitvi Evropske unije : diplomsko delo 2008 , pp. VI., 47 f.- book Kovačič, M. Izračun kontrolne vsote datoteke pomeni v ZDA preiskavo : United States v. Crist, 2008 WL 4682806, 22. oktober 2008 2008 PP Vol. 27(47), pp. str. 27-28 article Kramarenko, D. Hackers or Cyber-soldiers?, Computer Crime Research Center 2003 , pp. - book Kratz, M. Canada's computer crime laws: ten years of experience 1996 Information systems security, pp. - article Krause, J. Computing Time for Crime 2005 Computing, pp. - article URL Krauss, L. & ... Computer fraud and countermeasures 1979 , pp. - book Krauss, L. & ... SAFE-security audit and field evaluation for computer facilities and information systems 1972 No.: U, pp. - article URL Krieger, M. Current and Proposed Computer Crime Legislation 1980 COMP. LAW J., pp. - article Kroczynski, R. Are the current computer crime laws sufficient or should the writing of virus code be prohibited 2007 Fordham Intell. Prop. Media & Ent. LJ, pp. - article URL Kruck, S. & ... Computer Security Practices and Perceptions of the Next 2008 International Journal of Information Security and , pp. - article URL Generation of Corporate Computer Use Kruse, W. & ... Computer forensics: incident response essentials 2001 , pp. - book Kruse, Warren G., I. & Heiser, J.G. Computer forensics : incident response essentials 2002 , pp. XIII, 398 str.- book Kshetri, N. The simple economics of cybercrimes 2006 Security & Privacy, IEEE, pp. - article URL Kshetri, N. Pattern of global cyber war and crime: A conceptual framework 2005 Journal of International Management, pp. - article URL Kuhar, B. Preiskovanje piratstva računalniških programov : diplomska naloga 2001 , pp. 71 f.- book Kusserow, R. An Inside Look at Federal Computer Crime 1986 Security Management, pp. - article Kutz, R. Computer Crime in Virginia William and Mary Law Review, pp. - article Kutz, R. Computer Crime in Virginia: A Critical Examination of the Criminal Offenses in the Virginia Computer Crimes Act 1985 Wm. & Mary L. Rev., pp. - article URL Lakhina, A., Crovella, M. & ... Detecting distributed attacks using network-wide flow traffic 2005 Proceedings of FloCon 2005 Analysis , pp. - article Lam, C. & ... Signature recognition through spectral analysis 1989 Pattern Recognition, pp. - article URL Lampson, B. Computer security in the real world 2004 Computer, pp. - article URL Lasden, M. Computer Crime 1981 COMP. DECISIONS, pp. - article Lawrence, A. & ... Wiliam Lucyshyn and&obert gichardson. 2004 CSVFm Computer Crime and Security 2004 Computer Security Institute, pp. - article Lawrence, A., Martin, P., Lucyshyn, W. & ... CSI/FBI Computer Crime and Security Survey 2004 2004 , pp. - book Lawrence, G., Loeb, M., Lucyshyn, W. & ... CSI/FBI computer crime and security survey 2005 Computer Security Institute, pp. - article LeBlanc, C. & ... Teaching computer security at a small college 2004 ACM SIGCSE Bulletin, pp. - article URL Lee, H. Cyber crime and challenges for crime investigation in the information era 2008 Intelligence and Security Informatics, 2008. ISI 2008. , pp. article URL Lee, J. & ... A holistic model of computer abuse within organizations 2002 Information management & computer security, pp. - article URL Lee, J., Segal, G. & ... Positive alternatives: a report on an ACM panel on hacking 1986 Communications of the ACM, pp. - article Lee, S., Lee, S. & ... An integrative model of computer abuse based on social control and general deterrence theories 2004 Information & Management, pp. - article URL Lee, W. A Deterrent Measure Against Computer Crime: Knowledge-Based Risk-Analytic Audit 1997 Singapore Management Review, pp. - article Lee, W. & ... Computer Ethics: an Argument for Rethinking Business Ethics 2008 Presented at the 2nd World Business Ethics Forum: , pp. - article Leepson Computer Crime 1978 , pp. - book Leeson, P. & ... Economics of Computer Hacking, The 2005 JL Econ. & Pol'y, pp. - article URL Leibholz, S. & ... Users' guide to computer crime: its commission, detection & prevention 1974 , pp. - book Leighton, F. & ... Method and system for personal identification using proofs of legitimacy 1991 US Patent 4,995,081, pp. - article URL Leinfuss, E. Computer Crime: How Deep Does It Go 1986 MIS Week, pp. - article Leiwo, J. & ... An analysis of ethics as foundation of information security in distributed systems 1998 , 1998., Proceedings of the Thirty-First , pp. - article URL Lending, D. & ... Research in progress: the effects of ethical climate on attitudes and behaviors toward software piracy 2001 Proceedings of the 2001 ACM SIGCPR , pp. - article URL Leonard, L. & ... Attitude toward ethical behavior in computer use: a shifting model 2005 Industrial Management & Data , pp. - article URL Levenfeld, B. Israel considers comprehensive computer law. 1988 INT. COMP. LAW ADVISER., pp. - article URL Levi, M., Schlegel, K. & ... White-collar crime victimization 1992 White-Collar Crime , pp. - article URL Levine, J., LaBella, R., Owen, H. & The use of honeynets to detect exploited systems across large enterprise networks 2003 , 2003. IEEE Systems, , pp. - article URL Levy, E. Criminals become tech savvy 2004 Security & Privacy, IEEE, pp. - article URL Lewis, B. Preventing of Computer Crime Amidst International Anarchy. 2004 [cited 2008 17 November] , pp. - book Lewis, B. Prevention of computer crime amidst international anarchy 2004 Am. Crim. L. Rev., pp. - article URL Lewis, B. Prevention of Computer Crime Amidst International AnarchyA~a,-ŠA(2004) 2004 American Criminal Law Review, pp. - article Lewis, J. & ... Assessing the risks of cyber terrorism, cyber war and other cyber threats 2002 , pp. - book Lewis, M. Computer Crime: Theft in Bits and Bytes 1985 Nation's Business, pp. - article Li, Z. & ... The Present Situation of Computer Crime in China and Its Technical Defense [J] 2006 Journal of Railway Police College, pp. - article Liebholz, S. & ... User's Guide to Computer Crime 1974 Chilton Book Company, pp. - article Lilleng, S. Datakriminalitet (Computer Crime) 1995 , pp. - book Litt, R. Crime in the computer age: The law enforcement perspective 1999 Tex. Rev. L. & Pol., pp. - article URL Livshits, V. & Lam, M. Finding security vulnerabilities in Java applications with static analysis 2005 Proceedings of the 14th conference on USENIX , pp. - article URL fakulteta v Ljubljani, P. Strokovno gradivo za posvet "Računalniška kriminaliteta" 1997 , pp. 41 str. loč pag.- book Lloyd, I. Information technology law 2005 Recherche, pp. - article URL Lo, A. Computer Crime a Magnet for Teens 1999 South China Morning Post, pp. - article Lobel, J. Foiling the system breakers: computer security and access control 1986 , pp. - book Logar, J. Elektronsko poslovanje in kriminaliteta : podjetja na izzive niso dovolj pripravljena 2000 Delo Vol. 42(38), pp. str. 15- article Loia, V., Mattiucci, M. & ... Veniero: Computer Crime Investigation by Means of Fuzzy Semantic Maps, M 2009 Web Intelligence and Intelligent Agent , pp. - article LUCYSHYN, W. RICHARDSON., R.(2005) 2005 CSI/FBI COMPUTER CRIME AND SECURITY SURVEY 2005 Computer Security Institute, pp. - article Ludlow, P. High noon on the electronic frontier: Conceptual issues in cyberspace 1996 , pp. - book Lynch, J. Identity theft in cyberspace: Crime control methods and their effectiveness in combating phishing attacks 2005 Berkeley Tech. LJ, pp. - article URL Ma, L. & ... Query length impact on misuse detection in information retrieval systems 2005 Proceedings of the 2005 ACM symposium on , pp. - article URL Magklaras, G. & ... A preliminary model of end user sophistication for insider threat prediction in IT systems 2005 Computers & Security, pp. - article URL Malone, R. & ... Computer Viruses: Legal Aspects 1993 U. Miami Bus. LJ, pp. - article URL Mandell, S. Computer crime 1990 Computers, ethics, & society, pp. - article Mandia, K. Incident Response: Investigating Computer Crime 2001 , pp. - book Mandia, K., Prosise, C. & ... A§Šža€t'A$a,-A„A§a€šŠoA§Šža€t'čA®E$A§A®a €"A$Š>ŠžA§Š Š»A§Et'ŠžčA° A$Š5A„ 2002 Incident Response: Investigating Computer Crime. , pp. - article Manili, B. & ... Police chiefs and sheriffs rank their criminal justice needs 1988 Washington, DC: National Institute of Justice, US , pp. - article URL Manion, M. & ... Terrorism or civil disobedience: toward a hacktivist ethic 2000 ACM SIGCAS Computers and Society, pp. - article URL Marbach, W., Conant, J. & ... New wave computer crime. 1983 Newsweek, pp. - article Marcella, A. & ... Cyber forensics: a field manual for collecting, examining, and preserving evidence of computer crimes 2002 , pp. - book Marion, C. Computer viruses and the law 1988 Dick. L. Rev., pp. - article URL Marks, R. Security, Privacy, and Free Expression in the New World of Broadband Networks 1995 Hous. L. Rev., pp. - article URL Marsh, R. With criminal intent: The changing face of crime in South Africa 1999 , pp. - book Martonoši, P. Kriminaliteta v zvezi z računalniki v novi slovenski kazenski zakonodaji Podjetje in delo : revija za gospodarsko, delovno in socialno pravo, pp. str. 498-500 article Massingale, C. & ... Risk Allocation for Computer System Security Breaches: Potential Liability for Providers of Computer Services 1990 W. New Eng. L. Rev., pp. - article URL Mastnak, Š". Računalniško piratstvo : diplomska naloga 1999 , pp. 71 f.- book Matsumoto, Y. Ruby in a nutshell: a desktop quick reference 2002 , pp. - book May, M. & ... Federal computer crime laws 2004 The SANS Institute. Retrieved October, pp. - article McCall, C. Computer crime statutes: Are they bridging the gap between law and technology 1988 Crim. Just. J., pp. - article URL McCausland, J. Regulating Computer Crime After Reno v. ACLU: The Myth of Additional Regulation 1997 Fla. L. Rev., pp. - article URL McCollum, T. Computer crime 1997 Nation's Business, pp. - article McCombie, S. & ... Computer Forensic: An Issue of Definitions 2003 Proceedings of 1st Australian , pp. - article McEwen, J., Fester, D. & ... Dedicated computer crime units 1989 , pp. - book McEwen, T. The growing threat of computer crime 1990 Detective (Summer), pp. - article McHugh, J. & ... An incentive system for reducing malware attacks 2005 Communications of the ACM, pp. - article URL McKemmish, R. What is forensic computing 1999 Trends and issues in crime and criminal justice, pp. - article McKnight, G. Computer crime 1973 , pp. - book McLaughlin, G. & ... Computer Crime: The Ribicoff Amendment to United States Code, Title 18 1978 Crim. Just. J., pp. - article URL McLoughlin, G. & ... Computer Crime and Security 1987 , pp. - book McMullan, J. & ... Technologies of crime: The cyber-attacks on electronic gambling machines 2003 Canadian Journal of Criminology and Criminal , pp. - article URL McNeil, J. The Consultant: A Novel of Computer Crime 1978 , pp. - book Meall, L. Computer crime: foiling the fraudsters 1992 Accountancy, November, pp. - article Mello, S. Administering the Antidote to Computer Viruses: A Comment on United States v. Morris 1993 Rutgers Computer & Tech. LJ, pp. - article URL Mencin, R. Rekonstrukcija podatkov v računalniški forenziki 2010 , pp. 57 f.- book URL Mendell, R. Investigating Computer Crime in the 21st Century 2004 No.: ISBN 0-398-07525-5, pp. - article URL Mendell, R. Investigating Computer Crime: a Primer for Security Managers 1998 , pp. - book Mendell, R. Investigating Computer Crime: A Primer for Security Managers. Springfield, Illinois: Charles C 1998 , pp. - book Mennecke, B., Roche, E., Bray, D. & Second Life and other virtual worlds: A roadmap for research 2007 Systems (ICIS), 2007, pp. - article URL Merrill, P., Hammons, K., VINCENT, B., REYNOLDS, P. & ... Computers in education 1996 Recherche, pp. - article URL Merritt, M.P. U.S. Secret Service's computer forensic training for state and local agencies 2009 The Police chief Vol. 76(7), pp. str. 16-17 article URL Merwe, A.V.D., Loock, M. & ... Characteristics and responsibilities involved in a Phishing attack 2005 Proceedings of the 4th , pp. - article URL Meyer, G. The social organization of the computer underground 1989 , pp. - book URL Meyer, G. & ... The baudy world of the byte bandit: A postmodernist interpretation of the computer underground 1990 ,(also published in SCHMALLEGER, F.(ed.), , pp. - article Meyer, J. & ... Investigating computer crime: Concerns voiced by local law enforcement agencies 1998 Police Chief, pp. - article URL Meyers, M. & ... Computer forensics: the need for standardization and certification 2004 International Journal of Digital Evidence, pp. - article Michalowski, R. & ... Technology, property, and law 1991 Crime, Law and Social Change, pp. - article URL Millard, C. Legal protection of computer programs and data 1985 , pp. - book Mobbs, P. Computer Crime The law on the misuse of computers and networks. 2003, GreenNet Civil Society Internet Rights Project , pp. - book Mohay, G. Technical challenges and directions for digital forensics 2005 Approaches to Digital Forensic Engineering, 2005. , pp. - article URL Mohay, G. Computer and intrusion forensics 2003 , pp. - book Mohr, J. & ... Fighting Computer Crime with Software Risk Analysis 1984 INFORMATION SYSTEM MANAGEMENT, pp. - article URL Monson-Haefel, R. & ... Java message service 2001 , pp. - book Montana, J. Viruses and the law: Why the law is ineffective 2000 The Information Management Journal, pp. - article URL Montgomery, J. Computer Crime 1986 Am. Crim. L. Rev., pp. - article URL Moon, B., McCluskey, J. & ... A general theory of crime and computer crime: An empirical test 2010 Journal of Criminal Justice, pp. - article URL Moore, R. Cybercrime: Investigating high-technology computer crime 2010 , pp. - book Moore, T., Clayton, R. & ... The economics of online crime 2009 The Journal of Economic , pp. - article URL Moores, T. & ... Do privacy seals in e-commerce really work? 2003 Communications of the ACM, pp. - article URL Morris, D. Tracking a computer hacker 2001 United States Attorneys' Bulletin,(Internet Fraud , pp. - article Morris, R. & Blackburn, A. Cracking the code: An empirical exploration of social learning theory and computer crime 2009 Journal of Crime and Justice, pp. - article URL Morris, S. Crime and prevention: a Treasury viewpoint 1997 Spectrum, IEEE, pp. - article URL Morrison, P. Computer ethics: cautionary tales and ethical dilemmas in 1994 , pp. - book computing Morth, T. Considering our position: Viewing information warfare as a use of force prohibited by Article 2 (4) of the UN Charter 1998 Case W. Res. J. Int'l L., pp. - article URL MostA,A©faoui, G. Security in Pervasive Environments, What's Next? 2003 Security and Management Journal, pp. - article MrA^EJeviA„a€", Z. Kompjuterski kriminalitet i potreba koncipiranja kriviA„Š □nog dela kompjuterske zloupotrebe 1991 Jugoslovenska revija za kriminologiju i kriviA„Šono pravo, pp. - article URL MrševiAj, Z. Zaštita privatnosti zloupotreba kompjutera - potreba krivičnopravne regulative Jugoslovenska revija za kriminologiju i krivično pravo, pp. 29, št. 4 (1991), str.131-146 article Myers, L. & ... Preparing for high technology crime: An educational assessment of criminal justice and criminology academic programs 2002 Journal of Criminal Justice Education, pp. - article URL Nasheri, H. & ... Crime and technology: New rules in a new world* 1998 Information and Communications , pp. - article URL Nasuti, F. Investigating computer crime 1986 Journal of Accounting and EDP, pp. - article Nawrocki, J. There are too many loopholes" current computer crime laws require clearer definition 1987 Data Management, pp. - article Nelson, B. Strain ing the Capacity of the Law: The Idea of Computer Crime in the Age of the Computer Worm 1991 Computer LJ, pp. - article Nelson, B., Phillips, A. & ... Guide to computer forensics and investigations 2010 , pp. - book Nemerofsky, J. The Crime of" Interruption of Computer Services to Authorized Users" Have You Ever Heard of It? 2000 Rich. JL & Tech., pp. - article URL Newman, G. & Clarke, R. Superhighway Robbery: Preventing e-commerce crime 2003 , pp. - book Nichols, R. & ... Wireless security 2002 , pp. - book Nigri, D.F. Investigating computer crime in the UK 1992 Computer Law & Security Report, pp. - article URL Nolan, J. FBI Agent Accountants Intensify'Campaign Against White Collar'Crime 1974 Journal of Accountancy, pp. - article URL Nycum, S. & ... Prosecutorial experience with state computer crime laws in the United States 1990 , pp. - book Nycum, S. & ... Prosecutorial Experience with State Computer Crime Laws 1985 Gaston, Snow, & Ely Bartlett, Palo Alto, California, and , pp. - article Nycum, S., University, R. & ... CRIMINAL LAW ASPECTS OF COMPUTER ABUSE-PART 1-STATE PENAL LAWS 1976 Rutgers Journal of , pp. - article URL Nykodym, N., KahleA~a,- Piasecki, L. & ... The managers guide to understanding, detecting, and thwarting computer crime: An international performance issue 2010 Performance , pp. - article URL Nykodym, N., Taylor, R. & ... Criminal profiling and insider cyber crime 2005 Digital Investigation, pp. - article URL O'Ballance, E. From sarin to cyber warfare 2001 Intersec article Vol. 11(2), pp. str. 52-53 O'Brien, J. & ... Introduction to information systems 2005 , pp. - book O'Donoghue, J. Strategies found to be effective in the control of computer crime in the Forbes 500 Corporations 1987 ACM SIGSAC Review, pp. - article URL Ognibene, R. & ... Computers and the schools: Unused and misused 1990 Action in Teacher Education, pp. - article URL Olivenbaum, J. : Rethinking Federal Computer Crime Legislation 1996 Seton Hall L. Rev., pp. - article URL Onwubiko, C. & ... Managing security threats and vulnerabilities for small to medium enterprises 2007 Intelligence and Security , pp. - article URL Ottaviano, C. Computer Crime 1985 Idea, pp. - article URL Overill, R. Trends in Computer Crime 1998 Journal of Financial Crime, pp. - article URL Overill, R. Computer crime-an historical survey 1997 Defence Systems International, pp. - article Oz, E. Ethics for an Information Age 1994 , pp. - book Park, Y., Moon, S., Kim, S., Kang, S. & ... A study on prevention scheme for communication network from computer crime 1994 Journal of Data Communication , pp. - article Parker, D. The dark side of computing: SRI International and the study of computer crime 2007 Annals of the History of Computing, IEEE, pp. - article URL Parker, D. Computer crime 2003 , pp. - book URL Parker, D. Fighting computer crime: A new framework for protecting information 1998 , pp. - book Parker, D. Consequential loss from computer crime 1989 Security and Protection in Information Systems, , pp. - article Parker, D. Computer Crime: Criminal Justice Resource Manual . 1989 , pp. - book URL Parker, D. Ethics for Information Systems Personnel 1988 INFORMATION SYSTEM MANAGEMENT, pp. - article URL Parker, D. How Much Computer Abuse is There? 1983 EDPACS: The EDP Audit, Control, and Security , pp. - article URL Parker, D. Fighting computer crime 1983 , pp. - book Parker, D. Chapter 43: Public Key Cryptosystems 1983 Fighting Computer Crime, Charles Scribner's Sons, , pp. - article Parker, D. Computer security management 1981 , pp. - book Parker, D. & ... Computer crime 1984 Communications of the ACM, pp. - article Parker, D., Nycum, S. & ... Computer abuse 1973 No.: SR12501, pp. - article URL Parker, R. Computer-related crime: ethical considerations 1990 ACM SIGSAC Review, pp. - article URL Parsons, M. Protecting children on the electronic frontier : a law enforcement challenge 2000 FBI law enforcement bulletin Vol. 69(10), pp. str. 22-26 article Parsons, M. I Crime prevention and the electronic frontier 1998 FBI Law Enforcement Bulletin, pp. - article URL i Patel, A. & ... The impact of forensic computing on telecommunications 2000 Communications Magazine, IEEE, pp. - article URL Pawar, M. & ... Computer crime in Bombay: Efforts to alter this problem 1994 International Journal of Offender Therapy , pp. - article URL Peng, N. On Electronic Evidence in Computer Crime 2004 Hebei Law Science, pp. - article Perenič, A. Odkrivanje in preiskovanje računalniške kriminalitete : diplomsko delo 2008 , pp. V, 54 f.- book Perry, R. Computer Crime. New York: Franklin Watts 1986 , pp. - book Perry, R. Computer Crime 1986 , pp. - book Perry, T. & ... Can computer crime be stopped?. 1984 IEEE Spectrum, pp. - article URL Peters, S. CSI Computer Crime and Security Survey 2009 Computer Security Institute (December 2009), pp. - article Petersen, J.P. Forensic examination of log files : [master] thesis 2005 , pp. 60 f., 5 f. pril.- other URL PetroviA„a€", S. Neki aspekti nacionalne bezbednosti u informacionom dobu 2001 Nauka, tehnika, bezbednost, pp. - article URL Pfitzmann, A., Pfitzmann, B., Schunter, M. & ... Trusting mobile user devices and security modules 1997 Computer, pp. - article URL Philippsohn, S. An overview of electronic crime in the 21st century 2000 Intersec Vol. 10(4), pp. str. 114-116 article Phillips, P., Martin, A., Wilson, C. & An introduction evaluating biometric systems 2000 Computer, pp. - article URL Pickard, R. Computer crime 1989 Information Center, pp. - article Pilant, L. Fighting crime in cyberspace 1997 The Police Chief, pp. - article URL Podgor, E. Cybercrime: National, Transnational, or International 2004 Wayne L. Rev., pp. - article URL Podgor, E. Computer crimes and the USA patriot act 2002 Crim. Just., pp. - article URL Podgor, E. International computer fraud: A paradigm for limiting national jurisdiction 2001 UC Davis L. Rev., pp. - article URL Police, R. Computer crime, can it affect you? 2000 Retrieved November, pp. - article Police, V. & ... Computer Crime and Security Survey 1999 Victoria Police Computer Crime Squad and Deloitte , pp. - article Politi, A. European Security: the new transnational risks 1997 , pp. - book Pollak, R. Implications of international terrorism on security of information systems 1983 Proceedings of IEEE INFOCOM, pp. - article Pollet, J. Developing a solid SCADA security strategy 2002 Sensors for Industry Conference, 2002. 2nd ISA/IEEE, pp. article URL Pollitt, M. An ad hoc review of digital forensic models 2007 Approaches to Digital Forensic Engineering, 2007 , pp. - article URL Pollitt, M. Cyberterrorism--fact or fancy? 1998 Computer Fraud & Security, pp. - article URL I JI _ll _ll _II _II I Post, D. Governing Cyberspace 1996 Wayne L. Rev., pp. - article URL Post, J. The dangerous information system insider: Psychological perspectives 1996 Available HTTP: Hostname: infowar. com, pp. - article Potaczala, M. Computer forensics 2001 Retrieved June, pp. - article Poulsen, K. Hacker penetrates T-Mobile systems 2005 Security Focus. http://www. securityfocus. com/news/ , pp. - article Power, R. 2002 CSI/FBI computer crime and security survey 2002 , pp. - book Power, R. Computer security issues & trends 2002 CSI/FBI Computer Crime and Society Survey, CSI, pp. - article Power, R. CSI/FBI computer crime and security survey 2001 Computer Security Journal, pp. - article Power, R. 2000 CSI/FBI computer crime and security survey 2000 COMPUT SECUR J, pp. - article Power, R. CSI/FBI Computer Crime and Security Survey, 1999 1999 Computer Security Issues & Trends, pp. - article URL Power, R. 1998 CSI/FBI Computer Crime and Security Survey 1998 COMPUTER SECURITY JOURNAL, pp. - article Power, R. CSI/FBI Computer Crime and Security Survey, 1997 1997 Computer Security Issues and Trends, pp. - article URL Power, R. 2002 CSI/FBI Computer Crime and Security Survey 1996 Computer Securlly: Issues and Treno fi: i (Spring , pp. - article Power, R. Current and Future Danger: A CSI Primer on Computer Crime & Information Warfare 1996 , pp. - book Power, R. Current and future danger: A CSI primer on computer crime & information warfare 1995 , pp. - book Powers, R. Computer Security Issues & Trends: 2002 CSI/FBI Computer Crime and Security Survey 2002 Computer Security Institute. Available on-line at: http:// , pp. - article Prew, M. Minimizing the impact of Computer Crime on Your Earnings 1984 Wigham Poland (Corporation of Lloyds), pp. - article Prichard, J. & ... Cyber terrorism: A study of the extent of coverage in computer Security Textbooks 2004 Journal of Information Technology Education, pp. - article Procise, C. & ... Incident response: investigating computer crime 2001 Berkley (CA): McGraw Hill Osborne Media, pp. - article PROP., C.C. &.I. & ... Prosecuting Intellectual Property Crimes 2001 , pp. - book Prosise, C. & ... Incident response: computer forensics 2003 Recherche, pp. - article URL Purdy, S. Computer Crime Investigations 1988 Draft monograph. Federal Computer Investigations , pp. - article Quarantiello, L. Cyber crime: How to protect yourself from computer criminals 1997 No.: ISBN 0-936653-74-4, pp. - article URL Quinn, K. Second annual New Zealand computer crime and security survey 2006 , pp. - book URL Quirk, P. & Forder, J. Electronic commerce & the law 2003 , pp. - book ii-ii-ii-ii-ir Rahanu, H. Teaching professional and ethical aspects of computing: a case study approach 1999 ACM SIGCAS Computers and Society, pp. - article URL Ransbotham, S. & ... Choice and chance: A conceptual model of paths to information security compromise 2009 Information Systems Research, pp. - article URL Rapalus, P. Issues and Trends: 1998 CSI/FBI Computer Crime and Security Survey 1998 , pp. - book Raskin, X. & ... Computer crimes 1995 Am. Crim. L. Rev., pp. - article URL Reed, C. & ... Computer law 2003 Recherche, pp. - article URL Reichel, P. Handbook of transnational crime and justice 2004 , pp. - book Reid, L. Expert opinion: Interview with Amanda M. Hubbard, JD, Fulbright Scholar, former trial attorney, Computer Crime and Intellectual Property Section, US 2006 Journal of Information Privacy and Security, pp. - article Reith, M., Carr, C. & ... An examination of digital forensic models 2002 International Journal of Digital , pp. - article Response, I. Investigation Computer Crime. MANDIA, K. y PROSISE, C 2001 , pp. - book Rhodes, W. Computer Crime Is No Crime At All 1979 , pp. - book Richards, T. A computer fraud survey 1984 ACM SIGSAC Review, pp. - article URL Richardson, R. CSI Survey 2007: The 12th Annual Computer Crime and Security Survey. 2007 Computer Security Institute, pp. - article Richardson, R. 15th annual 2010/2011 computer crime and security survey 2011 , pp. - book Richardson, R. 14th Annual CSI computer crime and security survey. Executive summary 2009 CSI Computer Crime and Security SurveyComputer, pp. - article RICHARDSON, R. CSI/FBI Computer Crime and Security Survey (Documento en LA,Anea) 2008 , pp. - book Richardson, R. csi computer crime & security survey, 2008. i. cmpnet. com/v2. gocsi. com/pdf 2008 CSIsurvey2008. pdf, pp. - article Richardson, R. CSI computer crime and security survey 2008 Computer Security Institute, pp. - article Richardson, R. 12th Annual CSI Computer Crime and Security Survey 2007 Computer Security Institute, pp. - article Richardson, R. CSI/FBI Computer Crime Survey 2007 Twelfth Annual Computer Crime and Security, pp. - article Richardson, R. CSI Computer Crime and Security Survey, GoCSI. com 2007 Last accessed July, pp. - article Richardson, R. The 12th annual computer crime and security survey 2007 , pp. - book Richardson, R. CSI computer crime and security survey, CSI Survey 2007 2007 , pp. - book Richardson, R. Eighth annual CSI/FBI computer crime and security survey 2003 Computer Security Institute, pp. - article Richardson, R. 8th Annual Computer Security Institute (CSI) and Federal Bureau of Investigation (FBI) Computer Crime and Security Survey 2003 , pp. - book Richardson, R. CSI 2003 FBI Computer crime and security survey, pp. - article Richardson, R. Eighth Annual CSI/FBI Computer Crime and Security Survey. 2003 2003 Comput. Security Inst./Federal Bureau of Investigation, , pp. - article Richardson, R. Issues and Trends: 2003 CSI/FBI Computer Crime and Security Survey 2003 , pp. - book Richardson, R. CSI/FBI 2003 computer crime survey 2003 Retrieved June, pp. - article Richardson, R. CSI/FBI Computer Crime and Security Survey [R/OL] 2003 , pp. - book Richardson, R. Computer Crime Bleeds US Corporations, Survey Shows; Financial losses from attacks 2002 on-line]. Available from the Internet: URL Http://www. , pp. - article Richardson, R. & ... CSI &FBI CSI Computer Crime & Security Survey 2008 , pp. - book Richtel, M. Study finds rise in computer crime 1998 The New York Times, pp. - article URL Rivlin Computer Crime 1980 Student Law., pp. - article Roache, J. Computer Crime Deterrence 1985 Am. J. Crim. L., pp. - article URL Roberson, R. CSI/FBI Computer Crime Survey 2003 Computer Security Institute, pp. - article Roche, E. Internet and Computer Related Crime: Economic and Other Harms to Organizational Entities 2006 Miss. LJ, pp. - article URL Roche, E. & ... Information Systems, Computer Crime and Criminal Justice 2004 , pp. - book Rogers, M. A two-dimensional circumplex approach to the development of a hacker taxonomy 2006 digital investigation, pp. - article URL Rogers, M. The role of criminal profiling in the computer forensics process 2003 Computers & Security, pp. - article URL Rogers, M. A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study 2001 , pp. - book Rogers, M. Organized computer crime and more sophisticated security controls: which came first the chicken or the egg? 1999 Telematic Journal of Clinical Criminology, pp. - article Rogers, M. & ... The future of computer forensics: a needs analysis survey 2004 Computers & Security, pp. - article URL Rogers, M., Goldman, J., Mislan, R. & ... Computer forensics field triage process model 2006 Proceeding of the , pp. - article Rogers, M., Robin, M., Moral, H. & Modern-day Robin Hood or Moral Disengagement: understanding the justification for criminal computer activity 1999 , pp. - book URL Rogers, M., Seigfried, K. & ... Self-reported computer criminal behavior: A 2006 digital investigation, pp. - article URL psychological analysis Rogers, M., Smoak, N. & ... Self-reported deviant computer behavior: A big-5, moral choice, and manipulative exploitive behavior analysis 2006 Deviant behavior, pp. - article URL Rosenblatt, K. High-Technology Crime: Investigating Cases Involving Computers 1995 No.: ISBN 0-9648171-0-1, pp. - article URL Rosenblatt, K. Deterring computer crime 1990 Technology Review, pp. - article URL Rosoff S., Pontell, H. & ... Profit without honor: White-collar crime and the looting of America 1998 , pp. - book Ross, S., Jr, R.C., Parker, D. & ... Computer Security Issues-A Roundtable 1985 Computer Security , pp. - article URL Rossi, S. Aust tops computer crime stats 2002 Computerworld, pp. - article Roush, W. Hackers taking a byte out of computer crime 1994 Technology Review, pp. - article Rushinek, A. & ... Using experts for detecting and litigating computer crime 1993 Managerial Auditing Journal, pp. - article URL Russell, D. & ... Computer security basics 1991 , pp. - book RužiAj, I. Izbira osnovnega nabora metod za izvajanje programske računalniške forenzike : magistrska naloga 2007 , pp. 76 str.- book RužiAj, I., MarijanoviAj, D. & Ciglarič, M. Selection of the base set of methods for computer forensic SoftCOM 2009, pp. Str. 1-7 article Saari, J. Computer crime—numbers lie 1987 Computers & Security, pp. - article URL Sackman, H. Computer Crime Prevention 1999 , pp. - book Sanderson, E. & ... Information security in business environments 1996 Information Management & , pp. - article URL Sarzana, C. CriminalitA, e tecnologia: il caso del computer crime 1979 Rassegna Penitenziaria e CriminologA,Aa, pp. - article Saydjari, O.S. Defending cyberspace 2002 Computer, pp. - article URL Schabeck, T. Computer Crime Investigation Manual 1980 , pp. - book Schaffer, G. Worms and viruses and botnets, oh my! Rational responses to emerging Internet threats 2006 Security & Privacy, IEEE, pp. - article URL Schjolberg, S. Computer-related offences 2004 Council of Europe Octopus Interface, pp. - article SchjA,A,lberg, S., International, S. & Computers and penal legislation: A study of the legal politics of a new technology 1983 , pp. - book Schmalleger, F. Criminal Justice Today: An Introductory Text for the 21st Century 1995 No.: ISBN 0-13-302985-9, pp. - article URL Schmidt, H. The changing face of computer crime 1998 The Police chief Vol. 65(5), pp. str. 38-45 article Scholberg, S. & ... Computer Crime 1983 Encyclopedia of Crime and Justice, pp. - article Schonlau, M. & ... Detecting masquerades in intrusion detection based on 2000 Information Processing Letters, pp. - article URL unpopular commands Schonlau, M., DuMouchel, W., Ju, W., Karr, A. & ... Computer intrusion: Detecting masquerades 2001 Statistical Science, pp. - article URL Schrager, B. Outwitting 2-bit Thieves and Arresting Computer Crime 1982 Data Communications, pp. - article Schuck, P. Electronic funds transfer: A technology in search of a market 1975 Md. L. Rev., pp. - article URL Schultz, E. Security views 2003 Computers & Security, pp. - article URL Schultz, E. A framework for understanding and predicting insider attacks 2002 Computers & Security, pp. - article URL Schultz, E. & ... Incident response: a strategic guide to handling system and network security breaches 2001 , pp. - book Schweitzer, D. & ... Incident response: computer forensics toolkit 2003 , pp. - book Schweitzer, J. Computer crime and business information: a practical guide for managers 1986 , pp. - book Schweitzer, J. Protecting information in the electronic workplace: a guide for managers 1983 , pp. - book Scientist, N. Computer Crime a Growing Threat, Warns FBI 2008 , pp. - book Scott, A. Computer and intellectual property crime: federal and state law 2001 , pp. - book Scottberg, B., Yurcik, W. & ... Internet honeypots: Protection or entrapment? 2002 Technology and Society, 2002 , pp. - article URL Selinšek, L. Odprta pravna vprašanja v zvezi z dokazovanjem s postopki digitalne forenzike Problemi dokazovanja v zahtevnih kazenskih postopkih, pp. Str. 139-149 article Selinšek, L. Preiskovanje zaščitenih elektronskih podatkov - britanski pristop Zbornik povzetkov, pp. Str. 69- other Selinšek, L. "Digitalni forenzični forum" jan. Revija za kriminalistiko in kriminologijo Vol. 59(1), pp. str. 89-91 article Selinšek, L. Računalniška kriminaliteta in reševanje problemov iz prakse 2011 Pravosodni bilten Vol. 32(2), pp. str. 223-237 article Selinšek, L. Electronic evidence in the Slovene criminal procedure act 2010 Digital evidence and electronic signature law review(7), pp. str. 77-81 article Selinšek, L. Ekonomska upravičenost uporabe metod digitalne forenzike 2009 Lexonomica Vol. 1(1), pp. str. 51-58 article Selinšek, L. Computer forensics in criminal procedure : (needed new approaches in Slovenia) 2008 Zbornik Pravne fakultete Univerze v Mariboru Vol. 4(1), pp. str. 237-248 article Selinšek, L. NA>kterA© prA"vnA aspekty forenznA analA'zy digitA'lnAch dat 2008 Acta Universitatis Carolinae(4), pp. str. 131-140 article Selinšek, L. Kazenskopravni vidiki računalniške forenzike : predavanje 2008 , pp. - unpublished na konferenci INFOSEK 2008 - FORUM, Nova Gorica, 9.-11. junij 2008 Selinšek, L. Legal collecting of digital evidence 2007 Zbornik Pravne fakultete Univerze v Mariboru(3), pp. str. 217-230 article Selinšek, L. & Malovrh, M. Digitalni dokaz - med pravom in tehniko Nekateri praktični problemi dokazovanja v kazenskih postopkih, pp. Str. 57-78 incollection Selinšek, L. & Oparnica, G. Legal aspects of digital forensics in public and private sector : predavanje na konferenci Euroforensics - Forensic Sciences, 26.-28.3.2010, Istanbul 2010 , pp. - unpublished Senjo, S. An analysis of computer-related crime: comparing police officer perceptions with empirical data 2004 Security Journal, pp. - article URL Serra, C. & Strano, M. Nuove frontiere della criminalita : la criminalita tecnologica 1997 , pp. VII, 145 str.- book Seymour, T., Seifert, C., Shafto, M. & ... Using response time measures to assess" guilty knowledge". 2000 Journal of Applied , pp. - article URL Sh, M., D'Amico, E., Tomlinson, K. & ... Teenagers self-reported motivations for participating in computer crime 2002 8th International Conference on , pp. - article Shackelford, S. Computer-related crime: an international problem in need of an international solution 1992 Tex. Int'l LJ, pp. - article URL Shaw, E., Ruby, K. & ... The Insider Threat to Information Systems1 1998 , pp. - book Sherizan, S. The globalization of computer crime and information security 1992 Computer Security Journal, pp. - article URL Sherizen, S. Can computer crime be deterred 1995 Computers and Security, pp. - article URL Sherizen, S. Criminological concepts and research findings relevant for improving computer crime control 1990 Computers & Security, pp. - article URL Sherizen, S. Federal Computers and Telecommunications: Security and Reliability Considerations and Computer Crime Legislative Options 1985 , pp. - book Shinder, D. & ... Scene of the cybercrime: Computer forensics handbook 2002 , pp. - book Sieber, U. Computer Crime and Criminal Information Law-New Trends in the International Risk and Information Society 1996 Statement for the Hearing on Security in Cyberspace of , pp. - article Sieber, U. Information technology crime: national legislations and international initiatives 1994 , pp. - book Sieber, U. General Report on 'Computer Crime': the emergence of criminal information law 1990 13th International Congress of International Academy , pp. - article Sieber, U. The international handbook on computer crime: computer-related economic crime and the infringements of privacy 1986 , pp. - book Silverglate, H. Computer Crime in Massachusetts: How Best to Meet the Future? 1994 BBJ, pp. - article Sim, S. Effective countermeasures against economic crime and computer crime 2000 Resource material series, pp. - article Simkin, M. Computer Crime: Lessons and Direction 1981 CPA Journal, pp. - article Sinangin, D. Computer forensics investigations in a corporate environment 2002 Computer Fraud & Security, pp. - article URL Sinrod, E. & ... Cyber-crimes: A practical approach to the application of federal computer crime laws 2012 Santa Clara Computer & High , pp. - article Sinrod, E. & ... Cyber-Crimes: A Practical Approach to the Application of Federal Computer Crime Laws,A"a,-Š4(2000) 16 2000 Santa Clara Computer and High Technology Law , pp. - article Sinrod, E. & ... Cyber-Crimes: A Practical Approach to the Application of Federal Computer Crime Laws 2000 Santa Clara Computer & High Tech. LJ, pp. - article URL Sinrod, E. & ... Hacking your way to hard time: application of computer crime laws to specific types of hacking attacks 2000 Journal of Internet Laws, pp. - article Skaggs, B., Blackburn, B., Manes, G. & ... Network vulnerability analysis 2002 Circuits and Systems, , pp. - article URL Skibell, R. Cybercrime & (and) Misdemeanors: A Reevaluation of the Computer Fraud and Abuse Act 2003 Berkeley Tech. LJ, pp. - article URL Skibell, R. The myth of the computer hacker 2002 Information, Communication & Society, pp. - article URL Skinner, W. & ... A social learning theory analysis of computer crime among college students 1997 Journal of Research in Crime and , pp. - article URL SKORODUMOVA, O. Hackers as information space phenomenon 2004 Social Sciences, pp. - article Sloan, I. The computer and the law 1984 , pp. - book Smaha, S. Haystack: An intrusion detection system 1988 Aerospace Computer Security Applications , pp. - article URL Smith, A. & ... Issues in cybersecurity; understanding the potential risks associated with hackers/crackers 2002 Information management & computer , pp. - article URL Smith, D. Who is Calling Your Computer Next--Hacker 1985 Crim. Just. J., pp. - article URL Smith, G. An Electronic Pearl Harbor? Not Likely 1998 Issues in Science and Technology, pp. - article URL Smith, M. Commonsense computer security 1994 , pp. - book Smith, R. Identity-related economic crime: Risks and countermeasures 1998 Victoria, pp. - article Smith, R. & ... Organisations as Victims of Fraud and how They Deal with it 1999 , pp. - book Smrkolj, S. Računalniška kriminaliteta : (oblike in preiskovanje) : diplomska naloga 2000 , pp. 58 f.- book Soi, G. 1 Tracce informatiche 2010 Polizia moderna Vol. 62(11), pp. str. 30-33 article 1 Sokolik, S. Computer CrimeA~a,-a€sthe Need for Deterrent Legislation"(1980) 1980 Computer Law Journal, pp. - article Sokolik, S. Computer Crime-The Need for Deterrent Legislation 1980 Computer LJ, pp. - article Solarz, A. Computer-related embezzlement 1987 Computers & Security, pp. - article URL Solarz, A. Computer Technology and Computer Crime 1981 , pp. - book Solarz, A. & ... Computer Technology and Computer Crime:(aetiological and Phenomenological Aspects) 1981 , pp. - book Solomon, M.G., Barrett, D. & Broom, N. Computer forensics jumpstart : [computer forensics basics] 2005 , pp. XVII, 283 str.- book URL Soma, J., Banker, E. & ... Computer Crime: Substantive Statutes & (and) Technical & (and) Legal Search Considerations 1995 AFL Rev., pp. - article URL Soma, J., Jr, T.M. & ... Transnational extradition for computer crimes: Are new treaties and laws needed 1997 Harv. J. on Legis., pp. - article URL Somers, L. Economic Crimes: Investigative Principles and Techniques 1984 New York: Clark Boardman Co, pp. - article URL Sommer, P. The future for the policing of cybercrime 2004 Computer Fraud & Security, pp. - article URL Sommer, P. Intrusion detection systems as evidence 1999 Computer Networks, pp. - article URL Sommer, P. Digital footprints: Assessing computer evidence 1998 Criminal Law Review, pp. - article Sr, W.S. Redefining National Security in Today's World of Information Technology and Emergment Threats 1998 Duke J. Comp. & Int'l L., pp. - article URL Stallard, T. & ... Automated analysis for digital forensic science: Semantic integrity checking 2003 Computer Security Applications , pp. - article URL Stambaugh, H. & ... Electronic crime needs assessment for state and local law enforcement 2001 , pp. - book Stambaugh, H. & ... State and local law enforcement needs to combat electronic crime 2000 , pp. - book Standler, R. Computer crime 2002 Retrieved February, pp. - article Stanley, P. A methodology for the investigation of computer crime 1992 Proceedings of the IFIP TC11, Eigth International , pp. - article Stanley, P. Educating computer crime investigators 1986 Computers & Security, pp. - article Stanley, P. Computer crime investigation and investigators 1986 Computers & Security, pp. - article URL Stanley, P. Computer Crime Investigation-The Lessons Learned from Experience 1986 IFIP/SEC'86, pp. - article Statistics, U.S.B. o.J. & ... Computer Crime: Computer Security Techniques 1982 , pp. - book Steffensmeier, D. Organization properties and sex-segregation in the underworld: Building a sociological theory of sex differences in crime 1983 Social Forces, pp. - article URL Steinhauer, J. Verdict in MySpace suicide case 2008 The New York Times, pp. - article Stephenson, P. Investigating computer-related crime 2000 , pp. - book Stephenson, P. Investigating Computer Crime 2000 , pp. - book Stevenson, G. Computer Fraud: Detection and Prevention 2000 Computer Fraud & Security, pp. - article URL Stewart, H. & ... One-at-a-time versus grouped presentation of mug book pictures: Some surprising results. 2001 Journal of applied psychology, pp. - article URL Strader, J. Understanding white collar crime 2002 , pp. - book Strano, M. Computer crime: manuale di criminologia informatica 2000 Edizioni Apogeo, Milano, pp. - article Strano, M. Computer crime 2000 , pp. - book Straub, D. Validating instruments in MIS research 1989 MIS quarterly, pp. - article URL Straub, D. & ... Coping with systems risk: security planning models for management decision making 1998 Mis Quarterly, pp. - article URL Straub, D. & ... Effective IS security 1990 Information Systems Research, pp. - article Sugarman, R. On foiling computer crime 1979 IEEE Spectrum, pp. - article Sukhai, N. Hacking and cybercrime 2004 Proceedings of the 1st annual conference on , pp. - article URL Sullivan, P. Australian attitudes towards computer crime 1995 , pp. - book URL Sussmann, M. Critical Challenges from International High-Tech and Computer-Related Crime at the Millenium, The 1998 Duke J. Comp. & Int'l L., pp. - article URL Swanson, C. & ... Computer Crime-Dimensions, Types, Causes, and Investigation 1980 Journal of Police Science and Administration, pp. - article URL Swanson, C.R., Chamelin, N.C. & Territo, L. Criminal investigation 1996 , pp. X, 801 str.- book Swartz, H. Taking the bite out of computer crime 1982 Business Computer Systems, pp. - article Sykes, J. Computer Crime: A Spanner in the Works 1992 Management Accounting, pp. - article Taber, J. A Survey of Computer Crime Studies"(1980) 1980 Computer LJ, pp. - article Taber, J. A survey of computer crime studies 1980 Computer/Law Journal, pp. - article Taber, J. On Computer Crime (Senate Bill S. 240) 1979 Computer LJ, pp. - article Tan, K. Prosecuting foreign-based computer crime: international law and technology collide 2000 Symposium on Rule of Law in the Global Village, , pp. - article Tan, K. The application of neural networks to UNIX computer security 1995 1995. Proceedings., IEEE International Conference on, pp. - article URL Tan, K. & ... Detection and classification of TCP/IP network services 1997 Computer Security Applications , pp. - article URL Tapper, C. Computer law 1989 , pp. - book Tapper, C. Computer Crime": Scotch Mist?',(1987) 1987 Criminal Law Review, pp. - article Tapper, C. Computer Crime": Scotch Mist? 1987 Crim L Rev, pp. - article Tassel, D.V. Computer security management 1972 , pp. - book Tassel, D.V. Computer crime 1970 Proceedings of the November 17-19, 1970, fall joint , pp. article URL Tavani, H. The uniqueness debate in computer ethics: What exactly is at issue, and why does it matter? 2002 Ethics and Information Technology, pp. - article URL Tavani, H. Defining the boundaries of computer crime: piracy, break-ins, and sabotage in cyberspace 2000 ACM SIGCAS Computers and Society, pp. - article URL Tavani, H. A computer ethics bibliography 1995 ACM SIGCAS Computers and Society, pp. - article Taylor, P. Hackers: crime in the digital sublime 1999 , pp. - book Taylor, R. & ... Computer crime 2003 Criminal Investigation, pp. - article Taylor, R., Caeti, T., Loper, D., Fritsch, E. & ... Digital crime and digital terrorism 2006 , pp. - book Teer, F., Kruck, S. & ... EMPIRACAL STUDY OF STUDENTS'COMPUTER SECURITY-PRACTICES/PERCEPTIONS 2007 Journal of Computer Information , pp. - article Telem, M. Computer crimes in schools 1984 Programmed Learning and Educational Technology, pp. - article URL Tenhunen, M. Updating computer crime and information security strategies 1994 Kriminalistik und forensische Wissenscqften, , pp. - article Thackeray, G. Computer-Related Crimes-An Outline 1984 Jurimetrics J., pp. - article URL Theoharidou, M., Kokolakis, S., Karyda, M. & ... The insider threat to information systems and the effectiveness of ISO17799 2005 Computers & , pp. - article URL Thomas, D. Criminality on the electronic frontier: corporality and the judicial construction of the hacker 1998 Information Communication & Society, pp. - article URL Thomas, D. & ... Legal methods of using computer forensics techniques for computer crime analysis and investigation 2004 Retrieved September, pp. - article Thomas, T. Al Qaeda and the Internet: The Danger ofCyberplanning' 2003 , pp. - book URL Thompson, D. 1997 computer crime and security survey 1998 Information management & computer security, pp. - article URL Thompson, R. Chasing after A~a,-Š>pettyA~a,-Ši\ computer crime 1999 Potentials, IEEE, pp. - article URL Thornhill, W. Risk management for financial institutions: applying cost-effective controls and procedures 1990 , pp. - book Tohmatsu, D. & ... Computer Crime & Security Survey 1999 Victoria Police Computer Crime Squad and Deloitte , pp. - article Tohmatsu, D. & ... Computer Crime & Security SurveyA~a,-a€s1999 1999 , pp. - book Tompkins Joseph B Jr," An Analysis of the 1984 Federal Computer Crime Provisions,"[1985] Law/Technology, pp. - article Toren, P. Internet: A Safe Haven for Anonymous Information Thieves 1995 . John's J. Legal Comment., pp. - article URL Trdina, R. Preiskovanje kaznivih dejanj s področja otroške pornografije : diplomsko delo 2009 , pp. VII, 72 f.- book Tribbensee, N. Privacy and security in higher education computing environments after the USA PATRIOT Act 2003 Journal of College and University , pp. - article Trites, G. Director responsibility for IT governance 2004 International Journal of Accounting Information , pp. - article URL Troutner, J. Computer Literacy: Teaching Computer Ethics. 1986 Journal of Computers in Mathematics and Science , pp. - article URL Trček, D., Abie, H., Skomedal, A. & Starc, I. Advanced framework for digital forensic technologies and procedures 2010 Journal of forensic sciences Vol. 55(6), pp. str. 1471-1480 article URL Tully, E. The Near Future: Implications for Law Enforcement 1986 FBI Law Enforcement Bulletin, pp. - article URL Tunick, D. People v. Versaggi: A Conviction for a Computer Crime That was not Committed 1997 CRIMINAL LAW BULLETIN- , pp. - article Tunick, D. Computer Law: An Overview 1979 Loy. LAL Rev., pp. - article URL Turnbull, L., Hendrix, E. & ... Atlas of crime: mapping the criminal landscape 2000 No.: ISBN 1-57356-241-6, pp. - article URL Umphress, D. & ... Identity verification through keyboard characteristics 1985 International journal of man-machine studies, pp. - article URL Upchurch, J. Combating Computer Crime 2003 , pp. - book Urbas, G. & ... Computer Crime Legislation in Australia' 2004 Internet Law Bulletin (, pp. - article Urek, R. Računalniška forenzika v predkazenskem postopku : diplomsko delo visokošolskega strokovnega študija Varnost in notranje zadeve 2012 , pp. 56 str.- book URL Vacca, J. Computer forensics: computer crime scene investigation 2005 , pp. - book Vacca, J. Computer Forensics: Computer Crime Scene Investigation (Networking Series)(Networking Series), Charles River Media 2005 Inc., Rockland, MA, pp. - article Vacca, J. Digital forensicsA~a,-a€sComputer Crime Scene Investigation 2002 Charles River Media, pp. - article Valeriano, G. Pitfalls In Insurance Coverage for Computer Crimes 1992 Def. Counsel J., pp. - article URL Vasiu, L. & ... Dissecting computer fraud: from definitional issues to a taxonomy 2004 System Sciences, 2004. Proceedings of the , pp. - article URL Vaughn, R. & ... Integration of computer security into the software engineering and computer science programs 1999 Journal of Systems and Software, pp. - article URL Verduyn, B. FBI computer crime survey 2005 Retrieved April, pp. - article Vidovič, S. Praktični vidiki ugotavljanja in dokazovanja komunikacij po mobilnem telefonu in računalniku : diplomsko delo 2010 , pp. VI, 50 f.- book Vidovič, S. Praktični vidiki ugotavljanja in dokazovanja komunikacij po mobilnem telefonu in računalniku : diplomsko delo 2010 , pp. VI, 50 f.- book VINCENT, F. & ... Correlates of computer misuse: Data from a self-reporting sample 1990 Behaviour & Information Technology, pp. - article URL Voiskounsky, A. Current problems of moral research and education in the IT environment 2004 Human perspectives in the Internet society: , pp. - article URL Voiskounsky, A. & ... Flow-based model of computer hackers' motivation 2003 CyberPsychology & , pp. - article URL Volgyes, M. The investigation, prosecution, and prevention of computer crime: A state-of-the-art review 1980 Computer LJ, pp. - article Volokh, E. Crime Severity and Constitutional Line-Drawing 2004 bepress Legal Series, pp. - article URL Volonino, L. & ... Principles and practice of information security 2003 , pp. - book Volonino, L. & Anzaldua, R. Computer forensics for dummies 2008 , pp. 360 str.- book Volonino, L., Anzaldua, R., Godwin, J. & ... Computer forensics: principles and practices 2007 , pp. - book Waal, P. Keeping Hackers at Bay 1986 Telecommunication Technology, pp. - article URL Wagner, A. Challenge of Computer-Crime Legislation: How Should New York Respond, The 1984 Buff. L. Rev., pp. - article URL Wahlert, G. & ... Crime in cyberspace: Trends in computer crime in Australia 1998 Platypus Magazine, pp. - article Walden, I. Harmonising computer crime laws in Europe 2004 European Journal of Crime, Criminal Law and , pp. - article URL Walden, I., Reed, C. & ... Computer crime 2003 Computer law, pp. - article Walker, K. Federal criminal remedies for the theft of intellectual property 1993 Hastings Comm. & Ent. LJ, pp. - article URL Wall, D. Crime and the Internet 2001 , pp. - book Wall, D. 1 Cybercrimes and the Internet 2001 Crime and the Internet, pp. - article Wall, D. Cybercrimes: New wine, no bottles 1999 Davies & Francis P. & Jupp V.(Eds), Invisible Crimes: , pp. - article Wan, H. & ... An analysis of Chinese laws against computer crimes 1997 Journal of Global Information Management (JGIM), pp. - article URL Wang, D. & ... Application of Ant Colony Clustering in Computer Forensics 2009 and Computing Science, 2009. ICIC'09. , pp. - article URL Wang, S. Measures of retaining digital evidence to prosecute computer-based cyber-crimes 2007 Computer Standards & Interfaces, pp. - article URL Wang, Y., Cannady, J. & ... Foundations of computer forensics: A technology for the fight against computer crime 2005 Computer Law & Security Review, pp. - article URL Warkentin, M. & ... Behavioral and policy issues in information systems security: the insider threat 2009 European Journal of Information Systems, pp. - article Warren, M. Security practice: survey evidence from three countries 2002 Logistics information management, pp. - article URL Wasik, M. Crime and the Computer 1991 No.: ISBN 0-19-825621-3, pp. - article URL Watkins, P. Computer Crime: Separating the Myth from the Reality 1981 Chartered Accountant) Magazine, pp. - article Webber, C. Computer Crime or Jay-Walking on the Electronic Highway 1983 Crim. LQ, pp. - article URL Webber, C. Computer Crime, or Jay-Walking on the Electronic Highway"(1983) 1983 Crim. LQ, pp. - article Webster, W. Technology Transfer, Industrial Espionage, and Computer Crime: The FBI's Activities 1985 Computer Security Journal, pp. - article URL Webster, W. Examination of FBI Theory and Methodology Regarding White-Collar Crime Investigation and Prevention, An 1979 Am. Crim. L. Rev., pp. - article URL Wei, H., Frinke, D., Carter, O. & ... Cost-benefit analysis for network intrusion detection systems 2001 , pp. - book URL Weiler, N. Honeypots for distributed denial-of-service attacks 2002 for Collaborative Enterprises, 2002. WET ICE 2002 , pp. article URL Weisburd, D. & ... Crime mapping and crime prevention 1997 No.: ISBN 1-881798-08-9, pp. - article URL Weiss, H. Computer Security: An Overview 1974 Datamation, pp. - article URL Weissinger, A. ASP in a nutshell: a desktop quick reference 2000 , pp. - book Welch, T. Computer crime investigation and computer forensics 1997 Information Systems Security, pp. - article URL Weller, H., Repman, J. & ... The relationship of learning, behavior, and cognitive style in hypermedia-based instruction 1995 Computers in the Schools, pp. - article URL Wessels, J. & Hillenkamp, T. Strafrecht : Straftaten gegen Vermogenswerte 1999 Vol. 8Schwerpunkte, pp. XXVII, 347 str.- book Westland, C. A rational choice model of computer and network crime 1996 International Journal of Electronic Commerce, pp. - article URL Wetter, D. Erste Hilfe in Digitaler Forensik [2007? ] , pp. - other URL Wharton, L. Legislative Issues in Computer Crime 1984 Harv. J. on Legis., pp. - article URL White, M. Current issues and controversies in policing 2007 , pp. - book Whiteside, T. Computer capers: Tales of electronic thievery, embezzlement, and fraud 1978 , pp. - book Whitman, M. In defense of the realm: understanding the threats to information security 2004 International Journal of Information Management, pp. - article URL Whitman, M. Enemy at the gate: threats to information security 2003 Communications of the ACM, pp. - article URL Wible, B. A Site Where Hackers Are Welcome: Using Hacking Contests To Shape Preferences and Deter Computer Crime 2003 The Yale Law Journal, pp. - article Wible, B. Site Where Hackers Are Welcome: Using Hack-in Contests to Shape Preferences and Deter Computer Crime, A 2002 Yale LJ, pp. - article URL Wilding, E. Information risk and security: preventing and investigating workplace computer crime 2006 , pp. - book Wilding, E. Computer evidence : a forensic investigations handbook 1997 , pp. XI, 236 str.- book Wilkinson, D., Harries, G., Thelwall, M. & ... Motivations for academic Web site interlinking: Evidence for the Web as a novel source of information on informal scholarly communication 2003 Journal of Information , pp. - article URL Williams, K. Using Tittle's control balance theory to understand computer crime and deviance 2008 International Review of Law Computers & , pp. - article URL Williams, P. Organized Crime and Cybercrime: Synergies, Trends and Responses 2001 Global Issues, pp. - article URL Williams, W. The National Cybercrime Training Partnership 1999 Police Chief, pp. - article URL Willison, R. Understanding the perpetration of employee computer crime in the organisational context 2006 Information and organization, pp. - article URL Willison, R. Understanding the offender/environment dynamic for computer crimes 2006 Information Technology & People, pp. - article URL Willison, R. Opportunities for computer abuse: assessing a crime specific approach in the case of Barings Bank 2002 , pp. - book Willison, R. & ... Motivations for Employee Computer Crime: Understanding and Addressing Workplace Disgruntlement through the Application of Organisational Justice 2009 IFIP TC 8 International Workshop on Information , pp. - article Willison, R. & ... Overcoming the insider: reducing employee computer crime through situational crime prevention 2009 Communications of the ACM, pp. - article URL Willison, R. & ... Considering the offender: addressing the procedural stages of computer crime in an organisational context 2005 , pp. - book Willison, R. & Backhouse, J. Opportunities for computer crime: considering systems risk from a criminological perspective 2006 European journal of information , pp. - article URL Wilson, C. Holding management accountable: a new policy for protection against computer crime 2000 and Electronics Conference, 2000. NAECON 2000. , pp. - article URL Wilson, D. Viewing computer crime: Where does the systems error really exist?. 1991 COMP. LAW J., pp. - article URL Winchester, J. Computer-printed documents as part of a computer crime investigation 1981 Journal of Forensic Sciences, pp. - article URL Winkler, I. The changing face of computer crime 2005 The ISSA Journal, pp. - article ii-n-n-n-ir Wise, E. Criminal Law: Sex, Crime, and Cyberspace 1996 Wayne L. Rev., pp. - article URL Wold, G. & ... Computer crime: techniques, prevention 1989 , pp. - book Wold, G. & ... Computer Crime: Techniques for Preventing and Detecting Crime in Financial Institutions 1989 Rolling Meadows, IL: Bankers Publishing Company, pp. - article Wolf, J. War games meets the internet: Chasing 21st century cybercriminals with old laws and little money 2000 Am. J. Crim. L., pp. - article URL Wong, D. Computer Crime in the UK 1984 EDPACS: The EDP Audit, Control, and Security , pp. - article URL Wong, K. Computer crimeA~a,-a€t'risk management and computer security 1985 Computers & Security, pp. - article URL Wong, K. & ... Computer Crime Casebook 1987 , pp. - book Woodhouse, S. Information security: end user behavior and corporate culture 2007 and Information Technology, 2007. CIT 2007. , pp. - article URL Wright, M. The need for information security education 1998 Computer Fraud & Security, pp. - article URL Wright, T. The Field Guide For Investigating Computer Crime: Overview of a Methodology for the Application of Computer Forensics Part II 2000 Security Focus, May, pp. - article Xiang, Y. & ... A defense system against DDoS attacks by large-scale IP traceback 2005 and Applications, 2005. ICITA 2005. Third , pp. - article URL Yang, C. & Ng, T. Terrorism and crime related weblog social network: Link, content analysis and information visualization 2007 Intelligence and Security Informatics, 2007 , pp. - article URL Yang, D. & ... Countering the Cyber-Crime Threat 2006 Am. Crim. L. Rev., pp. - article URL Yar, M. Computer Hacking: Just Another Case of Juvenile Delinquency? 2005 The Howard Journal of Criminal Justice, pp. - article URL Yasinsac, A. & ... Policies to enhance computer and network forensics 2001 Proceedings of the 2001 IEEE Workshop on , pp. - article Yasinsac, A., Erbacher, R., Marks, D. & ... Computer forensics education 2003 Security & Privacy, , pp. - article URL Yeager, R. Criminal computer forensics management 2006 Proceedings of the 3rd annual conference on , pp. - article URL Yee, H. Juvenile Computer Crime-Hacking: Criminal and Civil Liability 1984 Comm/Ent LJ, pp. - article URL Young, J. Spies like us 1996 Forbes, pp. - article Young, L. United States computer crime laws, criminals and deterrence 1995 International Review of Law, Computers & Technology, pp. - article URL Young, R., Zhang, L. & ... Hacking into the minds of hackers 2007 Information Systems , pp. - article URL Zajac, B. Legal Options to Computer VirusesA~a,-Ši\ 1989 Computers & Security, pp. - article Zakelšek, J. Informacijska varnost : diplomska naloga 2010 , pp. X, 48 str.- book Završnik, A. Digital forensics and open internet : referat na Cyberspace Conference 2009, Brno, 20.-21. 11. 2009 Brno , pp. - unpublished Završnik, A. Towards an overregulated cyberspace : criminal law perspective 2010 Masaryk University journal of law and technology Vol. 4(2), pp. str. 173-190 article Završnik, A. Cyberbullying in Slovenia : legal framework and supralegal initiatives : [referat na posvetu] The legal aspects of cyberbullying, Antwerp, 26 May 2010 2010 , pp. - unpublished Završnik, A. Kriminaliteta in informacijska tehnologija : predstavitev raziskovalnega področja : referat na konferenci Kibernetska kriminaliteta in digitalna forenzika, Ljubljana, 4. junij 2009 2009 , pp. - unpublished Zelin, H. & ... On Bylaw Limitation in Criminal Law for Computer Crimes and Its Theoretical Response [J] 2005 Jianghai Academic Journal (Bimonthly), pp. - article URL Zhijun, L. & ... Developing a computer forensics program in police higher education 2009 Science & Education, 2009. ICCSE'09. 4th , pp. - article URL Zidanšek, V. Računalniška forenzika v okolju Windows XP : diplomsko delo 2006 , pp. V, 66 f.- book Zou, J., Lu, K. & ... Architecture and fuzzy adaptive security algorithm in intelligent firewall 2002 MILCOM 2002. Proceedings, pp. - article URL Zupančič, M. Računalniško piratstvo - oblike in pravnovarstveni vidiki 1998 Revija za kriminalistiko in kriminologijo Vol. 49(4), pp. str.334-345 article Zupančič, M. Kriminaliteta v globalni komunikacijski mreži (internet) 1997 Revija za kriminalistiko in kriminologijo Vol. 48(2), pp. str.179-188 article Zviran, M. & ... Password security: an empirical study 1999 Journal of Management Information Systems, pp. - article URL , (Calif., N.C. f.C.C.D. & ... The Computer Crime Law Reporter 1994 , pp. - book , Crime, A.B.A.P. &.C. & ... International guide to privacy 2004 , pp. - book URL , Crime, U.S.D. o.J.C. & ... Searching and seizing computers and obtaining electronic evidence in criminal investigations 2001 , pp. - book Šavnik, J. Vloga sodnega izvedenca za računalniško forenziko v kazenskih postopkih Digitalni dokazi, pp. Str. 75-87 article Šavnik, J. Prihodnost računalniške forenzike 2009 Varnostni forum Vol. 4(5), pp. str. 28-29 article Šavnik, J. Principi, metodologija in orodja računalniške forenzike s praktičnim primerom : specialistična naloga 2006 , pp. 101 f.- book Škufca, M. Goljufije na svetovnem spletu : diplomsko delo 2010 , pp. 47 str.- book URL Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data 2010 , pp. XII, 353 str.- book Open source software for digital forensics 2010 , pp. VII, 124 str.- book URL Law and the internet 2009 , pp. IL, 713 str.- book ENISA quarterly 2005 ENISA quarterly, pp. - other URL Invisible crimes : their victims and their regulation 1999 , pp. 264 str.- book Computers in society 1998 Annual editions series, pp. X, 245 str.- book Crime, criminal justice and the Internet 1998 , pp. 91 str.- book Journal of financial crime : the official journal of the Cambridge International Symposium on economic crime 1995 J. financ. crime, pp. - other Prawne aspekty naduzyAj popelnianych z wykorzystaniem nowoczesnych technologii przetwarzania informacji 1994 , pp. 384 str.- book Criminal and civil investigation handbook 1993 , pp. 1 zv. (loč. pag.)- book Izdelano s pomočjo programskega orodja JabRef dne 24/07/2012. GOR