MINISTRSTVO ZA NOTRANJE ZADEVE RS
.HTML RAZLICICA JE MNOGO BOLJ FUNKCIONALNA
Računalniška kriminaliteta
Dr. Karl Petrič Ljubljana, 2012
Kazalo poglavij
Povzetek
1 Uvod
1.1 Cilj dela
2 Reševanje informacijskega problema s področja računalniške kriminalitete
2.1 Priprava in izdelava koncepta
2.2 Slika 1: Koncept reševanja informacijskega problema
3 Izdelava vsebinskega omrežja
3.1 Slika 2: Miselni vzorec informacijskega problema "Računalniška kriminaliteta"
3.2 Slika 3: Klikalni diagram so področja računalniške kriminalitete
4 Zaključek
5 Uporabljena programska orodja
6 Priloga
Povzetek
V hibridnem izdelku na temo "Računalniška kriminaliteta" je avtor prikazal postopek reševanja informacijskega problema, nakar je v klikalnem diagramu združil med sabo naslednje teme s področja računalniške kriminalitete: digitalna kriminaliteta, kibernetska kriminaliteta, elektronska kriminaliteta, internetna kriminaliteta, spletna kriminaliteta, sistemski vdori, računalniška forenzika idr. Kot končni izdelek je nastal klikalni diagram z maloprej navedenimi perečimi vsebinami. V tem klikalnem diagramu se nahajajo tudi povezave do spletnih strani kot npr. COBISS/COBIB in Google. Kot prilogo je avtor dodal aplikacijo v obliki preglednične bibliografije z iskalnikom, ki zajema zadetke s področja računalniške kriminalitete (COBISS/COBIB in Google učenjak).
Ključne besede: računalniška kriminaliteta, digitalna kriminaliteta, kibernetska kriminaliteta, internetna kriminaliteta, sistemski vdori, računalniška forenzika, preiskovanje kaznivih dejanj, preprečevanje.
GOR
1 Uvod
Računalniška kriminaliteta je v zadnjih dvajsetih letih izjemno porastla že zaradi dejstva, ker so se računalniki dejansko vgradili ne samo v poslovne in akademske sfere, ampak tudi v čisto navadne vsakdanje dejavnosti ter dogodke. S"e pojmovna analiza računalniške kriminalitete bi zelo zgovorno pokazala njeno razvejenost. Brez informacijske tehnologije si sploh več ne moremo zamisliti normalno delovanje družbe in s tem posameznika, ki živi v njej. Računalniki so v bistvu zapleteni stroji, ki v veliki meri pozitivno delujejo na delovanje družbe, vendar navkljub zapisanemu, je potrebno izpostaviti temno stran uporabe računalnikov, ki se kaže še zlasti v sferah družbenega. Po eni strani je povezovanje računalnikov v omrežja omogočilo hitrejšo komunikacijo med ljudmi, a po drugi strani je prav to povezovanje povečalo sistemske luknje, ki privlačijo razne zlorabe podatkov (npr. kraja podatkov, kraja identitete, kibernetska špijonaža, pedofilska omrežja, teroristična omrežja, spletni socialni inženiring). Zlorabe so lahko zelo hude in lahko posežejo celo (čeprav posredno) po človeških življenjih. Drugi večji negativni vpliv, ki ga je potrebno izpostaviti je v spodbujanju osiromašenega socialnega čuta do soljudi in nezdravega fiziološko pasivnega načina življenja.
Prekomerno socialno izolirani ljudje lahko postanejo zelo hitro tarča prekaljenih virtualnih kriminalcev.
GOR
1.1 Cilj dela ali hibridnega izdelka
Reševanje informacijskega problema na temo "Računalniška kriminaliteta", nakar izdelava klikalnega diagrama, ki poleg že pripravljenih poizvedb vsebuje še aplikacijo v obliki preglednične bibliografije z iskalnikom o računalniški kriminaliteti.
GOR
2 Reševanje informacijskega problema s področja različnih policijskih tem
Na kratko povzeto
Možni koraki pri reševanju informacijskega problema
1. Predstavitev informacijskega problema
2. Priprava in izdelava koncepta
3. Uporaba orodij (npr. iskalniki, zbirke podatkov, orodje za izdelavo miselnih vzorcev)
4. Izdelava klikalnega diagrama (npr. s programskim orodjem Yed graph editor)
5. Predstavitev zanimivih vsebinskih konceptov
V tem E- dokumentu bom najprej predstavil korake pri reševanju informacijskega problema na temo "Računalniška kriminaliteta". Po predstavitvi informacijskega problema bom pripravil in izdelal slikovni koncept, ki bo predvidel različne vsebinske gradnike. Na podlagi vsebinskih gradnikov bom izdelal klikalni diagram, ki vsebuje pomembne spletne povezave do E- del in že pripravljenih poizvedb s podatkovnih zbirk (npr. COBISS/COBIB, COBISS/MNZRS) in iskalnikov (npr. Google)
Predstavitev informacijskega problema
Predstavitev informacijskega problema lahko poteka na podlagi naslednjih kazalcev: Tema: Računalniška kriminaliteta
Ključne besede: računalniška kriminaliteta, digitalna kriminaliteta, kibernetska kriminaliteta, internetna kriminaliteta, sistemski vdori, računalniška forenzika, preiskovanje kaznivih
dejanj, preprečevanje.
Časovna omejitev: ni omejitev
Jezikovna omejitev: slv, eng, ger, scr, scc, bos
Omejitev za število zadetkov (A- članki, M- monografije/knjige, N- neknjižni/elektronski viri): A --> N ; M --> N
Namen poizvedbe: podpora pri odločanju v delovnem procesu in za izobraževanje
GOR
2.1 Priprava in izdelava koncepta
V tem delu bom predstavil pripravo in izdelavo slikovnega koncepta. S pomočjo modelirnega orodja Microsoft Visio Professional 2007 bom vizualno prikazal tako posamične entitete informacijskega problema kot tudi proces reševanja informacijskega problema.
2.2 Slika 1: Koncept reševanja informacijskega problema
Slika 1 prikazuje koncept reševanja informacijskega problema (v nadaljevanju IP) po stopnjah od ena do šest:
1. predstavitev IP
2. tema IP, različne policijske teme
3. naslov IP
4. določitev predmetnih oznak (računalniška kriminaliteta, kibernetska kriminaliteta, internetna kriminaliteta, digitalna kriminaliteta, e-kriminaliteta, virtualna kriminaliteta, kraja podatkov, kraja identitete, računalniška forenzika)
5. uporaba orodij
6. predstavitev klikalnega diagrama s področja računalniške kriminalitete
Slika 1 vključuje tudi pomembne prvine kot so različne omejitve (npr. za jezik, čas in vrsta virov). V nadaljevanju tega dela bom prikazal vsebinski koncept ali miselni vzorec kot osnova za izdelavo kasnejšega klikalnega diagrama.
GOR
3 Izdelava vsebinskega omrežja
3.1 Slika 2: Miselni vzorec informacijskega problema "Računalniška kriminaliteta"
Slika 2 prikazuje miselni vzorec oziroma vsebinske koncepte, ki so s temo računalniške kriminalitete povezani. Vsebinski koncepti so naslednji:
Kibemetska kriminaliteta (gl. tudi RK), oprema, komunikacijske naprave, mobilna omrežja, telefonske linije, računalniška omrežja, kazniva dejanja, goljufije, kraja podatkov, kraja identitete, špijonaža, računalniško piratstvo, poneverbe, finančne prevare, prenašanje virusov, pedofilska omrežja, terorizem na spletu, spletke, mobing, stalking, spletni vandalizem, Računalniška kriminaliteta (RK), internetna kriminaliteta, digitalna kriminaliteta, virtualna kriminaliteta, e-kriminaliteta, Informacijska kriminaliteta, Računalniška forenzika, odkrivanje,
preiskovanje, preprečevanje. Bralci tega dela si lahko izdelajo še bolj nadrobno sliko s pomočjo spletne aplikacije, ki se imenuje Text2MindMap Converter (kliknite sliko 2).
GOR
3.2 Slika 3: Klikalni diagram na temo računalniške kriminalitete
Slika 3 prikazuje klikalni diagram s področja računalniške kriminalitete. Sleherni gradnik znotraj diagrama vsebuje spletno povezavo do že pripravljene poizvedbe s COBISS/COBIB ali pa iskalnika Google (v primeru, da z določene teme na COBISS/COBIB ni bilo zadetka, sem v določeno slikovno entiteto vgradil spletno povezavo do pripravljene poizvedbe z Googla). Poizvedbe so bile izvedene v slovenskem jeziku s pomočjo izbranih predmetnih oznak (gl. geslovnik MNZ in organov v sestavi).
GOR
4 Zaključek
Bralke/-ci bodo lahko ta hibridni izdelek (podobno kot vse poprejšnje) uporabili za naslednje namene: za študij, za raziskave, za interno izobraževanje idr. Prav tako bodo lahko tudi dopolnili oziroma nadgradili že obstoječe spletne povezave do relevantnih vsebin.
5 Uporabljena programska orodja
1. JabRef 2.7.2 Reference manager (2012-07-24)
2. Microsoft Fronpage 2003
3. Microsoft Visio Professional 2007
4. Publish or perish (2012-07-24)
5. Text2Mindmap converter (2012-07-24)
6. Yed editor (2012-07-24)
GOR
6 Priloga
Spodnja preglednica predstavlja aplikacijo, ki poleg bibliografskih zapisov s COBISS/COBIB in Google učenjaka vsebuje še kakovosten iskalnik (ta iskalnik zajema zadetke znotraj preglednice). Predstavljeni so ključni podatki o avtorju, naslovu, letu nastanka, reviji/konferenci, tipu reference in ali je delo dosegljivo na spletu (gl. DOI/URL - povsem na desni strani preglednice).
TEVILO USTREZNIH ZADETKOV: 1107/1107.
HITRO ISKANJE: | b« | Š
AVTOR NASLOV LETO REVIJA/KONFERENCA TIP REFERENCE DOI/URL
at1, I.P. & 939 In addition to the formal concerns related to substantive laws and procedural laws, international computer crime investigations are hampered by a variety 1941 , pp. - book
Aas, K. Technologies of inSecurity: the surveillance of everyday life 2008 , pp. - book
Abagnale, F. FBI 2005 Computer Crime Survey 2005 Federal Bureau of Investigation, pp. - article
Abraham, T. & ... Investigative profiling with computer forensic log data and association rules 2002 Data Mining, 2002. ICDM 2002. , pp. - article URL
Adachi, N., Aoki, S., Komano, Y. & The security problems of Rivest and Shamir's PayWord scheme 2003 E-Commerce, 2003. CEC , pp. - article URL
Adams, J. Controlling cyberspace: applying the computer fraud and abuse act to the internet 1996 Santa Clara Computer & High Tech. LJ, pp. - article URL
Adelstein, F. Live forensics: diagnosing your system without killing it first 2006 Communications of the ACM, pp. - article URL
Adler, F. A note on teaching A~a,-S>internationalA~a,-S^ 1996 Journal of Criminal Justice Education, pp. - article URL
Adler, F., Mueller, G.O. & Laufer, W.S. Criminology 1998 , pp. XXIII, 552 str.- book
Aiziwa, K. Cooperation in Criminal Matters: Mutual Legal Assistance and Extradition, 24/7 Points of Contact Network, and Training in the Field of Computer Crime' 2001 Proceedings of the Asia Cyber Crime Summit. Hong , pp. article
Albanese, J. Tomorrow's thieves 1988 The Futurist, pp. - article URL
Albanese, J. & ... Crime in America: Some existing and emerging issues 1993 No.: ISBN 0-13-191446-4, pp. - article URL
Alderman, T. Computer Crime Journal of Systems Management, pp. - article
Aldrich, R. Cyberterrorism and computer crimes: issues surrounding the establishment of an international regime 2000 , pp. - book
Alexander, K. & ... Computer crime 1996 Emory Law Journal, pp. - article
Alexander, M. Computer crime: Ugly secret for business 1990 Computerworld, pp. - article
Alexander, M. Computer crime fight stymied 1989 Federal Computer Week, pp. - article
Allegrini, M. Le frodi aziendali. Frodi amministrative, alterazioni di bilancio e computer crime 2003 , pp. - book
Allen, B. Computer Crime: New Findings, New Insights 1981 notes used at computer Security Institute's Eighth , pp. - article
Allen, B. Embezzler's Guide to the Computer 1975 Harvard Business Review, pp. - article
Allen, W. Computer forensics 2005 Security & Privacy, IEEE, pp. - article URL
Altheide, C. & Carvey, H. Digital forensics with open source tools 2011 , pp. XVII, 264 str.- book
Anderson, D. Aggregate Burden of Crime, The 1999 JL & Econ., pp. - article URL
Anderson, K. Hacktivism and Politically Motivated Computer Crime 2009 Encurve, LLCC, pp. - article
Anderson, K. Intelligence Based Threat Assessments for Information Networks and Infrastructures 1999 Global Technology Research, Inc. White paper, n. pag, pp. - article
Anderson, R. Liability and computer security: Nine principles 1994 Computer SecurityA"a,-a€fESORICS 94, pp. - article URL
Anderson, R. & ... Understanding the insider threat 2004 , pp. - book URL
Andreano, F. Evolution of Federal Computer Crime Policy: The Ad Hoc Approach to an Ever-Changing Problem, The 1999 Am. J. Crim. L., pp. - article URL
Anthes, G. Security plans lag computer crime rate 1995 Computers and Security, pp. - article URL
Armstrong, C. Mastering computer forensics 2003 World Conference on Information Security , pp. - article URL
Armstrong, C. Developing a framework for evaluating computer forensic tools 2003 Evaluation in Crime Trends and justice: Trends , pp. - article
Armstrong, H. & ... Internet anonymity practices in computer crime 2003 Information management & , pp. - article URL
Armstrong, I. Computer Crime Spreads 2000 SC Magazine, pp. - article
Association, A.B. Task Force on Computer Crime 1984 Criminal Justice, pp. - article
Association, A.B. Task Force on Computer Crime, Section of Criminal Justice 1984 Report On Computer Crime, Washington, DC: ABA, pp. - article
Attaran, M. Managing legal liability of the Net: a ten step guide for IT managers 2000 Information management & computer security, pp. - article URL
August, R. Turning the Computer into a Criminal 1983 Barrister, pp. - article URL
AusCERT, M., Rankine, T., Rothery, M. & ... 1 Australian Computer Crime and Security Survey 2003 , pp. - book 1
Aycock, J. Computer viruses and malware 2010 , pp. - book
Baase, S. A gift of fire 2003 , pp. - book
Bace, R. A New Look at Perpetrators of Computer Crime 1994 Proc. 16th Department of Energy Computer Security , pp. article
Backhouse, J. & ... Managing computer crime: a research outlook 1995 Computers & Security, pp. - article URL
Bagchi, K. & ... An analysis of the growth of computer and Internet security breaches 2003 of the Association for Information Systems ( , pp. - article
Bailey, D. Attacks on computers: Congressional hearings and pending legislation 1984 , pp. - book URL
Baker, G. Trespassers will be prosecuted: computer crime in the 1990s 1993 Computer/law journal, pp. - article URL
Baker, R. Computer security handbook 1991 , pp. - book
Baker, W., Hylender, C. & ... 2008 data breach investigations report 2008 Basking Ridge, NJ: Verizon , pp. - article
Ball, L. Computer crime 1982 Technology Review, pp. - article
Bandyopadhyay, T., Mookerjee, V. & Why IT managers don't go for cyber-insurance products 2009 Communications of the , pp. - article URL
Bar-Sela, Y. Computer Legislation in Israel: A Proposal Being Developed by the Ministry of Justice 1986 Isr. L. Rev., pp. - article URL
Barki, H., Rivard, S. & ... A keyword classification scheme for IS research literature: An update 1993 Mis Quarterly, pp. - article URL
Barlow, J. & ... Crime & Puzzlement 1990 , pp. - book
Barr, R. & ... Crime placement, displacement, and deflection 1990 Crime and Justice, pp. - article URL
Barr, W. Foreword 1991 Am. Crim. L. Rev., pp. - article URL
Barrett, N. Digital crime : policing the cybernation 1997 , pp. 224 str.- book
Barton, B. & ... User-friendly password methods for computer-mediated information systems 1984 Computers & Security, pp. - article URL
Barton, G. Taking a Byte out of Crime: E-mail Harassment and the Inefficacy of Existing Law 1995 Wash. L. Rev., pp. - article URL
Barton, P. & ... Cyber-crime--criminal offence or civil wrong? 2003 Computer Law & Security Report, pp. - article URL
Baryamureeba, V. & ... The enhanced digital investigation process model 2004 Proceedings of the 4th Annual Digital , pp. - article
Baskerville, R. Information systems security design methods: implications for information systems development 1993 ACM Computing Surveys (CSUR), pp. - article URL
Bawden, B. International Symposium on the Prevention and Prosecution of Computer Crime 1992 Computer Law and Security Report, pp. - article
Bear, G. Teaching Computer Ethics 1986 Computers in the Schools, pp. - article URL
I II__II__IL
Becker, J. Computer crime career of the future? 1982 SIGCAS Comput. Soc, pp. - article
Becker, J. Who are the computer criminals 1982 ACM SIGCAS Computers and Society, pp. - article URL
Becker, J. Trial of a Computer Crime 1982 Prosecutor, pp. - article URL
Becker, J. The investigation of computer crime 1980 , pp. - book
Becker, J. Rifkin, A Documentary History 1980 COMP. LAW. J., pp. - article URL
Becker, J. Operational Guide to White-Collar Crime Enforcement, on the Investigation of Computer Crime 1978 Battelles Law and Justice Center, Seattle, Washington, pp. article
Beebe, N. & ... A hierarchical, objectives-based framework for the digital investigations process 2005 Digital Investigation, pp. - article URL
Beebe, N. & ... Using situational crime prevention theory to explain the effectiveness of information systems security 2005 Proceedings of the 2005 software , pp. - article
Belič, I. Okrogla miza o informacijski varnosti in digitalni forenziki Zbornik povzetkov [!prispevkov], pp. 2 str.- article
Belič, I. Tehnični vidiki odprtih vprašanj v zvezi z dokazovanjem s postopki digitalne forenzike Problemi dokazovanja v zahtevnih kazenskih postopkih, pp. Str. 151-162 article
Belič, I. Ustanovitev enote za boj proti računalniškemu kriminalu v Veliki Britaniji (Chloe Palmer, Zapis urednika revije Computer Fraud & Security, maj 2001) 2001 Varstvoslovje Vol. 3(1/2), pp. str. 125-126 article
Belič, I. Seminar Računalniško piratstvo - Gotenica 20. in 21.9.1999 1999 Varstvoslovje Vol. 1(2), pp. str. 75-76 article
Bell, R. The prosecution of computer crime 2002 Journal of financial crime, pp. - article URL
Bennett, S. & ... An application of qualitative risk analysis to computer security for the commercial sector 1992 Computer Security Applications , pp. - article URL
Bennett, W.W. & Hess, K.M. Criminal investigation 1998 , pp. XXI, 730 str.- book
Bequai, A. How to Prevent Computer Crime: A Guide to Forensic and Technology 2002 , pp. - book
Bequai, A. Employee abuses in cyberspace: Management's legal quagmire 1998 Computers & Security, pp. - article URL
Bequai, A. Techno-Crimes: The Computerization of Crime and Terrorism 1987 Lexington: DC Heath and Company, pp. - article URL
Bequai, A. Lack of Ethics as a Cause of Computer Crime' 1984 Computers and People, pp. - article
Bequai, A. How to prevent computer crime: a guide for managers 1983 , pp. - book
Bequai, A. Computer Crime: Expert Witness Manual 1980 , pp. - book
Bequai, A. Organized crime: The fifth estate 1979 , pp. - book
Bequai, A. Problem of Crime in the Electronic Society, The 1978 Com. LJ, pp. - article URL
Bequai, A. Computer crime 1978 , pp. - book
Bequai, A. Computer Crime: A Growing and Serious Problem 1976 Police LQ, pp. - article URL
BEQUAI, A., Utah, U. o. & ... CASHLESS SOCIETY-AN ANALYSIS OF THE THREAT OF CRIME AND THE INVASION OF PRIVACY 1976 JOURNAL OF , pp. - article URL
Berg, T. State Criminal Jurisdiction in Cyberspace: Is There a Sheriff on the Electronic Frontier? 2000 Michigan Bar Journal, pp. - article
Berlim, B. The International Handbook on Computer Crime Chichester, pp. - article
Bernard, J., Selinšek, L., Lesjak, B. & Š avnik, J. Digitalna forenzika v kazenskih postopkih : zbornik razprav, pripravljenih v okviru projekta Digitalna forenzika in njena vloga v sodnih postopkih (CRP V2-0219) 2008 , pp. 138 str.- book
Berqia, A. & ... A distributed approach for intrusion detection systems 2004 Information and Communication , pp. - article URL
Besednjak, A. Tehnični in pravni vidik dokazov v elektronski obliki : diplomsko delo visokošolskega študija 2008 , pp. 81 f.- book
Best, R. & ... Computer Crime, Abuse, Liability and Security,-A Comprehensive Bibliography 1970 , pp. - book
Bhaskar, R. State and local law enforcement is not ready for a cyber Katrina 2006 Communications of the ACM, pp. - article URL
Biggs, S. & ... Cloud computing: The impact on digital forensic investigations 2009 Internet Technology and Secured , pp. - article URL
Bintliff, R. Complete manual of white collar crime detection and prevention 1993 No.: ISBN 0-13-017260-X, pp. - article URL
Bishop, M. The insider problem revisited 2005 Proceedings of the 2005 workshop on New security , pp. - article URL
Bistarelli, S. & ... Analysis of integrity policies using soft constraints 2003 Policies for Distributed Systems and , pp. - article URL
Black, D. Computer Hacker-Electronic Vandal or Scout of the Networks, The 1993 JL & Inf. Sci., pp. - article URL
Blain, M. iCrime cops 2010 Police review Vol. 118(6070), pp. str. 26-27 article
Bliss, A. & ... The threat of computer crime: identifying the problem and formulating a response at force level 1998 POLICE JOURNAL, pp. - article
Bloom, R. Computer crime: a new white collar crook' 1980 Infosystems, pp. - article
Bloombecker, B. Spectacular Computer Crimes: What They are and how They Cost American Business Half a Billion Dollars a Year! 1990 No.: ISBN 1-55623-256-X, pp. - article URL
Bloombecker, B. Computer crime and abuse 1990 The EDP Auditor Journal, II, pp. - article
BloomBecker, J. Buck." Cracking down on Computer Crime." State Legislatures, pp. - article
I l|___|l II II H
BloomBecker, J. Computer Crime Laws 1993 , pp. - book
BloomBecker, J. Short-circuiting computer crime 1989 Datamation, pp. - article
BloomBecker, J. Computer ethics: an antidote to despair 1987 ACM SIGCAS Computers and Society, pp. - article URL
BloomBecker, J. Computer Crime, Computer Security, Computer Ethics: The First Annual Statistical Report of the National Center for Computer Crime Data 1986 , pp. - book
BloomBecker, J. Computer Crime 1986 National Center for Computer Crime Data. Los Angeles , pp. - article
BloomBecker, J. Introduction to computer crime 1984 Proceedings of the 2nd IFIP international conference , pp. article
BloomBecker, J. Computer crime update: The view as we exit 1984 1984 W. New Eng. L. Rev., pp. - article URL
BloomBecker, J. Conscience in computing: a Law Day perspective on computer crime 1983 ACM SIGCAS Computers and Society, pp. - article
Bloombecker, J. International computer crime: Where terrorism and transborder data flow meet 1982 Computers & Security, pp. - article URL
Bloombecker, J. Trial of a Computer Crime, The 1981 Int'l Bus. Law., pp. - article URL
Blythe, S. South pacific computer law: Promoting E-commerce in Vanuatu and fighting cyber-crime in Tonga 2006 Journal of South Pacific Law, pp. - article
Boedges, P. Air force mounts offensive against computer crime 1988 Government Computer News, pp. - article
Bogen, A. & ... Knowledge discovery and experience modeling in computer forensics media analysis 2004 of the 2004 international symposium on , pp. - article URL
Bogolea, B. & ... Information security curriculum creation: a case study 2004 Proceedings of the 1st annual conference on , pp. - article URL
Bologna, G., Lindquist, R. & ... ACCOUNTANT'S HANDBOOK OF FRAUD AND COMMERCIAL CRIME 1993 No.: ISBN 0-471-52642-8, pp. - article URL
Bologna, J. Computer Crime: Wave of the Future 1981 , pp. - book
Boni, W.C. & Kovacich, G.L. Netspionage : the global threat to information 2000 , pp. XX, 260 str.- book
Boockholdt, J., HORVITZ, J. & ... Prosecution of Computer Crime 1978 JOURNAL OF , pp. - article URL
Booth, M. The triads: the Chinese criminal fraternity 1990 , pp. - book
Borchgrave, A.D., Cilluffo, F., Cardash, S. & ... Cyber threats and information security meeting the 21st century challenge 2001 , pp. - book URL
Bosworth, S. & ... Computer security handbook 2002 , pp. - book
Botha, M. & ... Utilising fuzzy logic and trend analysis for effective intrusion detection 2003 Computers & Security, pp. - article URL
Bottom, N. & ... Security & loss control 1983 , pp. - book
II-II-II-II-If
Bowers, D. Access control and personal identification systems 1988 No.: ISBN 0-409-90083-4, pp. - article URL
Bowker, A. The advent of the computer delinquent 2000 FBI Law Enforcement Bulletin, pp. - article URL
Bowker, A. Juveniles and Computers: Should We Be Concerned 1999 Fed. Probation, pp. - article URL
Bowker, A. & ... Computer Crime in the 21st Century and Its Effect on the Probation Officer 2000 Fed. Probation, pp. - article URL
Bowker, A.L. The advent of the computer delinquent 2000 FBI law enforcement bulletin Vol. 69(12), pp. str. 7-11 article
Boyd, C. & ... Time and date issues in forensic computingA~a,-a€t'a case study 2004 Digital Investigation, pp. - article URL
Bradford, P., Brown, M., Perdue, J. & ... Towards proactive computer-system forensics 2004 Technology: Coding and , pp. - article URL
Branigan, S. High-tech crimes revealed: cyberwar stories from the digital front 2004 , pp. - book
Branscomb, A. Rogue computer programs and computer rogues: Tailoring the punishment to fit the crime 1990 Rutgers Computer & Tech. LJ, pp. - article URL
Brenner, S. Is There Such a Thing as' Virtual Crime'? 2001 California Criminal Law Review, Vol. 4, No. 1, 2001, pp. article URL
Brill, A., Pollitt, M. & ... The evolution of computer forensic best practices: an update on programs and publications 2006 Journal of Digital Forensic , pp. - article URL
Britz, M. Computer forensics and cyber crime 2004 , pp. - book
Britz, M. Computer Forensics and Computer Crime 2003 , pp. - book
Broadhurst, R. Developments in the global law enforcement of cybercrime 2006 Policing: An International Journal of Police , pp. - article URL
Bronitt, S. & ... Shifting boundaries of cybercrime: From computer hacking to cyber-terrorism 2003 CRIMINAL LAW JOURNAL- , pp. - article
Brown, D. & ... Using clustering to discover the preferences of computer criminals 2001 Systems, Man and Cybernetics, , pp. - article URL
Brown, D., Gunderson, L. & ... Interactive analysis of computer crimes 2000 Computer, pp. - article URL
Brungs, A. & Jamieson, R. Identification of legal issues for computer forensics 2005 Information Systems Management, pp. - article URL
Bržan, D. Računalniška forenzika in računalniško preiskovanje : magistrsko delo 2011 , pp. 80 str.- book URL
Buckland, J. & ... Combating computer crime: prevention, detection, investigation 1992 , pp. - book
BudimliA„a€", M. Kompjuterski kriminalitet izmeA„a€u teorije i prakse (Transl.: Computer crime between theory and practice) 2003 Sarajevo, Fakultet kriminalitiA„Šokih nauka, pp. - article
Bumke, D. Computer Crime 1980 The Saturday Evening Post, pp. - article
Burk, D. Transborder intellectual property issues on the Electronic Frontier 1994 Stan. L. & Pol'y Rev., pp. - article URL
Burns, R., Whitworth, K. & ... Assessing law enforcement preparedness to address Internet fraud 2004 Journal of Criminal Justice, pp. - article URL
Bynum, T. Computer ethics: Its birth and its future 2001 Ethics and Information Technology, pp. - article URL
Bynum, T. & ... Computer ethics and professional responsibility 2004 , pp. - book
Cardinali, R. Reinforcing our moral vision: examining the relationship between unethical behaviour and computer crime 1995 Work Study, pp. - article URL
Carl, G., Kesidis, G., Brooks, R. & ... Denial-of-service attack-detection techniques 2006 Internet Computing, IEEE, pp. - article URL
Carney, M. & ... The Trojan made me do it: A first step in statistical based computer forensics event reconstruction 2004 International Journal of Digital Evidence, pp. - article
Carrier, B. File system forensic analysis 2005 , pp. XX, 569 str.- book
Carrier, B. & ... Getting physical with the digital investigation process 2003 International Journal of Digital Evidence, pp. - article
Carroll, J.M. Computer security 1996 , pp. - book
Carter, D. Computer crime categories: how techno-criminals operate 1995 FBI law enforcement bulletin, pp. - article
Carter, D. & ... Computer crime and security: The perceptions and experiences of corporate security directors 2006 Security Journal, pp. - article URL
Carter, D. & ... Computer-related crime 2002 Op. cit, pp. - article
Carter, D. & ... Computer crime: An emerging challenge for law enforcement 1996 FBI Law Enforcement Bulletin, pp. - article URL
Casabona, P. & ... Computer Fraud: Financial and Ethical Implications 1998 Review of Business, pp. - article URL
Casey, E. Digital Evidence and Computer Crime. 2000 Academic Press, pp. - article
Casey, E. Digital evidence and computer crime: forensic science, computers, and the Internet 2011 , pp. - other
Casey, E. Investigating sophisticated security breaches 2006 Communications of the ACM, pp. - article URL
CASEY, E. Digital Evidence and Computer Crime, [Sl]: Elsevier Academic Press 2004 ISBN, pp. - article
Casey, E. Chapter 13: Forensic examination of handheld devices, digital evidence and computer crime 2004 , pp. - book
Casey, E. ur.(2004) Handbook of computer crime investigation: Forensic tools and technology 2004 London-San Diego: Elsevier , pp. - article
Casey, E. Digital evidence and computer crime 2003 , pp. - book
Casey, E. Handbook of computer crime investigation: forensic tools and technology 2002 , pp. - book
Casey, E. Practical approaches to recovering encrypted digital 2002 International Journal of Digital Evidence, pp. - article
evidence
Casey, E. Digital evidence and computer crime : forensic science, computers and the Internet 2000 , pp. 279 str.- book
Casey, E. Handbook of Computer Crime 2000 Forensic Science, Computer and the Internet, pp. - article
Casey, E. & ... The investigative process in Digital evidence and computer crime: forensic science, computers and the Internet 2004 , pp. - book
Castelli, G. & ... Il dolo informatico: come combattere il" computer crime" 1988 , pp. - book
Center, C. How the FBI Investigates Computer Crime 2004 , pp. - book
Cerullo, V. & ... Business continuity planning: A comprehensive approach 2004 Information Systems Management, pp. - article URL
CFE, K. Computer Forensic Case Study: Espionage, Part 1 Just Finding the File is Not Enough! 2001 Information Systems Security, pp. - article URL
Chambers, A. Computer auditing 1986 , pp. - book
Chan, H. A comparative study of reported and unreported computer crimes 2000 , pp. - book URL
Chang, W., Chung, W., Chen, H. & An international perspective on fighting cybercrime 2003 Proceedings of the 1st NSF/NIJ , pp. - article URL
Charney, S. Christensen O'Connor Johnson Kindness les 9 et 10 septembre 1996, Seattle, chapitre 7;" Congress Approves Electronic Espionage and Computer Crime 1997 Computer Law and Security Report, pp. - article
Charney, S. The justice department responds to the growing threat of computer crime 1992 Computer Security Journal, pp. - article URL
Charney, S. & ... Computer Crime 1996 Emory LJ, pp. - article URL
Chaski, C. Who's at the keyboard? Authorship attribution in digital evidence investigations 2005 International Journal of Digital Evidence, pp. - article
Chen, C. Computer crime and the computer fraud and abuse act of 1986 1990 Computer/Law Journal, pp. - article
Chen, C. & Lindsay, G. Viruses, attacks, and sabotage: It's a computer crime wave 2000 Fortune, pp. - article
Chen, H. Intelligence and security informatics: international workshop, WISI 2006, Singapore, April 9, 2006: proceedings 2006 , pp. - book
Chen, H., Chung, W., Xu, J., Wang, G., Qin, Y. & ... Crime data mining: a general framework and some examples 2004 Computer, pp. - article URL
Chen, T. Intrusion detection for viruses and worms 2004 IEC Annual Review of Communications, pp. - article
Chen, Y., Chen, P., Hwang, J., Korba, L. & ... An analysis of online gaming crime characteristics 2005 Internet , pp. - article URL
Chen, Y., Chen, P., Song, R. & ... Online gaming crime and security issue-cases and 2004 , pp. - book URL
countermeasures from taiwan
Chen, Y., Lin, S. & ... The influence of computer crime in online gaming on E-society-taking example for Taiwan in 2002 2003 on Innovative Information Technology Policy and E- , pp. article
Cheurprakobkit, S. & ... Computer crime enforcement in Texas: funding, training, and investigating problems 2003 Journal of Police and Criminal Psychology, pp. - article URL
Chien, E. & Bunker, L. Cyber viruses : how business can win in the battle that is not yet won 2000 Intersec Vol. 10(11/12), pp. str. 379-381 article
Choi, K. Computer crime victimization and integrated theory: An empirical assessment 2008 International Journal of Cyber Criminology, pp. - article
Chung, W., Chen, H., Chang, W. & Fighting cybercrime: a review and the Taiwan experience 2006 Decision Support Systems, pp. - article URL
CiardhuA,E$in, S. An extended model of cybercrime investigations 2004 International Journal of Digital Evidence, pp. - article
Clark, F. & ... Investigating computer crime 1996 No.: ISBN 0-8493-8158-4, pp. - article URL
Clifford, R. Cybercrime: The investigation, prosecution and defense of a computer-related crime 2001 , pp. - book URL
Clough, B. Computer Crime 1997 , pp. - book
Clutterbuck, R. Terrorism, drugs and crime in Europe after 1992 1990 No.: ISBN 0-415-05443-5, pp. - article URL
Code, T. Chapter 33 1996 Computer Crime, pp. - article
Cohen, C.L. Growing challenge of computer forensics 2007 The Police chief Vol. 74(3), pp. str. 24-29 article
Cohen, F. Computer viruses: theory and experiments 1987 Computers & security, pp. - article URL
Coldwell, R. Australian attitudes toward legal intervention into hacking 1995 Communications of the ACM, pp. - article URL
Coldwell, R. Perceptions of Computer Crime 1994 Crime against Business, Australian Institute of , pp. - article
Coldwell, R. University students' attitudes towards computer crime: a research note 1993 ACM SIGCAS Computers and Society, pp. - article URL
Coldwell, R. Some social parameters of computer crime 1990 Australian Computer Journal, pp. - article
Coldwell, R. Non-professional practices in computing: Some thoughts on the next decade or so. 1987 AUST. COMP. J., pp. - article URL
Coleman, J. The criminal elite: Understanding white-collar crime 2005 , pp. - book
Collier, P. & ... A forensic methodology for countering computer crime 1992 Artificial intelligence review, pp. - article URL
Collier, P. & ... Problems in policing computer crime 1992 Policing and Society: An International , pp. - article URL
Collins, J. Demand for Computer Crime Investigation Increases 1987 Data Management, pp. - article
Colombell, M. The legislative response to the evolution of computer viruses 2002 Rich. JL & Tech., pp. - article
1 II II II II II 1
Colton, K. & ... Computer crime: Electronic fund transfer systems and crime 1982 , pp. - book
Colvin, B. Computer Crime Investigators-a New Training Field 1979 FBI Law Enforcement Bulletin, pp. - article URL
Commission, S.L. Report on Computer Crime: Presented to Parliament by the Lord Advocate by Command of Her Majesty, July 1987 1987 , pp. - book
Congress, U. The federal computer crime statute. 18 USCA~ 030 1986 US Congress, Washington, DC, pp. - article
Conley, J. & ... A survey of computer crime legislation in the United States 1999 Information and Communications , pp. - article URL
Conly, C., (US), N.I. o.J. & ... Organizing for computer crime investigation and prosecution 1989 , pp. - book
Conly, C. & ... Computer Crime 1990 NIJ Reports, pp. - article
Conly, C.H. Organizing for computer crime investigation and prosecution [1998? ] Issues and Practices in Criminal Justice, pp. VI, 124 str.- book
Conry-Murray, A. Deciphering the Cost of a Computer Crime 2002 NETWORK MAGAZINE-SAN FRANCISCO-, pp. - article
Conser, J., Carsone, L. & ... Investigating Computer-Related Crimes Involving Small Computer Systems 1988 Critical Issues in Computer Investigation 2nd , pp. - article
Cooper, J. & ... Computer-security technology 1984 , pp. - book URL
Corbett, P. State and Federal Criminal Cyberlaw and Legislation Survey 2001 TM Cooley L. Rev., pp. - article URL
Corbett, P. Michigan's Arsenal for Fighting Cybercrime: An Overview of State Laws Relating to Computer Crimes 2000 MICHIGAN BAR JOURNAL, pp. - article
Cordeiro, W. Suggested management responses to ethical issues raised by technological change 1997 Journal of Business Ethics, pp. - article URL
Couch, R. Suggested Legislative Approach to the Problem of Computer Crime 1981 Wash. & Lee L. Rev., pp. - article URL
Couch, R. Suggested Legislative Approach to the Problem of Computer Crime, XXXVIII Wash & Lee L 1981 , pp. - book
Coutorie, L. The future of high-technology crime: A parallel Delphi study 1995 Journal of Criminal Justice, pp. - article URL
Cra, D. Two bills equal forewarning 1989 , pp. - book
Craiger, P., Ponte, L., Whitcomb, C. & ... Master's Degree in Digital Forensics 2007 , 2007. HICSS 2007. , pp. - article URL
Criscuoli, E. What personnel administrators should know about computer crime 1981 Personnel Administrator Dated:(September 1981), pp. - article URL
Croall, H. White collar crime 1992 No.: ISBN 0-335-09656-5, pp. - article URL
Cronan, T., Foltz, C. & ... Piracy, computer crime, and IS misuse at the university 2006 Communications of the ACM, pp. - article URL
Cronin, B. Strategic intelligence and networked business 2000 Journal of information science, pp. - article URL
CSI, C. Computer Crime and Security Survey 2009 , pp. - book
CSI, C. FBI computer crime and security survey 2001 Computer Security Issues & Trend, pp. - article
Csonka, P. The Council of Europe Convention on Cyber-crime: A response to the challenge of the new age 2005 Cyber-crime: The challenge in Asia, pp. - article
Csonka, P. INTERNET CRIME: THE DRAFT COUNCIL OF EUROPE CONVENTION ON CYBER-CRIME: A RESPONSE TO THE CHALLENGE OF CRIME IN THE AGE OF THE 2000 Computer Law & Security Review, pp. - article URL
Cumiskey, A. Internet and telecoms security in the EU 1999 Intersec Vol. 9(2), pp. str. 42-44 article
Cunningham, W., Strauchs, J. & ... The Hallcrest Report II: Private Security Trends 19702000 1990 Stoneham, MA: Butterworth , pp. - article URL
Cunningham, W., Strauchs, J. & ... Private security trends, 1970 to 2000: The Hallcrest report II 1990 , pp. - book
Cutrera, T. Constitution in Cyberspace: The Fundamental Rights of Computer Users, The 1991 UMKC L. Rev., pp. - article URL
D'Arcy, J., Hovav, A. & ... User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach 2009 Information Systems Research, pp. - article URL
David, J., Karl, S. & ... Computer Crime 1999 Reilly Associates Inc. Taiwan Branch, pp. - article
Davies, D. The nature of computer crime 1990 Computers and Law, pp. - article
Davis, B. It's Virus Season again, Has Your Computer Been Vaccinated: A Survey of Computer Crime Legislation as a Response to Malevolent Software 1994 Wash. ULQ, pp. - article URL
Davis, J.B. Computer intrusion investigation guidelines 2001 FBI law enforcement bulletin Vol. 70(1), pp. str. 8-11 article
Davis, R. & ... Computer crime in canada 1999 CRIMINAL LAW QUARTERLY, pp. - article
Debelak, B. Računalniška forenzika - organizacijski vidiki : diplomsko delo visokošolskega študija 2007 , pp. 49 f.- book
DeFrances, C. Prosecutors in state courts, 2001 2002 BJS Bulletin. Washington, DC: US Department of , pp. - article URL
DeLooze, L. Classification of computer attacks using a self-organizing map 2004 Workshop, 2004. Proceedings from the Fifth , pp. - article URL
DeMarco, J. It's Not Just Fun and 'War Games'-Juveniles and Computer Crime' 2001 United States Attorneys' Bulletin, pp. - article
Denning, D. Concerning hackers who break into computer systems 1990 High Noon on the Electronic Frontier: Conceptual , pp. - article URL
Denning, D., Neumann, P. & ... Social aspects of computer security 1987 Proceedings of the 10th , pp. - article
I-II-II-II-II-II-1
Denning, D.E. Information warfare and security 1999 , pp. XVII, 522 str.- book
Denning, P. Computers under attack: intruders, worms, and viruses 1990 , pp. - book
Denning, P. Computers, crime and privacyA~a,-a€t'a national dilemma: congressional testimony from the industry 1984 Communications of the ACM, pp. - article
Deutch, M. Computer legislation: Israel's new codified approach 1996 J. Marshall J. Computer & Info. L., pp. - article URL
Dhillon, G. Principles of information systems security: Texts and Cases 2006 Recherche, pp. - article URL
Dhillon, G. Challenges in managing information security in the new millennium 2001 Information security management: global challenges in , pp. - article URL
Dhillon, G. Violation of safeguards by trusted personnel and understanding related information security concerns 2001 Computers & Security, pp. - article URL
Dhillon, G. Computer crime: interpreting violation of safeguards by trusted personnel 1999 information technology resources in organizations in , pp. article
Dhillon, G. Managing and controlling computer misuse 1999 Information Management & Computer Security, pp. - article URL
Dhillon, G. & ... Computer crimes: theorizing about the enemy within 2001 Computers & Security, pp. - article URL
Dhillon, G., Silva, L. & ... Computer crime at CEFORMA: a case study 2004 International journal of information , pp. - article URL
DiDio, L. Computer Crime Costs on the Rise 1998 Computerworld, pp. - article
Diehl, E. & ... A,A© watermark: Closing the analog hole 2003 Consumer Electronics, 2003. ICCE. 2003 , pp. - article URL
Dierks, M. Computer network abuse 1992 Harv. JL & Tech., pp. - article URL
Dittrich, D. Developing an effective incident cost analysis mechanism 2002 Security Focus, pp. - article
Dixon, P. An overview of computer forensics 2005 Potentials, IEEE, pp. - article URL
Doney, L. The growing threat of computer crime in small businesses 1998 Business Horizons, pp. - article
DONN, B. Fighting Computer Crime: A New Framework for Protecting Information 1998 , pp. - book
Douglas, J., Burgess, A., Burgess, A. & ... Crime classification manual: A standard system for investigating and classifying violent crimes 2011 , pp. - book
Dowland, P., Furnell, S., Illingworth, H. & ... Computer crime and abuse: A survey of public attitudes and awareness 1999 Computers & , pp. - article URL
Drevenšek, M. Ponarejanje zgoščenk, kreditnih kartic in blagovnih znamk : diplomska naloga 2000 , pp. 59 f.- book
Duff, L. & ... Computer Crime in the Global Village: Strategies for Control and RegulationA~a,-a€t'in Defence of the Hacker 1996 International Journal of the Sociology of Law, pp. - article URL
Dunne, R. Deterring Unauthorized Access to Computers: Controlling Behavior in Cyberspace Through a Contract Law Paradigm 1994 Jurimetrics J., pp. - article URL
1 II II II II II 1
Durkin, K. Misuse of the Internet by pedophiles: Implications for law enforcement and probation practice 1997 Fed. Probation, pp. - article URL
Durkin, K. & ... A~a,-Š>Log on to sexA~a,-Ši\: Some notes on the carnal computer and erotic cyberspace as an emerging research frontier 1995 , pp. - book URL
Duyn, J.V. The human factor in computer crime 1985 , pp. - book
Easttom, C. & ... Computer Crime Investigation and the Law 2010 , pp. - book
Eckert, W. Interpretation of bloodstain evidence at crime scenes 1999 , pp. - book
Ekblom, P. Gearing up against crime 1997 International Journal of Risk, Security and , pp. - article
Eliasson, R. Datorbrott (Computer Crime) 1982 Treatise from the UmeA,A„ University, pp. - article
Eltringham, S. Computer Crime and Intellectual Property Section, US Department of Justice 2007 Prosecuting Computer Crimes, pp. - article
Embar-Seddon, A. Cyberterrorism 2002 American Behavioral Scientist, pp. - article URL
Endicoytt-Popuvsky, B. Ethics and teaching information assurance 2003 Security & Privacy, IEEE, pp. - article URL
Eoghan, C. Handbook of computer crime investigation 2002 , pp. - book
Eoghan, C. Digital evidence and computer crime 2000 San Diego, Calif, pp. - article
Erbschloe, M. Forces of change: ten trends that will impact the internet over the next five years 2001 Information systems management, pp. - article URL
Esbensen, D. Method and apparatus for automated network-wide surveillance and security breach intervention 1998 US Patent 5,796,942, pp. - article URL
Esbenshade, P. Hacking: Juveniles and Undeterred Recreational Cybercrime 2002 J. Juv. L., pp. - article URL
Etter, B. Computer crime 2001 4th National Outlook Symposium on Crime in Australia- , pp. - article
Etter, B., Research, A.C. f.P. & ... Forensic Challenges of E-Crime 2001 , pp. - book URL
Etter, C. The challenge of the forensic investigation of computer crime 2001 Platypus Magazine, pp. - article
Evers, J. Computer crime costs $67 billion, FBI says 2006 CNET News. com, pp. - article
Exum, J. Making the Punishment Fit the (Computer) Crime: Rebooting Notions of Possession for the Federal Sentencing of Child Pornography Offenses 2010 Rich. JL & Tech., pp. - article URL
Fagin, J. Criminal justice 2007 No.: ISBN 0-205-47893-X, pp. - article URL
Farahmand, F., Navathe, S., Sharp, G. & ... Assessing Damages of Information Security Incidents and Selecting Control Measures, a Case Study Approach 2005 Proceedings of the , pp. - article
Fedoreck, T. Computers+ Connectivity= New Opportunities for Criminals and Dilemmas for Investigators 2004 NY ST. BJ, pp. - article
Fifield, K. Smartcards outsmart computer crime 1989 Computers & Security, pp. - article URL
Flanagan, A. The law and computer crime: Reading the Script of Reform 2005 International Journal of Law and Information , pp. - article URL
Fluendy, S. Phishing targeting online outlets. Computer Crime Research Center 2005 , pp. - book
Flusche, K. Computer Crime and Analysis of Computer Evidence: It Ain't Just Hackers and Phreakers Anymore! 1998 Information systems security, pp. - article URL
Foltz, C. Bryan.(2004)," Cyberterrorism, Computer Crime, and Reality 2004 Information Management & Computer Security, pp. - article
Foltz, C. Cyberterrorism, computer crime, and reality 2004 Information Management & Computer Security, pp. - article URL
Foltz, C., Cronan, T. & ... Have you met your organization's computer usage policy? 2005 Industrial Management & , pp. - article URL
Foltz, C., Cronan, T. & ... Human behavior as a factor in the control of information systems misuse and computer crime 2002 Decision Sciences Institute 2002 Annual Meeting , pp. - article
Foltz, C., Schwager, P. & ... Why users (fail to) read computer usage policies 2008 Industrial Management & , pp. - article URL
Forcht, K. Assessing the ethical standards and policies in computer-based environments 1991 A Question of Ethics: Developing Information System , pp. - article
Forcht, K., Thomas, D. & ... Computer crime: Assessing the lawyer's perspective 1989 Journal of Business Ethics, pp. - article URL
Forensic, K. Fraud survey 2003 2003 Montvale, NJ, pp. - article
Forte, D. Strategic aspects in international forensics 2005 Forensic science series, pp. Str. 179-206 article
Fossen, E. Principles of internet investigation: Basic reconnaissance, geopositioning, and public information sources 2005 Unpublished master's thesis, Norwegian University of , pp. - article
Foster, D. Can the general theory of crime account for computer offenders: Testing low self-control as a predictor of computer crime offending 2004 , pp. - book URL
Francia, G. & ... Computer forensics laboratory and tools 2005 Journal of Computing Sciences in Colleges, pp. - article URL
Francis, D. Computer crime 1987 No.: ISBN 0-525-67192-7, pp. - article URL
Freeh, L. speech to the 1997 International Computer Crime Conference 1997 , pp. - book
Friedman, B. Moral Responsibility and Computer Technology. 1990 , pp. - book URL
Friedman, D. & ... Future imperfect: technology and freedom in an uncertain world 2008 , pp. - book
Friedrichs, D. Trusted criminals: White collar crime in contemporary society 2009 , pp. - book
Furnell, S. Cybercrime: Vandalizing the information society 2002 , pp. - book
Furnell, S. The problem of categorising cybercrime and 2001 2nd Australian Information Warfare and Security , pp. - article
cybercriminals
Furnell, S. & ... Computer hacking and cyber terrorism: The real threats in the new millennium? 1999 Computers & Security, pp. - article URL
Furnell, S. & ... Computer abuse: vandalizing the information society 1997 Internet research, pp. - article URL
Furnell, S., Dowland, P., Illingworth, H. & ... Authentication and supervision: A survey of user attitudes 2000 Computers & , pp. - article URL
Gabrys, E. The international dimensions of cyber-crime, part 1 2002 Information systems security, pp. - article URL
Gaensslen, R. How do I become a forensic scientist? Educational pathways to forensic science careers 2003 Analytical and bioanalytical chemistry, pp. - article URL
Gammer, M. Computer Crime 1980 American Criminal Law Review, pp. - article URL
Gardner, E., Samuels, L., Render, B. & ... The importance of ethical standards and computer crime laws for data security 1989 Information System , pp. - article URL
Garfinkel, S. The FBI's Cybercrime Crackdown 2002 TECHNOLOGY REVIEW-MANCHESTER NH-, pp. - article
Garfinkel, T. & ... When virtual is harder than real: Security challenges in virtual machine based computing environments 2005 Proceedings of the 10th conference on Hot , pp. - article URL
Garg, A., Curtis, J. & ... Quantifying the financial impact of IT security breaches 2003 Information Management & , pp. - article URL
Garner, B. & ... Black's Law Dictionary Deluxe 8 1999 Auditing, pp. - article
Geary, J. Executive liability for computer crime and how to prevent it 1994 Information Management & Computer Security, pp. - article URL
Geer, D. Security technologies go phishing 2005 Computer, pp. - article URL
Geer, D. Malicious bots threaten network security 2005 Computer, pp. - article URL
Gemignani, M. What is Computer Crime, and Why Should We Care 1987 UALR LJ, pp. - article URL
Gemignani, M. Computer Crime: The Law in'80 1980 Ind. L. Rev., pp. - article URL
George, B. Contemporary Legislation Governing Computer Crimes 1985 Criminal Law Bulletin, pp. - article URL
George, N. Cyber traps: An overview of crime, misconduct and security risks in the cyber environment 2004 Capacity building series, pp. - article URL
Geradts, Z.J. Content-based information retrieval from forensic image databases : [dissertation] 2002 , pp. 148 f.- other URL
Gilbert, J. Criminal investigation 1993 , pp. - book
Gillard, C. & ... Computer crime: a growing threat 1983 BYTE Mag, pp. - article
Gish, J. Computer Crime and Punishment-The View From the DA's Office 1985 Information Stategy-The Executive's Journal, pp. - article URL
Glynn, E. Computer Abuse: The Emerging Crime and the Need for Legislation 1983 Fordham Urb. LJ, pp. - article URL
1 II II II II II 1
Goldfarb, A. & ... Economic and business dimensions Search engine advertising 2008 Communications of the ACM, pp. - article URL
Gonzalez, P. Addressing computer crime legislation: Progress and regress. 1983 COMP. LAW J., pp. - article URL
Goodhue, D. & ... Security concerns of system users* 1:: A study of perceptions of the adequacy of security 1991 Information & Management, pp. - article URL
Goodhue, D. & ... Security concerns of system users: a proposed study of user preceptions of the adequacy of security measures 1989 System Sciences, 1989. Vol. IV: , pp. - article URL
Goodman, M. Making computer crime count 2001 FBI Law Enforcement Bulletin, pp. - article URL
Goodman, M. My the Police Don't Care About Computer Crime, 10HARV 1997 JL & TECH, pp. - article
Goodman, M. Why the police don't care about computer crime'(1997) 10 1997 Harvard journal of law and technology, pp. - article
Goodman, M. Why the Police Don't Care About Computer Crime 1996 Harv. JL & Tech., pp. - article URL
Gorden, L. Computer crime and security survey 2004 CSI/FBI, pp. - article
Gordon, G., Hosmer, C., Siedsma, C., Rebovich, D. & ... Assessing technology, methods, and information for committing and combating cyber crime 2002 , pp. - book URL
Gordon, L., Loeb, G., Lucyshyn, W. & ... 9th Annual FBI/CSI computer crime and security survey 2004' 2004 , pp. - book
Gordon, L., Loeb, M. & ... The 2005 CSI/FBI computer crime and security survey 2005 Computer Security , pp. - article
Gordon, L., Loeb, M. & ... A framework for using insurance for cyber-risk management 2003 Communications of the ACM, pp. - article URL
Gordon, L., Loeb, M., Lucyshyn, W. & ... Eleventh annual CSI/FBI computer crime and security survey 2006 2007 Computer Security Institute, pp. - article
Gordon, L., Loeb, M., Lucyshyn, W. & ... CSI 2006 FBI computer crime and security , pp. - article
Gordon, L., Loeb, M., Lucyshyn, W. & ... 2006 csi/fbi computer crime and security survey 2006 Computer Security , pp. - article
Gordon, L., Loeb, M., Lucyshyn, W. & ... Computer crime and security survey, 2006 2006 , pp. - book
Gordon, L., Loeb, M., Lucyshyn, W. & ... 10th annual CSI/FBI computer crime and security survey 2005 , pp. - book
Gordon, L., Loeb, M., Lucyshyn, W. & ... The annual CSI/FBI computer crime and security survey 2005 CSI (Ed.), pp. - article
Gordon, L., Loeb, M., Lucyshyn, W. & ... Ninth CSI/FBI computer crime and security survey 2004 , pp. - book
Gordon, L., Loeb, M., Lucyshyn, W. & ... 2004 CSI/FBI computer crime and security survey 2004 Computer Security , pp. - article
Gordon, L., Loeb, M., Lucyshyn, W. & ... The ninth annual 2004 CSI/FBI Computer crime and security survey 2004 /www. gocsi. com/.[Cited 20th Oct , pp. - article
Gordon, S. & ... On the definition and classification of cybercrime 2006 Journal in Computer Virology, pp. - article URL
Gordon, S. & ... Computer crime revisited: The evolution of definition and classification 2006 European Institute for Computer Anti-Virus Research ( , pp. - article
Gottschalk, L., Liu, J., Dathan, B., Fitzgerald, S. & ... Computer forensics programs in higher education: a preliminary study 2005 ACM SIGCSE Bulletin, pp. - article URL
Gould, C. The information web: ethical & social implications of computer networking 1988 , pp. - book
Grabosky, P. 'Computer Crime: Challenge to Law Enforcement 2000 Law Enforcement Review N, pp. - article
Grabosky, P. Computer crime: A criminological overview 2000 Workshop on Crimes Related to the Computer Network , pp. - article
Grabosky, P. & ... The Future of Cyber-crime in Asia 2005 Broadhurst, RG, pp. - article
Grabosky, P. & ... Telecommunication fraud in the digital age 2001 Crime and the Internet, pp. - article
Grabosky, P. & ... Crime in the digital age: Controlling telecommunications and cyberspace illegalities 1998 , pp. - book
Grabosky, P.N. Crime in the digital age : controlling telecommunications and cyberspace illegalities 1998 , pp. XI, 259 str.- book
Granick, J. Faking It: Calculating Loss in Computer Crime Sentencing 2005 ISJLP, pp. - article URL
Grant, A., David, F. & ... Child pornography in the digital age 1997 Transnational Organized Crime, pp. - article URL
Grazioli, S. & ... Consumer and business deception on the Internet: Content analysis of documentary evidence 2003 International Journal of Electronic Commerce, pp. - article URL
Green, G. & ... Introduction to security 1987 , pp. - book
Green, V. State computer crime statutes and the use of traditional doctrines to prosecute the computer criminal 1989 memorandum), Reed, Smith, Shaw, and McClay, , pp. - article
Gresty, D., Shi, Q. & ... Requirements for a general framework for response to distributed denial-of-service 2001 Computer Security Applications , pp. - article URL
Griffith, D. Computer Fraud and Abuse Act of 1986: A Measured Response to a Growing Problem, The 1990 Vand. L. Rev., pp. - article URL
Griffiths, M. Computer Crime and Hacking: A Serious Issue for the Police 2000 POLICE JOURNAL, pp. - article
Gripman, D. The doors are locked but the thieves and vandals are still getting in: A proposal in tort to alleviate corporate America's cyber-crime problem 1997 J. Marshall J. Computer & Info. l., pp. - article URL
Grodzinsky, F. & ... Is Cyberstalking a Special Type of Computer Crime 2001 Proceedings of ETHICPMP, pp. - article
Groover, R. Overcoming obstacles: Preparing for computer-related 1996 FBI Law Enforcement Bulletin, pp. - article URL
crime
Guisnel, J. Guerres dans le cyberespace : services secrets et Internet 1995 Enquetes, pp. 251 str.- book
Gupta, M., Chaturvedi, A., Mehta, S. & ... The experimental analysis of information security management issues for online financial services 2000 Proceedings of the twenty , pp. - article URL
Haagman, D. & ... Trojan defence: A forensic view 2005 Digital Investigation, pp. - article URL
Hagen, J., Sivertsen, T. & ... Protection against unauthorized access and computer crime in Norwegian enterprises 2008 Journal of Computer Security, pp. - article URL
Haggerty, J. & ... Managing corporate computer forensics 2006 Computer Fraud & Security, pp. - article URL
Halbert, D. Discourses of danger and the computer hacker 1997 The Information Society, pp. - article URL
Hall, J. & ... The Sarbanes-Oxley Act: implications for large-scale IT outsourcing 2007 Communications of the ACM, pp. - article URL
Hamilton, C. Risk management and security 1999 Information systems security, pp. - article URL
Hansen, R. The computer virus eradication act of 1989: the war against computer crime continues 1990 Software Law Journal, pp. - article
Harrington, S. Software piracy: Are Robin Hood and responsibility denial at work? 2000 of information technology management in the , pp. - article URL
Harrington, S. The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions 1996 MIS quarterly, pp. - article URL
Harrington, S. Computer Crime & Abuse by US Employees: Something to Worry About? 1995 Journal of Systems Management, pp. - article
Harrington, S. Why People Copy Software and Create Computer Viruses 1989 Information Resources Management Journal (IRMJ), pp. - article URL
Harrington, S. & ... Lessons from corporate America applied to training in computer ethics 1990 ACM SIGSAC Review, pp. - article URL
Harris, A. IS ethical attitudes among college students: A comparative study 2000 Proceedings of ISECON, pp. - article
Harris, K. & ... Computer Crime: An Overview 1995 Technical Bulletin, pp. - article URL
Hatcher, M., McDannell, J. & ... Computer Crimes 1999 Am. Crim. L. Rev., pp. - article URL
Haugen, S. & ... Identifying and controlling computer crime and employee fraud 1999 Industrial Management & Data Systems, pp. - article URL
Hearnden, K. Computer crime and people 1990 A handbook of computer crime, London: Kogan Page, pp. article
Hearst, M. TileBars: visualization of term distribution information in full text information access 1995 Proceedings of the SIGCHI conference on Human , pp. - article URL
Heinlein, E. Principles of information systems security 1995 Computers & Security, pp. - article
Held, D. & ... Governing globalization: Power, authority and global governance 2002 , pp. - book
Henning, J. & ... Insider trading, money laundering and computer crime 2000 Transactions of the Centre for Business , pp. - article
Henry, S. & ... The criminology theory reader 1998 No.: ISBN 0-8147-3551-7, pp. - article URL
Henseler, H. Computer Crime and Computer Forensics 2000 The encyclopedia of forensic science, pp. - article
Herig, J. Computer crime in Florida: 1989 1989 Tallahassee, FL: Florida Department of Law , pp. - article
Hernandez, C. & ... Transnational crime and regional security in the Asia Pacific 1999 , pp. - book
Herringshaw, C. Detecting attacks on networks 1997 Computer, pp. - article URL
Heymann, S. Legislating Computer Crime 1997 Harv. J. on Legis., pp. - article URL
Higgins, G. Can low self-control help with the understanding of the software piracy problem? 2004 Deviant Behavior, pp. - article URL
Higgins, G. & ... Does social learning theory condition the effects of low self-control on college students' software piracy 2004 Journal of Economic Crime Management, pp. - article
Higgins, G. & ... SELF-CONTROL, DEVIANT PEERS, AND SOFTWARE PIRACY 1 2004 Psychological reports, pp. - article URL
Higgins, G., Wilson, A. & ... An application of deterrence theory to software piracy 2005 Journal of Criminal Justice and , pp. - article
Hinduja, S. Deindividuation and Internet software piracy 2008 CyberPsychology & Behavior, pp. - article URL
Hinduja, S. Investigating computer crime 2008 Crimes of the Internet, Prentice-Hall, Upper Saddle , pp. - article
Hinduja, S. Computer crime investigations in the United States: leveraging knowledge from the past to address the future 2007 International Journal of Cyber Criminology, pp. - article
Hinduja, S. Perceptions of local and state law enforcement concerning the role of computer crime investigative teams 2004 Policing: An International Journal of Police , pp. - article URL
Hinduja, S. Trends and patterns among online software pirates 2003 Ethics and Information Technology, pp. - article URL
Hinduja, S. Correlates of Internet software piracy 2001 Journal of Contemporary Criminal Justice, pp. - article URL
Hitchings, J. Deficiencies of the traditional approach to information security and the requirements for a new methodology 1995 Computers & Security, pp. - article URL
Hollinger, R. Crime, deviance and the computer 1997 , pp. - book
Hollinger, R. Hackers: computer heroes or electronic highwaymen? 1991 ACM SIGCAS Computers and Society, pp. - article URL
Hollinger, R. Computer hackers follow a Guttman-like progression 1988 Sociology and social research, pp. - article
Hollinger, R. & ... THE PROCESS OF CRIMINALIZATION: THE CASE OF COMPUTER CRIME LAWS* 1988 Criminology, pp. - article URL
Hollinger, R. & ... Criminal Law Formation: The Case of Computer Crime Legislation 1986 A paper presented at the 1986 Annual Meetings of , pp. - article
1 II II II II II 1
Holt, T. Examining a transnational problem: An analysis of computer crime victimization in eight countries from 1999 to 2001 2003 International Journal of Comparative and Applied , pp. - article URL
Holt, T., Bossler, A. & ... Examining state and local law enforcement perceptions of computer crime 2010 Crime On-line: Correlates, Causes, and Context, , pp. - article
Hong, H. Hacking Through the Computer Fraud and Abuse Act 1997 UC Davis L. Rev., pp. - article URL
Hoo, K. How much is enough? A risk-management approach to computer security 2000 Workshop on Economics and Information Security, UC , pp. - article
Hoonakker, P., Bornoe, N. & ... Password authentication from a human factors perspective: Results of a survey among end-users 2009 Proceedings of the Human , pp. - article URL
Hoonakker, P., Carayon, P., Deb, J. & ... The use of focus groups to examine human factors in computer and information security 2008 Human Factors in , pp. - article
Horvat, D. Kazenski postopek pri kaznivih dejanjih v zvezi z računalniki : diplomska naloga 2000 , pp. 57 f.- book
Hosmer, C. Time-lining computer evidence 1998 Information Technology Conference, 1998. IEEE, pp. - article URL
Householder, A., Houle, K. & ... Computer attack trends challenge Internet security 2002 Computer, pp. - article URL
Hovav, A. & ... The impact of virus attack announcements on the market value of firms 2004 Information Systems Security, pp. - article URL
Howard, J. & ... A common language for computer security incidents 1998 Sandia Report: SAND98-8667, Sandia , pp. - article
Howerton, P. Computer crime (a tutorial) 1985 Proceedings of the 1985 ACM annual conference on , pp. article
Huebner, E., Bem, D. & ... Computer forensics: past, present and future 2003 security Technical report, pp. - article
Hughes, G. Computer crime: the liability of hackers 1990 Australian Computer Journal, pp. - article
Hughes, G., Tucker, G., Thompson, D. & ... Legislative responses to computer crime 1990 , pp. - book
Hughes, K. Comparing pretesting methods: cognitive interviews, respondent debriefing, and behavior coding 2004 Survey Methodology, pp. - article
Hunt, C. Networking personal computers with TCP/IP 1995 , pp. - book
Husted, B. The impact of national culture on software piracy 2000 Journal of Business Ethics, pp. - article URL
Hutchinson, W. & ... Attacking the Attackers: Attitudes of Australian IT Managers to retaliation against hackers 1999 ACIS (Australasian Conference on , pp. - article
Hyde-Bales, K., Morris, S. & ... The Policing Recording of Computer Crime 2004 Development and Practitioner Report, pp. - article
Hyde-Bales, K., Morris, S., Charlton, A. & ... Police Recording of Computer Crime 2004 No.: ISBN 1 84473 488 , pp. - article URL
Icov, D., Seger, K. & ... Computer Crime. A Crimefighter's Handbook, O'Reily & Associates 1995 Inc. Sebastopol, CA, pp. - article
Icove, D. Collaring the cybercrook: an investigator's view 1997 Spectrum, IEEE, pp. - article URL
Icove, D., Seger, K. & ... Computer crime: a crimefighter's handbook 1995 , pp. - book
Icove, D., Seger, K. & ... Fighting Computer Crime 1995 , pp. - book
Icove, D., Seger, K. & ... Computer Crime. O'Reilley & Associates 1995 Inc., Sebastopol, California, pp. - article
Icove, D., Seger, K. & VonStorch, W. Computer crime : a crimefighter's handbook 1995 Computer security, pp. XXI, 437 str.- book
IgnjatoviA„a€", A„. Pojmovno odreA„a€enje kompjuterskog kriminaliteta 1991 Anali Pravnog fakulteta u Beogradu, pp. - article URL
III, B.Y. MANAGING E-BUSINESS RISKS 2001 , pp. - book
III, G.F. Digital forensics laboratory projects 2006 Journal of computing Sciences in Colleges, pp. - article URL
Ingraham, D. On Charging Computer Crime"(1980) 1980 Computer Law Journal, pp. - article
Ingraham, D. On charging computer crime 1980 Computer LJ, pp. - article
International Criminal Law Seminar, 2. The alleged transnational criminal : the Second Biennial International Criminal Law Seminar 1995 International bar association series, pp. XXI, 449 str.- inproceedings
Iqbal, M. Defining cyberterrorism 2004 J. Marshall J. Computer & Info. L., pp. - article URL
Irons, A. Computer forensics and records managementA~a,-a €scompatible disciplines 2006 Records Management Journal, pp. - article URL
Jackson, K. Congress pushes computer crime law 1989 Federal Computer Week, pp. - article
Jaishankar, K. Cyber criminology: Evolving a novel discipline with a new journal 2007 International Journal of Cyber Criminology, pp. - article
Jakšič, B. Kibernetska vojna : (cyberwar) : diplomska naloga 2000 , pp. 55 f.- book
Jambriško, D. Računalniški kriminal in avtorske pravice : diplomska naloga 1999 , pp. 64 f., [17] f. pril.- book
Jensen, E. Electronic Soapbox: Computer Bulletin Boards and the First Amendment, An 1987 Fed. Comm. LJ, pp. - article URL
Jessup, L., Valacich, J. & ... Information systems today 2003 , pp. - book
Jewkes, Y. Crime online 2007 , pp. - book
Jinyuan, L. Analysis of computer crime challenge the existing criminal law and criminal legislation to improve , pp. - book
Johnson, A. The technology acceptance model and the decision to invest in information security 2005 Southern Association of Information Systems , pp. - article
Johnson, D. Mapping ordinary morals onto the computer society: a philosophical perspective 1984 Journal of Social Issues, pp. - article URL
Johnson, T. Forensic computer crime investigation 2005 , pp. - book
Johnston, A. & ... Improved security through information security 2009 Communications of the ACM, pp. - article URL
governance
Johnston, J., Eloff, J. & ... Security and human computer interfaces 2003 Computers & Security, pp. - article URL
Jones, R. Computer file protection system 1992 US Patent 5,144,659, pp. - article URL
Jones, T. Child abuse or computer crime? The proactive approach 2003 Policing Paedophiles on the Internet Bristol: New , pp. - article
Joutsen, M. in European Criminal Justice: Corruption, Women in the Criminal Justice System, Criminal Policy Indicators, Community Crime Prevention, and Computer Crime 1999 No.: ISBN 951-53-1968-4, pp. - article URL
Jr, D.S. & ... Discovering and disciplining computer abuse in organizations: a field study 1990 MIS Quarterly, pp. - article URL
Jr, D.S. & ... Key information liability issues facing managers: software piracy, proprietary databases, and individual rights to privacy 1990 Mis Quarterly, pp. - article URL
Jr, E.P. Computer abuse: Problems of instrumental control 1987 Deviant Behavior, pp. - article URL
Jr, H.S. Web That Binds Us All: The Future Legal Environment of the Internet, The 1996 Hous. J. Int'l L., pp. - article URL
Jr, J.T. & ... Computer Crime: Keeping Up with High Tech Criminals 1986 Crim. Just., pp. - article URL
Jr, J.T. & ... The 1984 Federal Computer Crime Statute: A partial answer to a pervasive problem. 1986 COMP. LAW J., pp. - article URL
Jr, R.V., Bergiel, B. & ... Effects of the electronic Nigerian money fraud on the brand equity of Nigeria and Africa 2004 Management Research , pp. - article URL
Judson, K. Computer crime: phreaks, spies, and salami slicers 2000 , pp. - book
Judson, K. Computer crime : phreaks, spies, and salami slicers 1994 Issues in focus, pp. 128 str.- book
Jurc, J. Digitalna forenzika in digitalni dokazi : diplomsko delo 2011 , pp. 53 f.- book
Jurkat, M. Computer Crime Legislation: Survey and Analysis 1986 Annual Survey of American Law, pp. - article
Kabay, M. Understanding Studies and surveys of computer Crime 2009 Computer Security Handbook, pp. - article
Kabay, M. Studies and surveys of computer crime 2001 , pp. - book
Kabay, M. ICSA White Paper on Computer Crime Statistics 1998 International Computer Security Association, pp. - article
Kallman, E. & ... Ethical decision making and information technology: An introduction with cases 1996 , pp. - book
Kanellis, P. Digital crime and forensic science in cyberspace 2006 , pp. - book
Kankanhalli, A., Teo, H., Tan, B. & An integrative study of information systems security effectiveness 2003 International Journal of , pp. - article URL
Kapor, M. Civil liberties in cyberspace 1991 Scientific American, pp. - article
Kardoš, Z. Možnosti računalniške forenzike z uporabo nekomercialnih programskih orodij : specialistična naloga 2010 , pp. VI, 70 str.- book URL
Kaspersen, H.W. Implementation of Recommendation no. R (89) 9 on computer-related crime Council of Europe - European Committee on Crime Problems, pp. 114 str.- article
Kastelic, T. & Š kraba, M. Digitalni dokazi - metode in izkušnje policije Digitalni dokazi, pp. Str. 29-44 article
KatanoviAj, D. Obvladovanje varnostnih incidentov s pomočjo računalniške forenzike : magistrska naloga 2011 , pp. 92 str., [18] f. pril- book
Katyal, N. Digital architecture as crime control 2002 Yale LJ, pp. - article URL
Katz, A. Computers: the changing face of criminality 1995 No.:, pp. - article URL
Kay, D. A course in computer law 1992 ACM SIGCSE Bulletin, pp. - article URL
Keefe, B. Computer Crime Research Organization News 2004 , pp. - book
Keefe, P. Computer crime insurance available- for a price 1983 COMPUTERWORLD., pp. - article
Kelly, S. Computer crime losses double 2007 Business Insurance, pp. - article
Kelman, A. Computer Crime in the 1990s: A Barrister's View' 1994 Paper for the Twelfth International Symposium on , pp. - article
Kenny, M. Data encryption: coping with computer crime. Manage, 33: 15-17, April 1981. Descriptors:" Electronic data processing departmentsA~a,-a€t'Security measures Computer crimes, pp. - article
Keromytis, A. Patch on demand saves even more time?[network security] 2004 Computer, pp. - article URL
Kerr, O. Computer Crime Law 2006 , pp. - book
Kerr, O. Virtual Crime, Virtual Deterrence: A Skeptical View of Self-Help, Architecture, and Civil Liability 2005 JL Econ. & Pol'y, pp. - article URL
Kerr, O. Cybercrime's Scope: Interpreting Access and Authorization in Computer Misuse Statutes 2003 NYUL Rev., pp. - article URL
Kerr, O. Lifting the Fog of Internet Surveillance: How a Suppression Remedy Would Change Computer Crime Law 2002 Hastings Lj, pp. - article URL
Kesar, S. & ... Developing ethical practices to minimize computer misuse 1998 Social science computer review, pp. - article URL
Kessler, G. An overview of steganography for the computer forensics examiner 2004 Forensic science communications, pp. - article
Kholfi, S., Habib, M. & ... Best hybrid classifiers for intrusion detection 2006 Journal of Computational Methods in , pp. - article URL
Khoshgoftaar, T. & ... Resource-sensitive intrusion detection models for network traffic 2004 High Assurance Systems , pp. - article URL
Kim, M. How counties handle computer crime? 1997 Ethics and Law on Electronic Frontier, pp. - article
Kjaerland, M. A classification of computer security incidents based on reported attack data 2005 Journal of Investigative Psychology and , pp. - article URL
Klanjščak, B. Spopadi velikanov : hekerji in Pentagon Revija obramba article
Vol. 9(2000), pp. str. 44-45
Kling, R. Computer Abuse and Computer Crime as Organized Activities Computer/Law Journal, pp. - article
Kling, R. When organizations are perpetrators: assumptions about computer abuse and computer crime 1991 Computerization and controversy, pp. - article
Kling, R. Computer abuse and computer crime as organizational activities 1981 ACM SIGCAS Computers and Society, pp. - article
Kloster, A. & ... The effects of different types of organizers on students' learning from text. 1989 Journal of educational psychology, pp. - article URL
Kluth, D. Computer, Virus Threat: A Survey of Current Criminal Statutes, The 1990 Hamline L. Rev., pp. - article URL
Knightmare Secrets of a super hacker 1994 , pp. - book
Knijff R. v. d. Embedded Systems Analysis, chapter 11 of Handbook of Computer Crime Investigations-Forensic Tools and Technology, edited by Eoghan Casey 2002 , pp. - book
Knijff R. v. d. Chapter 11: Embedded Systems Analysis, Handbook of Computer Crime Investigation, Edited by Eoghan Casey 2002 , pp. - book
Knotts, R. & ... Computer Security: Who's Minding the Store? 1989 The Academy of Management Executive (1987- , pp. - article URL
Koch, E.R. & Sperber, J. Die Datenmafia : Geheimdienste, Konzerne, Syndikate -Computerspionage und neue Informationskartelle 1995 , pp. 351 str.- book
Kohn, M., Eloff J. & ... Framework for a digital forensic investigation 2006 of Information Security South Africa (ISSA , pp. - article
Kovač, Jože, p. Nekatere nove oblike kaznivih dejanj po širitvi Evropske unije : diplomsko delo 2008 , pp. VI., 47 f.- book
Kovačič, M. Izračun kontrolne vsote datoteke pomeni v ZDA preiskavo : United States v. Crist, 2008 WL 4682806, 22. oktober 2008 2008 PP Vol. 27(47), pp. str. 27-28 article
Kramarenko, D. Hackers or Cyber-soldiers?, Computer Crime Research Center 2003 , pp. - book
Kratz, M. Canada's computer crime laws: ten years of experience 1996 Information systems security, pp. - article
Krause, J. Computing Time for Crime 2005 Computing, pp. - article URL
Krauss, L. & ... Computer fraud and countermeasures 1979 , pp. - book
Krauss, L. & ... SAFE-security audit and field evaluation for computer facilities and information systems 1972 No.: U, pp. - article URL
Krieger, M. Current and Proposed Computer Crime Legislation 1980 COMP. LAW J., pp. - article
Kroczynski, R. Are the current computer crime laws sufficient or should the writing of virus code be prohibited 2007 Fordham Intell. Prop. Media & Ent. LJ, pp. - article URL
Kruck, S. & ... Computer Security Practices and Perceptions of the Next 2008 International Journal of Information Security and , pp. - article URL
Generation of Corporate Computer Use
Kruse, W. & ... Computer forensics: incident response essentials 2001 , pp. - book
Kruse, Warren G., I. & Heiser, J.G. Computer forensics : incident response essentials 2002 , pp. XIII, 398 str.- book
Kshetri, N. The simple economics of cybercrimes 2006 Security & Privacy, IEEE, pp. - article URL
Kshetri, N. Pattern of global cyber war and crime: A conceptual framework 2005 Journal of International Management, pp. - article URL
Kuhar, B. Preiskovanje piratstva računalniških programov : diplomska naloga 2001 , pp. 71 f.- book
Kusserow, R. An Inside Look at Federal Computer Crime 1986 Security Management, pp. - article
Kutz, R. Computer Crime in Virginia William and Mary Law Review, pp. - article
Kutz, R. Computer Crime in Virginia: A Critical Examination of the Criminal Offenses in the Virginia Computer Crimes Act 1985 Wm. & Mary L. Rev., pp. - article URL
Lakhina, A., Crovella, M. & ... Detecting distributed attacks using network-wide flow traffic 2005 Proceedings of FloCon 2005 Analysis , pp. - article
Lam, C. & ... Signature recognition through spectral analysis 1989 Pattern Recognition, pp. - article URL
Lampson, B. Computer security in the real world 2004 Computer, pp. - article URL
Lasden, M. Computer Crime 1981 COMP. DECISIONS, pp. - article
Lawrence, A. & ... Wiliam Lucyshyn and&obert gichardson. 2004 CSVFm Computer Crime and Security 2004 Computer Security Institute, pp. - article
Lawrence, A., Martin, P., Lucyshyn, W. & ... CSI/FBI Computer Crime and Security Survey 2004 2004 , pp. - book
Lawrence, G., Loeb, M., Lucyshyn, W. & ... CSI/FBI computer crime and security survey 2005 Computer Security Institute, pp. - article
LeBlanc, C. & ... Teaching computer security at a small college 2004 ACM SIGCSE Bulletin, pp. - article URL
Lee, H. Cyber crime and challenges for crime investigation in the information era 2008 Intelligence and Security Informatics, 2008. ISI 2008. , pp. article URL
Lee, J. & ... A holistic model of computer abuse within organizations 2002 Information management & computer security, pp. - article URL
Lee, J., Segal, G. & ... Positive alternatives: a report on an ACM panel on hacking 1986 Communications of the ACM, pp. - article
Lee, S., Lee, S. & ... An integrative model of computer abuse based on social control and general deterrence theories 2004 Information & Management, pp. - article URL
Lee, W. A Deterrent Measure Against Computer Crime: Knowledge-Based Risk-Analytic Audit 1997 Singapore Management Review, pp. - article
Lee, W. & ... Computer Ethics: an Argument for Rethinking Business Ethics 2008 Presented at the 2nd World Business Ethics Forum: , pp. - article
Leepson Computer Crime 1978 , pp. - book
Leeson, P. & ... Economics of Computer Hacking, The 2005 JL Econ. & Pol'y, pp. - article URL
Leibholz, S. & ... Users' guide to computer crime: its commission, detection & prevention 1974 , pp. - book
Leighton, F. & ... Method and system for personal identification using proofs of legitimacy 1991 US Patent 4,995,081, pp. - article URL
Leinfuss, E. Computer Crime: How Deep Does It Go 1986 MIS Week, pp. - article
Leiwo, J. & ... An analysis of ethics as foundation of information security in distributed systems 1998 , 1998., Proceedings of the Thirty-First , pp. - article URL
Lending, D. & ... Research in progress: the effects of ethical climate on attitudes and behaviors toward software piracy 2001 Proceedings of the 2001 ACM SIGCPR , pp. - article URL
Leonard, L. & ... Attitude toward ethical behavior in computer use: a shifting model 2005 Industrial Management & Data , pp. - article URL
Levenfeld, B. Israel considers comprehensive computer law. 1988 INT. COMP. LAW ADVISER., pp. - article URL
Levi, M., Schlegel, K. & ... White-collar crime victimization 1992 White-Collar Crime , pp. - article URL
Levine, J., LaBella, R., Owen, H. & The use of honeynets to detect exploited systems across large enterprise networks 2003 , 2003. IEEE Systems, , pp. - article URL
Levy, E. Criminals become tech savvy 2004 Security & Privacy, IEEE, pp. - article URL
Lewis, B. Preventing of Computer Crime Amidst International Anarchy. 2004 [cited 2008 17 November] , pp. - book
Lewis, B. Prevention of computer crime amidst international anarchy 2004 Am. Crim. L. Rev., pp. - article URL
Lewis, B. Prevention of Computer Crime Amidst International AnarchyA~a,-ŠA(2004) 2004 American Criminal Law Review, pp. - article
Lewis, J. & ... Assessing the risks of cyber terrorism, cyber war and other cyber threats 2002 , pp. - book
Lewis, M. Computer Crime: Theft in Bits and Bytes 1985 Nation's Business, pp. - article
Li, Z. & ... The Present Situation of Computer Crime in China and Its Technical Defense [J] 2006 Journal of Railway Police College, pp. - article
Liebholz, S. & ... User's Guide to Computer Crime 1974 Chilton Book Company, pp. - article
Lilleng, S. Datakriminalitet (Computer Crime) 1995 , pp. - book
Litt, R. Crime in the computer age: The law enforcement perspective 1999 Tex. Rev. L. & Pol., pp. - article URL
Livshits, V. & Lam, M. Finding security vulnerabilities in Java applications with static analysis 2005 Proceedings of the 14th conference on USENIX , pp. - article URL
fakulteta v Ljubljani, P. Strokovno gradivo za posvet "Računalniška kriminaliteta" 1997 , pp. 41 str. loč pag.- book
Lloyd, I. Information technology law 2005 Recherche, pp. - article URL
Lo, A. Computer Crime a Magnet for Teens 1999 South China Morning Post, pp. - article
Lobel, J. Foiling the system breakers: computer security and access control 1986 , pp. - book
Logar, J. Elektronsko poslovanje in kriminaliteta : podjetja na izzive niso dovolj pripravljena 2000 Delo Vol. 42(38), pp. str. 15- article
Loia, V., Mattiucci, M. & ... Veniero: Computer Crime Investigation by Means of Fuzzy Semantic Maps, M 2009 Web Intelligence and Intelligent Agent , pp. - article
LUCYSHYN, W. RICHARDSON., R.(2005) 2005 CSI/FBI COMPUTER CRIME AND SECURITY SURVEY 2005 Computer Security Institute, pp. - article
Ludlow, P. High noon on the electronic frontier: Conceptual issues in cyberspace 1996 , pp. - book
Lynch, J. Identity theft in cyberspace: Crime control methods and their effectiveness in combating phishing attacks 2005 Berkeley Tech. LJ, pp. - article URL
Ma, L. & ... Query length impact on misuse detection in information retrieval systems 2005 Proceedings of the 2005 ACM symposium on , pp. - article URL
Magklaras, G. & ... A preliminary model of end user sophistication for insider threat prediction in IT systems 2005 Computers & Security, pp. - article URL
Malone, R. & ... Computer Viruses: Legal Aspects 1993 U. Miami Bus. LJ, pp. - article URL
Mandell, S. Computer crime 1990 Computers, ethics, & society, pp. - article
Mandia, K. Incident Response: Investigating Computer Crime 2001 , pp. - book
Mandia, K., Prosise, C. & ... A§Šža€t'A$a,-A„A§a€šŠoA§Šža€t'čA®E$A§A®a €"A$Š>ŠžA§Š Š»A§Et'ŠžčA° A$Š5A„ 2002 Incident Response: Investigating Computer Crime. , pp. - article
Manili, B. & ... Police chiefs and sheriffs rank their criminal justice needs 1988 Washington, DC: National Institute of Justice, US , pp. - article URL
Manion, M. & ... Terrorism or civil disobedience: toward a hacktivist ethic 2000 ACM SIGCAS Computers and Society, pp. - article URL
Marbach, W., Conant, J. & ... New wave computer crime. 1983 Newsweek, pp. - article
Marcella, A. & ... Cyber forensics: a field manual for collecting, examining, and preserving evidence of computer crimes 2002 , pp. - book
Marion, C. Computer viruses and the law 1988 Dick. L. Rev., pp. - article URL
Marks, R. Security, Privacy, and Free Expression in the New World of Broadband Networks 1995 Hous. L. Rev., pp. - article URL
Marsh, R. With criminal intent: The changing face of crime in South Africa 1999 , pp. - book
Martonoši, P. Kriminaliteta v zvezi z računalniki v novi slovenski kazenski zakonodaji Podjetje in delo : revija za gospodarsko, delovno in socialno pravo, pp. str. 498-500 article
Massingale, C. & ... Risk Allocation for Computer System Security Breaches: Potential Liability for Providers of Computer Services 1990 W. New Eng. L. Rev., pp. - article URL
Mastnak, Š". Računalniško piratstvo : diplomska naloga 1999 , pp. 71 f.- book
Matsumoto, Y. Ruby in a nutshell: a desktop quick reference 2002 , pp. - book
May, M. & ... Federal computer crime laws 2004 The SANS Institute. Retrieved October, pp. - article
McCall, C. Computer crime statutes: Are they bridging the gap between law and technology 1988 Crim. Just. J., pp. - article URL
McCausland, J. Regulating Computer Crime After Reno v. ACLU: The Myth of Additional Regulation 1997 Fla. L. Rev., pp. - article URL
McCollum, T. Computer crime 1997 Nation's Business, pp. - article
McCombie, S. & ... Computer Forensic: An Issue of Definitions 2003 Proceedings of 1st Australian , pp. - article
McEwen, J., Fester, D. & ... Dedicated computer crime units 1989 , pp. - book
McEwen, T. The growing threat of computer crime 1990 Detective (Summer), pp. - article
McHugh, J. & ... An incentive system for reducing malware attacks 2005 Communications of the ACM, pp. - article URL
McKemmish, R. What is forensic computing 1999 Trends and issues in crime and criminal justice, pp. - article
McKnight, G. Computer crime 1973 , pp. - book
McLaughlin, G. & ... Computer Crime: The Ribicoff Amendment to United States Code, Title 18 1978 Crim. Just. J., pp. - article URL
McLoughlin, G. & ... Computer Crime and Security 1987 , pp. - book
McMullan, J. & ... Technologies of crime: The cyber-attacks on electronic gambling machines 2003 Canadian Journal of Criminology and Criminal , pp. - article URL
McNeil, J. The Consultant: A Novel of Computer Crime 1978 , pp. - book
Meall, L. Computer crime: foiling the fraudsters 1992 Accountancy, November, pp. - article
Mello, S. Administering the Antidote to Computer Viruses: A Comment on United States v. Morris 1993 Rutgers Computer & Tech. LJ, pp. - article URL
Mencin, R. Rekonstrukcija podatkov v računalniški forenziki 2010 , pp. 57 f.- book URL
Mendell, R. Investigating Computer Crime in the 21st Century 2004 No.: ISBN 0-398-07525-5, pp. - article URL
Mendell, R. Investigating Computer Crime: a Primer for Security Managers 1998 , pp. - book
Mendell, R. Investigating Computer Crime: A Primer for Security Managers. Springfield, Illinois: Charles C 1998 , pp. - book
Mennecke, B., Roche, E., Bray, D. & Second Life and other virtual worlds: A roadmap for research 2007 Systems (ICIS), 2007, pp. - article URL
Merrill, P., Hammons, K., VINCENT, B., REYNOLDS, P. & ... Computers in education 1996 Recherche, pp. - article URL
Merritt, M.P. U.S. Secret Service's computer forensic training for state and local agencies 2009 The Police chief Vol. 76(7), pp. str. 16-17 article URL
Merwe, A.V.D., Loock, M. & ... Characteristics and responsibilities involved in a Phishing attack 2005 Proceedings of the 4th , pp. - article URL
Meyer, G. The social organization of the computer underground 1989 , pp. - book URL
Meyer, G. & ... The baudy world of the byte bandit: A postmodernist interpretation of the computer underground 1990 ,(also published in SCHMALLEGER, F.(ed.), , pp. - article
Meyer, J. & ... Investigating computer crime: Concerns voiced by local law enforcement agencies 1998 Police Chief, pp. - article URL
Meyers, M. & ... Computer forensics: the need for standardization and certification 2004 International Journal of Digital Evidence, pp. - article
Michalowski, R. & ... Technology, property, and law 1991 Crime, Law and Social Change, pp. - article URL
Millard, C. Legal protection of computer programs and data 1985 , pp. - book
Mobbs, P. Computer Crime The law on the misuse of computers and networks. 2003, GreenNet Civil Society Internet Rights Project , pp. - book
Mohay, G. Technical challenges and directions for digital forensics 2005 Approaches to Digital Forensic Engineering, 2005. , pp. - article URL
Mohay, G. Computer and intrusion forensics 2003 , pp. - book
Mohr, J. & ... Fighting Computer Crime with Software Risk Analysis 1984 INFORMATION SYSTEM MANAGEMENT, pp. - article URL
Monson-Haefel, R. & ... Java message service 2001 , pp. - book
Montana, J. Viruses and the law: Why the law is ineffective 2000 The Information Management Journal, pp. - article URL
Montgomery, J. Computer Crime 1986 Am. Crim. L. Rev., pp. - article URL
Moon, B., McCluskey, J. & ... A general theory of crime and computer crime: An empirical test 2010 Journal of Criminal Justice, pp. - article URL
Moore, R. Cybercrime: Investigating high-technology computer crime 2010 , pp. - book
Moore, T., Clayton, R. & ... The economics of online crime 2009 The Journal of Economic , pp. - article URL
Moores, T. & ... Do privacy seals in e-commerce really work? 2003 Communications of the ACM, pp. - article URL
Morris, D. Tracking a computer hacker 2001 United States Attorneys' Bulletin,(Internet Fraud , pp. - article
Morris, R. & Blackburn, A. Cracking the code: An empirical exploration of social learning theory and computer crime 2009 Journal of Crime and Justice, pp. - article URL
Morris, S. Crime and prevention: a Treasury viewpoint 1997 Spectrum, IEEE, pp. - article URL
Morrison, P. Computer ethics: cautionary tales and ethical dilemmas in 1994 , pp. - book
computing
Morth, T. Considering our position: Viewing information warfare as a use of force prohibited by Article 2 (4) of the UN Charter 1998 Case W. Res. J. Int'l L., pp. - article URL
MostA,A©faoui, G. Security in Pervasive Environments, What's Next? 2003 Security and Management Journal, pp. - article
MrA^EJeviA„a€", Z. Kompjuterski kriminalitet i potreba koncipiranja kriviA„Š □nog dela kompjuterske zloupotrebe 1991 Jugoslovenska revija za kriminologiju i kriviA„Šono pravo, pp. - article URL
MrševiAj, Z. Zaštita privatnosti zloupotreba kompjutera - potreba krivičnopravne regulative Jugoslovenska revija za kriminologiju i krivično pravo, pp. 29, št. 4 (1991), str.131-146 article
Myers, L. & ... Preparing for high technology crime: An educational assessment of criminal justice and criminology academic programs 2002 Journal of Criminal Justice Education, pp. - article URL
Nasheri, H. & ... Crime and technology: New rules in a new world* 1998 Information and Communications , pp. - article URL
Nasuti, F. Investigating computer crime 1986 Journal of Accounting and EDP, pp. - article
Nawrocki, J. There are too many loopholes" current computer crime laws require clearer definition 1987 Data Management, pp. - article
Nelson, B. Strain ing the Capacity of the Law: The Idea of Computer Crime in the Age of the Computer Worm 1991 Computer LJ, pp. - article
Nelson, B., Phillips, A. & ... Guide to computer forensics and investigations 2010 , pp. - book
Nemerofsky, J. The Crime of" Interruption of Computer Services to Authorized Users" Have You Ever Heard of It? 2000 Rich. JL & Tech., pp. - article URL
Newman, G. & Clarke, R. Superhighway Robbery: Preventing e-commerce crime 2003 , pp. - book
Nichols, R. & ... Wireless security 2002 , pp. - book
Nigri, D.F. Investigating computer crime in the UK 1992 Computer Law & Security Report, pp. - article URL
Nolan, J. FBI Agent Accountants Intensify'Campaign Against White Collar'Crime 1974 Journal of Accountancy, pp. - article URL
Nycum, S. & ... Prosecutorial experience with state computer crime laws in the United States 1990 , pp. - book
Nycum, S. & ... Prosecutorial Experience with State Computer Crime Laws 1985 Gaston, Snow, & Ely Bartlett, Palo Alto, California, and , pp. - article
Nycum, S., University, R. & ... CRIMINAL LAW ASPECTS OF COMPUTER ABUSE-PART 1-STATE PENAL LAWS 1976 Rutgers Journal of , pp. - article URL
Nykodym, N., KahleA~a,- Piasecki, L. & ... The managers guide to understanding, detecting, and thwarting computer crime: An international performance issue 2010 Performance , pp. - article URL
Nykodym, N., Taylor, R. & ... Criminal profiling and insider cyber crime 2005 Digital Investigation, pp. - article URL
O'Ballance, E. From sarin to cyber warfare 2001 Intersec article
Vol. 11(2), pp. str. 52-53
O'Brien, J. & ... Introduction to information systems 2005 , pp. - book
O'Donoghue, J. Strategies found to be effective in the control of computer crime in the Forbes 500 Corporations 1987 ACM SIGSAC Review, pp. - article URL
Ognibene, R. & ... Computers and the schools: Unused and misused 1990 Action in Teacher Education, pp. - article URL
Olivenbaum, J. : Rethinking Federal Computer Crime Legislation 1996 Seton Hall L. Rev., pp. - article URL
Onwubiko, C. & ... Managing security threats and vulnerabilities for small to medium enterprises 2007 Intelligence and Security , pp. - article URL
Ottaviano, C. Computer Crime 1985 Idea, pp. - article URL
Overill, R. Trends in Computer Crime 1998 Journal of Financial Crime, pp. - article URL
Overill, R. Computer crime-an historical survey 1997 Defence Systems International, pp. - article
Oz, E. Ethics for an Information Age 1994 , pp. - book
Park, Y., Moon, S., Kim, S., Kang, S. & ... A study on prevention scheme for communication network from computer crime 1994 Journal of Data Communication , pp. - article
Parker, D. The dark side of computing: SRI International and the study of computer crime 2007 Annals of the History of Computing, IEEE, pp. - article URL
Parker, D. Computer crime 2003 , pp. - book URL
Parker, D. Fighting computer crime: A new framework for protecting information 1998 , pp. - book
Parker, D. Consequential loss from computer crime 1989 Security and Protection in Information Systems, , pp. - article
Parker, D. Computer Crime: Criminal Justice Resource Manual . 1989 , pp. - book URL
Parker, D. Ethics for Information Systems Personnel 1988 INFORMATION SYSTEM MANAGEMENT, pp. - article URL
Parker, D. How Much Computer Abuse is There? 1983 EDPACS: The EDP Audit, Control, and Security , pp. - article URL
Parker, D. Fighting computer crime 1983 , pp. - book
Parker, D. Chapter 43: Public Key Cryptosystems 1983 Fighting Computer Crime, Charles Scribner's Sons, , pp. - article
Parker, D. Computer security management 1981 , pp. - book
Parker, D. & ... Computer crime 1984 Communications of the ACM, pp. - article
Parker, D., Nycum, S. & ... Computer abuse 1973 No.: SR12501, pp. - article URL
Parker, R. Computer-related crime: ethical considerations 1990 ACM SIGSAC Review, pp. - article URL
Parsons, M. Protecting children on the electronic frontier : a law enforcement challenge 2000 FBI law enforcement bulletin Vol. 69(10), pp. str. 22-26 article
Parsons, M. I Crime prevention and the electronic frontier 1998 FBI Law Enforcement Bulletin, pp. - article URL i
Patel, A. & ... The impact of forensic computing on telecommunications 2000 Communications Magazine, IEEE, pp. - article URL
Pawar, M. & ... Computer crime in Bombay: Efforts to alter this problem 1994 International Journal of Offender Therapy , pp. - article URL
Peng, N. On Electronic Evidence in Computer Crime 2004 Hebei Law Science, pp. - article
Perenič, A. Odkrivanje in preiskovanje računalniške kriminalitete : diplomsko delo 2008 , pp. V, 54 f.- book
Perry, R. Computer Crime. New York: Franklin Watts 1986 , pp. - book
Perry, R. Computer Crime 1986 , pp. - book
Perry, T. & ... Can computer crime be stopped?. 1984 IEEE Spectrum, pp. - article URL
Peters, S. CSI Computer Crime and Security Survey 2009 Computer Security Institute (December 2009), pp. - article
Petersen, J.P. Forensic examination of log files : [master] thesis 2005 , pp. 60 f., 5 f. pril.- other URL
PetroviA„a€", S. Neki aspekti nacionalne bezbednosti u informacionom dobu 2001 Nauka, tehnika, bezbednost, pp. - article URL
Pfitzmann, A., Pfitzmann, B., Schunter, M. & ... Trusting mobile user devices and security modules 1997 Computer, pp. - article URL
Philippsohn, S. An overview of electronic crime in the 21st century 2000 Intersec Vol. 10(4), pp. str. 114-116 article
Phillips, P., Martin, A., Wilson, C. & An introduction evaluating biometric systems 2000 Computer, pp. - article URL
Pickard, R. Computer crime 1989 Information Center, pp. - article
Pilant, L. Fighting crime in cyberspace 1997 The Police Chief, pp. - article URL
Podgor, E. Cybercrime: National, Transnational, or International 2004 Wayne L. Rev., pp. - article URL
Podgor, E. Computer crimes and the USA patriot act 2002 Crim. Just., pp. - article URL
Podgor, E. International computer fraud: A paradigm for limiting national jurisdiction 2001 UC Davis L. Rev., pp. - article URL
Police, R. Computer crime, can it affect you? 2000 Retrieved November, pp. - article
Police, V. & ... Computer Crime and Security Survey 1999 Victoria Police Computer Crime Squad and Deloitte , pp. - article
Politi, A. European Security: the new transnational risks 1997 , pp. - book
Pollak, R. Implications of international terrorism on security of information systems 1983 Proceedings of IEEE INFOCOM, pp. - article
Pollet, J. Developing a solid SCADA security strategy 2002 Sensors for Industry Conference, 2002. 2nd ISA/IEEE, pp. article URL
Pollitt, M. An ad hoc review of digital forensic models 2007 Approaches to Digital Forensic Engineering, 2007 , pp. - article URL
Pollitt, M. Cyberterrorism--fact or fancy? 1998 Computer Fraud & Security, pp. - article URL
I JI _ll _ll _II _II I
Post, D. Governing Cyberspace 1996 Wayne L. Rev., pp. - article URL
Post, J. The dangerous information system insider: Psychological perspectives 1996 Available HTTP: Hostname: infowar. com, pp. - article
Potaczala, M. Computer forensics 2001 Retrieved June, pp. - article
Poulsen, K. Hacker penetrates T-Mobile systems 2005 Security Focus. http://www. securityfocus. com/news/ , pp. - article
Power, R. 2002 CSI/FBI computer crime and security survey 2002 , pp. - book
Power, R. Computer security issues & trends 2002 CSI/FBI Computer Crime and Society Survey, CSI, pp. - article
Power, R. CSI/FBI computer crime and security survey 2001 Computer Security Journal, pp. - article
Power, R. 2000 CSI/FBI computer crime and security survey 2000 COMPUT SECUR J, pp. - article
Power, R. CSI/FBI Computer Crime and Security Survey, 1999 1999 Computer Security Issues & Trends, pp. - article URL
Power, R. 1998 CSI/FBI Computer Crime and Security Survey 1998 COMPUTER SECURITY JOURNAL, pp. - article
Power, R. CSI/FBI Computer Crime and Security Survey, 1997 1997 Computer Security Issues and Trends, pp. - article URL
Power, R. 2002 CSI/FBI Computer Crime and Security Survey 1996 Computer Securlly: Issues and Treno fi: i (Spring , pp. - article
Power, R. Current and Future Danger: A CSI Primer on Computer Crime & Information Warfare 1996 , pp. - book
Power, R. Current and future danger: A CSI primer on computer crime & information warfare 1995 , pp. - book
Powers, R. Computer Security Issues & Trends: 2002 CSI/FBI Computer Crime and Security Survey 2002 Computer Security Institute. Available on-line at: http:// , pp. - article
Prew, M. Minimizing the impact of Computer Crime on Your Earnings 1984 Wigham Poland (Corporation of Lloyds), pp. - article
Prichard, J. & ... Cyber terrorism: A study of the extent of coverage in computer Security Textbooks 2004 Journal of Information Technology Education, pp. - article
Procise, C. & ... Incident response: investigating computer crime 2001 Berkley (CA): McGraw Hill Osborne Media, pp. - article
PROP., C.C. &.I. & ... Prosecuting Intellectual Property Crimes 2001 , pp. - book
Prosise, C. & ... Incident response: computer forensics 2003 Recherche, pp. - article URL
Purdy, S. Computer Crime Investigations 1988 Draft monograph. Federal Computer Investigations , pp. - article
Quarantiello, L. Cyber crime: How to protect yourself from computer criminals 1997 No.: ISBN 0-936653-74-4, pp. - article URL
Quinn, K. Second annual New Zealand computer crime and security survey 2006 , pp. - book URL
Quirk, P. & Forder, J. Electronic commerce & the law 2003 , pp. - book
ii-ii-ii-ii-ir
Rahanu, H. Teaching professional and ethical aspects of computing: a case study approach 1999 ACM SIGCAS Computers and Society, pp. - article URL
Ransbotham, S. & ... Choice and chance: A conceptual model of paths to information security compromise 2009 Information Systems Research, pp. - article URL
Rapalus, P. Issues and Trends: 1998 CSI/FBI Computer Crime and Security Survey 1998 , pp. - book
Raskin, X. & ... Computer crimes 1995 Am. Crim. L. Rev., pp. - article URL
Reed, C. & ... Computer law 2003 Recherche, pp. - article URL
Reichel, P. Handbook of transnational crime and justice 2004 , pp. - book
Reid, L. Expert opinion: Interview with Amanda M. Hubbard, JD, Fulbright Scholar, former trial attorney, Computer Crime and Intellectual Property Section, US 2006 Journal of Information Privacy and Security, pp. - article
Reith, M., Carr, C. & ... An examination of digital forensic models 2002 International Journal of Digital , pp. - article
Response, I. Investigation Computer Crime. MANDIA, K. y PROSISE, C 2001 , pp. - book
Rhodes, W. Computer Crime Is No Crime At All 1979 , pp. - book
Richards, T. A computer fraud survey 1984 ACM SIGSAC Review, pp. - article URL
Richardson, R. CSI Survey 2007: The 12th Annual Computer Crime and Security Survey. 2007 Computer Security Institute, pp. - article
Richardson, R. 15th annual 2010/2011 computer crime and security survey 2011 , pp. - book
Richardson, R. 14th Annual CSI computer crime and security survey. Executive summary 2009 CSI Computer Crime and Security SurveyComputer, pp. - article
RICHARDSON, R. CSI/FBI Computer Crime and Security Survey (Documento en LA,Anea) 2008 , pp. - book
Richardson, R. csi computer crime & security survey, 2008. i. cmpnet. com/v2. gocsi. com/pdf 2008 CSIsurvey2008. pdf, pp. - article
Richardson, R. CSI computer crime and security survey 2008 Computer Security Institute, pp. - article
Richardson, R. 12th Annual CSI Computer Crime and Security Survey 2007 Computer Security Institute, pp. - article
Richardson, R. CSI/FBI Computer Crime Survey 2007 Twelfth Annual Computer Crime and Security, pp. - article
Richardson, R. CSI Computer Crime and Security Survey, GoCSI. com 2007 Last accessed July, pp. - article
Richardson, R. The 12th annual computer crime and security survey 2007 , pp. - book
Richardson, R. CSI computer crime and security survey, CSI Survey 2007 2007 , pp. - book
Richardson, R. Eighth annual CSI/FBI computer crime and security survey 2003 Computer Security Institute, pp. - article
Richardson, R. 8th Annual Computer Security Institute (CSI) and Federal Bureau of Investigation (FBI) Computer Crime and Security Survey 2003 , pp. - book
Richardson, R. CSI 2003 FBI Computer crime and security survey, pp. - article
Richardson, R. Eighth Annual CSI/FBI Computer Crime and Security Survey. 2003 2003 Comput. Security Inst./Federal Bureau of Investigation, , pp. - article
Richardson, R. Issues and Trends: 2003 CSI/FBI Computer Crime and Security Survey 2003 , pp. - book
Richardson, R. CSI/FBI 2003 computer crime survey 2003 Retrieved June, pp. - article
Richardson, R. CSI/FBI Computer Crime and Security Survey [R/OL] 2003 , pp. - book
Richardson, R. Computer Crime Bleeds US Corporations, Survey Shows; Financial losses from attacks 2002 on-line]. Available from the Internet: URL Http://www. , pp. - article
Richardson, R. & ... CSI &FBI CSI Computer Crime & Security Survey 2008 , pp. - book
Richtel, M. Study finds rise in computer crime 1998 The New York Times, pp. - article URL
Rivlin Computer Crime 1980 Student Law., pp. - article
Roache, J. Computer Crime Deterrence 1985 Am. J. Crim. L., pp. - article URL
Roberson, R. CSI/FBI Computer Crime Survey 2003 Computer Security Institute, pp. - article
Roche, E. Internet and Computer Related Crime: Economic and Other Harms to Organizational Entities 2006 Miss. LJ, pp. - article URL
Roche, E. & ... Information Systems, Computer Crime and Criminal Justice 2004 , pp. - book
Rogers, M. A two-dimensional circumplex approach to the development of a hacker taxonomy 2006 digital investigation, pp. - article URL
Rogers, M. The role of criminal profiling in the computer forensics process 2003 Computers & Security, pp. - article URL
Rogers, M. A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study 2001 , pp. - book
Rogers, M. Organized computer crime and more sophisticated security controls: which came first the chicken or the egg? 1999 Telematic Journal of Clinical Criminology, pp. - article
Rogers, M. & ... The future of computer forensics: a needs analysis survey 2004 Computers & Security, pp. - article URL
Rogers, M., Goldman, J., Mislan, R. & ... Computer forensics field triage process model 2006 Proceeding of the , pp. - article
Rogers, M., Robin, M., Moral, H. & Modern-day Robin Hood or Moral Disengagement: understanding the justification for criminal computer activity 1999 , pp. - book URL
Rogers, M., Seigfried, K. & ... Self-reported computer criminal behavior: A 2006 digital investigation, pp. - article URL
psychological analysis
Rogers, M., Smoak, N. & ... Self-reported deviant computer behavior: A big-5, moral choice, and manipulative exploitive behavior analysis 2006 Deviant behavior, pp. - article URL
Rosenblatt, K. High-Technology Crime: Investigating Cases Involving Computers 1995 No.: ISBN 0-9648171-0-1, pp. - article URL
Rosenblatt, K. Deterring computer crime 1990 Technology Review, pp. - article URL
Rosoff S., Pontell, H. & ... Profit without honor: White-collar crime and the looting of America 1998 , pp. - book
Ross, S., Jr, R.C., Parker, D. & ... Computer Security Issues-A Roundtable 1985 Computer Security , pp. - article URL
Rossi, S. Aust tops computer crime stats 2002 Computerworld, pp. - article
Roush, W. Hackers taking a byte out of computer crime 1994 Technology Review, pp. - article
Rushinek, A. & ... Using experts for detecting and litigating computer crime 1993 Managerial Auditing Journal, pp. - article URL
Russell, D. & ... Computer security basics 1991 , pp. - book
RužiAj, I. Izbira osnovnega nabora metod za izvajanje programske računalniške forenzike : magistrska naloga 2007 , pp. 76 str.- book
RužiAj, I., MarijanoviAj, D. & Ciglarič, M. Selection of the base set of methods for computer forensic SoftCOM 2009, pp. Str. 1-7 article
Saari, J. Computer crime—numbers lie 1987 Computers & Security, pp. - article URL
Sackman, H. Computer Crime Prevention 1999 , pp. - book
Sanderson, E. & ... Information security in business environments 1996 Information Management & , pp. - article URL
Sarzana, C. CriminalitA, e tecnologia: il caso del computer crime 1979 Rassegna Penitenziaria e CriminologA,Aa, pp. - article
Saydjari, O.S. Defending cyberspace 2002 Computer, pp. - article URL
Schabeck, T. Computer Crime Investigation Manual 1980 , pp. - book
Schaffer, G. Worms and viruses and botnets, oh my! Rational responses to emerging Internet threats 2006 Security & Privacy, IEEE, pp. - article URL
Schjolberg, S. Computer-related offences 2004 Council of Europe Octopus Interface, pp. - article
SchjA,A,lberg, S., International, S. & Computers and penal legislation: A study of the legal politics of a new technology 1983 , pp. - book
Schmalleger, F. Criminal Justice Today: An Introductory Text for the 21st Century 1995 No.: ISBN 0-13-302985-9, pp. - article URL
Schmidt, H. The changing face of computer crime 1998 The Police chief Vol. 65(5), pp. str. 38-45 article
Scholberg, S. & ... Computer Crime 1983 Encyclopedia of Crime and Justice, pp. - article
Schonlau, M. & ... Detecting masquerades in intrusion detection based on 2000 Information Processing Letters, pp. - article URL
unpopular commands
Schonlau, M., DuMouchel, W., Ju, W., Karr, A. & ... Computer intrusion: Detecting masquerades 2001 Statistical Science, pp. - article URL
Schrager, B. Outwitting 2-bit Thieves and Arresting Computer Crime 1982 Data Communications, pp. - article
Schuck, P. Electronic funds transfer: A technology in search of a market 1975 Md. L. Rev., pp. - article URL
Schultz, E. Security views 2003 Computers & Security, pp. - article URL
Schultz, E. A framework for understanding and predicting insider attacks 2002 Computers & Security, pp. - article URL
Schultz, E. & ... Incident response: a strategic guide to handling system and network security breaches 2001 , pp. - book
Schweitzer, D. & ... Incident response: computer forensics toolkit 2003 , pp. - book
Schweitzer, J. Computer crime and business information: a practical guide for managers 1986 , pp. - book
Schweitzer, J. Protecting information in the electronic workplace: a guide for managers 1983 , pp. - book
Scientist, N. Computer Crime a Growing Threat, Warns FBI 2008 , pp. - book
Scott, A. Computer and intellectual property crime: federal and state law 2001 , pp. - book
Scottberg, B., Yurcik, W. & ... Internet honeypots: Protection or entrapment? 2002 Technology and Society, 2002 , pp. - article URL
Selinšek, L. Odprta pravna vprašanja v zvezi z dokazovanjem s postopki digitalne forenzike Problemi dokazovanja v zahtevnih kazenskih postopkih, pp. Str. 139-149 article
Selinšek, L. Preiskovanje zaščitenih elektronskih podatkov - britanski pristop Zbornik povzetkov, pp. Str. 69- other
Selinšek, L. "Digitalni forenzični forum" jan. Revija za kriminalistiko in kriminologijo Vol. 59(1), pp. str. 89-91 article
Selinšek, L. Računalniška kriminaliteta in reševanje problemov iz prakse 2011 Pravosodni bilten Vol. 32(2), pp. str. 223-237 article
Selinšek, L. Electronic evidence in the Slovene criminal procedure act 2010 Digital evidence and electronic signature law review(7), pp. str. 77-81 article
Selinšek, L. Ekonomska upravičenost uporabe metod digitalne forenzike 2009 Lexonomica Vol. 1(1), pp. str. 51-58 article
Selinšek, L. Computer forensics in criminal procedure : (needed new approaches in Slovenia) 2008 Zbornik Pravne fakultete Univerze v Mariboru Vol. 4(1), pp. str. 237-248 article
Selinšek, L. NA>kterA© prA"vnA aspekty forenznA analA'zy digitA'lnAch dat 2008 Acta Universitatis Carolinae(4), pp. str. 131-140 article
Selinšek, L. Kazenskopravni vidiki računalniške forenzike : predavanje 2008 , pp. - unpublished
na konferenci INFOSEK 2008 - FORUM, Nova Gorica, 9.-11. junij 2008
Selinšek, L. Legal collecting of digital evidence 2007 Zbornik Pravne fakultete Univerze v Mariboru(3), pp. str. 217-230 article
Selinšek, L. & Malovrh, M. Digitalni dokaz - med pravom in tehniko Nekateri praktični problemi dokazovanja v kazenskih postopkih, pp. Str. 57-78 incollection
Selinšek, L. & Oparnica, G. Legal aspects of digital forensics in public and private sector : predavanje na konferenci Euroforensics - Forensic Sciences, 26.-28.3.2010, Istanbul 2010 , pp. - unpublished
Senjo, S. An analysis of computer-related crime: comparing police officer perceptions with empirical data 2004 Security Journal, pp. - article URL
Serra, C. & Strano, M. Nuove frontiere della criminalita : la criminalita tecnologica 1997 , pp. VII, 145 str.- book
Seymour, T., Seifert, C., Shafto, M. & ... Using response time measures to assess" guilty knowledge". 2000 Journal of Applied , pp. - article URL
Sh, M., D'Amico, E., Tomlinson, K. & ... Teenagers self-reported motivations for participating in computer crime 2002 8th International Conference on , pp. - article
Shackelford, S. Computer-related crime: an international problem in need of an international solution 1992 Tex. Int'l LJ, pp. - article URL
Shaw, E., Ruby, K. & ... The Insider Threat to Information Systems1 1998 , pp. - book
Sherizan, S. The globalization of computer crime and information security 1992 Computer Security Journal, pp. - article URL
Sherizen, S. Can computer crime be deterred 1995 Computers and Security, pp. - article URL
Sherizen, S. Criminological concepts and research findings relevant for improving computer crime control 1990 Computers & Security, pp. - article URL
Sherizen, S. Federal Computers and Telecommunications: Security and Reliability Considerations and Computer Crime Legislative Options 1985 , pp. - book
Shinder, D. & ... Scene of the cybercrime: Computer forensics handbook 2002 , pp. - book
Sieber, U. Computer Crime and Criminal Information Law-New Trends in the International Risk and Information Society 1996 Statement for the Hearing on Security in Cyberspace of , pp. - article
Sieber, U. Information technology crime: national legislations and international initiatives 1994 , pp. - book
Sieber, U. General Report on 'Computer Crime': the emergence of criminal information law 1990 13th International Congress of International Academy , pp. - article
Sieber, U. The international handbook on computer crime: computer-related economic crime and the infringements of privacy 1986 , pp. - book
Silverglate, H. Computer Crime in Massachusetts: How Best to Meet the Future? 1994 BBJ, pp. - article
Sim, S. Effective countermeasures against economic crime and computer crime 2000 Resource material series, pp. - article
Simkin, M. Computer Crime: Lessons and Direction 1981 CPA Journal, pp. - article
Sinangin, D. Computer forensics investigations in a corporate environment 2002 Computer Fraud & Security, pp. - article URL
Sinrod, E. & ... Cyber-crimes: A practical approach to the application of federal computer crime laws 2012 Santa Clara Computer & High , pp. - article
Sinrod, E. & ... Cyber-Crimes: A Practical Approach to the Application of Federal Computer Crime Laws,A"a,-Š4(2000) 16 2000 Santa Clara Computer and High Technology Law , pp. - article
Sinrod, E. & ... Cyber-Crimes: A Practical Approach to the Application of Federal Computer Crime Laws 2000 Santa Clara Computer & High Tech. LJ, pp. - article URL
Sinrod, E. & ... Hacking your way to hard time: application of computer crime laws to specific types of hacking attacks 2000 Journal of Internet Laws, pp. - article
Skaggs, B., Blackburn, B., Manes, G. & ... Network vulnerability analysis 2002 Circuits and Systems, , pp. - article URL
Skibell, R. Cybercrime & (and) Misdemeanors: A Reevaluation of the Computer Fraud and Abuse Act 2003 Berkeley Tech. LJ, pp. - article URL
Skibell, R. The myth of the computer hacker 2002 Information, Communication & Society, pp. - article URL
Skinner, W. & ... A social learning theory analysis of computer crime among college students 1997 Journal of Research in Crime and , pp. - article URL
SKORODUMOVA, O. Hackers as information space phenomenon 2004 Social Sciences, pp. - article
Sloan, I. The computer and the law 1984 , pp. - book
Smaha, S. Haystack: An intrusion detection system 1988 Aerospace Computer Security Applications , pp. - article URL
Smith, A. & ... Issues in cybersecurity; understanding the potential risks associated with hackers/crackers 2002 Information management & computer , pp. - article URL
Smith, D. Who is Calling Your Computer Next--Hacker 1985 Crim. Just. J., pp. - article URL
Smith, G. An Electronic Pearl Harbor? Not Likely 1998 Issues in Science and Technology, pp. - article URL
Smith, M. Commonsense computer security 1994 , pp. - book
Smith, R. Identity-related economic crime: Risks and countermeasures 1998 Victoria, pp. - article
Smith, R. & ... Organisations as Victims of Fraud and how They Deal with it 1999 , pp. - book
Smrkolj, S. Računalniška kriminaliteta : (oblike in preiskovanje) : diplomska naloga 2000 , pp. 58 f.- book
Soi, G. 1 Tracce informatiche 2010 Polizia moderna Vol. 62(11), pp. str. 30-33 article 1
Sokolik, S. Computer CrimeA~a,-a€sthe Need for Deterrent Legislation"(1980) 1980 Computer Law Journal, pp. - article
Sokolik, S. Computer Crime-The Need for Deterrent Legislation 1980 Computer LJ, pp. - article
Solarz, A. Computer-related embezzlement 1987 Computers & Security, pp. - article URL
Solarz, A. Computer Technology and Computer Crime 1981 , pp. - book
Solarz, A. & ... Computer Technology and Computer Crime:(aetiological and Phenomenological Aspects) 1981 , pp. - book
Solomon, M.G., Barrett, D. & Broom, N. Computer forensics jumpstart : [computer forensics basics] 2005 , pp. XVII, 283 str.- book URL
Soma, J., Banker, E. & ... Computer Crime: Substantive Statutes & (and) Technical & (and) Legal Search Considerations 1995 AFL Rev., pp. - article URL
Soma, J., Jr, T.M. & ... Transnational extradition for computer crimes: Are new treaties and laws needed 1997 Harv. J. on Legis., pp. - article URL
Somers, L. Economic Crimes: Investigative Principles and Techniques 1984 New York: Clark Boardman Co, pp. - article URL
Sommer, P. The future for the policing of cybercrime 2004 Computer Fraud & Security, pp. - article URL
Sommer, P. Intrusion detection systems as evidence 1999 Computer Networks, pp. - article URL
Sommer, P. Digital footprints: Assessing computer evidence 1998 Criminal Law Review, pp. - article
Sr, W.S. Redefining National Security in Today's World of Information Technology and Emergment Threats 1998 Duke J. Comp. & Int'l L., pp. - article URL
Stallard, T. & ... Automated analysis for digital forensic science: Semantic integrity checking 2003 Computer Security Applications , pp. - article URL
Stambaugh, H. & ... Electronic crime needs assessment for state and local law enforcement 2001 , pp. - book
Stambaugh, H. & ... State and local law enforcement needs to combat electronic crime 2000 , pp. - book
Standler, R. Computer crime 2002 Retrieved February, pp. - article
Stanley, P. A methodology for the investigation of computer crime 1992 Proceedings of the IFIP TC11, Eigth International , pp. - article
Stanley, P. Educating computer crime investigators 1986 Computers & Security, pp. - article
Stanley, P. Computer crime investigation and investigators 1986 Computers & Security, pp. - article URL
Stanley, P. Computer Crime Investigation-The Lessons Learned from Experience 1986 IFIP/SEC'86, pp. - article
Statistics, U.S.B. o.J. & ... Computer Crime: Computer Security Techniques 1982 , pp. - book
Steffensmeier, D. Organization properties and sex-segregation in the underworld: Building a sociological theory of sex differences in crime 1983 Social Forces, pp. - article URL
Steinhauer, J. Verdict in MySpace suicide case 2008 The New York Times, pp. - article
Stephenson, P. Investigating computer-related crime 2000 , pp. - book
Stephenson, P. Investigating Computer Crime 2000 , pp. - book
Stevenson, G. Computer Fraud: Detection and Prevention 2000 Computer Fraud & Security, pp. - article URL
Stewart, H. & ... One-at-a-time versus grouped presentation of mug book pictures: Some surprising results. 2001 Journal of applied psychology, pp. - article URL
Strader, J. Understanding white collar crime 2002 , pp. - book
Strano, M. Computer crime: manuale di criminologia informatica 2000 Edizioni Apogeo, Milano, pp. - article
Strano, M. Computer crime 2000 , pp. - book
Straub, D. Validating instruments in MIS research 1989 MIS quarterly, pp. - article URL
Straub, D. & ... Coping with systems risk: security planning models for management decision making 1998 Mis Quarterly, pp. - article URL
Straub, D. & ... Effective IS security 1990 Information Systems Research, pp. - article
Sugarman, R. On foiling computer crime 1979 IEEE Spectrum, pp. - article
Sukhai, N. Hacking and cybercrime 2004 Proceedings of the 1st annual conference on , pp. - article URL
Sullivan, P. Australian attitudes towards computer crime 1995 , pp. - book URL
Sussmann, M. Critical Challenges from International High-Tech and Computer-Related Crime at the Millenium, The 1998 Duke J. Comp. & Int'l L., pp. - article URL
Swanson, C. & ... Computer Crime-Dimensions, Types, Causes, and Investigation 1980 Journal of Police Science and Administration, pp. - article URL
Swanson, C.R., Chamelin, N.C. & Territo, L. Criminal investigation 1996 , pp. X, 801 str.- book
Swartz, H. Taking the bite out of computer crime 1982 Business Computer Systems, pp. - article
Sykes, J. Computer Crime: A Spanner in the Works 1992 Management Accounting, pp. - article
Taber, J. A Survey of Computer Crime Studies"(1980) 1980 Computer LJ, pp. - article
Taber, J. A survey of computer crime studies 1980 Computer/Law Journal, pp. - article
Taber, J. On Computer Crime (Senate Bill S. 240) 1979 Computer LJ, pp. - article
Tan, K. Prosecuting foreign-based computer crime: international law and technology collide 2000 Symposium on Rule of Law in the Global Village, , pp. - article
Tan, K. The application of neural networks to UNIX computer security 1995 1995. Proceedings., IEEE International Conference on, pp. - article URL
Tan, K. & ... Detection and classification of TCP/IP network services 1997 Computer Security Applications , pp. - article URL
Tapper, C. Computer law 1989 , pp. - book
Tapper, C. Computer Crime": Scotch Mist?',(1987) 1987 Criminal Law Review, pp. - article
Tapper, C. Computer Crime": Scotch Mist? 1987 Crim L Rev, pp. - article
Tassel, D.V. Computer security management 1972 , pp. - book
Tassel, D.V. Computer crime 1970 Proceedings of the November 17-19, 1970, fall joint , pp. article URL
Tavani, H. The uniqueness debate in computer ethics: What exactly is at issue, and why does it matter? 2002 Ethics and Information Technology, pp. - article URL
Tavani, H. Defining the boundaries of computer crime: piracy, break-ins, and sabotage in cyberspace 2000 ACM SIGCAS Computers and Society, pp. - article URL
Tavani, H. A computer ethics bibliography 1995 ACM SIGCAS Computers and Society, pp. - article
Taylor, P. Hackers: crime in the digital sublime 1999 , pp. - book
Taylor, R. & ... Computer crime 2003 Criminal Investigation, pp. - article
Taylor, R., Caeti, T., Loper, D., Fritsch, E. & ... Digital crime and digital terrorism 2006 , pp. - book
Teer, F., Kruck, S. & ... EMPIRACAL STUDY OF STUDENTS'COMPUTER SECURITY-PRACTICES/PERCEPTIONS 2007 Journal of Computer Information , pp. - article
Telem, M. Computer crimes in schools 1984 Programmed Learning and Educational Technology, pp. - article URL
Tenhunen, M. Updating computer crime and information security strategies 1994 Kriminalistik und forensische Wissenscqften, , pp. - article
Thackeray, G. Computer-Related Crimes-An Outline 1984 Jurimetrics J., pp. - article URL
Theoharidou, M., Kokolakis, S., Karyda, M. & ... The insider threat to information systems and the effectiveness of ISO17799 2005 Computers & , pp. - article URL
Thomas, D. Criminality on the electronic frontier: corporality and the judicial construction of the hacker 1998 Information Communication & Society, pp. - article URL
Thomas, D. & ... Legal methods of using computer forensics techniques for computer crime analysis and investigation 2004 Retrieved September, pp. - article
Thomas, T. Al Qaeda and the Internet: The Danger ofCyberplanning' 2003 , pp. - book URL
Thompson, D. 1997 computer crime and security survey 1998 Information management & computer security, pp. - article URL
Thompson, R. Chasing after A~a,-Š>pettyA~a,-Ši\ computer crime 1999 Potentials, IEEE, pp. - article URL
Thornhill, W. Risk management for financial institutions: applying cost-effective controls and procedures 1990 , pp. - book
Tohmatsu, D. & ... Computer Crime & Security Survey 1999 Victoria Police Computer Crime Squad and Deloitte , pp. - article
Tohmatsu, D. & ... Computer Crime & Security SurveyA~a,-a€s1999 1999 , pp. - book
Tompkins Joseph B Jr," An Analysis of the 1984 Federal Computer Crime Provisions,"[1985] Law/Technology, pp. - article
Toren, P. Internet: A Safe Haven for Anonymous Information Thieves 1995 . John's J. Legal Comment., pp. - article URL
Trdina, R. Preiskovanje kaznivih dejanj s področja otroške pornografije : diplomsko delo 2009 , pp. VII, 72 f.- book
Tribbensee, N. Privacy and security in higher education computing environments after the USA PATRIOT Act 2003 Journal of College and University , pp. - article
Trites, G. Director responsibility for IT governance 2004 International Journal of Accounting Information , pp. - article URL
Troutner, J. Computer Literacy: Teaching Computer Ethics. 1986 Journal of Computers in Mathematics and Science , pp. - article URL
Trček, D., Abie, H., Skomedal, A. & Starc, I. Advanced framework for digital forensic technologies and procedures 2010 Journal of forensic sciences Vol. 55(6), pp. str. 1471-1480 article URL
Tully, E. The Near Future: Implications for Law Enforcement 1986 FBI Law Enforcement Bulletin, pp. - article URL
Tunick, D. People v. Versaggi: A Conviction for a Computer Crime That was not Committed 1997 CRIMINAL LAW BULLETIN- , pp. - article
Tunick, D. Computer Law: An Overview 1979 Loy. LAL Rev., pp. - article URL
Turnbull, L., Hendrix, E. & ... Atlas of crime: mapping the criminal landscape 2000 No.: ISBN 1-57356-241-6, pp. - article URL
Umphress, D. & ... Identity verification through keyboard characteristics 1985 International journal of man-machine studies, pp. - article URL
Upchurch, J. Combating Computer Crime 2003 , pp. - book
Urbas, G. & ... Computer Crime Legislation in Australia' 2004 Internet Law Bulletin (, pp. - article
Urek, R. Računalniška forenzika v predkazenskem postopku : diplomsko delo visokošolskega strokovnega študija Varnost in notranje zadeve 2012 , pp. 56 str.- book URL
Vacca, J. Computer forensics: computer crime scene investigation 2005 , pp. - book
Vacca, J. Computer Forensics: Computer Crime Scene Investigation (Networking Series)(Networking Series), Charles River Media 2005 Inc., Rockland, MA, pp. - article
Vacca, J. Digital forensicsA~a,-a€sComputer Crime Scene Investigation 2002 Charles River Media, pp. - article
Valeriano, G. Pitfalls In Insurance Coverage for Computer Crimes 1992 Def. Counsel J., pp. - article URL
Vasiu, L. & ... Dissecting computer fraud: from definitional issues to a taxonomy 2004 System Sciences, 2004. Proceedings of the , pp. - article URL
Vaughn, R. & ... Integration of computer security into the software engineering and computer science programs 1999 Journal of Systems and Software, pp. - article URL
Verduyn, B. FBI computer crime survey 2005 Retrieved April, pp. - article
Vidovič, S. Praktični vidiki ugotavljanja in dokazovanja komunikacij po mobilnem telefonu in računalniku : diplomsko delo 2010 , pp. VI, 50 f.- book
Vidovič, S. Praktični vidiki ugotavljanja in dokazovanja komunikacij po mobilnem telefonu in računalniku : diplomsko delo 2010 , pp. VI, 50 f.- book
VINCENT, F. & ... Correlates of computer misuse: Data from a self-reporting sample 1990 Behaviour & Information Technology, pp. - article URL
Voiskounsky, A. Current problems of moral research and education in the IT environment 2004 Human perspectives in the Internet society: , pp. - article URL
Voiskounsky, A. & ... Flow-based model of computer hackers' motivation 2003 CyberPsychology & , pp. - article URL
Volgyes, M. The investigation, prosecution, and prevention of computer crime: A state-of-the-art review 1980 Computer LJ, pp. - article
Volokh, E. Crime Severity and Constitutional Line-Drawing 2004 bepress Legal Series, pp. - article URL
Volonino, L. & ... Principles and practice of information security 2003 , pp. - book
Volonino, L. & Anzaldua, R. Computer forensics for dummies 2008 , pp. 360 str.- book
Volonino, L., Anzaldua, R., Godwin, J. & ... Computer forensics: principles and practices 2007 , pp. - book
Waal, P. Keeping Hackers at Bay 1986 Telecommunication Technology, pp. - article URL
Wagner, A. Challenge of Computer-Crime Legislation: How Should New York Respond, The 1984 Buff. L. Rev., pp. - article URL
Wahlert, G. & ... Crime in cyberspace: Trends in computer crime in Australia 1998 Platypus Magazine, pp. - article
Walden, I. Harmonising computer crime laws in Europe 2004 European Journal of Crime, Criminal Law and , pp. - article URL
Walden, I., Reed, C. & ... Computer crime 2003 Computer law, pp. - article
Walker, K. Federal criminal remedies for the theft of intellectual property 1993 Hastings Comm. & Ent. LJ, pp. - article URL
Wall, D. Crime and the Internet 2001 , pp. - book
Wall, D. 1 Cybercrimes and the Internet 2001 Crime and the Internet, pp. - article
Wall, D. Cybercrimes: New wine, no bottles 1999 Davies & Francis P. & Jupp V.(Eds), Invisible Crimes: , pp. - article
Wan, H. & ... An analysis of Chinese laws against computer crimes 1997 Journal of Global Information Management (JGIM), pp. - article URL
Wang, D. & ... Application of Ant Colony Clustering in Computer Forensics 2009 and Computing Science, 2009. ICIC'09. , pp. - article URL
Wang, S. Measures of retaining digital evidence to prosecute computer-based cyber-crimes 2007 Computer Standards & Interfaces, pp. - article URL
Wang, Y., Cannady, J. & ... Foundations of computer forensics: A technology for the fight against computer crime 2005 Computer Law & Security Review, pp. - article URL
Warkentin, M. & ... Behavioral and policy issues in information systems security: the insider threat 2009 European Journal of Information Systems, pp. - article
Warren, M. Security practice: survey evidence from three countries 2002 Logistics information management, pp. - article URL
Wasik, M. Crime and the Computer 1991 No.: ISBN 0-19-825621-3, pp. - article URL
Watkins, P. Computer Crime: Separating the Myth from the Reality 1981 Chartered Accountant) Magazine, pp. - article
Webber, C. Computer Crime or Jay-Walking on the Electronic Highway 1983 Crim. LQ, pp. - article URL
Webber, C. Computer Crime, or Jay-Walking on the Electronic Highway"(1983) 1983 Crim. LQ, pp. - article
Webster, W. Technology Transfer, Industrial Espionage, and Computer Crime: The FBI's Activities 1985 Computer Security Journal, pp. - article URL
Webster, W. Examination of FBI Theory and Methodology Regarding White-Collar Crime Investigation and Prevention, An 1979 Am. Crim. L. Rev., pp. - article URL
Wei, H., Frinke, D., Carter, O. & ... Cost-benefit analysis for network intrusion detection systems 2001 , pp. - book URL
Weiler, N. Honeypots for distributed denial-of-service attacks 2002 for Collaborative Enterprises, 2002. WET ICE 2002 , pp. article URL
Weisburd, D. & ... Crime mapping and crime prevention 1997 No.: ISBN 1-881798-08-9, pp. - article URL
Weiss, H. Computer Security: An Overview 1974 Datamation, pp. - article URL
Weissinger, A. ASP in a nutshell: a desktop quick reference 2000 , pp. - book
Welch, T. Computer crime investigation and computer forensics 1997 Information Systems Security, pp. - article URL
Weller, H., Repman, J. & ... The relationship of learning, behavior, and cognitive style in hypermedia-based instruction 1995 Computers in the Schools, pp. - article URL
Wessels, J. & Hillenkamp, T. Strafrecht : Straftaten gegen Vermogenswerte 1999 Vol. 8Schwerpunkte, pp. XXVII, 347 str.- book
Westland, C. A rational choice model of computer and network crime 1996 International Journal of Electronic Commerce, pp. - article URL
Wetter, D. Erste Hilfe in Digitaler Forensik [2007? ] , pp. - other URL
Wharton, L. Legislative Issues in Computer Crime 1984 Harv. J. on Legis., pp. - article URL
White, M. Current issues and controversies in policing 2007 , pp. - book
Whiteside, T. Computer capers: Tales of electronic thievery, embezzlement, and fraud 1978 , pp. - book
Whitman, M. In defense of the realm: understanding the threats to information security 2004 International Journal of Information Management, pp. - article URL
Whitman, M. Enemy at the gate: threats to information security 2003 Communications of the ACM, pp. - article URL
Wible, B. A Site Where Hackers Are Welcome: Using Hacking Contests To Shape Preferences and Deter Computer Crime 2003 The Yale Law Journal, pp. - article
Wible, B. Site Where Hackers Are Welcome: Using Hack-in Contests to Shape Preferences and Deter Computer Crime, A 2002 Yale LJ, pp. - article URL
Wilding, E. Information risk and security: preventing and investigating workplace computer crime 2006 , pp. - book
Wilding, E. Computer evidence : a forensic investigations handbook 1997 , pp. XI, 236 str.- book
Wilkinson, D., Harries, G., Thelwall, M. & ... Motivations for academic Web site interlinking: Evidence for the Web as a novel source of information on informal scholarly communication 2003 Journal of Information , pp. - article URL
Williams, K. Using Tittle's control balance theory to understand computer crime and deviance 2008 International Review of Law Computers & , pp. - article URL
Williams, P. Organized Crime and Cybercrime: Synergies, Trends and Responses 2001 Global Issues, pp. - article URL
Williams, W. The National Cybercrime Training Partnership 1999 Police Chief, pp. - article URL
Willison, R. Understanding the perpetration of employee computer crime in the organisational context 2006 Information and organization, pp. - article URL
Willison, R. Understanding the offender/environment dynamic for computer crimes 2006 Information Technology & People, pp. - article URL
Willison, R. Opportunities for computer abuse: assessing a crime specific approach in the case of Barings Bank 2002 , pp. - book
Willison, R. & ... Motivations for Employee Computer Crime: Understanding and Addressing Workplace Disgruntlement through the Application of Organisational Justice 2009 IFIP TC 8 International Workshop on Information , pp. - article
Willison, R. & ... Overcoming the insider: reducing employee computer crime through situational crime prevention 2009 Communications of the ACM, pp. - article URL
Willison, R. & ... Considering the offender: addressing the procedural stages of computer crime in an organisational context 2005 , pp. - book
Willison, R. & Backhouse, J. Opportunities for computer crime: considering systems risk from a criminological perspective 2006 European journal of information , pp. - article URL
Wilson, C. Holding management accountable: a new policy for protection against computer crime 2000 and Electronics Conference, 2000. NAECON 2000. , pp. - article URL
Wilson, D. Viewing computer crime: Where does the systems error really exist?. 1991 COMP. LAW J., pp. - article URL
Winchester, J. Computer-printed documents as part of a computer crime investigation 1981 Journal of Forensic Sciences, pp. - article URL
Winkler, I. The changing face of computer crime 2005 The ISSA Journal, pp. - article
ii-n-n-n-ir
Wise, E. Criminal Law: Sex, Crime, and Cyberspace 1996 Wayne L. Rev., pp. - article URL
Wold, G. & ... Computer crime: techniques, prevention 1989 , pp. - book
Wold, G. & ... Computer Crime: Techniques for Preventing and Detecting Crime in Financial Institutions 1989 Rolling Meadows, IL: Bankers Publishing Company, pp. - article
Wolf, J. War games meets the internet: Chasing 21st century cybercriminals with old laws and little money 2000 Am. J. Crim. L., pp. - article URL
Wong, D. Computer Crime in the UK 1984 EDPACS: The EDP Audit, Control, and Security , pp. - article URL
Wong, K. Computer crimeA~a,-a€t'risk management and computer security 1985 Computers & Security, pp. - article URL
Wong, K. & ... Computer Crime Casebook 1987 , pp. - book
Woodhouse, S. Information security: end user behavior and corporate culture 2007 and Information Technology, 2007. CIT 2007. , pp. - article URL
Wright, M. The need for information security education 1998 Computer Fraud & Security, pp. - article URL
Wright, T. The Field Guide For Investigating Computer Crime: Overview of a Methodology for the Application of Computer Forensics Part II 2000 Security Focus, May, pp. - article
Xiang, Y. & ... A defense system against DDoS attacks by large-scale IP traceback 2005 and Applications, 2005. ICITA 2005. Third , pp. - article URL
Yang, C. & Ng, T. Terrorism and crime related weblog social network: Link, content analysis and information visualization 2007 Intelligence and Security Informatics, 2007 , pp. - article URL
Yang, D. & ... Countering the Cyber-Crime Threat 2006 Am. Crim. L. Rev., pp. - article URL
Yar, M. Computer Hacking: Just Another Case of Juvenile Delinquency? 2005 The Howard Journal of Criminal Justice, pp. - article URL
Yasinsac, A. & ... Policies to enhance computer and network forensics 2001 Proceedings of the 2001 IEEE Workshop on , pp. - article
Yasinsac, A., Erbacher, R., Marks, D. & ... Computer forensics education 2003 Security & Privacy, , pp. - article URL
Yeager, R. Criminal computer forensics management 2006 Proceedings of the 3rd annual conference on , pp. - article URL
Yee, H. Juvenile Computer Crime-Hacking: Criminal and Civil Liability 1984 Comm/Ent LJ, pp. - article URL
Young, J. Spies like us 1996 Forbes, pp. - article
Young, L. United States computer crime laws, criminals and deterrence 1995 International Review of Law, Computers & Technology, pp. - article URL
Young, R., Zhang, L. & ... Hacking into the minds of hackers 2007 Information Systems , pp. - article URL
Zajac, B. Legal Options to Computer VirusesA~a,-Ši\ 1989 Computers & Security, pp. - article
Zakelšek, J. Informacijska varnost : diplomska naloga 2010 , pp. X, 48 str.- book
Završnik, A. Digital forensics and open internet : referat na Cyberspace Conference 2009, Brno, 20.-21. 11. 2009 Brno , pp. - unpublished
Završnik, A. Towards an overregulated cyberspace : criminal law perspective 2010 Masaryk University journal of law and technology Vol. 4(2), pp. str. 173-190 article
Završnik, A. Cyberbullying in Slovenia : legal framework and supralegal initiatives : [referat na posvetu] The legal aspects of cyberbullying, Antwerp, 26 May 2010 2010 , pp. - unpublished
Završnik, A. Kriminaliteta in informacijska tehnologija : predstavitev raziskovalnega področja : referat na konferenci Kibernetska kriminaliteta in digitalna forenzika, Ljubljana, 4. junij 2009 2009 , pp. - unpublished
Zelin, H. & ... On Bylaw Limitation in Criminal Law for Computer Crimes and Its Theoretical Response [J] 2005 Jianghai Academic Journal (Bimonthly), pp. - article URL
Zhijun, L. & ... Developing a computer forensics program in police higher education 2009 Science & Education, 2009. ICCSE'09. 4th , pp. - article URL
Zidanšek, V. Računalniška forenzika v okolju Windows XP : diplomsko delo 2006 , pp. V, 66 f.- book
Zou, J., Lu, K. & ... Architecture and fuzzy adaptive security algorithm in intelligent firewall 2002 MILCOM 2002. Proceedings, pp. - article URL
Zupančič, M. Računalniško piratstvo - oblike in pravnovarstveni vidiki 1998 Revija za kriminalistiko in kriminologijo Vol. 49(4), pp. str.334-345 article
Zupančič, M. Kriminaliteta v globalni komunikacijski mreži (internet) 1997 Revija za kriminalistiko in kriminologijo Vol. 48(2), pp. str.179-188 article
Zviran, M. & ... Password security: an empirical study 1999 Journal of Management Information Systems, pp. - article URL
, (Calif., N.C. f.C.C.D. & ... The Computer Crime Law Reporter 1994 , pp. - book
, Crime, A.B.A.P. &.C. & ... International guide to privacy 2004 , pp. - book URL
, Crime, U.S.D. o.J.C. & ... Searching and seizing computers and obtaining electronic evidence in criminal investigations 2001 , pp. - book
Šavnik, J. Vloga sodnega izvedenca za računalniško forenziko v kazenskih postopkih Digitalni dokazi, pp. Str. 75-87 article
Šavnik, J. Prihodnost računalniške forenzike 2009 Varnostni forum Vol. 4(5), pp. str. 28-29 article
Šavnik, J. Principi, metodologija in orodja računalniške forenzike s praktičnim primerom : specialistična naloga 2006 , pp. 101 f.- book
Škufca, M. Goljufije na svetovnem spletu : diplomsko delo 2010 , pp. 47 str.- book URL
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data 2010 , pp. XII, 353 str.- book
Open source software for digital forensics 2010 , pp. VII, 124 str.- book URL
Law and the internet 2009 , pp. IL, 713 str.- book
ENISA quarterly 2005 ENISA quarterly, pp. - other URL
Invisible crimes : their victims and their regulation 1999 , pp. 264 str.- book
Computers in society 1998 Annual editions series, pp. X, 245 str.- book
Crime, criminal justice and the Internet 1998 , pp. 91 str.- book
Journal of financial crime : the official journal of the Cambridge International Symposium on economic crime 1995 J. financ. crime, pp. - other
Prawne aspekty naduzyAj popelnianych z wykorzystaniem nowoczesnych technologii przetwarzania informacji 1994 , pp. 384 str.- book
Criminal and civil investigation handbook 1993 , pp. 1 zv. (loč. pag.)- book
Izdelano s pomočjo programskega orodja JabRef dne 24/07/2012. GOR