000026088 000__ 03393cam\a2200601\i\4500 000026088 001__ 26088 000026088 003__ SzGeWIPO 000026088 005__ 20210318105028.0 000026088 008__ 100316s2010\\\\enk\\\\\rb\\\\001\0\eng\\ 000026088 010__ $$a2010011450 000026088 015__ $$aGBB027864$$2bnb 000026088 020__ $$a9780521728126 000026088 020__ $$z9780521899253$$qhardback 000026088 020__ $$z0521899257$$qhardback 000026088 020__ $$z9780511729782$$qelectronic book 000026088 020__ $$z0511729782$$qelectronic book 000026088 020__ $$z9780511845123$$qelectronic book 000026088 020__ $$z051184512X$$qelectronic book 000026088 020__ $$z9780511726491 000026088 035__ $$a(wipo)006038740 000026088 035__ $$a(OCoLC)466341213 000026088 040__ $$aDLC$$beng$$erda$$cSzGeWIPO$$dCaBNVSL 000026088 043__ $$au-at---$$an-cn---$$ae-uk---$$an-us--- 000026088 050_4 $$aK5215$$b.C58 2010 000026088 072_7 $$aZB345$$2Z01 000026088 072_7 $$aE02095$$2E02-20100712 000026088 08204 $$a345.0268$$222 000026088 084__ $$aN 629 GLO.P 000026088 090__ $$c28475$$d28465 000026088 1001_ $$aClough, Jonathan,$$eauthor. 000026088 24510 $$aPrinciples of cybercrime /$$cJonathan Clough. 000026088 264_1 $$aCambridge, UK :$$bCambridge University Press,$$c2010. 000026088 300__ $$aliii, 449 pages ;$$c24 cm 000026088 336__ $$atext$$btxt$$2rdacontent 000026088 337__ $$aunmediated$$bn$$2rdamedia 000026088 338__ $$avolume$$bnc$$2rdacarrier 000026088 504__ $$aIncludes bibliographical references (pages 417-437) and index. 000026088 5050_ $$a1. Cybercrime; 2. Computer as target; 3. Access offences; 4. Impairment of data; 5. Misuse of devises; 6. Interception of data; 7. Fraud; 8. Criminal copyright infringement; 9. 'Spam'; 10. Child pornography; 11. 'Grooming'; 12. Cyberstalking; 13. Voyeurism; 14. Jurisdiction. 000026088 5050_ $$aCybercrime -- Computer as target -- Access offences -- Impairment of data -- Misuse of devices -- Interception of data -- Fraud -- Criminal copyright infringement -- 'Spam' -- Child pornography -- 'Grooming' -- Cyberstalking -- Voyeurism -- Jurisdiction. 000026088 5201_ $$a"We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, have transformed the way in which we socialize and do business. While overwhelmingly positive, there has also been a dark side to these developments proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes: so-called 'cybercrimes'. Whether it is fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions Focusing on Australia, Canada, the UK and USA, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes."--Jacket. 000026088 650_0 $$aComparative law. 000026088 650_0 $$aCopyright infringement$$zAustralia. 000026088 650_4 $$aDigital technology 000026088 650_4 $$aCybercrime 000026088 650_6 $$aCriminalité informatique. 000026088 651_0 $$aAustralia$$xCommerce$$xLaw and legislation. 000026088 651_0 $$aCanada$$xCommerce$$xLaw and legislation. 000026088 7001_ $$aClough, Jonathan. 000026088 8524_ $$bZ01$$c02$$jHC 40848 000026088 8524_ $$bE02$$cE02RA$$j004.49 CLO 000026088 942__ $$cMON$$jN 629 GLO.P 000026088 952__ $$w2010-08-18$$p2010-0788$$r54.94$$u40286$$bMAIN$$10$$kN 629 GLO.P$$v2010-08-18$$ztagged$$71 000026088 980__ $$aBIB 000026088 999__ $$c28475$$d28475