PART Ⅰ THEORETICAL PERSPECTIVES AND VIEWPOINTS 3
1 David S. Wall (1999), 'Cybercrimes: New Wine, No Bottles?', in P. Davies, P. Francis and V. Jupp (eds), Invisible Crimes: Their Victims and their Regulation, London: Macmillan, pp. 105-39. 3
2 EN. Grabosky and Russell G. Smith (2001), 'Digital Crime in the Twenty-First Century', Journal oflnformation Ethics, 10, pp. 8-26. 39
3 Alan Norrie (2001), 'Dialogue and Debate: The Nature of Virtual Criminality', Social and Legal Studies, 10, pp. 227-28. 59
4 Wanda Capeller (2001), 'Not Such a Neat Net: Some Comments on Virtual Criminality', Social and Legal Studies, 10, pp. 229-42. 61
5 Peter N. Grabosky (2001), 'Virtual Criminality: Old Wine in New Bottles?', Social and Legal Studies, 10, pp. 243-49. 75
6 Francis Snyder (2001), 'Sites of Criminality and Sites of Governance', Social and Legal Studies, 10, pp. 251-56. 83
7 Graham Greenleaf (1998), 'An Endnote on Regulating Cyberspace: Architecture vs Law'?', University of New South Wales Law Journal, 21, pp. 593M522. 89
PART Ⅱ CYBERCRIMES 121
8 Amanda Chandler (1996), 'The Changing Definition and Image of Hackers in Popular Discourse', International Journal of the Sociology of Law, 24, pp. 229-51. 121
9 Liz Duff and Simon Gardiner (1996), 'Computer Crime in the Global Village: Strategies for Control and Regulation - in Defence of the Hacker', International Journal of the Sociology of Law, 24, pp. 211-28. 145
10 Tim Jordan and Paul Taylor (1998), 'A Sociology of Hackers', Sociological Review, November, pp. 757-80. 163
11 David Mann and Mike Sutton (1998), 'Netcrime: More Change in the Organization of Thieving', British Journal of Criminology, 38, pp. 201-29. 187
12 Dorothy E. Denning (2000), 'Cyberterrorism: The Logic Bomb versus the Truck Bomb', Global Dialogue, Autumn, pp. 29-37. 217
13 David L. Speer (2000), 'Redefining Borders: The Challenges of Cybercrime', Crime, Law and Social Change, 34, pp. 259-73. 227
14 George Smith (1998), 'An Electronic Pearl Harbor'? Not Likely', Issues in Science and Technology, 15, pp. 68-73. 243
15 Hedieh Nasheri and Timothy J. O'Hearn (1999), 'The Worldwide Search for Techno-thieves: International Competition v. International Co-operation', International Review of Law Computers and Technology, 13, pp. 373-82. 249
16 C. David Freedman (1999), 'The Extension of the Criminal Law to Protecting Confidential Commercial Information: Comments on the Issues and the CyberContext', International Review of Law Computers and Technology, 13, pp. 147-62. 259
17 Louise Ellison and Yaman Akdeniz (1998), 'Cyberstalking: The Regulation of Harassment on the Internet', Criminal Law Review Special Edition 1998, pp. 29-47. 275
18 Matthew Williams (2000), 'Virtually Criminal: Discourse, Deviance and Anxiety within Virtual Communities', International Review of Law Computers and Technology, 14, pp. 95-104. 295
19 Nadine Strossen (2000), 'Cybercrimes v. Cyberliberties', International Review of Law Computers and Technology, 14, pp. 11-24. 305
20 Clive Walker and Yaman Akdeniz (1998), 'The Governance of the Internet in Europe with Special Reference to Illegal and Harmful Content', Criminal Law Review Special Edition 1998, pp. 5-18. 319
21 Marty Rimm (1995), 'Marketing Pornography on the Information Superhighway: A Survey of 917,410 Images, Descriptions, Short Stories, and Animations Downloaded 8.5 Million Times by Consumers in Over 2000 Cities in Forty Countries, Provinces, and Territories', Georgetown Law Journal, 83, pp. 1849-915. 333
22 Catharine A. MacKinnon (1995), 'Vindication and Resistance: A Response to the Carnegie Mellon Study of Pornography in Cyberspace', Georgetown Law Journal, 83, pp. 1959-67. 401
23 Donna L. Hoffman and Thomas P. Novak (1995), 'A Detailed Analysis of the Conceptual, Logical, and Methodological Flaws in the Article: "Marketing Pornography on the Information Superhighway"', Owen Graduate School of Management, Vanderbilt University, pp. 1-21. 411
24 Jon Spencer (1999), 'Crime on the Internet: Its Presentation and Representation', Howard Journal, 38, pp. 241-51. 433
PART Ⅲ CRIMINAL JUSTICE PROCESSES 447
25 Marc D. Goodman (1997), 'Why the Police Don't Care About Computer Crime', Harvard Journal of Law and Technology, 10, pp. 465-94. 447
26 David S. Wall (1998), 'Policing and the Regulation of the Internet', Criminal Law Review Special Edition 1998, pp. 79-91. 477
27 P.K. Manning (2001), 'Technology's Ways: Information Technology, Crime Analysis and the Rationalizing of Policing', Criminal Justice, 1, pp. 83-103. 491
28 Janet B.L. Chan (2001), 'The Technological Game: How Information Technology is Transforming Police Practice', Criminal Justice, 1, pp. 139-59. 513
29 Peter Sommer (1998), 'Digital Footprints: Assessing Computer Evidence', Criminal Law Review Special Edition 1998, pp. 61-78. 535
30 Clive Walker (1996), 'Fundamental Rights, Fair Trials and the New Audio-Visual Sector', Modern Law Review, 59, pp. 517-39. 553
Name Index 577