PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2009/2010 | 11/12 | 39--56
Tytuł artykułu

Cybercrime and Punishment

Autorzy
Treść / Zawartość
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The idea of deterrence has existed in fragmented forms for several centuries in both eastern and western philosophy and law. However, it is generally accepted that the identification of economic aspects in illegal activities began in the US in the late 1960s. Gary S. Becker's article "Crime and Punishment: An Economic Approach", published in 1968, is considered the earliest study of crime from an economic perspective. Becker seeks to observe criminal behaviour in the light of purely economic factors as he perceives crime as the consequence of rational estimations of the lawbreaker. The economic approach to crime starts from a plain hypothesis that all people take action rationally, and make a decision whether to perpetrate crime by comparing the benefits and costs of engaging in crime. If the action produces more expected benefits than expected costs, the person will carry out the action, even if it is an unlawful act. The individual estimates all her or his actual opportunities of gaining legal returns, the sum of returns offered by these opportunities, the sum of returns offered by different illicit ways, the probability of being arrested if she or he acts illegally, and the possible penalty if she or he is seized. After making these estimations, she or he chooses the act or profession with the maximum discounted return. (fragment of text)
Twórcy
autor
Bibliografia
  • Adams, J. (1996), Controlling Cyberspace: Applying the Computer Fraud and Abuse Act to the Internet. Computer and High Technology Law Journal, 403.
  • Adreano, S. (ed.), (1980), The Economics of Crime, New York.
  • Allen, J. (2001), CERT System and Network Security Practices. http://www.cert.org/archive/pdf/NCISSE_practices.pdf.
  • American Society for Industrial Security, Cybercrime-fighting Tools Still Lacking, Security Management, 40 (May 2004).
  • Beccaria, C. (1774), An Essay on Crimes and Punishment.
  • Becker, G. S. (1968), "Crime and Punishment: An Economic Approach", Journal of Political Economy, 169-217.
  • Behar, R. (1997), "Who's Reading Your E-mail?", Fortune, 66.
  • Bentham, J. (1789), An Introduction to the Principles of Morals and Legislation.
  • Blackstone, W. (1765-1769), Commentaries on the Laws of England, A Facsimile Edition of the First Edition of 1765-1769.
  • Carter, D. (1995), "Computer Crime Categories: How Techno-Criminals Operate," 64 FBI Law Enforcement Bulletin, 21.
  • Commission of the European Communities (2000). Creating a Safer Information Society by Improving the Security of Information Infrastructures and Combating Computer-Related Crime, COM (2000) 890, final.
  • Computer Security Devision, Computer Security Resource Center, National University of Standards and Technology (1993). Clipper Chip Technology, in Encryption Key Recovery, 30 April 1993. http://csrc.nist.gov/keyrecovery/clip.txt
  • CSI/FBI (2000), Computer Crime and Security Survey (2000). http://www.pbs.org/wgbh/pages/frontline/shows/hackers/risks/csi-fbi2000.pdf.
  • CSI/FBI (2005), Computer Crime and Security Survey, Computer Security Institute, 2005.
  • Davidson, A. (2003), Decentralization, Disease and Terorism, 14 April 2003. http://www.eclicktick.com/decentralization__disease_and_terrorism__htm
  • Department of Treasury Office of Tax Policy (1996). Selected Tax Policy Implications of Global Electronic Commerce, November 1996.
  • Dizard, W. (1982), The coming information age: an overview of technology, economics, and politics, New York.
  • Dnes, A. W. (1996), The Economics of Law, Oxford.
  • Ehrlich, I. (1973), "Participation in Illegitimate Activities: A Theoretical and Empirical Investigation," Journal of Political Economy, 81, 521.
  • Ehrlich, I. (1975), The Deterrent Effect of Capital Punishment: A Question of Life and Death, American Economics Review, 65, 397.
  • Ehrlich, I. and Mark, R. (1977), "Fear of Deterrence: A Critical Evaluation of the »Report of the Panel on Research on Deterrent and Incapacitation Effects«, Journal of Legal Studies, 6, 293.
  • Fields G. (2004), "Cyberexperts and Engineers Wanted by FBI", Wall Street Journal, B1, 6.
  • Findlay (1999), The Globalisation of Crime, Cambridge.
  • Fraser, B. T. (2003), "Welcome to Computer Crime Research Resources." http://mailer.fsu.edu/~btf1553/ccrr/welcome.htm (last visited 15 Aug. 2003).
  • Garg, A., Curtis, J. and Halper, H. (2003), "Quantifying the Financial Impact of IT Security Breaches." Information Management and Security (11) 2, 74-83.
  • Garoupa, N. (2003), An Economic Analysis of Criminal Law, Oct. 2003. http://esnie.u-paris10.fr/pdf/textes_2004/Garoupa_criminalaw01.pdf.
  • Gelbstein, E., and Kamal, A. (2002), Information Insecurity: A Survival Guide to the Uncharted Territories of Cyber-threats and Cyber-security, the United Nations ICT Task Force and the United Nations Institute for Training and Research (2nd ed., 2002).
  • Hale, C. (2002), "Cybercrime: Facts and Figures Concerning the Global Dilemma." Crime and Justice International, Vol. 18, No. 65.
  • Harris, J. R. (1970), On the Economics of Law and Order, 78 Journal of Political Economy 165.
  • Hatcher, M. et al. (1999), Computer Crimes. 36 AM. CRIM. L. REV. 397 (1999).
  • Hellmann, (1980), The Economics of Crime, New York.
  • IMF (2002), Global Financial Stability Report, A Quaterly on Market Developments and Issues, June 2002, International Monetary Fund.
  • Institute for Security Technology Studies (ISTS) (2002), Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National Needs Assessment (2002).
  • Kingdon, J. (1994), Shooting the Messenger: The Liability of Internet Service Providers for Prohibited Expression, http://www.catalaw.com/logic/docs/jk-isps.htm
  • Koch, L. Z. (2000), "Open Sources Preventing Cybercrime," Inter@ctive Week, 34, 10 July.
  • Lee, M. et al. (1998), "Comment, Electronic Commerce, Hackers, and the Search for Legitimacy: A Regulatory Proposal," Berkeley Technological Law Journal, 14, 839.
  • Lenk, K. (1997), The Challenge of Cyberspatial Forms of Human Interaction to Territorial Governance and Policing, The Governance of Cyberspace, New York.
  • Levitt, S. D. (2005), "The Economics of Crime and the Criminal Justice System." NBER Website. 1 Sept. 2005. at http://www.nber.org/reporter/fall98/levitt_fall98.html.
  • Loeb, M. P. (2004), "The True Cost of Cybercrime." Network Computing, 69, 1 April.
  • Longstaff, T. A. (1999), International Coordination for Cyber Crime and Terrorism in the 21st Century, presentation at the Conference on International Cooperation to Combat Cyber Crime and Terrorism, Hoover Institution, Stanford University, Stanford, California (6-7 Dec.1999).
  • Lukasik, S. J. (2000), "Protecting the Global Information Commons." Telecommunication Policy, (24)6-7, 519-531.
  • Mardesich, J. (1996), "Laws Across the Country Become Relevant in Connected World; Jurisdiction at Issue in Net Legal Cases." San Jose Mercury News, 1E, 8 October.
  • Mc Afee (2005), McAfee Virtual Criminology Report: North American Study into Organized Crime and the Intertnet, July 2005. http://www.mcafeesecurity.com/us/local_content/misc/mcafee_na_virtual_criminology_report.pdf.
  • McConnell International LLC. (2000), "Cyber Crime . . . and Punishment?" Archaic Laws Threaten Global Information, December. http://www.witsa.org/papers/McConnell-cybercrime.pdf.
  • Mc Cullagh, D. (2004), "Punishment fails to fit the cybercrime," ZDNet UK, 19 Aug. 2004. http://www.crime-research.org/news/19.08.2004/574
  • Mc Kenna, B. (2003), "UK Police Promise Charter to Guard Good Names." Computers and Security, vol. 22, issue 1, 38-40.
  • Molander, R. C. et al. (1996), Strategic Information Warfare: A New Face of War, xiii (1996), http://www.rand.org/publications/MR/MR661/.
  • Morris, D. A. (2001), "Tracking a Computer Hacker." USA Bulletin, May.
  • National Commission (2004), On Terrorist Attacks upon the United States, 9/11 Commission report, August 2004. http://www.9-11commission.gov/report/911Report.pdf.
  • National Police Agency (1998), Keisatsu Hakusho, Haiteku Hanzai no Genjo to Keisatsu no Torikumi (Japan Police White Paper, The Situation of High-tech Crime and the Suppression of Police).
  • O'Connor, R. J. (1997), "Computers Vulnerable to Insiders." San Jose Mercury News, 3C, 6 March.
  • Park, E. (2004), Analysis of Internet Crime in Korea and Countermeasures. http://www.iap.nl.com/speeches2/internetcrime.html (last visited 23 July 2004).
  • Parker, D. B., and Nycum, S. H. (1984), Computer Crime, Communication of the ACM, vol. 27, no. 4, 313-315 (April 1984).
  • Peters, A. (1971), "Computers and Society: A Course," IIT, 30-38.
  • Philip, A. R. (2002), The Legal System and Ethics in Information Security (15 July 2002), http://www.sans.org/rr/papers/31/54.pdf.
  • Rahul T., Sunil W. (2005), "Impact of Vulnerability Disclosure on Market Value of Software Vendors: An Empirical Analysis", 4th Workshop on Economics and Information Security, Boston, 1-3 June. http://infosecon.net/workshop/pdf/telang_wattal.pdf.
  • Ramo, J. C. (1996), "Crime Online: Mobsters Around the World are Wiring for the Future." Time Digital, 32, 23 September.
  • Rottenberg (ed.), (1973), The Economics of Crime and Punishment, American Enterprise Institute for Public Policy Research, Washington.
  • Roush, W. (1995), "Hackers: Taking a Bite Out of Computer Crime." Technology Review, 32, (April).
  • Salgado, R. P. (2001), "Working with Victims of Computer Network Hacks," USA Bulletin, March; http://www.cybercrime.gov/usamarch2001_6.htm.
  • Sofaer, A. D. et al. (2000), A Proposal for an International Convention on Cyber Crime and Terrorism, Cambridge MA.
  • Speer, D. L. (2000), "Redefining borders: The Challenges of Cybercrime." Crime, Law and Social Change, 34, 259-273.
  • Stanley, T. J. (1995), "Optimal Penalties for Concealment of Crime," 22 December.
  • Stigler, G. J. (1970), The Optimum Enforcement of Laws. Journal of Political Economy, 78, 526.
  • Stoll, C. (1988), "Stalking the Wily Hacker." Communication of the ACM, vol. 31, no. 5, 484-497.
  • Sullivan (1973), "The Economics of Crime: An Introduction to the Literature." Crime and Delinquency, 19, 138-149.
  • Tullock, G. (1967), "The Welfare Costs of Tariffs, Monopolies and Theft." Western Economic Journal 5, 224-232.
  • Ullman, R., and Ferrera, D. (1998), "Crime on the Internet." Boston Bar Journal, No. 6.
  • Vamosi, R. (2003), "Make the punishment fit the cybercrime." CNET Reviews, 10 September, http://reviews.cnet.com/4520-3513_7-5073597.html.
  • Webster, W. H., and de Borchgrave, (1998), A. Foreword. In: Peterson, Gallagher, Borchgraze, Cillusso, S. Lanz (ed.), Berkowitz (ed.), William H. Webster, Center for Strategic and International Studies, Cybercrime... Cyberterrorism... Cyberwarfare... (Nov. 1998), http://www.csis.org/pubs/cyberfor.html.
  • Wolf , J. B. (2000), "War Games Meets the Internet: Chasing 21st Century Cybercriminals With Old Laws and Little Money." American Journal of Criminal Law, Vol. 28, 95-117.
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.ekon-element-000171497551

Zgłoszenie zostało wysłane

Zgłoszenie zostało wysłane

Musisz być zalogowany aby pisać komentarze.
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.