Данный модуль является ресурсом для лекторов
Библиография
Публикации и интернет-порталы
Barclay, Corlane. (2017). Cybercrime and legislation: a critical reflection on the Cybercrimes Act, 2015 of Jamaica. Commonwealth Law Bulletin , Vol. 43(1), 77-107. BBC News. (2017). Young children groomed on live streaming app Periscope. 21 July 2017. Berliner, Lucy and Jon R. Conte (1990). The process of victimization: A victims' perspective. Child Abuse & Neglect , Vol. 14(1), 29-40. CloudFlare. (2018). What is a DDoS Attack? Davies, Caroline. (2018). 'Sadistic' paedophile Matthew Falder jailed for 32 years. The Guardian , 19 February 2018. European Parliament, Citizens' Rights and Constitutional Affairs. (2016). Cyberbullying Among Young People. Directorate General For Internal Policies, Policy Department C (PE 571.367). Hern, Alex. (2017). Hackers publish private photos from cosmetic surgery clinic. The Guardian , 31 May 2017. Dennison, Kesta. (2018). The Fight Against Child Exploitation Material Online. Presentation at International Academic Conference: Linking Organized Crime and Cybercrime. A conference hosted by Hallym University and sponsored by the United Nations Office on Drugs and Crime (UNODC) , 8 June 2018. International Centre for Missing & Exploited Children (ICMEC) and The United Nations Children's Fund (UNICEF). (2016). Online Child Sexual Abuse and Exploitation. Maras, Marie-Helen. (2014). Computer Forensics: Cybercriminals, Laws and Evidence , second edition. Jones and Bartlett. Maras, Marie-Helen. (2016). Cybercriminology . Oxford University Press. McMenemy, Rachel. (2018). Reaction as one of Britain's most prolific paedophiles is jailed. Cambridge News, 19 February 2018. O'Connell, Rachel. (2003). A typology of cyber sexploitation and online grooming practices. Cyberspace Research Unit: University of Central Lancashire. Ospina, Maria, Christa Harstall, and Liz Dennet (2010). Sexual exploitation of children and youth over the internet: A rapid review of the scientific literature. Alberta, Canada: Institute of Health Economics. Parkin, Simon. (2017). Keyboard warrior: the British hacker fighting for his life. The Guardian , 8 September 2017. Ragan, Steven. (2016). Chinese scammers take Mattel to the bank, Phishing them for $3 million. CSO , 29 March 2016. Reuters. (2015). Corrected - Scoular hit with $17.2 million fraud - newspaper. United Nations Commission on Crime Prevention and Criminal Justice. (2017). Results of the second meeting of the Intergovernmental Expert Group to Prepare a Study on Fraud and the Criminal Misuse and Falsification of Identity. United Nations Economic and Social Council (2 April 2017). UNODC. (2011). Handbook on Identity-related Crime. UNODC. (2012). The Use of the Internet for Terrorist Purposes. UNODC. (2013). Draft Comprehensive Study on Cybercrime. UNODC. (2015). Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children. UNODC. (n.d.). Economic Fraud and Identity-related Crime. US Department of Justice (DOJ). (2018). Thirty-six defendants indicted for alleged roles in transnational criminal organization responsible for more than $530 Million in losses from cybercrimes. Vernalls, Richard and Rachel McMenemy. (2018). Warped paedophile began his sick campaign of abuse while at Cambridge University. Cambridge News , 20 February 2018. Whittle, Helen, Catherine Hamilton-Giachritsis, Anthony Beech and Guy Collings. (2013). A review of online grooming: Characteristics and concerns. Aggression and Violent Behavior , Vol. 18(1), 62-70. World Intellectual Property Organization (WIPO). (2016). Understanding Copyright and Related Rights . WIPO. (n.d.). What is Intellectual Property.
Список дел
Geoffrey Andare v AG & DPP & Article 19 East Africa [2016] eKLR.R v. Tsouli [2007] EWCA (Crim) 3300.United States of America v. Emerson Winfield Begolly , Criminal No 1:11 CR 326 (2013)
Законы