:::

詳目顯示

回上一頁
題名:電腦犯罪模式及犯罪者特徵分析之研究
作者:廖有祿
作者(外文):Liao, You-lu
校院名稱:中央警察大學
系所名稱:犯罪防治研究所
指導教授:林燦璋
張平吾
學位類別:博士
出版日期:2001
主題關鍵詞:電腦犯罪網路犯罪犯罪剖繪犯罪手法犯罪簽名特徵心理跡證動機模型Computer CrimeCyber CrimeCriminal ProfilingModus OperandiCrime SignaturePsychological TrailMotivational Model
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(1) 博士論文(4) 專書(0) 專書論文(1)
  • 排除自我引用排除自我引用:1
  • 共同引用共同引用:0
  • 點閱點閱:85
對於日益嚴重的電腦犯罪,現有的研究大致分為二個方向,一是從安全技術層面研究如何預防電腦犯罪,或是從法律規範角度探討如何追訴處罰犯罪者。但是前者的問題在於:不論密碼再難破解,存取控制再嚴密,都不能阻止有心的犯罪者突破安全漏洞;後者的問題則是:電腦犯罪的證據容易銷毀,犯罪者的來源和身分難以追查,以致犯罪黑數難以估計。
為填補安全技術和法律規範之間的空隙,有賴犯罪偵查技術的充實,而其中一個重要環節是從行為科學的心理跡證,推測犯罪者的動機、手法和特徵,以逐步縮小偵查範圍,掌握特定的嫌犯。此種最新發展的犯罪剖繪技術,已成功運用在連續型的殺人、強暴、金融機構搶劫及縱火犯罪的偵查上,目前已有學者研究將其應用於電腦及網路犯罪的追查。
此種研究途徑可從犯罪者親友的側面調查,了解其生長歷程,再從檢警的偵查紀錄及蒐集物證,掌握其犯罪過程。最主要的方法則是直接訪談犯罪者及官方資料的內容分析,以深入剖析其犯罪手法及特徵。當累積相當的研究資料後,將對此類犯罪的偵防提供堅實的研究基礎。
本研究係屬電腦犯罪領域上的實證研究,擬從犯罪學研究及犯罪防治的觀點,分析電腦犯罪的作案模式和簽名特徵,剖析犯罪者的行為動機和人格特質,以建立詮釋電腦犯罪的理論架構,俾供未來電腦犯罪研究及偵防的重要參考。
根據犯罪特性分析,電腦犯罪以散布色情及侵害著作最多,犯罪地點以住宅為主,破案件數有逐漸增多趨勢,犯罪期間會持續到被發現為止,動機則以圖利為主。犯罪者屬性以男性為主,大多單獨進行,年齡偏低,職業以學生和無業者最多,教育程度大多在專科以上,犯罪紀錄多屬初犯,居住地以都市為主,且有不少殘障人士涉案。刑事司法體系處理情形目前仍集中在少數單位,處理結果明顯有漏斗效應,且判處刑罰均不重,緩刑或易科罰金比率甚高,但科處罰金額度卻相當高。
犯罪模式分析係綜合相關案例融合而成26種犯罪模式,再由下而上統合成九類,並從中找出以電腦為通訊工具、儲存設備及犯罪標的三大類型的犯罪特徵,最後歸納出總體電腦犯罪的概括模式。此模式計分為觸發事件、事前準備、使用工具及管道、時空選擇、避免發現、實際行動、事後處置和湮滅證據八個階段,除可幫助瞭解電腦犯罪的現象,並可協助電腦犯罪的預防和提供偵查的方向。
犯罪者特徵分析係利用各種管道和方法,訪談到13位犯罪者或關係人,首先進行總體觀察,再依非法販賣、煽惑犯罪、網路詐騙、妨害名譽、侵害著作、散布色情、妨害祕密、電腦病毒、電腦竊用九類,探討其背景資料、犯罪經過、處理情形和事後檢討,此種方法雖然較為困難,但所得資料卻可補充官方資料的不足,並矯正一般人及執法者偏差的觀點。
根據上述資料分析結果,最後總結本研究之發現,再對照先前回顧的理論及文獻加以討論,並提供若干偵查實務和未來研究的建議。
Current studies which deal with increasingly serious computer crimes can be divided into two categories: one is applying security technique to prevent computer crimes; the other is enacting new laws to prosecute and punish computer criminals. However, no matter how difficult password cracking is and how tight access control has become, there are still some potential criminals who are able to break through security loopholes. Moreover, since the related evidence of computer crimes is very vulnerable to destruction and the source of criminal trailing is difficult to identify, the dark figure of computer crime is terribly high.
In order to fill the disjunction between the security technique and the legal norm, it is crucial to make improvement in the skill and the technique of investigation. The approach of deploying intangible psychological evidence to explore the motivation and modus operandi of criminals has been applied, whereby the scope of investigation can be narrowed progressively to identify specific suspects. This criminal profiling technique, though newly developed, has been adopted and proved to be useful in the investigation of crimes like serial killing, rape, bank robbery and arson. Due to its success, the technique has also been applied to the tracing of computer and cyber criminals and related studies.
Studies of this type are characterized by their threefold procedures. At the beginning, information about the criminals is solicited from their relatives and friends in order to understand their growing history. Secondly, a content analysis of official records and related evidences of law enforcement is conducted so as to get familiar with the whole process of criminal proceedings. The third and also the most important part is to interview criminals face to face to develop a clear picture of their modus operandi and crime signature. A lot of information and material can be accumulated through this and thereby facilitate prevention and investigation of these crimes.
This research is an empirical study of computer crime. It focuses on classifying and analyzing various aspects of relevant data gathered empirically, aiming to find out the pattern of computer crimes, profile the motivation of criminals, and establish a theoretical framework. The ultimate goal is to help investigators interpret computer crimes easily but correctly and provide useful and practical literature for future studies.
According to the analysis of computer crime characteristics, the majority of computer crimes are regarding distribution of pornography and copyright infringement. The crime is mainly residence in urban areas. Crimes are mostly committed alone and repeatedly until being discovered. The motivation is mainly for profit. The offenders are, for the most part, male, young at age, unemployed(or students), well educated with college degrees or higher and usually possess no criminal records. Many handicapped people are involved. The investigation and trial of such crimes fall within the jurisdiction of few criminal justice agencies. The funnel effect, therefore, emerges. The number of crime is getting higher due to the lenient punishment and high rate of fines and probation.
While doing the crime pattern analysis, related cases were first classified and divided into 26 patterns, which were then synthesized into nine types. In the next step, three categories were separated, namely computer as communication tools, storage media, and criminal targets. A general pattern of overall computer crimes was abstracted finally. This pattern includes eight phases, including triggering incidents, preparation, instruments and methods, option of space and time, escape supervision, taking actions, afterward disposal, and vanishing evidence. The pattern is so complete that it is of great value in helping us understand, prevent and investigate computer crimes.
As to the analysis of criminal characteristics, 13 offenders and correspondents were interviewed. After a general observation, the criminals’ backgrounds, course of criminality, processing modes and afterward review were examined. Nine types of crimes were covered, including illegal sale, inciting crime, cyber fraud, impair reputation, copyright refringement, distribution of pornography, infringement of secrets, computer virus, and illegal use of computers. In addition to the above-mentioned data analysis, the summary and discussion of findings as well as the comparison between research findings and previous studies are also important parts of the research.
Although the new technique is more complicated and difficult to undergo, the information and results acquired can undoubtedly make up for the inadequacy of official data, and correct deviant perspectives of the public and law enforcers.
一、中文資料
(一)書籍
1.王朝煌、張維平,電腦及網路犯罪偵查,警察百科全書(七)-刑事警察,桃園:中央警察大學,民國89年1月。
2.王朝煌等,網路犯罪自動化搜尋系統之研究,交通部電信總局,民國88年6月。
3.白方平譯,捍衛網路,台北:天下文化,民國85年7月。
4.行政院研考會,資訊立法之研究,民國83年7月。
5.行政院研考會,網路使用犯罪問題及預防措施之研究,民國89年4月。
6.李璞良譯,世紀大擒兇─FBI心理分析官對異常殺人者分析手記,台北:台灣先智,民國84年8月。
7.李麒麟、林美娜,電腦犯罪終結者,台北:松崗圖書,民國82年4月。
8.谷岡康則,如何防範個人電腦犯罪,台北:林鬱文化,民國89年9月。
9.周文萍譯,小心駭客-電腦安全專家現身對抗全球頭號駭客,台北:時報文化,民國86年5月。
10.周震歐,犯罪社會學,台北:黎明書局,民國82年7月。
11.尚清松譯,電腦叛客,台北:天下文化,民國84年12月。
12.房阿生、吳振村,電腦犯罪及防制方法之研究,司法周刊社,民國78年9月。
13.林山田、林東茂,犯罪學,台北:三民書局,民國79年9月。
14.林宜隆,網際網路與犯罪問題之研究,桃園:中央警察大學出版社,民國89年3月。new window
15.林東和,駭客入侵不求人,台北:碁峰資訊,民國89年8月。
16.林燦璋,當前台灣地區組織犯罪問題之整合型實證研究─從現象面分析,國科會專題研究,民國88年6月。
17.法務通訊雜誌社,電腦犯罪問題研討會實錄,民國75年1月。
18.胡幼慧等,質性研究─理論、方法及本土女性研究實例,台北:巨流圖書,民國87年6月。
19.徐宗國譯,質性研究概論,台北:巨流圖書,民國86年8月。
20.馬傳鎮、許春金,犯罪學研究法,載於許春金等,犯罪學,桃園:中央警官學校,民國77年1月。
21.康樹華,犯罪學─歷史、現狀、未來,台北:五洲出版社,1999年6月。
22.張台先、陳玥菁編譯,網路法律,台北:儒林圖書,民國87年2月。
23.張真誠,電腦密碼學與資訊安全,台北:松崗圖書,民國83年7月。
24.張真誠、林祝興、江季翰,電子商務安全,台北:松崗圖書,民國89年2月。
25.許武峰,電腦犯罪理論與實務問題研究,司法院祕書處,民國87年6月。
26.許春金,犯罪學,桃園:中央警察大學,民國85年7月。
27.許春金等,犯罪學,桃園:中央警官學校,民國77年1月。
28.郭懿美,資訊法規,台北:松崗圖書,民國89年10月。
29.陳志昌譯,駭客攻防大全,台北:松格資訊,民國86年12月。
30.陳美伶,電腦犯罪之防制研究,著者自印,民國75年10月。
31.陳家駿等,網路vs.法律,資訊工業策進會,民國88年2月。
32.陳鴻斌,網際網路犯罪之研究,著者自印,民國89年5月。
33.麥留芳,個體與集團犯罪-系統犯罪學初探,台北:巨流圖書,民國80年7月。
34.麥惠東、鄭文哲,駭客,台北:松崗圖書,民國89年2月。
35.馮震宇,我國網路犯罪類型及案例探討,載於網路法基本問題研究,台北:學林文化,民國89年9月。new window
36.黃富源等,性侵害加害人之特質與犯罪手法之研究,內政部性侵害防治委員會,民國88年5月。
37.葛佳琳譯,黑暗之旅─破案之神續集,台北:時報文化,民國87年5月。
38.劉心陽,網路駭客─電子商務安全實務,台北:亞太圖書,民國87年2月。
39.劉江彬,資訊法論-電腦與法律問題之探討,台大法學叢書,民國75年10月。
40.劉體中、霍達文譯,破案之神Ⅱ─解剖動機擒兇錄,台北:時報文化,民國88年10月。
41.蔡美智,從駭客大戰談起網路監聽的兩難,載於周天等,數位科技與法律,台北:書泉出版社,民國89年12月。
42.蔡德輝、楊士隆,少年犯罪:理論與實務,台北:五南圖書,民國86年1月。new window
43.鄧文淵等,電腦防毒寶典,台北:松崗圖書,民國87年2月。
44.賴溪松、韓亮、張真誠,近代密碼學及其應用,台北:松崗圖書,民國87年11月。
45.閻蕙群譯,網路犯罪實錄-頂尖駭客與FBI的電子戰爭,台北:智庫文化,民國87年2月。
46.駱宜安、梁建銘、林燦璋,台北市政府處理強暴犯罪效能之評估,台北市政府研考會,民國81年6月。
47.羅明通等,電腦法,台北:群彥圖書,民國83年11月。
48.蘇轍譯,駭客的祕密,台北:碁峰資訊,民國87年6月。
49.鐘明通,網際網路法律入門,台北:月旦出版社,民國88年2月。
(二)期刊、論文
1.王旭正、高大宇,電話飛客防護資訊系統規劃與管理之研究,警學叢刊31卷5期,民國90年3月,頁161-169。new window
2.吳國清,警察電腦犯罪與防制措施之探討,第四屆資訊管理學術暨警政資訊實務研討會論文集,民國89年5月12日,頁201-15。
3.李柏宏、廖有祿,電腦犯罪之問題與對策,警學叢刊26卷6期,民國85年5月,頁141-54。new window
4.周宜寬,以科爾曼理論探討美國電腦犯罪,淡江大學美國研究所碩士論文,民國83年5月。
5.林子儀,資訊安全與法律,資訊建設推動與法規研討會,民國85年9月,頁1-23。
6.林山田,電腦犯罪之研究,政大法學評論30期,民國73年12月,頁45-66。new window
7.林民程,網路犯罪之問題建構研究,中興大學公共政策研究所碩士論文,民國87年6月。
8.林永謀,電腦犯罪與刑事法上之問題,法令月刊35卷7期,民國73年7月,頁9-11。new window
9.林育民,如何防範網路犯罪及駭客入侵行為,國家資通安全基礎研討論會(Ⅰ),民國90年2月23日,頁1-32。
10.林宜隆,網路使用的犯罪問題,第七屆中美防治犯罪研究會,民國85年9月,頁1-24。
11.林宜隆,網路使用的犯罪問題與防範對策之研究,中央警察大學學報34期,民國88年3月,頁353-381。new window
12.林宜隆、黃讚松,網路社會與犯罪問題之研究,2000年網際空間:資訊、法律與社會研討會論文集,民國89年3月3日,頁135-150。new window
13.林東茂,刑事政策及其相關學科,警大法學論集二期,民國86年3月,頁315-334。new window
14.林東茂,簡介世界各國對抗電腦犯罪的立法與構想,新知譯粹2卷4期,民國75年10月,頁28-33。
15.林煒翔,電腦犯罪模式之分析,中央警察大學警政研究所碩士論文,民國87年6月。
16.林燦璋,系統化的犯罪分析:程序、方式與自動化犯罪剖析之探討,警政學報24期,民國83年1月,頁111-26。
17.林燦璋、許明耀、廖有祿,台灣地區警察人員犯罪狀況及分析─以近十年來(1985-1994)涉案警察人員為研究對象,中央警察大學學報32期,民國87年3月,頁145-178。
18.邱忠俊,犯罪語言學與資料檢索應用觀念之研究-以網際網路情色文學為例,中央警察大學資管所碩士論文,民國88年6月。
19.邱承迪,網際網路上可疑不法資訊之自動化蒐集系統,中央警察大學資管所碩士論文,民國88年6月。
20.洪榮彬,電腦處理個人資料保護法簡介,月旦法學雜誌6期,民國84年10月,頁108-111。
21.張淑慧等,台灣地區縱火受刑人基本特性及類型分析,中央警察大學學報33期,民國87年9月,頁197-212。new window
22.張紹斌,司法實務(婦幼安全案件)研究會,第58、59期。
23.莊忠進,電腦犯罪偵查與立法之研究,著者自版,民國83年9月。
24.許春金等,少年偏差行為早期預測之研究─第一年研究報告,中央警察大學犯罪防治研究所,民國86年1月。
25.陳文地,網路犯罪模式分析及偵防對策之研究,中央警察大學資管所碩士論文,民國89年6月。
26.陳文雄,電腦犯罪之預防與偵查,中央警官學校警政研究所碩士論文,民國84年6月。
27.陳美伶,考察美國電腦犯罪之防制研究(上),法學叢刊32卷2期,民國76年4月,頁87-108。new window
28.陳美伶,考察美國電腦犯罪之防制研究(下),法學叢刊32卷3期,民國76年7月,頁63-82。new window
29.曾昱國,網路SYN泛濫攻擊防制機制之研究-以訊務流量控制為基礎,中央警察大學資管所碩士論文,民國88年6月。
30.黃富源、廖訓誠,心理描繪技術在刑事偵防上的運用,刑事科學42期,刑事警察局,民國85年9月,頁59-84。new window
31.黃景彰,網上駭客的攻擊與防制,資訊安全通訊,7卷1期,民國89年12月,頁66。
32.黃榮堅,電腦犯罪的刑法問題,台大法學論叢25卷4期,民國85年7月,頁197-228。new window
33.黃讚松,從情境犯罪預防理論探討網路犯罪預防對策之研究,中央警察大學犯罪防治研究所碩士論文,民國89年6月。new window
34.楊富強,電腦犯罪之立法與電腦安全,法學叢刊34卷2期,民國78年4月,頁126-145。new window
35.廖又生,資訊犯罪及其立法政策之研究,台大圖書館研究所碩士論文,民國76年6月。
36.廖有祿,社會心理剖繪技術在犯罪偵防上的應用,警學叢刊28卷6期,中央警察大學,民國87年5月,頁1-20。new window
37.廖有祿,電腦犯罪的刑法問題,中央警察大學學報31期,民國86年9月,頁25-40。new window
38.廖訓誠,縱火犯罪之研究─兼論縱火犯之心理描繪,中央警官學校警政研究所碩士論文,民國84年6月。
39.樊國楨、時崇德,資訊社會之倫理守則背景初探,我國通資訊基礎建設安全機制討論會,民國89年3月27日,頁89-111。
40.蔡墩銘,電腦與業務上犯罪,法令月刊36卷5期,民國74年5月,頁8-10。new window
41.蔡蕙芳,電腦犯罪與刑事立法的課題,台大法研所碩士論文,民國83年6月。
(三)網路資料
張維平,我國網路犯罪現況分析,http://www.crime.org.tw/data04_0829.htm。
二、英文資料
(一)書籍
1.Alexander, Michael (1996), The Underground Guide to Computer Security, MA: Addison-Wesley Publisher.
2.Amoroso, Edward G. (1999), Detection – An Introduction to Internet Surveillance, Traps, Trace Back, and Response, NJ: Intrusion.Net Books.
3.Angelis, Gina De (2000), Cyber Crimes, Philadephia: Chelsea House Publisher.
4.Archambeault, William G. & Betty J. Archambeault(1989), Computers in Criminal Justice Administration and Management, OH: Anderson.
5.Barlow, Hugh D.(1984), Introduction to Criminology, Boston: Little Brown.
6.Bartollas, Cremens & Simon Dinitz(1989), Introduction to Criminology: Order and Disorder, NY: Happer & Row.
7.Bequai, August(1978), Computer Crime, MA: Lexington Books.
8.Boni, William C. & Gerald L. Kovacich(1999), I-Way Robbery:Crime in the Internet, MA: Butterworth-Heiemann.
9.Bonn, Robert L.(1984), Criminology, NY: McGraw-Hill.
10.Brookshear, J. Glenn(1997), Computer Science- An Overview, MA: Addison Wesley.
11.Burgess, Robert G.(1982), Field Research: a Sourcebook and Field Manual, London: George Allen & Unwin.
12.Casey, Eoghan (2000), Digital Evidence and Computer Crime- Forensic Science, Computers and the Internet, Londen: Academic Press.
13.Clark, Franklin & Ken Diliberto(1996), Investigating Computer Crime, Florida: CRC Press.
14.Coleman, James W. (1985), The Criminal Elite:The Sociology of White-Collar Crime, St. Martin''s Press.
15.Conklin, John E.(1995), Criminology, MA: Allyn & Bacon.
16.Conly, Catherine H. (1989), Organizing for Computer Crime Investigation and Prosecution, Washington D. C.: National Institute of Justice.
17.Denning, Dorothy E. & Peter J. Denning(1998), Internet Besieged: Countering Cyberspace Scofflaws, NY: ACM Press
18.Denning, Dorothy E. (1999), Information Warfare and Security, MA: Addison Wesley Longman.
19.Denning, Peter J.(ed.) (1990), Computers Under Attack- Intruders, Worms and Viruses, NY: ACM Press.
20.Douglas, J. E., A. W. Burgess, A. G. Burgess, & R. K. Ressler (1992), Crime Classification Manual, NY: Lexington Books.
21.Ermann, M. David, Mary B. Willims, & Michele S. Shauf(1997), Computers, Ethics, and Society, NY: Oxford University Press.
22.Ferbrache, David (1992), A Pathology of Computer Viruses, London: Spring- Verlag.
23.Gottfredson, Michael R. & Travis Hirschi(1990), A General Theory of Crime, CA: Stanford University.
24.Hagan, F. E. (1993), Research Methods in Criminal Justice and Criminology, NY: Macmillan.
25.Hoffman, Lance J. (1990), Rogue Programs: Viruses, Worms, and Trojan Horses, NY: Van Nostrand Reinhold.
26.Hollinger, Richard C. (ed.) (1997), Crime, Deviance and the Computer, England: Dartmouth.
27.Holmes, Ronald M. & Stephen T. Holmes (ed.)(1998), Contemporary Perspectives on Serial Murder, CA: Sage Publications.
28.Holmes, Ronald M. & Stephen T. Holmes(1996), Profiling Violent Crimes- An Investigative Tool, CA: Sage Publications.
29.Hutt, Authur E., Seymour Bosworth, & Douglas B. Hoyt (eds.)(1995), Computer Security Handbook, NY: John Wiley & Sons.
30.Icove, D., K. Seger, & W. VonStorch(1995),Computer Crime: A Crimefighter''s Handbook, CA: O''Reilly & Associates.
31.Judson, Karen (1994), Computer Crime: Phreaks, Spies, and Salami Slicers, NJ: Enslow Publishers.
32.Kovacich, Gerald L. & William Boni(2000),High-Technology-Crime Investigator’s Handbook: Working in the Global Information Environment, MA: Butterworth-Heinemann.
33.Leibholz, Stephen & Louis D. Wilson(1974), User''s Guide to Computer Crime: Its Commission, Detection & Prevention, PE: Chilton Book.
34.McCaughy, Charles H., Timothy A. Capron, & J.D. Jamieson(2000), Deviant Behavior- Crime, Conflict, and Interest Groups, MA: Allyn & Bacon.
35.McEwen, J. Thomas, et al. (1989), Deicated Computer Crime Units, Washington D. C.: National Institute of Justice.
36.Norusis, Marija J. /SPSS Inc.(1993), SPSS For Windows: Advanced Statistics.
37.Osterburg, J. &, R.Ward (1997),Criminal Investigation:A Method for Reconstructing the Past, Cincinnati: Anderson.
38.Parker, Doon B. (1989), Computer Crime: Criminal Justice Resource Manual, Washington D. C.: National Institute of Justice.
39.Parker,Doon B. (1998),Fighting Computer Crime:A New Framework for Protecting Information, NY: John Wiley & Sons.
40.Pfleeger, Charles P. (1997), Security in Computing, NJ: Prentice-Hall.
41.Pipkin, Donald L. (1997), Halting the Hacker: a Practical Guide to Computer Security, NJ: Prentice Hall.
42.Quarantiello, Laura E.(1997),Cyber Crime:How to Protect Yourself from Computer Criminal, WI: LimeLight.
43.Ressler, R. K. & T. Shachtman (1992), Whoever Fights Monsters, NY: St. Martin’s Press.
44.Ressler, R. K., A. W. Burgess, & R. K. Douglas (1988), Sexual Homicide-Patterns and Motives, NY: Lexington Books.
45.Schmalleger, Frank(1996), Criminology Today, NJ: Prentice-Hall.
46.Sieber,Ulrich(1986), The International Handbook on Computer Crime, NY: John Wiley & Sons.
47.Siegel, Larry J.(1992), Criminology, MN: West Publishing.
48.Stephenson, Peter (2000), Investigating Computer-Related Crime, Florida: CRC Press.
49.Swanson, Charles R., Neil C. Chamelin, & Leonard Territo(2000), Criminal Investigation, NY: McGraw-Hill.
50.Taylor, Paul A. (1999), Hackers: Crime in the Digital Sublime, London: Routledge.
51.Thio, Alex(2001), Deviant Behavior, MA: Allyn & Bacon.
52.Thomas, Jim(1993), Doing Critical Ethnography, CA: Sage Publications.
53.Turvey, Brent(ed.)(1999), Criminal Profiling- An Introduction to Behavioral Evidence Analysis, CA: Academic Press.
54.Wang, Wallace (1998), Steal this Computer Book, San Francisco: No Starch Press.
(二)期刊、論文
1.Barlow, John Petty(1990), ''Crime and Puzzlement: Desperados of the Data Sphere'', Whole Earth Review, 68, pp.1-24.
2.Bawden, Brian(1992),''International Symposium on the Prevention and Prosecution of Computer Crime'', Computer Law and Security Report, May-June, pp.7-11.
3.Bloombecker, J. J. Buck (1990), ''Computer Crime and Abuse'', The EDP Auditor Journal, Ⅱ, pp.34-41.
4.Branscomb, Anne W.(1990), ''Rogue Computer Programs and Computer Rogues: Tailoring the Punishment to Fit the Crime'', Rutgers Computer and Technology Law Journal, 16, pp.1-61.
5.Branscomb, Anne Wells(1995),''Internet Babylon? Does the Carnegie Melon Study of Pornography on the Information Superhighway Reveal a Threat to the Stability of Society?'',The Georgetown Law Journal, 83, pp.1935-1957.
6.Charney, Scott(1994),''Computer Crime: Law Enforcement''s Shift form a Corporeal Environment to the Intangible, Electronic World of Cyberspace'', Federal Bar News & Journal, 41, pp.489-494.
7.Chen, Christopher D. (1990), ''Computer Crime and the Computer Fraud and Abuse Act of 1986'', Computer/Law Journal, X, pp.71-86.
8.Coldwell, R.A.(1993),''University Students'' Attitudes Towards Computer Crime: A Research Note'', Computer and Society, 23, pp.11-14.
9.Coleman, James W.(1987),''Toward an Integrated Theory of White-collar Crime'', American Journal of Sciology, 93(2), pp.406-439.
10.Dart, Roland C., ''The Challenge of High Tech Crime: a New Law Enforcement Frontier'',第三屆中美防治犯罪研究會論文集,中央警官學校,民國79年10月,頁70-91。
11.Denning, Dorothy E. (1995), ''Crime and Crypto on the Information Superhighway'', Journal of Criminal Justice Education, 6, pp.323-336.
12.Denning, Dorothy E.(1991),''The United States vs. Craig Neidorf: a Debate on Electronic Publishing, Constitutional Right and Hacking'', Communications of the ACM, 34, pp.24-43.
13.Denning, Peter J. (1988), ''Computer Viruses'', American Scientist, May-June, pp.236-238.
14.Denning, Peter J. (1989), ''The Internet Worm'', American Scientist, March-April, pp.126-128.
15.Denning, Peter J. (1990), ''Sending a Signal'', Communications of ACM, 33(8), pp.11-13.
16.Eisenberg, Ted et al.(1989), ''The Cornell Commission: on Morris and the Worm'', Communications of ACM, 32(6), pp.706-709.
17.Fagin, James A.(1991), ''Computer Crime: A Technology Gap'', International Journal of Comparative and Applied Criminal Justice, 15, pp.285-297.
18.Fainberg, Tony(1989), ''The Night the Network Failed'', New Scientist, 121, pp.38-42.
19.Forcht, Karen A., Daphyne Thomas, & Karen Wigginton(1989), ''Computer Crime: Assessing the Lawyer''s Perspective'', Journal of Business Ethics, 8, pp.243-251.
20.Foremski, Tom(1992), ''Computer Crime, United States Laws and Law Enforcement'', International Yearbook of Law Computers and Technology, 6, pp.121-127.
21.Gemignani, Michael (1989),''Viruses and Criminal Law'', Communications of the ACM, 32, pp.669-671.
22.Hafner, Katie(1990),''Computer Crime and Misdemeanors: Morris Code'', The New Republic, 202, pp.15-16.
23.Hansen, Raymond L. (1990),''The Computer Virus Eradiction Act of 1989: The War Against Computer Crime Continues'', Software Law Journal, 3, pp.717-747.
24.Harper''s Magazine(1990),''Is Computer Hacking a Crime? A Debate from the Electronic Underground'', Harper''s Magazine, March, pp.45-55.
25.Hollinger, Richard C. & Lon Lanza-Kaduce(1988), ''The Process of Criminaliza- tion: The Case of Computer Crime Laws'', Criminology, 26,pp.101-126.
26.Hollinger, Richard C. (1991),''Hackers: Computer Heros or Electronic Hiwaymen?'', Computers and Society,21,pp.6-17.
27.Hollinger, Richard C.(1988),''Computer Hackers Follow a Guttman- Like Progression'', Sociology and Social Research, 72, pp.199-200.
28.Hollinger, Richard C.(1993),''Crime by Computer: Correlates of Software Piracy and Unauthorized Account Access'', Security Journal, 4, pp.2-12.
29.Hurewitz, Barry J. & Allen M. Lo(1993),''Computer-Related Crimes'', American Criminal Law Review, 30, pp.495-521.
30.Johnson, Deborah G.(1994),''Crime, Abuse, and Hacker Ethic'', Computer Ethics, New Jersey: Prentice Hall, pp.103-123.
31.Levy, Steve(1984),''The Hacker Ethics'',Hackers:Heros of the Computer Revolution, NY: Anchor Press/Doubleday, pp.26-36.
32.Michalowski, Reymond J. & Erdwin H. Pfuhl(1991), ''Technology, Property, and Law: The Case of Computer Crime'', Crime, Law, and Social Change,15, pp.255- 275.
33.Moore, W. John(1992),''Taming Cyberspace'', National Journal, 24, pp.745-749.
34.Morris, James H. (1989), ''Our Global City'', Communications of the ACM, 32(6), pp.661-662.
35.Nelson, Brenda(1991),''Straining the Capacity of the Law: The Idea of Computer Crime in the Age of the Computer Worm'', Computer/Law Journal, XI, pp. 299- 321.
36.Nigri, Deborah Fich.(1992),''Investigating Computer Crime in the U.K.'', Computer Law and Security Report, May-June, pp.132-134.
37.Parker, Donn B. (1976),''Computer Abuse'', Crime by Computer, New York: Charles Scribner''s Sons, pp.12-22.
38.Pfuhl, Erdwin H., Jr.(1987),''Computer Abuse: Problems of Instrumental Control'', Deviant Behavior, 8,pp.113-130.
39.Raskin, Xan & Jeannie Schaldach-Paiva(1996), ''Computer Crimes'', American Criminal Law Review, vol.33(3), pp.541-573.
40.Reid, Brian(1989), ''Reflections on Some Recent Widespread Computer Break-Ins'', Communications of ACM, 30(2), pp.103-105.
41.Rigby, Andrew(1994),''Computer Crime: Computer Hacking and Misuse is Now a Criminal Offence'', Solicitors Journal, 138, pp.624-625.
42.Rochlis, Jon A. & Mark W. Eichin(1989), ''With Microscope and Tweezers: From MIT''s Perspective'', Communications of ACM, 32(6), pp.689-698.
43.Rosenblatt, Kenneth(1990),''Deterring Computer Crime'', Technology Review, 93, pp.34-40.
44.Saffo, Paul (1989),''Consensual Realities in Cyberspace'', Communications of the ACM, 32, pp.664-665.
45.Samuelson, Pamela (1989),''Legally Speaking: Can Hacker Be Sued for Damages Caused by Computer Viruses?'', Communications of the ACM, 32, pp.666-669.
46.Shackelford, Steve(1992),''Computer-Related Crime: An International Problem in Need of an International Solution'', Texas International Law Journal, 27, pp.479-505.
47.Sherizen, Sanford(1990),''Criminological Concepts and Research Findings Relevant for Improving Computer Crime Control'', Computer and Security, 9, pp.215-221.
48.Siegel, Lenny (1986), ''Microcomputers: From Movement to Industry'', Monthly Review, 8, pp.110-117.
49.Spafford, Eugene H.(1989),''The Internet Worm: Crisis and Aftermath'', Communications of the ACM, 32, pp.678-687.
50.Sterling, Bruce(1995),''Good Cop, Bad Hacker'', Wired, 3, pp.122-129.
51.Stoll, Cliff (1988), ''Stalking the Wily Hacker'', Communications of ACM, 31(5), pp.484-97.
52.Swinyard, W.R., H. Rinne, & A. Keng Kau(1990), ''The Morality of Software Piracy: A Cross-Cultural Analysis'', Journal of Business Ethics, 9, pp.655-664.
53.Tipton, Hal(1993), ''Computer Crime-Investigating Inside the Corporation'', Computer Fraud & Security Bulletin, February, pp.4-10.
54.Williams, Mary B., David Ermann, & Glaudio Gutierrez(1989),''Cautionary Tales and the Impacts of Computer on Society'', Computer and Society, 19, pp.23-31.
(三)網路資料
President’s Working Group on Unlawful Conduct on the Internet, The Electronic Frontier: The Challenge of Unlawful Conduct Involving the Use of Internet, http://www.usdoj.gov/criminal/cybercrime/unlawful.htm, 2000, March
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
QR Code
QRCODE