{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:41:21Z","timestamp":1725493281685},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540654742"},{"type":"electronic","value":"9783540492481"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-49248-8_1","type":"book-chapter","created":{"date-parts":[[2007,10,27]],"date-time":"2007-10-27T23:31:47Z","timestamp":1193527907000},"page":"1-17","source":"Crossref","is-referenced-by-count":0,"title":["Trends in the Fight Against Computer-Related Delinquency"],"prefix":"10.1007","author":[{"given":"Bart","family":"De Schutter","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,1,15]]},"reference":[{"key":"1_CR1","unstructured":"It seems that from the start of scientific activity in the field every major writer uses its own terms. See: Schj\u00d8lberg, Computers and penal legislation, Oslo, 1983, p. 3; Solarz, Computer technology and computer crime, Stockholm, 1981, p. 23 The computer is sometimes the instrument or target of an act (Von zur Muhlen, Computer Kriminalit\u00c4t, Berlin 1972, p. 17); The specific purpose (Parker, D.B., Computer Abuse Assessment, Washington, 1975, p. 3); Bequai only goes for \u201cpart of larger forms of criminal activity: white collar crime\u201d (Bequai, Computer crime, Lexington, 1978, P.1). See also: Rec.n.R(89)9 on computer-related crime and final report of the European Committee on Crime Problems, Council of Europe, Strasbourg, 1990."},{"key":"1_CR2","unstructured":"OECD-ICCP, Computer related crime-analysis of legal policy, Paris (1986), p. 7."},{"key":"1_CR3","unstructured":"See U.K.: A. Norman, Computer Insecurity, London, 1983 and K. Wong & Farquhar, W., Computer related Fraud Casebook, BIS Applied Systems, Ltd., Manchester, 1983, 106 p. See also: Australia\u2019s information at the Caulfield Institute of Technology, Computer-Abuse Research Bureaus (CIT-CARB); Japan, National Police Department, White paper on computer crime; the yearly reports of CLUSIF in France."},{"key":"1_CR4","first-page":"308","volume-title":"Crime by computer","author":"D.B. Parker","year":"1976","unstructured":"Within SRI, D. Parker\u2019s publications are the more important ones: Parker, D.B., Crime by computer, New York, Charles Scibner\u2019s and Sons, 1976, 308 p. Parker, D.B., Nycum, S.B., Computer abuse, U.S. Department of Commerce, Springfield, NTIS, 1973, 131 p. D. Icove, K. Seger and W. Von Storch, Computer Crime A crimefighter\u2019s handbook, Sebastopol (CA) O-Reilly and assoc. 1995, 437p. Drs. J.C. Von Dijk R.A., \u201cComputercriminaliteit\u201d, Ars Aequi Libri (ser. Strafrecht en criminologie, dl. 3), p. 203, 1984; Ph. JOST, \u201cLes pillards d\u2019ordinateur d\u00e9fient le FBI\u201d, VSD, 27 jan. 1983, p. 10."},{"key":"1_CR5","unstructured":"Local government Audit Inspectorate-Department of the Environment, Computer Fraud Survey Report, Crown copyright, July 1981, 33 pgs."},{"key":"1_CR6","unstructured":"Scottish Law Commission, Consultative Memorandum nr. 68, Computer Crime, (March 1986), p. 1. See also: the regular publication Newsware (V.De Pous editor)-Clusifreport 1995."},{"key":"1_CR7","volume-title":"The Equity Funding Papers, the anatomy of a fraud","author":"L.J. Seidler","year":"1977","unstructured":"L.J. SEIDLER, F. ANDREWS and M.J. EPSTEIN: \u201cThe Equity Funding Papers, the anatomy of a fraud\u201d, New York (J. Wiley and Sons, Inc., 1977)."},{"key":"1_CR8","unstructured":"\u201c10.2 Million $ theft may yield profit for victim\u201d, EDCAPS, Jan.\u2019 79, blz. 11\u201312, Aug.\u2019 79, Pg. 14\u201315."},{"key":"1_CR9","unstructured":"Whiz-kids managed to establish a link with a private network of the General Telephone Electronic Telenet. S. Herten, \u201cComputercriminaliteit: er is nog toekomst in de toekomst\u201d, Humo, 26 jan. 1984, n\u2134 2264, p. 32.-A similar incident occured in Tokyo, where patient files were copied by hackers with blackmail as a consequence (Newsware, dec. 94)."},{"key":"1_CR10","unstructured":"S. O\u2019DY, \u201cInformatique: La chasse aux perceurs de codes\u201d, L\u2019express, 9 march 1984, P. 74\u201375."},{"key":"1_CR11","unstructured":"L\u2019express, 26 april 1980, L\u2019informatique nouvelle, sept. 1980, p. 25."},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"BLOOMBECKER, J., International Computer Crime: Where Terrorism and Transboder Data Flow meet, Computers and Security, 1982, p. 41\u201353.-e.g. fraudelent telemarketing, according to the FBI a 40 million dollar issue.","DOI":"10.1016\/0167-4048(82)90024-4"},{"key":"1_CR13","first-page":"6","volume-title":"Criminaliteit in Cyberspace","author":"P. Eecke Van","year":"1997","unstructured":"These and other ex. of telematic crime in: P. Van Eecke, Criminaliteit in Cyberspace, Mys en Breesch, Gent, 1997, p. 6."},{"key":"1_CR14","unstructured":"G. Leveille, \u201cData base security systems, protecting the source\u201d, Today\u2019s Office, oct. 1982, p. 62. D. Parker, Computer abuse Assessment, Washington D.C.(National Science Foundation), 1975, p. 32. B. Allan, The biggest computer fraudes: lessons for CPA\u2019s, The Journal of Accountancy, Mai 1977, p. 52\u201362."},{"key":"#cr-split#-1_CR15.1","unstructured":"U. Sieber, Gefahr und Abwehr der Computercriminalit??t, Betriebs-Berater 1982, p. 1433; A. Norman, Computer Insecurity, London (1983);"},{"key":"#cr-split#-1_CR15.2","unstructured":"US Department of Justice, Computer Crime, Criminal Justice Resource Manual, Washington, 1979."},{"key":"1_CR16","unstructured":"[16]-OECD, ICCP, Computer-related crime, Ananlysis of legal policy, nr. 10, Paris 1986.-Council of Europe, supra note 1."},{"key":"1_CR17","unstructured":"U. Sieber, The international handbook on computer crime, West Chicester (1986) p. 94 et seq."},{"key":"1_CR18","series-title":"IFIP Transactions A-43","first-page":"15","volume-title":"Security and Control of Information technology in Society","author":"B. Schutter De","year":"1994","unstructured":"B. De Schutter & B. Sprayt, \u201cIs international law on security of information systems emerging?\u201d in Sizer (ed.), Security and Control of Information technology in Society, IFIP Transactions A-43, Amsterdam, North Holland, 1994, p. 15\u201323."},{"key":"1_CR19","unstructured":"OECD guidelines (for the security) of information systems (1992)-E.C. on Information Technology Security Evaluation Criteria (ITSEC)"},{"key":"1_CR20","unstructured":"e.g. Denmark: (the Danish Private registers etc. Act N\u2134 293, 8 June 1978 and the Danish Public Authorities\u2019 Registers Act, n\u2134 294 of 8 June 1978) France: (La loi relative \u00e0 l\u2019informatique, aux fichiers et aux libert\u00e9s, n\u2134 78\u201317, 6 January 1977, B.G.B.I., I S 201) Luxembourg: (Loi du 31 mars 1979 r\u00e9glementant l\u2019utilisation des donn\u00e9es nominatives dans les traitements informatiques M\u00e9m. 1 1979, p. 582). United Kingdom: (Data Protection Act 1984, 12 July 1984, Her Majesty\u2019s Stationery Office, C. 30 9\/84 CCP). Belgium: Act of 8 dec. 1992, M.B. 18 march 1993."},{"key":"1_CR21","unstructured":"A. Van Mensel, \u201cDe bescherming van fabricagegeheimen of Technische know-how naar Belgisch recht\u201d, R.W., 1981\u201382 kol. 2001, op kol. 2009."},{"key":"1_CR22","unstructured":"A. Lucas, La protection des cr\u00e9ations industrielles abstraites, Cit\u00e9e (Paris) 1978, p. 230 nr. 358."},{"key":"1_CR23","unstructured":"Weiss, E., \u201cTelecommunications policy: the users need for telecommunication systems. A review of trends in Europe\u201d in Communication regulation and international business, Proceedings of a Workshop held at the I.M.I., April 1983, J.F. Rada, G.R. Pipe, ed., 1984, p. 136). E.g. what is the effect of the privatisation of B.T. ? Beesley M.E., \u201cLiberalisation of the use of British Telecommunications Network\u201d, Department of Industry, Report to the Secretary of State, London, 1981. France: Loi, n\u2134 84, 939 du 23 octobre 1984, J.O., 25 octobre 1984, p.3335."},{"key":"1_CR24","unstructured":"J. De Houwer, Privacy en grensoverschrijdend dataverkeer, in: Soften Hard, ware het niet om de fraude, IUS, nr. 7 (1985) pg. 92. Denmark: The Danish Private Registers etc. Act N\u2134 293, 8 June 1978. The Danish Public Authorities\u2019 Registers Act N\u2134 294, 8 June 1978. France: Loi relative \u00e0 l\u2019informatique, aux fichiers et aux libert\u00e9s, N\u2134 78-17, 6 January 1978, J.O., 7 January 1978. Israel: Protection of Privacy Law, 5741-1981 van 23 February 1981, Sefer Ha-Chukkim N\u2134 1011 of the 5th Adar Bet, 5741 (AA March 1981). Iceland: Act concerning the systematic recording of personal data. Wet n\u2134 63 of May 25, 1981. Luxembourg: Loi du 31 mars 1979 r\u00e9glementant l\u2019utilisation des donn\u00e9es nominatives dans les traitements informatiques, M\u00e9m. A 1979, P. 582. Norway: Act relating to personal data registers etc., Wet n\u2134 48 van 9 juni 1978. Austria: Datenschutzgesetz D.S.G., October 18, 1978, Bundesgesetzblatt 1978, November 28, 1978, 3619-3631. U.K.: Data Protection Act 1984, chapter 35, July 12, 1984, Her Majesty\u2019s Stationary Office, C30 9\/84 CCP. West-Germany: Bundesdatenschutzgesets, January 27, 1977, BGBI, I S.201. Sweden: Data Act (1973: 289)."},{"key":"1_CR25","unstructured":"OECD, DSTI\/ICCP\/84.22 (1985) p. 53."},{"key":"1_CR26","unstructured":"Council of Europe, Computer-related crime, Strasbourg, 1990, Appendix I, N\u2134 Ia and b."},{"key":"1_CR27","unstructured":"B. Spruyt (B. De Schutter, collaborating), Grensoverschrijdende Informaticacriminaliteit en de Europese strafrechtelijke samenwerking, Kluwer (Antwerpen), 1989, 163 p."}],"container-title":["Lecture Notes in Computer Science","State of the Art in Applied Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49248-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T02:20:43Z","timestamp":1556936443000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49248-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540654742","9783540492481"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/3-540-49248-8_1","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1998]]}}}