{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:04:42Z","timestamp":1725663882508},"publisher-location":"Berlin, Heidelberg","reference-count":65,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540573418"},{"type":"electronic","value":"9783540480747"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1993]]},"DOI":"10.1007\/3-540-57341-0_52","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T12:52:08Z","timestamp":1330260728000},"page":"1-19","source":"Crossref","is-referenced-by-count":0,"title":["Trends in the fight against computer-related delinquency"],"prefix":"10.1007","author":[{"given":"B.","family":"Schutter","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,29]]},"reference":[{"unstructured":"It seems that every major writer in the field handles its own terms. See: SCHJ\u00d8LBERG, \u201cComputers and penal legislation\u201d, Oslo, 1983, p. 3; SOLARZ, \u201cComputer technology and computer crime\u201d, Stockholm, 1981, p. 23. The computer is sometimes the instrument or target of an act (VON ZUR MUHLEN), \u201cComputer Kriminalit\u00e4t\u201d, Berlin 1972, p. 17); The specific purpose (PARKER, D.B., \u201cComputer Abuse Assessment\u201d, Washington, 1975, p. 3); Bequai only goes for \u201cpart of larger forms of criminal activity: white collar crime\u201d (BEQUAI, Computer crime, Lexington, 1978, p.1).","key":"1_CR1"},{"unstructured":"OECD-ICCP, Computer related crime \u2014 analysis of legal policy, Paris (1986), p. 7.","key":"1_CR2"},{"unstructured":"See U.K.: A. NORMAN, \u201cComputer Insecurity\u201d, London, 1983 and K. WONG & FARQUHAR, W., \u201cComputer related Fraud Casebook\u201d, BIS Applied Systems, Ltd., Manchester, March 1983, 106 p. See also: Australia's information at the Caulfield Institute of Technology, Computer-Abuse Research Bureaus (CIT-CARB); Japan, National Police Department, \u201cWhite paper on computer crime\u201d.","key":"1_CR3"},{"key":"1_CR4","volume-title":"Crime by computer","author":"D. B. Parker","year":"1976","unstructured":"Within SRI, D. Parker's publications are the more important ones: D.B. PARKER, \u201cCrime by computer\u201d, New York, Charles Scribner's and Sons, 1976, 308 p."},{"key":"1_CR5","volume-title":"Computer abuse","author":"D. B. Parker","year":"1973","unstructured":"D.B. PARKER and S.B. NYCUM, \u201cComputer abuse\u201d, U.S. Department of Commerce, Springfield, NTIS, 1973, 131 p."},{"unstructured":"D.B. PARKER, \u201cComputer Security Management\u201d, Prentice Hall, 1981, 308 p.","key":"1_CR6"},{"key":"1_CR7","volume-title":"Fighting Computer Crime","author":"D. B. Parker","year":"1983","unstructured":"D.B. PARKER, \u201cFighting Computer Crime\u201d, New York, Charles Scribner's and Sons, 1983, 352 p."},{"unstructured":"Drs. J.C. VON DIJK R.A., \u201cComputercriminaliteit\u201d, Ars Aequi Libri (ser. Strafrecht en criminologie, dl. 3), p. 203, 1984; Ph. JOST, \u201cLes pillards d'ordinateur d\u00e9fient le FBI\u201d, VSD, 27 jan. 1983, p. 10.","key":"1_CR8"},{"unstructured":"Local government Audit Inspectorate \u2014 Department of the Environment, Computer Fraud Survey Report, Crown copyright, July 1981, 33 p.","key":"1_CR9"},{"unstructured":"Scottish Law Commission, Consultative Memorandum no. 68, Computer Crime, (March 1986), p. 1.","key":"1_CR10"},{"key":"1_CR11","volume-title":"The Equity Funding Papers, the anatomy of a fraud","author":"L. J. Seidler","year":"1977","unstructured":"L.J. SEIDLER, F. ANDREWS and M.J. EPSTEIN: \u201cThe Equity Funding Papers, the anatomy of a fraud\u201d, New York (J. Wiley and Sons, Inc., 1977)."},{"unstructured":"\u201c10.2 Million $ theft may yield profit for victim\u201d, EDCAPS, Jan. '79, p. 11\u201312, Aug. '79, p. 14\u201315.","key":"1_CR12"},{"unstructured":"Whiz-kids managed to establish a link with a private network of the General Telephone Electronic Telenet.","key":"1_CR13"},{"key":"1_CR14","first-page":"32","volume":"nr. 2264","author":"S. Herten","year":"1984","unstructured":"S. HERTEN, \u201cComputercriminaliteit: er is nog toekomst in de toekomst\u201d, Humo, 26 Jan. 1984, nr. 2264, p. 32.","journal-title":"Humo"},{"unstructured":"S. O'DY, \u201cInformatique: La chasse aux perceurs de codes\u201d, L'express, 9 March 1984, p. 74\u201375.","key":"1_CR15"},{"unstructured":"L'express, 26 April 1980, L'informatique nouvelle, Sept. 1980, p. 25.","key":"1_CR16"},{"unstructured":"Science et Vie micro, Dec. 1983, p. 52. J. BLOOMBECKER, \u201cInternational Computer Crime: Where Terrorism and Transborder Data Flow Meet\u201d, Computers & Security, 1982, p. 41\u201353.","key":"1_CR17"},{"unstructured":"G. LEVEILLE, \u201cData base security systems, protecting the source\u201d, Today's Office, Oct. 1982, p. 62.","key":"1_CR18"},{"key":"1_CR19","first-page":"32","volume-title":"Computer abuse Assessment","author":"D. B. Parker","year":"1975","unstructured":"D.B. PARKER, \u201cComputer abuse Assessment\u201d, Washington D.C. (National Science Foundation), 1975, p. 32."},{"unstructured":"B. ALLAN, \u201cThe biggest computer frauds: lessons for CPA's\u201d, The Journal of Accountancy, May 1977, p. 52\u201362.","key":"1_CR20"},{"unstructured":"U. SIEBER, ???Gefahr und Abwehr der Computercriminalit??t???, Betriebs-Berater 1982, p. 1433; A. NORMAN, ???Computer Insecurity???, London (1983);","key":"#cr-split#-1_CR21.1"},{"unstructured":"US Department of Justice, Computer Crime, Criminal Justice Resource Manual, Washington, 1979.","key":"#cr-split#-1_CR21.2"},{"unstructured":"We refer to the work of the OECD-ICCP ad hoc group of experts on computer-related criminality (1984\u201385) and the Council of Europe's Select Committee of experts on Computer-related Crime (CDPC-PC-R-CC) (1985\u20131989).","key":"1_CR22"},{"unstructured":"See e.g. the 8 categories of the Scottish Law Commission, including a.o. eavesdropping on a computer. Supra note 6, p. 18.","key":"1_CR23"},{"unstructured":"As to the criminal law initiative, one can only refer to the excellent study of Miss. M. Briat and Prof. U. Sieber leading to the OECD publication on computer related crime. OECD-ICCP, Computer related crime \u2014 analysis of legal policy, Paris 1986, p. 79.","key":"1_CR24"},{"unstructured":"OECD Guidelines governing the Protection of Privacy and Transborder Flows of Personal Data, 1980.","key":"1_CR25"},{"unstructured":"1981, in force Oct. 1, 1985, ratified by France, Austria, Denmark, Germany, Luxembourg, Norway, Spain, Sweden, U.K.","key":"1_CR26"},{"unstructured":"U. SIEBER, The \u201cinternational handbook on computer crime\u201d, West Chicester (1986) p. 94 et seq.","key":"1_CR27"},{"unstructured":"Council Directive of Dec. 16, 1986 on the legal protection of topografics of semi-conductor products, COM (86).","key":"1_CR28"},{"unstructured":"See e.g. the call for proposals in the field of data processing (85\/C 204\/02) O.J. 13.8.85, no. C 204\/2, including the item of a data protective guide for European users.","key":"1_CR29"},{"unstructured":"E.g. Denmark: (the Danish Private registers etc. Act No. 293, 8 June 1978 and the Danish Public Authorities' Registers Act, No. 294 of 8 June 1978).","key":"1_CR30"},{"unstructured":"France: (La loi relative d l'informatique, aux fichiers et aux libert\u00e9s, no. 78-17, 6 January 1977, B.G.B.I., I S 201).","key":"1_CR31"},{"unstructured":"Luxembourg: (Loi du 31 mars 1979 r\u00e9glementant l'utilisation des donn\u00e9es nominatives dans les traitements informatiques M\u00e9m. 1 1979, p. 582).","key":"1_CR32"},{"unstructured":"United Kingdom: (Data Protection Act 1984, 12 July 1984, Her Majesty's Stationery Office, C. 30 9\/84 CCP).","key":"1_CR33"},{"unstructured":"Model Provisions on the Protection of Computer Software, World Intellectual Property Organization, Gen\u00e8ve, 1978.","key":"1_CR34"},{"unstructured":"A. VAN MENSEL, \u201cDe bescherming van fabricagegeheimen of technische knowhow naar Belgisch recht\u201d, R.W., 1981\u201382 kol. 2001, op kol. 2009.","key":"1_CR35"},{"key":"1_CR36","first-page":"230","volume":"no. 358","author":"A. Lucas","year":"1978","unstructured":"A. LUCAS, \u201cLa protection des cr\u00e9ations industrielles abstraites\u201d, Cit\u00e9e (Paris) 1978, p. 230, no. 358.","journal-title":"Cit\u00e9e (Paris)"},{"unstructured":"E. WEISS, \u201cTelecommunications policy: the users need for telecommunication systems. A review of trends in Europe\u201d, in Communication regulation and international business, Proceedings of a Workshop held at the I.M.I., April 1983, J.F. RADA, G.R. PIPE, ed., 1984, p. 136. E.g. what is the effect of the privatisation of B.T.? M.E. BEESLEY, \u201cLiberalisation of the use of British Telecommunications Network\u201d, Department of Industry, Report to the Secretary of State, London, 1981. France: Loi, no. 84, 939 du 23 octobre 1984, J.O., 25 octobre 1984, p. 3335.","key":"1_CR37"},{"unstructured":"This is the case e.g. in Belgium and apparently also in Japan. Only at academic research level initiatives are under way to adapt the legislation.","key":"1_CR38"},{"unstructured":"A solution favoured by countries such as Austria, Finland, Denmark, or Greece.","key":"1_CR39"},{"unstructured":"E.g. the U.S.A. Counterfeit Access Device and Computer Fraud and Abuse Act (1984), The Swedish Data Act of 1973.","key":"1_CR40"},{"unstructured":"E.g. the Danish Penal Code Amendment Act of June 6, 1985; the Canadian Criminal Law Amendment Act of 1985; the French law of 1988.","key":"1_CR41"},{"unstructured":"Revisions are under way in o.a. Belgium, Switzerland, Finland, Norway.","key":"1_CR42"},{"unstructured":"OECD \u2014 Information Computer Communications Policy, vol. 10. Computer \u2014 related crime: analysis of legal policy, Paris (1986), 71 p.","key":"1_CR43"},{"unstructured":"COE \u2014 Computer related crime (final report of the European Committee on Crime Problems, Strasbourg, 1990, 124 p.","key":"1_CR44"},{"unstructured":"E.g. U.K. Computer Misuse Act, August 1990.","key":"1_CR45"},{"unstructured":"FRANCE: Loi no. 88-19 du 5 janvier 1988 relative \u00e1 la fraude informatique, J.O., 6 janvier 1988, p. 231.","key":"1_CR46"},{"key":"1_CR47","first-page":"92","volume":"nr. 7","author":"J. Houwer De","year":"1985","unstructured":"J. DE HOUWER, \u201cPrivacy en grensoverschrijdend dataverkeer\u201d, in: Soft-en Hard, ware het niet om de fraude, IUS, nr. 7 (1985) p. 92.","journal-title":"IUS"},{"unstructured":"DENMARK: The Danish Private Registers etc. Act No. 293, 8 June, 1978. The Danish Public Authorities' Registers Act No. 294, 8 June, 1978.","key":"1_CR48"},{"unstructured":"FRANCE: Loi relative \u00e1 l'informatique, aux fichiers et aux libert\u00e9s, No. 78-17, 6 January, 1978, J.O., 7 January, 1978.","key":"1_CR49"},{"unstructured":"ISRAEL: Protection of Privacy Law, 5741 \u2014 1981 of 23 February, 1981, Sefer Ha-Chukkim No. 1011 of the 5th Adar Bet, 5741 (AA March 1981).","key":"1_CR50"},{"unstructured":"ICELAND: Act concerning the systematic recording of personal data, Law nr. 63 of 25 May 25, 1981.","key":"1_CR51"},{"unstructured":"LUXEMBOURG: Loi du 31 mars 1979 r\u00e9glementant l'utilisation des donn\u00e9es nominatives dans les traitements informatiques, M\u00e9m. A 1979, p. 582.","key":"1_CR52"},{"unstructured":"NORWAY: Act relating to personal data registers etc., Law nr. 48 of 9 June, 1978.","key":"1_CR53"},{"unstructured":"AUSTRIA: Datenschutzgesetz D.S.G., October 18, 1978, Bundesgesetzblatt 1978, November 28, 1978, 3619\u20133631.","key":"1_CR54"},{"unstructured":"U.K.: Data Protection Act 1984, chapter 35, July 12, 1984, Her Majesty's Stationary Office, C30 9\/84 CCP.","key":"1_CR55"},{"unstructured":"WEST GERMANY: Bundesdatenschutzgesetz, January 27, 1977, BGBI, I S.201.","key":"1_CR56"},{"unstructured":"SWEDEN: Data Act (1973: 289).","key":"1_CR57"},{"unstructured":"Even though only a proposal, the Federal Computer System Act proposal (1984) acted as an example for some state laws, e.g. in California (January 1, 1985) Virginia Computer Crimes Act, Senate Bill no. 347, March 7, 1984.","key":"1_CR58"},{"unstructured":"OECD, DSTI\/ICCP\/84.22 (1985) p. 53.","key":"1_CR59"},{"unstructured":"D. REMER, \u201cLegal Care for your software\u201d, Gower, ershot 1984, 272 p.","key":"1_CR60"},{"key":"1_CR61","volume-title":"The Patentability of Computer Software","author":"W. Hanneman","year":"1985","unstructured":"W. HANNEMAN, \u201cThe Patentability of Computer Software\u201d, Kluwer, Deventer, 1985, 258 p."},{"unstructured":"N. FREED, \u201cSoftware protection: Introductory observations on the study sponsored by the National Commission on new technological uses of Copyright Works\u201d, Jurimetrice Journal, 1977\u20131978, p. 352.","key":"1_CR62"},{"unstructured":"Council of Europe, Computer-related crime, Strasbourg, 1990, Appendix I, No. Ia and b.","key":"1_CR63"},{"key":"1_CR64","volume-title":"Grensoverschrijdende Informatica-criminaliteit en de Europese strafrechtelijke samenwerking","author":"B. Spruyt","year":"1989","unstructured":"B. SPRUYT (B. DE SCHUTTER, collaborating), \u201cGrensoverschrijdende Informatica-criminaliteit en de Europese strafrechtelijke samenwerking\u201d, Kluwer (Antwerpen), 1989, 163 p."}],"container-title":["Lecture Notes in Computer Science","Computer Security and Industrial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-57341-0_52.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:03:56Z","timestamp":1619571836000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-57341-0_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993]]},"ISBN":["9783540573418","9783540480747"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/3-540-57341-0_52","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1993]]}}}