{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:35:01Z","timestamp":1725528901996},"publisher-location":"Wiesbaden","reference-count":18,"publisher":"Vieweg+Teubner","isbn-type":[{"type":"print","value":"9783834806604"},{"type":"electronic","value":"9783834892836"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-8348-9283-6_11","type":"book-chapter","created":{"date-parts":[[2009,3,6]],"date-time":"2009-03-06T16:17:39Z","timestamp":1236356259000},"page":"108-118","source":"Crossref","is-referenced-by-count":0,"title":["Governmental Control of the Internet in addressing Law Enforcement and National Security"],"prefix":"10.1007","author":[{"given":"Murdoch","family":"Watney","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Barlow, John Perry: A declaration of the Independence of Cyberspace. In: http:\/\/www.islandone.org\/Politics\/DeclarationOfIndependance.html (August 1, 2007)."},{"key":"11_CR2","unstructured":"Baumann, Michael: Cyberattacks engulf Kremlin\u2019s critics, left and right. In: http:\/\/www.ioltechnology,co.za\/article_print.php?iArticleID=5017802 January 24, 2008)."},{"key":"11_CR3","unstructured":"Bowrey, Kathy: Law and Internet Culture. Cambridge University Press, 2005, p. 8\u20139, 194\u2013197."},{"key":"11_CR4","unstructured":"Burney, Brett: The Concept of Cybercrime \u2014 Is it right to analogize a physical crime to a cybercrime? The rise of the Internet. In: http:\/\/www.cybercrimes.net\/Virtual\/Burney\/pages3.html (February 12, 2002)"},{"key":"11_CR5","first-page":"161","volume-title":"Digital Anonymity and the Law","author":"I. Carr","year":"2003","unstructured":"Carr, Indira: Anonymity, the Internet and Criminal Law Issues. In: C. Nicoll, J.E.J. Prins and M.J.M. van Dellen (Eds): Digital Anonymity and the Law. T M C Asser Press, The Hague, 2003, p. 161\u2013188."},{"key":"11_CR6","unstructured":"Carvajal, Doreen: Europe poised to bolster web shield. In: http:\/\/yaleglobal.yale.edu\/display.article?id=10598 (June 15, 2008)."},{"key":"11_CR7","unstructured":"Ferguson, Tim: Nato fires up cyber defences. In: http:\/\/software.silicon,com\/securty\/0,39024655,39223469,00.htm (June 15, 2008)."},{"key":"11_CR8","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1093\/oso\/9780195152661.001.0001","volume-title":"Who controls the Internet","author":"J. Goldsmith","year":"2006","unstructured":"Goldsmith, Jack and Wu, Tim: Who controls the Internet. Oxford University Press, USA, 2006, p. 73, 81, 84, 103, 145, 163\u2013167."},{"key":"11_CR9","unstructured":"Heath, Nick: Nato: Cyber terrorism \u201cas dangerous s missile attack\u201d. In: http:\/\/www.crime-research.org\/news\/10.03.2008\/3241\/ (March 19, 2008)."},{"key":"11_CR10","first-page":"75","volume-title":"Internet Law and Policy","author":"J. Hiller","year":"2002","unstructured":"Hiller, Janine and Cohen, Ronnie: Internet Law and Policy. Pearson Education, Inc., New Jersey, 2002, p. 75\u201376, 95, 98\u2013100, 169, 170\u2013171."},{"key":"11_CR11","doi-asserted-by":"crossref","first-page":"x","DOI":"10.4018\/978-1-59140-583-2","volume-title":"Managerial Guide for Handling Cyber-terrorism and Information Warfare","author":"L. Janczewski","year":"2005","unstructured":"Janczewski, Lech and Colarik, Andrew: Managerial Guide for Handling Cyber-terrorism and Information Warfare, Idea Group Publishing, USA, 2005, p. x, 43, 222\u2013225."},{"key":"11_CR12","unstructured":"Jones, Huw: Estonia calls for EU law to ban cyber attacks. In: http:\/\/www.crime-research.org\/news\/12\/03.2008\/3248\/ (March 19, 2008)."},{"key":"11_CR13","unstructured":"Ryan, Johny: Outbreak of iWar imminent. In: Commercial Crime Journal, March 2008, p. 10\u201311."},{"key":"11_CR14","first-page":"9","volume-title":"Digital Crime and Digital Terrorism","author":"R.W. Taylor","year":"2006","unstructured":"Taylor, R.W., Caeti, T.J., Loper, T.J., Fritsch, E.J. and Liederbach, J: Digital Crime and Digital Terrorism, Pearson Education, Inc, USA, 2006, p. 9\u201315, 27, 43, 378\u2013379."},{"key":"11_CR15","unstructured":"Tribe, Laurence. H: The Constitution in Cyberspace: Law and Liberty Beyond the Electronic Frontier. Presented at the first Conference on Computers, Freedom and Privacy, held in 1991. In: http:\/\/www.fiu.edu\/\u223cmizrachs\/CyberConst.html (March 22, 2008)."},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Warren, Jim: Introduction. Presented at the first Conference on Computers, Freedom and Privacy, held in 1991. IEEE Computer Society. In: http:\/\/www.cpsr.org\/conferences\/cfp91\/intro.html\/view (March 21, 2008).","DOI":"10.1109\/CCFP.1991.664750"},{"issue":"1","key":"11_CR17","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1504\/IJESDF.2007.013591","volume":"1","author":"M. Watney","year":"2007","unstructured":"Watney, Murdoch: State Surveillance of the Internet: human rights infringement or e-security mechanism? International Journal of Electronic Security and Digital Forensics, Vol. 1, No.1, 2007, p. 42\u201354.","journal-title":"International Journal of Electronic Security and Digital Forensics"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Watney, Murdoch: The Legal Conflict between Security and Privacy in Addressing Crime and Terrorism on the Internet\u2019 In: N. Pohlmann, H. Reiner and W. Schneider ISSE\/Secure 2007 Securing Electronic Business Processes, Vieweg, Wiesbaden, p. 26\u201337.","DOI":"10.1007\/978-3-8348-9418-2_3"}],"container-title":["ISSE 2008 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-8348-9283-6_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,2]],"date-time":"2021-10-02T20:44:25Z","timestamp":1633207465000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-8348-9283-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783834806604","9783834892836"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-8348-9283-6_11","relation":{},"subject":[]}}