{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T14:29:03Z","timestamp":1745850543667},"reference-count":59,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[1992,10,1]],"date-time":"1992-10-01T00:00:00Z","timestamp":717897600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1992,10]]},"DOI":"10.1016\/0167-4048(92)90183-r","type":"journal-article","created":{"date-parts":[[2002,10,11]],"date-time":"2002-10-11T13:56:18Z","timestamp":1034344578000},"page":"508-517","source":"Crossref","is-referenced-by-count":1,"title":["Breach of system security and theft of data: Legal aspects and preventive measures"],"prefix":"10.1016","volume":"11","author":[{"given":"Fran\u00e7oise","family":"Gilbert","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0167-4048(92)90183-R_BIB1","article-title":"Poor Security Made DOD Easy Hacker Prey","volume":"92","year":"1991","journal-title":"COMPUTERWORLD"},{"key":"10.1016\/0167-4048(92)90183-R_BIB2","doi-asserted-by":"crossref","unstructured":"U.S. v. Riggs, N.D. I11., No. 90-CR-0070 (5 June, 1990).","DOI":"10.1016\/0197-0070(90)90388-I"},{"key":"10.1016\/0167-4048(92)90183-R_BIB3","series-title":"Computer Viruses Rank Low as Security Problem Crime Data Report Indicates","volume":"8","year":"1990"},{"issue":"99","key":"10.1016\/0167-4048(92)90183-R_BIB4","article-title":"Hackers Draw Stiff Sentences","volume":"1","year":"1990","journal-title":"COMPUTERWORLD"},{"key":"10.1016\/0167-4048(92)90183-R_BIB5","unstructured":"Revlon Inc, v. Logisticon, Inc., No. 705933, Cal. Super. Ct., Santa Clara County, California."},{"key":"10.1016\/0167-4048(92)90183-R_BIB6","article-title":"Hacker Sentenced to a Prison Term","volume":"12","year":"1991","journal-title":"COMPUTERWORLD"},{"key":"10.1016\/0167-4048(92)90183-R_BIB7","unstructured":"18 U.S.C. 1030 (1991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB8","doi-asserted-by":"crossref","unstructured":"15 U.S.C.278(g)(3) & (4) and 40 U.S.C.795(d) (1991).","DOI":"10.1016\/0045-7949(91)90246-I"},{"key":"10.1016\/0167-4048(92)90183-R_BIB9_1","article-title":"Prison Term for first U.S. Hacker-law Convict","volume":"1","year":"1989","journal-title":"COMPUTERWORLD"},{"key":"10.1016\/0167-4048(92)90183-R_BIB10","unstructured":"U.S. v. Morris, 928 F.2d 504 (2nd Cir. 1991); U.S. App. Pndg."},{"key":"10.1016\/0167-4048(92)90183-R_BIB12_1","article-title":"Justice Revs Up Battle on Computer Crime","volume":"4","year":"1991","journal-title":"COMPUTERWORLD"},{"key":"10.1016\/0167-4048(92)90183-R_BIB12_2","article-title":"Justice Unit Spurred on by Cross-Border Hackers","volume":"6","year":"1991","journal-title":"COMPUTERWORLD"},{"issue":"4","key":"10.1016\/0167-4048(92)90183-R_BIB13","article-title":"Morris Case Impact Slight","volume":"1","year":"1991","journal-title":"COMPUTERWORLD"},{"key":"10.1016\/0167-4048(92)90183-R_BIB14","doi-asserted-by":"crossref","unstructured":"See, e.g., 56 Fed. Reg. 5983 (14 February, 1991).","DOI":"10.1016\/B978-1-4831-0607-6.50009-0"},{"key":"10.1016\/0167-4048(92)90183-R_BIB15","unstructured":"H.R. 55, 101st Congress, 1st Session.4"},{"key":"10.1016\/0167-4048(92)90183-R_BIB16","unstructured":"H.R. 287, 101st Congress, 1st Session."},{"key":"10.1016\/0167-4048(92)90183-R_BIB17","unstructured":"H.R. 3524, 101st Congress, 1st Session."},{"key":"10.1016\/0167-4048(92)90183-R_BIB18","unstructured":"47 U.S.C.\u00f1223 (1991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB19","unstructured":"S.2476, 101st Congress, 2nd Session"},{"key":"10.1016\/0167-4048(92)90183-R_BIB20","unstructured":"S. 1322, 102nd Congress, 1st Session."},{"key":"10.1016\/0167-4048(92)90183-R_BIB21","unstructured":"Ill. Rev. Stat., ch. 38, 16D, (199)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB22","unstructured":"Ill. Rev. Stat. ch. 38, 16D-3 (1991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB23","unstructured":"Ill. Rev. Stat. ch. 38, 16D-3(a)(4) and 16D- 3(c) (1991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB24","unstructured":"Ill. Rev. Stat. ch. 38, 16D-6 (1991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB25","unstructured":"Ill. Rev. Stat. ch. 38, 16D-6 (1991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB26","series-title":"New York Penal Law","year":"1991"},{"key":"10.1016\/0167-4048(92)90183-R_BIB27","series-title":"New York Penal Law","year":"1991"},{"key":"10.1016\/0167-4048(92)90183-R_BIB28","series-title":"New York Penal Law","year":"1991"},{"key":"10.1016\/0167-4048(92)90183-R_BIB29","series-title":"New York Penal Law","year":"1991"},{"key":"10.1016\/0167-4048(92)90183-R_BIB30","volume":"502","year":"1991"},{"key":"10.1016\/0167-4048(92)90183-R_BIB31","volume":"502","year":"1991"},{"key":"10.1016\/0167-4048(92)90183-R_BIB32","volume":"502","year":"1991"},{"key":"10.1016\/0167-4048(92)90183-R_BIB33","unstructured":"285 Cal. Rptr. 591 (4th App. Dist. 1991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB34","unstructured":"Id."},{"key":"10.1016\/0167-4048(92)90183-R_BIB35","doi-asserted-by":"crossref","unstructured":"U.S. v. Riggs, N.D. I11., No. 90-CR-0070 (June 5, 1990).","DOI":"10.1016\/0197-0070(90)90388-I"},{"key":"10.1016\/0167-4048(92)90183-R_BIB36","unstructured":"18 U.S.C. 1362 (1991).3"},{"key":"10.1016\/0167-4048(92)90183-R_BIB37","unstructured":"18 U.S.C. 1343 (1991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB38","unstructured":"15 U.S.C. 1693 et seq. (1991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB39","unstructured":"15 U.S.C. 1693n (1991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB40","unstructured":"18 U.S.C. 2511 (1991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB41","unstructured":"18 U.S.C. 2511 (1991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB42","unstructured":"18 U.S.C. 2701 (1991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB43","unstructured":"18 U.S.C. 2520 and 2707 991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB44","unstructured":"Ill. Rev. Stat., ch. 38, 15-1 (1991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB45","doi-asserted-by":"crossref","unstructured":"Ill. Rev. Stat. ch. 17 5930.2. (1991).","DOI":"10.1300\/J066v02n02_03"},{"key":"10.1016\/0167-4048(92)90183-R_BIB46","series-title":"New York Penal Law","year":"1991"},{"key":"10.1016\/0167-4048(92)90183-R_BIB47","unstructured":"17 U.S.C. \u00f1501 et seq. (1991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB48","unstructured":"17 U.S.C. 501 (1991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB49","unstructured":"17 U.S.C. \u00f1502 (1991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB50","unstructured":"17 U.S.C. \u00f1503 (1991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB51","unstructured":"17 U.S.C. \u00f1504 (1991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB52","unstructured":"17 U.S.C. \u00f1506 (1991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB53","doi-asserted-by":"crossref","unstructured":"Ill. Rev. Stat. ch. 140, 351 et seq. (1991).","DOI":"10.1038\/351140a0"},{"key":"10.1016\/0167-4048(92)90183-R_BIB54","unstructured":"Ill. Rev. Stat. ch. 140, 353-4 (1991)."},{"key":"10.1016\/0167-4048(92)90183-R_BIB55_1","first-page":"80","volume":"60","year":"1991","journal-title":"C.C.H. Guide to Computer Law"},{"key":"10.1016\/0167-4048(92)90183-R_BIB56","article-title":"Swapmeet","volume":"8","year":"1992","journal-title":"COMPUTERWORLD"},{"key":"10.1016\/0167-4048(92)90183-R_BIB57","article-title":"Despite Disasters, PC Users Spurn Anti-Virus Inoculation","volume":"8","year":"1991","journal-title":"COMPUTERWORLD"},{"key":"10.1016\/0167-4048(92)90183-R_BIB58","article-title":"Shrink-Wrapped Viruses on Rise","volume":"8","year":"1992","journal-title":"COMPUTERWORLD"},{"key":"10.1016\/0167-4048(92)90183-R_BIB59","article-title":"Virus on Computer Disks Spurs Elek-Tek to Order Recall","year":"1992","journal-title":"Chicago Tribune, Business"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016740489290183R?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016740489290183R?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,4,23]],"date-time":"2023-04-23T22:09:40Z","timestamp":1682287780000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/016740489290183R"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,10]]},"references-count":59,"journal-issue":{"issue":"6","published-print":{"date-parts":[[1992,10]]}},"alternative-id":["016740489290183R"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(92)90183-r","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1992,10]]}}}