Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Jahankhani, Hamid (2007)
Languages: English
Types: Article

Classified by OpenAIRE into

The menace of organised crime and terrorist activity grows ever more sophisticated as the ability to enter, control and destroy our electronic and security systems grows at an equivalent rate. Cyber-crime (organised criminal acts using microchip and software manipulation) is the world's biggest growth industry and is now costing an estimated $220 billion loss to organisations and individuals, every year. There are serious threats to nations, governments, corporations and the most vulnerable group of all, individuals. Cyber-crime combines the same methods of traditional crime identifying targets, using surveillance and psychological profiling but has added-in levels of duplicity in that the perpetrator need never actually be at the scene of the crime. Indeed the traditional idea of a criminal gang is meaningless in that the unit may exist but each member resides on a different continent and never needs to physically meet. The types of attack individuals face include confidence-trick telephone calls or actual encounters calculated to extract bank or personal details, computer spyware that opens on accessing the internet, enticing users with offers of non-existent free gifts while copying confidential files and programmes that can infiltrate networks, operating within them undetected, ultimately causing them to crash. Information and services provided on the internet which can be utilised by any person(s) with access bring to fore the concept of legislations. Thus cyber laws and legislations refers to those guidelines and regulations put in place to ensure that information and services so displayed and acquired on the internet meet a standard within the e-society. This paper aims to review these legislations and showcasing their impact and relevance to the society for which they are formulated. Finally, the question whether the current internet legislation is adequate to protect society is also raised.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Akdeniz, Y. (2001) 'Internet content regulation: UK Govt and the control of internet content', Published on Computer Law and Security Report, Vol. 17, No. 5.
    • British Medical Journal (1998) Dangers of Advertising Drugs on the Internet, 16 October.
    • Buck, S.P. (1996) 'Electronic commerce - would, could, and should you use current internet payment mechanisms?' Internet Research, Vol. 6, pp.5-18.
    • Children's Internet Protection Act of 2000 (CHIPA) (2003) 47 U.S.C. sections 254 (h) and (l) 2000.
    • Children's Online Privacy Protection Act of 1998 (COPPA) (2003) 15 U.S.C. sections 6501-6506 (1998).
    • Council of the European Communities (1992) 'Directive 92/28/EEC of 31st March 1992 on the advertising of medicinal products for human use', Official Journal European Communities L113, pp.13-18.
    • Cyber rights (1996) 'Letter from the Metropolitan Police to UK ISPs', Available at: www.cyber-rights.org/documents/themet.htm, August 1996, Accessed on May 2003.
    • eMarketer (2002) 'Advertising spending', Available at: www.eMarketer.com. Accessed on. April 2003.
    • Girasa, R.J. (2002) Cyberlaw, National and International Perspectives, New Jersey, USA: Pearson Education Inc.
    • Jahankhani, H. and Alexis, S.A. (2002) 'E-commerce business practices in the EU', International Conference on Enterprise Information Systems, ICEIS 2002, Enterprise Information Systems IV, Kluwer Academic Publishers, pp.268-276, ISBN 1402010869.
    • Jobber, D. (2001) Principles and Practice of Marketing, 3rd edition, UK: McGrawHill.
    • Kotler, P. (2003) Marketing Management, 11th edition, UK: Prentice Hall.
    • Pope-Davis, D.B. and Twing, J.S. (1991) 'The effects of age, gender, and experience on measures of attitude regarding computers', Computers in Human Behaviour, Vol. 7, No. 4, pp.333-339.
    • Sarkar, P.K. and Cybulski, J.L. (2002) 'Understanding a product line of electronic business systems', Working Paper 2002/17, School of Information Systems, Deakin University.
    • Strossen, N. (1999) ACLU Joins Protest Against Global Internet Censorship Plans ACLU Press Release, 9 September.
    • Zdrojeski, R.W., Hoffman, L.D. and Dames, J. (2002) 'United States signs treaty on cyber-crime', Internet Law Journal, Available at: www.internetlawjournal.com.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article