Limit this search to....

Computer Misuse: Response, Regulation and the Law
Contributor(s): Fafinski, Stefan (Author)
ISBN: 1843923793     ISBN-13: 9781843923794
Publisher: Willan Publishing (UK)
OUR PRICE:   $52.20  
Product Type: Paperback - Other Formats
Published: April 2009
Qty:
Annotation: This book is concerned with the nature of computer misuse and the legal and non-legal responses to it. It explores what is meant by the term 'computer misuse' and charts its emergence as a problem as well as its expansion in parallel with the continued progression in computing power, networking, reach and accessibility. It considers the resulting technological, social and commercial risks which arise and the consequences of the current legal regulation of computer misuse. It evaluates the extent to which the criminal law should seek to regulate the development and use of new technology and the implications of this on the content and operation of the criminal law. The book includes an introduction to theories relating to risk and governance, before broadening the discussion of potential means of regulation beyond the criminal law to encompass civil law as well as non-legal means of governance including Internet users and user-groups, Internet service providers, corporations, the police
Additional Information
BISAC Categories:
- Social Science | Criminology
Dewey: 364.168
LCCN: 2009287914
Physical Information: 0.74" H x 6.14" W x 9.21" (1.09 lbs) 352 pages
 
Descriptions, Reviews, Etc.
Publisher Description:

This book is concerned with the nature of computer misuse and the legal and extra-legal responses to it. It explores what is meant by the term 'computer misuse' and charts its emergence as a problem as well as its expansion in parallel with the continued progression in computing power, networking, reach and accessibility. In doing so, it surveys the attempts of the domestic criminal law to deal with some early manifestations of computer misuse and the consequent legislative passage of the Computer Misuse Act 1990.

This book will be of interest to students of IT law as well as to sociologists and criminologists, and those who have a professional concern with preventing computer misuse and fraud.