share_book
Envoyer cet article par e-mail

Computer Misuse: Response, Regulation and the Law

ou partager sur :

share_comment
Partager ce commentaire par e-mail

ou partager sur :

PRÊT A ACHETER?
(vous pouvez toujours annuler plus tard)


J'aime
Computer Misuse: Response, Regulation and the Law

Computer Misuse: Response, Regulation and the Law

  (Auteur)


Prix : Cet article n'a pas encore de prix  ask_price

Demande de cotation sur ""
Ce titre est nouveau dans notre fonds d'ouvrages et nous ne l'avons encore jamais vendu à ce jour.
Notre engagement: Vous obtenir le meilleur prix
Aussi nombreux que soient les titres que nous référençons, absolument rien n'est automatisé dans la fixation de nos prix; et plutôt que de convertir automatiquement le prix en euros et risquer de répercuter sur vous un prix artificiellement élevé, nous vous faisons un devis rapide après avoir vérifié les prix auprès de nos différents fournisseurs.
Cette étape de demande de cotation est rapide (généralement quelques heures) et vise à vous faire bénéficier en permanence du meilleur prix pour vos achats de livres.


Sur commande

Des articles qui pourraient aussi vous intéresser

    Description de "Computer Misuse: Response, Regulation and the Law"

    This book is concerned with the nature of computer misuse and the legal and extra-legal responses to it. It explores what is meant by the term 'computer misuse' and charts its emergence as a problem as well as its expansion in parallel with the continued progression in computing power, networking, reach and accessibility. In doing so, it surveys the attempts of the domestic criminal law to deal with some early manifestations of computer misuse and the consequent legislative passage of the Computer Misuse Act 1990.Having outlined the new criminal offences introduced by the 1990 Act, the book examines the extent to which the 1990 Act has been effective before considering the amendments made to it by the Police and Justice Act 2006 and their potential ramifications now they are in force. Having considered the position at domestic criminal law, the book turns to assess whether the solution to the effective regulation of computer misuse requires more than just the domestic criminal law, exploring the characteristics and purpose of the criminal law in the context of computer misuse.The book then introduces theories of risk from realist, cultural and symbolic, 'risk society' and governmentality perspectives before considering the idea of a governance network as a means of responding to risk. It examines computer misuse and the role of the domestic criminal law in the light of these theories. It further examines potential new nodes of governance within this framework from the European Union, Council of Europe, Commonwealth, United Nations and Group of Eight. It considers whether there might be advantages in moving beyond the domestic criminal law in the response to computer misuse. The book then broadens the discussion of potential means of governance beyond the law to encompass extra-legal initiatives. It establishes a typology of these extra-legal initiatives and examines the contribution made by each to the governance of computer misuse.Finally, this book concludes with an examination of the complex governance network and considers whether the regulation of computer misuse is only viable in a global networked society by a networked response combining nodes of both legal and extra-legal governance.This book will be of interest to students of IT law as well as to sociologists and criminologists, and those who have a professional concern with preventing computer misuse and fraud.

    Détails sur le produit

    • Reliure : Paperback
    • 352  pages
    • Dimensions :  2.6cmx15.6cmx23.0cm
    • Poids : 621.4g
    • Editeur :   Willan Paru le
    • ISBN :  1843923793
    • EAN13 :  9781843923794
    • Langue : Anglais

    Commentaires sur cet article

    Personne n'a encore laissé de commentaire. Soyez le premier!

    Laisser un commentaire

    Rechercher des articles similaires par rayon

    Rechercher par thèmes associés

    This book is concerned with the nature of computer misuse and the legal and extra-legal responses to it. It explores what is meant by the term 'computer misuse' and charts its emergence as a problem as well as its expansion in parallel with the continued progression in computing power, networking, reach and accessibility. In doing so, it surveys the attempts of the domestic criminal law to deal with some early manifestations of computer misuse and the consequent legislative passage of the Computer Misuse Act 1990.Having outlined the new criminal offences introduced by the 1990 Act, the book examines the extent to which the 1990 Act has been effective before considering the amendments made to it by the Police and Justice Act 2006 and their potential ramifications now they are in force. Having considered the position at domestic criminal law, the book turns to assess whether the solution to the effective regulation of computer misuse requires more than just the domestic criminal law, exploring the characteristics and purpose of the criminal law in the context of computer misuse.The book then introduces theories of risk from realist, cultural and symbolic, 'risk society' and governmentality perspectives before considering the idea of a governance network as a means of responding to risk. It examines computer misuse and the role of the domestic criminal law in the light of these theories. It further examines potential new nodes of governance within this framework from the European Union, Council of Europe, Commonwealth, United Nations and Group of Eight. It considers whether there might be advantages in moving beyond the domestic criminal law in the response to computer misuse. The book then broadens the discussion of potential means of governance beyond the law to encompass extra-legal initiatives. It establishes a typology of these extra-legal initiatives and examines the contribution made by each to the governance of computer misuse.Finally, this book concludes with an examination of the complex governance network and considers whether the regulation of computer misuse is only viable in a global networked society by a networked response combining nodes of both legal and extra-legal governance.This book will be of interest to students of IT law as well as to sociologists and criminologists, and those who have a professional concern with preventing computer misuse and fraud.