scispace - formally typeset
Search or ask a question

Showing papers in "Computer Law & Security Review in 2005"


Journal ArticleDOI
TL;DR: An accurate profile of an inside cyber criminal may help in identifying both prospectively and retrospectively for companies attempting to do away with cyber criminals inside their own walls.

42 citations


Journal ArticleDOI
TL;DR: The motives and methods of Internet-based identity Theft are examined, the problem of trust relationships and validation of identity tokens is discussed, and recommendations for the prevention of identity theft are given.

34 citations


Journal ArticleDOI
TL;DR: This article provides an introduction to computer forensics and outlines the associated inspection steps.

24 citations


Journal ArticleDOI
TL;DR: The author examines the issues of how and to what extent lobbyism has influenced the EU decision-making bodies in acceding to the lobbyist agenda and the opt-in and opt-out controversy.

18 citations


Journal ArticleDOI
TL;DR: How the international community might help to tackle Internet scam crime is highlighted and a case for greater systemic transparency, legal enforcement readiness, intensification of public enlightenment campaigns and technological approaches to combat the menace of advance fee fraud on the Internet is made.

18 citations


Journal ArticleDOI
TL;DR: The psychological processes that affect crisis teams in both the private and the public sector are described, and the search for a way of combating those processes is described.

16 citations


Journal ArticleDOI
TL;DR: In this article, the authors examined the security issues associated with the storage of DSCs/key pairs and suggested that CAs should issue digital signature certificates and key pairs on secure and user friendly portable information storage devices such as the flash disk.

13 citations


Journal ArticleDOI

11 citations


Journal ArticleDOI
TL;DR: The major ways of managing legal risk are through contracts, procedures and dispute management, together with information and document management, including regulatory compliance.

11 citations


Journal ArticleDOI
TL;DR: This paper considers the application of Disability Discrimination legislation to the design and presentation of Internet web sites and takes account of the revised Code of Practice on Rights of Access published by the Disability Rights Commission in 2002.

10 citations


Journal ArticleDOI
TL;DR: This article tentatively suggests key ideas for an overall biometrics strategy that could better resist identity fraud, including an identity fraud resistant use of biometric passports.

Journal ArticleDOI
TL;DR: The author's inaugural address delivered on the occasion of the public acceptance of his chair at the Faculty of Mathematics and Computer Science of Utrecht University is presented, to work within the discipline of Information Science, and more specifically Chain-computerisation in the constitutional state.

Journal ArticleDOI
Belinda Doshi1
TL;DR: An overview of the Decision Map Documentation is given and its implications for both private sector contractors and Government procurement professionals are looked at.

Journal ArticleDOI
TL;DR: The 2005 Financial Services Authority report into offshore outsourcing with specific reference to experience in India is evaluated and it is concluded that, on the whole, the findings are positive and that UK business methods appear to transfer well.

Journal ArticleDOI
TL;DR: In this paper, the authors discuss the legal issues involved in e-mail snooping in the workplace and the role of the employer in ensuring that the company's email system or Internet is not abused.

Journal ArticleDOI
TL;DR: The article considers the implications of this case for the forensic computing domain and highlights the need for the development of standard frameworks for the conduct of forensic computing investigations, and briefly presents the framework proposed by the European project ‘CTOSE’ (Cyber Tools On-line Search for Evidence).

Journal ArticleDOI
TL;DR: Some of the legal constraints and considerations which are unique to Internet access contracts are highlighted and the development of such contracts in the light of existing and anticipated regulatory developments are looked at.

Journal ArticleDOI
Marcus Turle1, Vicky Hordern1
TL;DR: The advent of the Freedom of Information Act 2000 (FOIA) is a welcome counterweight to a trend which seems increasingly to be tipping the scales in favour of the state.

Journal ArticleDOI
TL;DR: Though online activity raises numerous legal issues, not least jurisdiction, this article is concerned only with personal jurisdiction.

Journal ArticleDOI
TL;DR: This article in two parts tentatively suggests key ideas for an overall biometrics strategy that could better resist identity fraud.

Journal ArticleDOI
TL;DR: The analytical discussion in this paper requires definitions of civil jurisdiction, relevant laws in Malaysia and other jurisdictional issues.

Journal ArticleDOI
TL;DR: The story so far with the Safe Harbor Privacy Principles is reviewed, which facilitates a process that permits the transfer of personal data to that country on terms that secure recognition of the data protection principles for the treatment and use of such data.

Journal ArticleDOI
TL;DR: In this paper, the authors examine the provisions of the Directive and determine its implications, in particular, as to whether they balance or not the rights of the right holders and public interest.

Journal ArticleDOI
TL;DR: The main principles of the Act are considered, how the Information Commissioner, the courts and the European Commission have responded to Durant and what happens next.


Journal ArticleDOI
TL;DR: The issues faced by regulators in developed country markets with a history of extensive service competition are looked at, particularly those where service competition is limited.

Journal ArticleDOI
TL;DR: The difficulties facing national courts in respect of the regulation of online gambling activity in the wake of two recent decisions of the European Court of Justice that, in mixed messages, may be moving towards liberalization of theEuropean gaming market are reviewed.

Journal ArticleDOI
TL;DR: The focus will be on the law in the UK to determine if it provides a workable solution and suggests some modifications which could encourage a reduction in bugs.

Journal ArticleDOI
TL;DR: The background to, and main features of, the Convention on Exclusive Choice of Court Agreements are discussed, and some thoughts are expressed about the direction of the future work of the Hague Conference on Private International Law.