Showing papers in "Computer Law & Security Review in 2005"
••
TL;DR: An accurate profile of an inside cyber criminal may help in identifying both prospectively and retrospectively for companies attempting to do away with cyber criminals inside their own walls.
42 citations
••
TL;DR: The motives and methods of Internet-based identity Theft are examined, the problem of trust relationships and validation of identity tokens is discussed, and recommendations for the prevention of identity theft are given.
34 citations
••
TL;DR: This article provides an introduction to computer forensics and outlines the associated inspection steps.
24 citations
••
TL;DR: The author examines the issues of how and to what extent lobbyism has influenced the EU decision-making bodies in acceding to the lobbyist agenda and the opt-in and opt-out controversy.
18 citations
••
TL;DR: How the international community might help to tackle Internet scam crime is highlighted and a case for greater systemic transparency, legal enforcement readiness, intensification of public enlightenment campaigns and technological approaches to combat the menace of advance fee fraud on the Internet is made.
18 citations
••
TL;DR: The psychological processes that affect crisis teams in both the private and the public sector are described, and the search for a way of combating those processes is described.
16 citations
••
TL;DR: In this article, the authors examined the security issues associated with the storage of DSCs/key pairs and suggested that CAs should issue digital signature certificates and key pairs on secure and user friendly portable information storage devices such as the flash disk.
13 citations
••
TL;DR: The major ways of managing legal risk are through contracts, procedures and dispute management, together with information and document management, including regulatory compliance.
11 citations
••
TL;DR: This paper considers the application of Disability Discrimination legislation to the design and presentation of Internet web sites and takes account of the revised Code of Practice on Rights of Access published by the Disability Rights Commission in 2002.
10 citations
••
TL;DR: This article tentatively suggests key ideas for an overall biometrics strategy that could better resist identity fraud, including an identity fraud resistant use of biometric passports.
••
TL;DR: The author's inaugural address delivered on the occasion of the public acceptance of his chair at the Faculty of Mathematics and Computer Science of Utrecht University is presented, to work within the discipline of Information Science, and more specifically Chain-computerisation in the constitutional state.
••
TL;DR: An overview of the Decision Map Documentation is given and its implications for both private sector contractors and Government procurement professionals are looked at.
••
TL;DR: The 2005 Financial Services Authority report into offshore outsourcing with specific reference to experience in India is evaluated and it is concluded that, on the whole, the findings are positive and that UK business methods appear to transfer well.
••
TL;DR: In this paper, the authors discuss the legal issues involved in e-mail snooping in the workplace and the role of the employer in ensuring that the company's email system or Internet is not abused.
••
TL;DR: The article considers the implications of this case for the forensic computing domain and highlights the need for the development of standard frameworks for the conduct of forensic computing investigations, and briefly presents the framework proposed by the European project ‘CTOSE’ (Cyber Tools On-line Search for Evidence).
••
TL;DR: Some of the legal constraints and considerations which are unique to Internet access contracts are highlighted and the development of such contracts in the light of existing and anticipated regulatory developments are looked at.
••
TL;DR: The advent of the Freedom of Information Act 2000 (FOIA) is a welcome counterweight to a trend which seems increasingly to be tipping the scales in favour of the state.
••
TL;DR: Though online activity raises numerous legal issues, not least jurisdiction, this article is concerned only with personal jurisdiction.
••
TL;DR: This article in two parts tentatively suggests key ideas for an overall biometrics strategy that could better resist identity fraud.
••
TL;DR: The analytical discussion in this paper requires definitions of civil jurisdiction, relevant laws in Malaysia and other jurisdictional issues.
••
TL;DR: The story so far with the Safe Harbor Privacy Principles is reviewed, which facilitates a process that permits the transfer of personal data to that country on terms that secure recognition of the data protection principles for the treatment and use of such data.
••
TL;DR: In this paper, the authors examine the provisions of the Directive and determine its implications, in particular, as to whether they balance or not the rights of the right holders and public interest.
••
TL;DR: The main principles of the Act are considered, how the Information Commissioner, the courts and the European Commission have responded to Durant and what happens next.
••
TL;DR: The issues faced by regulators in developed country markets with a history of extensive service competition are looked at, particularly those where service competition is limited.
••
TL;DR: The difficulties facing national courts in respect of the regulation of online gambling activity in the wake of two recent decisions of the European Court of Justice that, in mixed messages, may be moving towards liberalization of theEuropean gaming market are reviewed.
••
TL;DR: The focus will be on the law in the UK to determine if it provides a workable solution and suggests some modifications which could encourage a reduction in bugs.
••
TL;DR: The background to, and main features of, the Convention on Exclusive Choice of Court Agreements are discussed, and some thoughts are expressed about the direction of the future work of the Hague Conference on Private International Law.