Computer Misuse: Response, Regulation and the Law / Edition 1

Computer Misuse: Response, Regulation and the Law / Edition 1

by Stefan Fafinski
ISBN-10:
1843923793
ISBN-13:
9781843923794
Pub. Date:
04/01/2009
Publisher:
Taylor & Francis
ISBN-10:
1843923793
ISBN-13:
9781843923794
Pub. Date:
04/01/2009
Publisher:
Taylor & Francis
Computer Misuse: Response, Regulation and the Law / Edition 1

Computer Misuse: Response, Regulation and the Law / Edition 1

by Stefan Fafinski
$55.99
Current price is , Original price is $55.99. You
$55.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.


Overview

This book is concerned with the nature of computer misuse and the legal and extra-legal responses to it. It explores what is meant by the term 'computer misuse' and charts its emergence as a problem as well as its expansion in parallel with the continued progression in computing power, networking, reach and accessibility. In doing so, it surveys the attempts of the domestic criminal law to deal with some early manifestations of computer misuse and the consequent legislative passage of the Computer Misuse Act 1990.

This book will be of interest to students of IT law as well as to sociologists and criminologists, and those who have a professional concern with preventing computer misuse and fraud.


Product Details

ISBN-13: 9781843923794
Publisher: Taylor & Francis
Publication date: 04/01/2009
Pages: 352
Product dimensions: 6.10(w) x 9.20(h) x 1.00(d)

About the Author

Stefan Fafinski is Lecturer in Law at Brunel University.

Table of Contents

1. Introduction Part 1: Constructing the Problem of Computer Misuse 2. The Emergence of the Problem of Computer Misuse 3. The Evolution of the Problem of Computer Misuse 4. Computer Misuse and the Criminal Law Part 2: The Governance of Computer Misuse 5. The Risk of Computer Misuse and its Governance 6. The Legal Governance of Computer Misuse: Beyond the Domestic Criminal Law 7. The Extra-legal Governance of Computer Misuse Part 3: Examining the Solution 8. The Constellation of Control
From the B&N Reads Blog

Customer Reviews