Skip to main content

Problems in Policing E-Commerce Crime

  • Chapter
E-Commerce Security and Privacy

Part of the book series: Advances in Information Security ((ADIS,volume 2))

  • 221 Accesses

Abstract

Nothing works. Despite repeated attempts by FedEx employees and customers around the globe, suddenly no information is available. Everything was fine a few moments ago, but now the company, which delivers more than three million express packages to 210 countries each working day, has had its worldwide operations crippled by a failure of its information system.1 Unbeknownst to FedEx officials, the debilitating disruption in its ability to move goods around the globe is the result of a “denial of service attack” by an unknown criminal hacker.2

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Council of Europe (1990)Computer Related Crime: Recommendation No. R(89) 9on “Computer-Related Crime and Final Report of the European Committee on Crime Problems”, Strasbourg, (341).

    Google Scholar 

  2. Dyson, Esther. (1997).Release 2.1: A Design for Living in the Digital Age.Broadway Books, New York.

    Google Scholar 

  3. Goldstone, D. and Shave, B., “International Dimensions of Crime in Cyberspace”Fordham International Law Journal22(June)1994.

    Google Scholar 

  4. Joutsen, M. (1999), “Five Issues in European Criminal Justice: Corruption, Women in the Criminal Justice System, Criminal Policy Indicators, Community Crime Prevention and Computer Crime”Proceedings of the European Colloquium on Crime and Criminal PolicyHelsinki, HEUNI Publication Series, 34(267).

    Google Scholar 

  5. National Criminal Intelligence Service of the United Kingdom (1999) “Project Trawler: Crime on the Information Highways,” National Criminal Intelligence Service, October 23, 1999, Report Issued on the World Wide Webhttp://www.ncis.co.uk/newpagel.htm.

    Google Scholar 

  6. Organization for Economic Cooperation and Development (OECD)Computer-Related Crime: Analysis of Legal PolicyParis, August 1986, ISBN 92–64–12852–2.

    Google Scholar 

  7. Pallock, R. (1996) “Creating the Standards of a Global Community: Regulating Pornography on the Internet-an International Concern,”Temple International and Comparative Law Journal10(Fall)467.

    Google Scholar 

  8. Persico, B. (1999), “Under Siege: The Jurisdictional and Interagency Problems of Protecting the National Information Infrastructure,”CommLaw ConspectusThe Catholic University of America, 7(winter)153.

    Google Scholar 

  9. Selin, S. (1997), “Governing Cyberspace: The Need for an International Solution”Gonzaga Law Review32(365).

    Google Scholar 

  10. Sieber, U (1986).The International Handbook on Computer Crime: Computer Related Economic Crime and the Infringements of PrivacyWiley Press, Chichester.

    Google Scholar 

  11. Soma, J., Thomas, T, and Brisette, H. (1997) “Transnational Extradition For Computer Crimes: Are New Treaties and Laws Needed?”Harvard Journal on Legislation34 (Summer), 317.

    Google Scholar 

  12. United Nations Centre for Social Development and Humanitarian Affairs (1994)United Nations Manual on the Prevention and Control of Computer-Related CrimeInternational Review of Criminal Policy, Numbers 43–44, U.N. Doc. ST/ESA/SER.M/43–44, U.N. Sales No. E.94.IV.5.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer Science+Business Media New York

About this chapter

Cite this chapter

Goodman, M.D. (2001). Problems in Policing E-Commerce Crime. In: Ghosh, A.K. (eds) E-Commerce Security and Privacy. Advances in Information Security, vol 2. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-1467-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-1-4615-1467-1_4

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4613-5568-7

  • Online ISBN: 978-1-4615-1467-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics