Abstract
Nothing works. Despite repeated attempts by FedEx employees and customers around the globe, suddenly no information is available. Everything was fine a few moments ago, but now the company, which delivers more than three million express packages to 210 countries each working day, has had its worldwide operations crippled by a failure of its information system.1 Unbeknownst to FedEx officials, the debilitating disruption in its ability to move goods around the globe is the result of a “denial of service attack” by an unknown criminal hacker.2
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Council of Europe (1990)Computer Related Crime: Recommendation No. R(89) 9on “Computer-Related Crime and Final Report of the European Committee on Crime Problems”, Strasbourg, (341).
Dyson, Esther. (1997).Release 2.1: A Design for Living in the Digital Age.Broadway Books, New York.
Goldstone, D. and Shave, B., “International Dimensions of Crime in Cyberspace”Fordham International Law Journal22(June)1994.
Joutsen, M. (1999), “Five Issues in European Criminal Justice: Corruption, Women in the Criminal Justice System, Criminal Policy Indicators, Community Crime Prevention and Computer Crime”Proceedings of the European Colloquium on Crime and Criminal PolicyHelsinki, HEUNI Publication Series, 34(267).
National Criminal Intelligence Service of the United Kingdom (1999) “Project Trawler: Crime on the Information Highways,” National Criminal Intelligence Service, October 23, 1999, Report Issued on the World Wide Webhttp://www.ncis.co.uk/newpagel.htm.
Organization for Economic Cooperation and Development (OECD)Computer-Related Crime: Analysis of Legal PolicyParis, August 1986, ISBN 92–64–12852–2.
Pallock, R. (1996) “Creating the Standards of a Global Community: Regulating Pornography on the Internet-an International Concern,”Temple International and Comparative Law Journal10(Fall)467.
Persico, B. (1999), “Under Siege: The Jurisdictional and Interagency Problems of Protecting the National Information Infrastructure,”CommLaw ConspectusThe Catholic University of America, 7(winter)153.
Selin, S. (1997), “Governing Cyberspace: The Need for an International Solution”Gonzaga Law Review32(365).
Sieber, U (1986).The International Handbook on Computer Crime: Computer Related Economic Crime and the Infringements of PrivacyWiley Press, Chichester.
Soma, J., Thomas, T, and Brisette, H. (1997) “Transnational Extradition For Computer Crimes: Are New Treaties and Laws Needed?”Harvard Journal on Legislation34 (Summer), 317.
United Nations Centre for Social Development and Humanitarian Affairs (1994)United Nations Manual on the Prevention and Control of Computer-Related CrimeInternational Review of Criminal Policy, Numbers 43–44, U.N. Doc. ST/ESA/SER.M/43–44, U.N. Sales No. E.94.IV.5.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer Science+Business Media New York
About this chapter
Cite this chapter
Goodman, M.D. (2001). Problems in Policing E-Commerce Crime. In: Ghosh, A.K. (eds) E-Commerce Security and Privacy. Advances in Information Security, vol 2. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-1467-1_4
Download citation
DOI: https://doi.org/10.1007/978-1-4615-1467-1_4
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4613-5568-7
Online ISBN: 978-1-4615-1467-1
eBook Packages: Springer Book Archive