In this Book

summary
This collection is innovative and original. It introduces new knowledge and is very timely because of the current high profile of the international public discourse over security, the internet and its impact upon the growth of the information economy.

Table of Contents

restricted access Download Full Book
  1. Cover
  2. restricted access
    • Download PDF Download
  1. Frontmatter
  2. restricted access
    • Download PDF Download
  1. Contents
  2. pp. v-vii
  3. restricted access
    • Download PDF Download
  1. Lists of Tables and Figures
  2. pp. viii-ix
  3. restricted access
    • Download PDF Download
  1. Foreword
  2. pp. xi-xii
  3. restricted access
    • Download PDF Download
  1. Acknowledgements
  2. p. xiii
  3. restricted access
    • Download PDF Download
  1. Contributors
  2. pp. xv-xxi
  3. restricted access
    • Download PDF Download
  1. Abbreviations
  2. pp. xxiii-xxvi
  3. restricted access
    • Download PDF Download
  1. 1.Computer-Related Crime in Asia: Emergent Issues
  2. pp. 1-27
  3. restricted access
    • Download PDF Download
  1. 2.The Global Cyber-Crime Problem: The Socio-Economic Impact
  2. pp. 29-55
  3. restricted access
    • Download PDF Download
  1. 3.Cyberspace Governance and Internet Regulation in China
  2. pp. 57-78
  3. restricted access
    • Download PDF Download
  1. 4.Cyber-Crime and E-Business in China: A Risk Perception Perspective
  2. pp. 79-88
  3. restricted access
    • Download PDF Download
  1. 5.Governance in the Digital Age: Policing the Internet in Hong Kong
  2. pp. 89-107
  3. restricted access
    • Download PDF Download
  1. 6.Third Party 'Responsibilisation' Through Telecoms Policing
  2. pp. 109-124
  3. restricted access
    • Download PDF Download
  1. 7.Cyber-Security: Country Report on Singapore, 2003
  2. pp. 125-140
  3. restricted access
    • Download PDF Download
  1. 8.Cyber-Crime in the 21 st Century: Windows on Australian law
  2. pp. 141-167
  3. restricted access
    • Download PDF Download
  1. 9.Cyber-Crime: Current Status and Countermeasures in Japan
  2. pp. 169-181
  3. restricted access
    • Download PDF Download
  1. 10.Cyber-Crime in India: The Legal Approach
  2. pp. 183-196
  3. restricted access
    • Download PDF Download
  1. 11.Computer Crimes: What Everyone Should Know About Them
  2. pp. 197-206
  3. restricted access
    • Download PDF Download
  1. 12.Cyber-Crime Legislation in the Asia-Pacific Region
  2. pp. 207-241
  3. restricted access
    • Download PDF Download
  1. 13.Lam Enforcement in Cyberspace: The Hong Kong Approach
  2. pp. 243-267
  3. restricted access
    • Download PDF Download
  1. 14.International Cooperation in Combating Cyber-Crime in Asia: Existing Mechanisms and New Approaches
  2. pp. 269-302
  3. restricted access
    • Download PDF Download
  1. 15.The Council of Europe Convention on Cyber-Crime: A Response to the Challenge of the New Age
  2. pp. 303-326
  3. restricted access
    • Download PDF Download
  1. 16.Human Security and Cyber-Security: Operationalising a Policy Framework
  2. pp. 327-346
  3. restricted access
    • Download PDF Download
  1. 17.The Future of Cyber-Crime in Asia
  2. pp. 347-359
  3. restricted access
    • Download PDF Download
  1. Notes
  2. pp. 361-402
  3. restricted access
    • Download PDF Download
  1. References
  2. pp. 403-417
  3. restricted access
    • Download PDF Download
  1. Index
  2. pp. 419-434
  3. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.