Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Cybercrimeology

Cybercrime History: Managing a Manifest Mitnick, Part 4

01 Oct 2020

Description

More about Our Guesthttps://researchers.anu.edu.au/researchers/grabosky-pnFrom this Episode:Michael A. Sussmann, (1999) The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium, 9 Duke Journal of Comparative & International Law 451-489https://scholarship.law.duke.edu/djcil/vol9/iss2/5/Kim Dotcomhttps://en.wikipedia.org/wiki/Kim_DotcomMalaysian Cybercrime LawYew, Wong Malaysian Law and Computer Crime (SANS Reading Room Whitepaper)https://www.sans.org/reading-room/whitepapers/legal/malaysian-law-computer-crime-670Appudurai, J., & Ramalingam, C. L. (2007). Computer Crimes: A Case Study of What Malaysia Can Learn from Others?. Journal of Digital Forensics, Security and Law, 2(2), 1.https://commons.erau.edu/cgi/viewcontent.cgi?article=1020&context=jdfslDrink or Diehttps://en.wikipedia.org/wiki/DrinkOrDieSanger, David E. (2018)The Perfect Weapon: War, Sabotage, and Fear in the Cyber AgeBruce Sterling The Hacker Crackdown: Law and Disorder on the Electronic Frontier (1992)

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.