Problems in Policing E-Commerce Crime

  • Marc D. Goodman
Part of the Advances in Information Security book series (ADIS, volume 2)


Nothing works. Despite repeated attempts by FedEx employees and customers around the globe, suddenly no information is available. Everything was fine a few moments ago, but now the company, which delivers more than three million express packages to 210 countries each working day, has had its worldwide operations crippled by a failure of its information system.1 Unbeknownst to FedEx officials, the debilitating disruption in its ability to move goods around the globe is the result of a “denial of service attack” by an unknown criminal hacker.2


Internet Service Provider Internet Protocol Address Safe Harbor Computer Crime Transnational Crime 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [COE 1990]
    Council of Europe (1990)Computer Related Crime: Recommendation No. R(89) 9on “Computer-Related Crime and Final Report of the European Committee on Crime Problems”, Strasbourg, (341).Google Scholar
  2. [Dyson, 1997]
    Dyson, Esther. (1997).Release 2.1: A Design for Living in the Digital Age.Broadway Books, New York.Google Scholar
  3. [Go1Sha 1994]
    Goldstone, D. and Shave, B., “International Dimensions of Crime in Cyberspace”Fordham International Law Journal22(June)1994.Google Scholar
  4. [Joutsen, 1999]
    Joutsen, M. (1999), “Five Issues in European Criminal Justice: Corruption, Women in the Criminal Justice System, Criminal Policy Indicators, Community Crime Prevention and Computer Crime”Proceedings of the European Colloquium on Crime and Criminal PolicyHelsinki, HEUNI Publication Series, 34(267).Google Scholar
  5. [NCI, 1999]
    National Criminal Intelligence Service of the United Kingdom (1999) “Project Trawler: Crime on the Information Highways,” National Criminal Intelligence Service, October 23, 1999, Report Issued on the World Wide Web Google Scholar
  6. [OECD, 1986]
    Organization for Economic Cooperation and Development (OECD)Computer-Related Crime: Analysis of Legal PolicyParis, August 1986, ISBN 92–64–12852–2.Google Scholar
  7. [Pallock, 1996]
    Pallock, R. (1996) “Creating the Standards of a Global Community: Regulating Pornography on the Internet-an International Concern,”Temple International and Comparative Law Journal10(Fall)467.Google Scholar
  8. [Persico, 1999]
    Persico, B. (1999), “Under Siege: The Jurisdictional and Interagency Problems of Protecting the National Information Infrastructure,”CommLaw ConspectusThe Catholic University of America, 7(winter)153.Google Scholar
  9. [Selin, 1997]
    Selin, S. (1997), “Governing Cyberspace: The Need for an International Solution”Gonzaga Law Review32(365).Google Scholar
  10. [Sieber, 1986]
    Sieber, U (1986).The International Handbook on Computer Crime: Computer Related Economic Crime and the Infringements of PrivacyWiley Press, Chichester.Google Scholar
  11. [SomThoBri, 1997]
    Soma, J., Thomas, T, and Brisette, H. (1997) “Transnational Extradition For Computer Crimes: Are New Treaties and Laws Needed?”Harvard Journal on Legislation34 (Summer), 317.Google Scholar
  12. [UN, 1994]
    United Nations Centre for Social Development and Humanitarian Affairs (1994)United Nations Manual on the Prevention and Control of Computer-Related CrimeInternational Review of Criminal Policy, Numbers 43–44, U.N. Doc. ST/ESA/SER.M/43–44, U.N. Sales No. E.94.IV.5.Google Scholar

Copyright information

© Springer Science+Business Media New York 2001

Authors and Affiliations

  • Marc D. Goodman

There are no affiliations available

Personalised recommendations