Policy & Internet

Cover image for Policy & Internet

May 2011

Volume 3, Issue 2

Pages 1–32

  1. Editorial

    1. Top of page
    2. Editorial
    3. Article: Cybercrime networks
    4. Article: Criminal Law
    5. Article: Law
    6. Article
    7. Article: Cybercrime
    8. Article: Cybersecurity
    9. Article
    1. Public Policy Responses to Cybercrime (pages 1–6)

      Stefan Fafinski

      Article first published online: 10 AUG 2012 | DOI: 10.2202/1944-2866.1139

  2. Article: Cybercrime networks

    1. Top of page
    2. Editorial
    3. Article: Cybercrime networks
    4. Article: Criminal Law
    5. Article: Law
    6. Article
    7. Article: Cybercrime
    8. Article: Cybersecurity
    9. Article
    1. Finding the Key Players in Online Child Exploitation Networks (pages 1–32)

      Bryce G Westlake, Martin Bouchard and Richard Frank

      Article first published online: 10 AUG 2012 | DOI: 10.2202/1944-2866.1126

  3. Article: Criminal Law

    1. Top of page
    2. Editorial
    3. Article: Cybercrime networks
    4. Article: Criminal Law
    5. Article: Law
    6. Article
    7. Article: Cybercrime
    8. Article: Cybersecurity
    9. Article
  4. Article: Law

    1. Top of page
    2. Editorial
    3. Article: Cybercrime networks
    4. Article: Criminal Law
    5. Article: Law
    6. Article
    7. Article: Cybercrime
    8. Article: Cybersecurity
    9. Article
    1. Teenage Folly or Child Abuse? State Responses to “Sexting” by Minors in the U.S. and Germany (pages 1–26)

      Sandra Schmitz and Lawrence Siry

      Article first published online: 10 AUG 2012 | DOI: 10.2202/1944-2866.1127

  5. Article

    1. Top of page
    2. Editorial
    3. Article: Cybercrime networks
    4. Article: Criminal Law
    5. Article: Law
    6. Article
    7. Article: Cybercrime
    8. Article: Cybersecurity
    9. Article
    1. Adolescents and Cybercrime: Navigating between Freedom and Control (pages 1–28)

      Simone van der Hof and Bert-Jaap Koops

      Article first published online: 10 AUG 2012 | DOI: 10.2202/1944-2866.1121

  6. Article: Cybercrime

    1. Top of page
    2. Editorial
    3. Article: Cybercrime networks
    4. Article: Criminal Law
    5. Article: Law
    6. Article
    7. Article: Cybercrime
    8. Article: Cybersecurity
    9. Article
    1. Overcoming the Warez Paradox: Online Piracy Groups and Situational Crime Prevention (pages 1–25)

      Jonathan Basamanowicz and Martin Bouchard

      Article first published online: 10 AUG 2012 | DOI: 10.2202/1944-2866.1125

  7. Article: Cybersecurity

    1. Top of page
    2. Editorial
    3. Article: Cybercrime networks
    4. Article: Criminal Law
    5. Article: Law
    6. Article
    7. Article: Cybercrime
    8. Article: Cybersecurity
    9. Article
    1. A Public-Private Partnership Model for National Cybersecurity (pages 1–23)

      Malcolm Shore, Yi Du and Sherali Zeadally

      Article first published online: 10 AUG 2012 | DOI: 10.2202/1944-2866.1114

  8. Article

    1. Top of page
    2. Editorial
    3. Article: Cybercrime networks
    4. Article: Criminal Law
    5. Article: Law
    6. Article
    7. Article: Cybercrime
    8. Article: Cybersecurity
    9. Article

SEARCH

SEARCH BY CITATION