Enough Law of Horses and Elephants Debated…, …Let’s Discuss the Cyber Law Seriously
Abstract
Keywords
Full Text:
PDFReferences
REFERENCES
Sandeep Mittal, 'A Strategic Road-map for Prevention of Drug Trafficking through Internet' (2012) 33 Indian Journal of Criminology and Criminalistics 86
Marco Gercke, Europe’s legal approaches to cybercrime (Springer 2009)
Marco Gercke, 'Understanding cybercrime: a guide for developing countries' (2011) 89 International Telecommunication Union (Draft) 93
David L Speer, 'Redefining borders: The challenges of cybercrime' (2000) 34 Crime, law and social change 259
Sandeep Mittal, 'Perspectives in Cyber Security, the future of cyber malware' (2013) 41 The Indian Journal of Criminology 18
Sandeep Mittal, 'The Issues in Cyber- Defense and Cyber Forensics of the SCADA Systems' (2015) 62 Indian Police Journal 29
Sandeep Mittal, 'A Strategic Road-map for Prevention of Drug Trafficking through Internet'
Open-ended Intergovernmental Expert Group on Cybercrime, Comprehensive Study on Cyber Crime, 2013)
https://wildequus.org/2014/05/07/sufi-story-blind-men-elephant/ (Accessed on 13/04/2017)
http://www.constitution.org/col/blind_men.htm (Accessed on 13/04/2017)
Martina Gillen, 'Lawyers and cyberspace: Seeing the elephant' (2012) 9 ScriptED 130
Frank H Easterbrook, 'Cyberspace and the Law of the Horse' (1996) U Chi Legal F 207
Ibid at 207, para 3
Joseph H Sommer, 'Against cyberlaw' (2000) Berkeley Technology Law Journal 1145
Lawrence Lessig, 'The law of the horse: What cyberlaw might teach' (1999) 113 Harvard law review 501
Andrew Murray, 'Looking back at the law of the horse: Why cyberlaw and the rule of law are important' (2013) 10 SCRIPTed 310
James Baxendale, 'FORTIETH ANNIVERSARY ISSUE: EQUINE CONSIDERATIONS AND COMPUTER LAW-REFLECTIONS FORTY YEARS ON' (2010) 36 Rutgers Computer & Tech LJ 161
Susan W Brenner, 'Toward a criminal law for cyberspace: A new model of law enforcement' (2004) 30 Rutgers Computer & Tech LJ 1
Ibid at page 104
Susan W Brenner, 'Cybercrime Metrics: Old Wine, New Bottles?' (2004) 9 Va JL & Tech 13
Susan W Brenner, 'Is There Such a Thing as' Virtual Crime'?' (2001)
Brenner, 'Toward a criminal law for cyberspace: A new model of law enforcement'
Miltiadis Kandias and others, An insider threat prediction model (Springer 2010)
Sandeep Mittal, 'Understanding the Human Dimension of Cyber Security' (2015) 34 Indian Journal of Criminology and Criminalistics 141
Majid Yar, 'The Novelty of ‘Cybercrime’ An Assessment in Light of Routine Activity Theory' (2005) 2 European Journal of Criminology 407
Ibid
Lawrence E Cohen and Marcus Felson, 'Social change and crime rate trends: A routine activity approach' (1979) American sociological review 588
Nir Kshetri, 'The simple economics of cybercrimes' (2006) 4 IEEE Security & Privacy 33
Yar, 'The Novelty of ‘Cybercrime’ An Assessment in Light of Routine Activity Theory'
Majid Yar, Cybercrime and society (Sage 2013)
Yar, 'The Novelty of ‘Cybercrime’ An Assessment in Light of Routine Activity Theory'. at page 424
Ibid
Mittal, 'A Strategic Road-map for Prevention of Drug Trafficking through Internet'
Statistics Source: Crime in India Statistics, NCRB, Ministry of Home Affairs, Government of India, New Delhi.
Karuppannan Jaishankar, 'Establishing a theory of cyber crimes'
(2007) 1 International Journal of Cyber Criminology 7
Susan W Brenner, 'Toward a criminal law for cyberspace: Product liability and other issues' (2004) 5 Pitt J Tech L & Pol'y i
Bill McCarthy, 'New economics of sociological criminology' (2002) 28 Annual Review of Sociology 417
JR Probasco and William L Davis, 'A human capital perspective on criminal careers' (1995) 11 Journal of Applied Business Research 58
Kshetri, 'The simple economics of cybercrimes'
Neal Kumar Katyal, 'Criminal law in cyberspace' (2001) 149 University of Pennsylvania Law Review 1003
Ibid
https://www.washingtonpost.com/blogs/comic-riffs/post/nobody-knows-youre-a-dog-as-iconic-internet-cartoon-turns-20-creator-peter-steiner-knows-the-joke-rings-as-relevant-as-ever/2013/07/31/73372600-f98d-11e2-8e84-c56731a202fb_blog.html?utm_term=.8cc4b79354f7
Alexandre López Borrull and Charles Oppenheim, 'Legal aspects of the Web' (2004) 38 Annual review of information science and technology 483
Though every computer or smart device has a machine address which can be easily spoofed, we are talking here specifically about geographical location. The remote access, incognito logins, encrypted platforms for communication, anonymous remailers and availability of ‘cached’ copies of frequently accessed internet resources further complicate and make impossible to attribute actions in cyberspace.
Dan L Burk, 'Jurisdiction in a World without Borders' (1997) 1 Va JL & Tech 1
Lessig, 'The law of the horse: What cyberlaw might teach'
In real space nature is represented by architecture.
That includes software that makes internet to behave as it is.
Graham Greenleaf, 'An endnote on regulating cyberspace: architecture vs law?' (1998)
Lessig, 'The law of the horse: What cyberlaw might teach'
Greenleaf, 'An endnote on regulating cyberspace: architecture vs law?'
Council of Europe, Convention on Cybercrime, 23 November 2001, available at: http://www.refworld.org/docid/47fdfb202.html [accessed 26 February 2017]
Ibid. Articles 23-35
Ibid. Preamble
DOI: https://doi.org/10.26483/ijarcs.v8i5.3617
Refbacks
Copyright (c) 2017 International Journal of Advanced Research in Computer Science

