Access Keys:
Skip to content (Access Key - 0)
Left Ad-Bar

References and Work Cited

“About Identity Theft - Deter. Detect. Defend. Avoid ID Theft." Federal Trade Commission. Web. 22 Feb. 2010. <http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html>.  

“Blumenthal v. Drudge.” EPIC Archive - Free Speech. Electronic PrivacyInformationCenter (EPIC), 8 Apr. 2002. Web. 4 Apr. 2010. <http://epic.org/free_speech/blumenthal_v_drudge.html>.  

“Conversion Law.” Wikipedia._Wikimedia Foundation, Inc. 12 April, 2010. <http://en.wikipedia.org/wiki/Conversion_(law)>  

“Conversion.” The Lectric Law Library. 12 April, 2010. <http://www.lectlaw.com/def/c309.htm

“Cyber Crime Called Out as 'Clear and Present Danger' by Deloitte's New Center for Security & Privacy Solutions: Risk-Based Approach for Combating Fastest Growing Security Threat Recommended.” 25 January, 2010. _PR Newswire. Retrieved March 3, 2010, from ABI/INFORM Dateline. (Document ID: 1947073381). 

“Cyberterrorism.” The IT Law Wiki. Web. 13 Apr. 2010. <http://itlaw.wikia.com/wiki/Cyberterrorism>. “FCC - Reports.” Communications Decency Act of 1996 (CDA). Federal Communications Commission (FCC), 1996. Web. 4 Apr. 2010. <http://www.fcc.gov/Reports/tcom1996.txt>. 

“Full-Scale July 4th Cyber Attacks Waged Against U.S., S. Korean Gov. Sites | ChattahBox News Blog." ChattahBox News Blog | Breaking News | Latest News | Current News. Web. 13 Apr. 2010. <http://chattahbox.com/technology/2009/07/08/full-scale-july-4th-cyber-attacks-waged-against-us-s-korean-gov-sites/>. 

“Global Napster Usage Plummets, But New File-Sharing Alternatives Gaining Ground, Reports Jupiter Media Metrix"The Free Library. 23 July 2001. 10 April 2010 <http://www.thefreelibrary.com/GLOBAL NAPSTER USAGE PLUMMETS, BUT NEW FILE-SHARING ALTERNATIVES...-a076784518>. 

“Greatest Cyber Risk Driven by Remote Network Access and Embedded Malicious Code: Deloitte Poll”. 6  January, 2010. PR Newswire.  Retrieved March 3, 2010, from ABI/INFORM Dateline. (Document ID: 1933738301). 

“If You Can Handle A Really Depressing Teen Suicide Story Right Now…” 4 March. Jezebel. http://jezebel.com/gossip/hell-is-other-people/if-you-can-handle-a-really-depressing-teen-suicide-story-right-now-322888.php 

“Trespass To Chattels.” The Lectric Law Library. 12 April, 2010. <http://www.lectlaw.com/def2/t047.htm

“Tunes Store and DRM-free Music: What You Need to Know." Macworld. 7 Jan. 2009. Web. 12 Apr. 2010. <http://www.macworld.com/article/138000/2009/01/drm_faq.html>. 

“US CODE: Title 47,230." LII | Legal Information Institute. CornellUniversityLawSchool. Web. 4 Apr. 2010. <http://www.law.cornell.edu/uscode/47/230.html>. 

“Virtual World Definition from PC Magazine Encyclopedia.” Definition Of: Virtual World. PCMag.com. Ziff Davis Publishing Holdings Inc. Web. 8 Apr. 2010. <http://www.pcmag.com/encyclopedia_term/0,2542,t=virtual+world&i=59269,00.asp>. 

Apple Inc. (2001-01-09). "Apple Introduces iTunes — World’s Best and Easiest To Use Jukebox Software". http://www.apple.com/pr/library/2001/jan/09itunes.html 

Aquilina, James M. “ ‘Botherder’ Dealt Record Prison Sentence for Selling and Spreading Malicious Computer Code” 8 May 2006. U.S.Department of Justice. 3 March 2010. <http://www.justice.gov/criminal/cybercrime/anchetaSent.htm

Graham, J. “CompuServe Incorporated, Plaintiff vs. Cyber Promotions, Inc. and Sanford Wallace, Defendants.” Learning Cyberlaw in Cyberspace. 12 April, 2010. <http://www.cyberspacelaw.org/chon/compuserv.html

Hoar, Sean B. “Identity Theft: Crime of the New Millennium” March 2001 USA Bulletin. 3 March 2010 <http://www.cybercrime.gov/usamarch2001_3.htm

Johnson, Bobbie. "Virtual Theft on the Rise." Guardian.co.uk - Technology - Law and Technology. Guardian News and Media Limited 2010, 20 Nov. 2008. Web. 8 Apr. 2010. <http://www.guardian.co.uk/technology/2008/nov/20/theft-in-virtual-worlds>. 

Kozinski. “Kremen V. Cohen.” Issues In Internet Law. 12 April, 2010.  <http://www.issuesininternetlaw.com/cases/kremen.html> Larson, Aaron. "Defamation, Libel and Slander Law." ExpertLaw. Aug. 2003. Web. 3 Apr. 2010. <http://www.expertlaw.com/library/personal_injury/defamation.html>. 

Maya Babu, Mysore Grahakara Parishat. “What Is Cybercrime?” 11 Oct. 2004 Compute Crime Research Center.  3 March 2010 < http://www.crime-research.org/analytics/702/2

Naavi. "Cyber Terrorism...A New Challenge to Law Enforcement Agencies." Naavi's Portal on Indian Cyber Law. Web. 13 Apr. 2010. <http://www.naavi.org/cl_editorial/edit_10_sep_02_01.html>. 

Parker, Laura. “Jury awards $11.3M over defamatory Internet posts” 11 Oct. 2006. USA Today. http://www.usatoday.com/news/nation/2006-10-10-internet-defamation-case_x.htm 

Posner, G. "China's Secret Cyberterrorism - Page 1 -." The Daily Beast. Web. 22 Feb. 2010. <http://www.thedailybeast.com/blogs-and-stories/2010-01-13/chinas-secret-cyber-terrorism/>. 

Rosenberg, Dave. "Korea Rules Virtual Currency as Good as Cash." CNET News. CBS Interactive, 19 Jan. 2010. Web. 8 Apr. 2010. <http://news.cnet.com/8301-13846_3-10437250-62.html?part=rss&subj=news&tag=2547-1_3-0-20>. 

Sadun, Erica. "Getting Naked with DRM-free ITunes Upgrades: the Details." Ars Technica. Condé Nast Digital, 7 Jan. 2009. Web. 10 Apr. 2010. <http://arstechnica.com/apple/news/2009/01/getting-naked-with-drm-free-itunes-upgrades-the-details.ars>. 

Samson, Martin H. "Online Defamation/Libel/Communications Decency Act." Internet Library of Law and Court Decisions. 21 Nov. 2008. Web. 3 Apr. 2010. <http://www.internetlibrary.com/internetlib_subject.cfm?TopicID=71>. 

Smilon, M. "U.S. Announces What Is Believed The Largest Identity Theft Case In American History; Losses Are In The Millions. November 25, 2002. "Welcome to the United States Department of Justice. Web. 13 Apr. 2010. <http://www.justice.gov/criminal/cybercrime/cummingsIndict.htm>. 

Wagner, James Au. "Why Virtual Theft Should Matter to Real Life Tech Companies." GigaOM. The GigaOM Network, 18 Nov. 2007. Web. 8 Nov. 2010. <http://gigaom.com/2007/11/18/why-virtual-theft-should-matter-to-real-life-tech-companies/>. 

Ward, Mark. "Does Virtual Crime Need Real Justice?" BBC News - Technology. BBC, 29 Sept. 2003. Web. 8 Apr. 2010. <http://news.bbc.co.uk/2/hi/technology/3138456.stm>. 

Wortham, Jenna, and Nick Bilton. "Big Web Attack on Twitter is the third one this year." New York Times. 19 Dec. 2009. Web. 22 Feb. 2010. <https://cms.psu.edu/section/content/default.asp?WCI=pgDisplay&WCU=CRSCNT&ENTRY_ID=CD089DD2ECD7409B8EDDCDA5F8EF9CF4>.  

Relevant cases for cyber crimes and cyber torts: 

A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004 (9th Cir. 2001). View 

Blumenthal v. Drudge, 992 F. Supp. 44 (D.D.C. 1998) View 

Bragg v. Linden Research, Inc., 487 F.Supp.2d 593, No. CIV.A.06 4925 (E.D.Pa., 2007) View 

Children of America, Inc. v. Edward Magedson, et al., CV 2007-003720 (D. Ariz., 2007) View 

Jane Doe v. Myspace, Inc. Case No. 07-50345, slip op. (5th Cir. 2008) View 

John Green v. America Online & John Does 1 and 2, 318 F.3d 465, No. 01-1120 (3rd Cir., 2003) View 

Parker v. Google, Inc., Civ. No. 04-CV-3918 (E.D. Pa., 2006), affirmed -- F.3d – (3rd Cir. 2007) View 

Patentwizard, Inc., et al. v. Kinko's Inc., 163 F. Supp. 2d 1069 (D.S.D., 2001) View 

Randall Stoner v. Ebay Inc., et al., 2000 WL 1705637, Civ. No. 305666 (Sup. Ct. Ca., 2000) View 

Schneider v. Amazon.com, Inc., Case No. 46791-3-I, 31 P.3d 37 (Wash. Ct. App., 2001) View 

Stanley Young v. New Haven Advocate, et al. No. 01-2340 (4th Cir. 2002) View 

Stephen J. Barrett, et al. v. Ilena Rosenthal, S122953, 40 Cal.4th 33 (Cal.Sup. Ct., 2006) View 

Taylor Building Corporation of Americav. Eric Benfield, Case No. 1:04cv510 (S.D. Ohio, 2007) View 

Whitney Information Network, Inc. v. Xcentric Ventures, LLC, No. 06-11888 (11th Cir, 2006) View 

Zeran v. AmericaOnline, Inc., 129 F.3d 327 (4th Cir. 1997) View