Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 736738, 6 pages
http://dx.doi.org/10.1155/2014/736738
Review Article

The Need for Specific Penalties for Hacking in Criminal Law

Center for Information Security Technologies (CIST), Korea University, Seoul 136-701, Republic of Korea

Received 13 April 2014; Accepted 29 May 2014; Published 16 June 2014

Academic Editor: Sang-Soo Yeo

Copyright © 2014 Sangkyo Oh and Kyungho Lee. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. K. B. Jain, “Hacking-ethical or criminal: a legal quandary,” The IUP Journal of Information Technology, pp. 49–56, 2008. View at Google Scholar
  2. A. Dudley, J. Braman, and G. Vincenti, Investigating Cyber Law and Cyber Ethics, Information Science Reference, Hershey, Pa, USA, 2011.
  3. G. Cybenko, A. Giani, C. Heckman, and P. Thompson, “Cognitive hacking: technological and legal issues,” in Proceedings of the Law and Technology Conference, 2002.
  4. A. Chandler, “The changing definition and image of hackers in popular discourse,” International Journal of the Sociology of Law, vol. 24, no. 2, pp. 229–251, 1996. View at Publisher · View at Google Scholar · View at Scopus
  5. Y. Choi, “Present information crimes and systematic counter-measures,” Korea Institute of Criminology, vol. 1997, no. 1, pp. 13–236, 1997. View at Google Scholar
  6. 2014, http://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act.
  7. R. C. Kain, “Federal computer fraud and abuse act: employee hacking legal in California and Virginia, but illegal in Miami, Dallas, Chicago, and Boston,” The Florida Bar Journal, vol. 87, no. 1, 2013. View at Google Scholar
  8. T. E. Booms, “Hacking into federal court: employee authorization under the computer fraud and abuse act,” Vanderbilt Journal of Entertainment and Technology Law, vol. 13, 2011. View at Google Scholar
  9. Korea Internet and Security Agency, “Internet legislation trend,” Internet Legislation Trend, vol. 70, 2013. View at Google Scholar
  10. D. Searls, “How “Aaron’s law” is good for business,” Harvard Business Review, 2013, http://blogs.hbr.org/2013/02/how-aarons-law-is-good-for-bus/. View at Google Scholar
  11. H. Jahankhani and A. Al-Nemrat, “Examination of cyber-criminal behaviour,” International Journal of Information Science and Management, pp. 41–48, 2010. View at Google Scholar
  12. Korea Internet and Security Agency, “A Study on Solutions for the Advancement of Security Legislation,” Korea Communications Commission, December 2011.
  13. B. Liang and H. Lu, “Internet development, censorship, and cyber crimes in China,” Journal of Contemporary Criminal Justice, vol. 26, no. 1, pp. 103–120, 2010. View at Publisher · View at Google Scholar · View at Scopus
  14. S. Yang, “Cyber crime trends and criminal liability,” Internet & Security Focus, September 2013.
  15. H. Choi, “Loopholes in criminal law to new types of hacking attacks,” Criminal Policy Research, vol. 18, no. 4, 2007. View at Google Scholar
  16. 2014, http://en.wikipedia.org/wiki/Portscan.
  17. S.-R. Kim, “Zur Strafbarkeit von Phishing,” IT & Law Review, vol. 4, 2010. View at Google Scholar
  18. L. W. Sang, “Die Vorfeldkriminalisierung des Hackens und das seine Eintritt in die Alltagssphare,” Anam Law Review, vol. 28, p. 294, 2009. View at Google Scholar
  19. L. W. Sang, “A study on discussion of the attempted hacking penal measure,” Korean Journal of Comparative Criminal Law, vol. 13, 2011. View at Google Scholar
  20. S. Jeong, “A study on reasonable sentencing in structural aspects,” Chungnam Law Review, vol. 24, no. 2, 2013. View at Google Scholar
  21. S. Lee, “A study on the improvement of discretionary mitigation statute in new sentencing system,” Inha Law Review, vol. 16, no. 3, 2013. View at Google Scholar