8. └φφε≥ΦpεΓαφφα  ßΦßδΦεπpα⌠Φ 

╓σδⁿ■ ±ε±≥αΓδσφΦ  ²≥εΘ αφφε≥Φ≡εΓαφφεΘ ßΦßδΦεπ≡α⌠∞∞  Γδ σ≥±  ∩ε∞ε∙ⁿ Γ ∩≡σΣε±≥αΓδσφΦΦ Σε±≥α≥ε≈φε ∩εδφεπε φαßε≡α Φ±≥ε≈φΦΩεΓ Φφ⌠ε≡∞α÷ΦΦ, Ωε≥ε≡√σ ∩ε∞επ≤≥ ≈Φ≥α≥σδ■ ²≥εΘ ΩφΦπΦ. ▌≥Φ Φ±≥ε≈φΦΩΦ Σεδµφ√ ≡α±±∞α≥≡ΦΓα≥ⁿ±  ΩαΩ ∞ΦφΦ∞≤∞ Σδ  ΣαδⁿφσΘ°Φ⌡ Φ±±δσΣεΓαφΦΘ Γ εßδα±≥Φ ßστε∩α±φε±≥Φ. ╩≡ε∞σ ≥επε ΓΩδ■≈σφ√ ±±√δΩΦ φα Σ≡≤πΦσ Φ±≥ε≈φΦΩΦ Φφ⌠ε≡∞α÷ΦΦ Σδ  ≥σ⌡, Ω≥ε ⌡ε≈σ≥ πδ≤ßµσ ετφαΩε∞Φ≥ⁿ±  ± ≥εΘ ΦδΦ ΦφεΘ ∩≡εßδσ∞εΘ.

8.1 ╩ε∞∩ⁿ■≥σpφ√σ ταΩεφ√

[ABA89]
American Bar Association, Section of Science and Technology, "Guide to the Prosecution of Telecommunication Fraud by the Use of Computer Crime Statutes", American Bar Association, 1989.

[BENDER]
Bender, D., "Computer Law: Evidence and Procedure", M. Bender, New York, NY, 1978-φα±≥ε ∙σσ Γpσ∞ .

└Ω≥≤αδⁿφα Φτ-τα Σε∩εδφσφΦΘ. ┬√∩≤±ΩΦ ± 1978 ∩ε 1984 πεΣ pα±±∞α≥pΦΓαδΦ Ωε∞∩ⁿ■≥σpφ√σ ταΩεφ√, ≤δΦΩΦ Φ ∩pε÷σΣ≤p√. ┬ ±δσΣ≤■∙Φσ πεΣ√ pα±±∞α≥pΦΓαδΦ±ⁿ εß∙Φσ Ωε∞∩ⁿ■≥σpφ√σ ταΩεφ√. ┬Ωδ■≈σφ√ ßΦßδΦεπpα⌠Φ≈σ±ΩΦσ ±±√δΩΦ Φ ΦφΣσΩ±

[BLOOMBECKER]
Bloombecker, B., "Spectacular Computer Crimes", Dow Jones- Irwin, Homewood, IL. 1990.

[CCH]
Commerce Clearing House, "Guide to Computer Law", (Topical Law Reports), Chicago, IL., 1989.

╬∩Φ±αφΦ  ±≤Σσßφ√⌡ pατßΦpα≥σδⁿ±≥Γ ∩ε Ωε∞∩ⁿ■≥σpφ√∞ ∩pσ±≥≤∩δσφΦ ∞ Γ ⌠σΣσpαδⁿφε∞ ±≤Σσ Φ ±≤Σα⌡ °≥α≥εΓ Φ ∩pΦπεΓεp√ ∩ε φΦ∞. ┬Ωδ■≈ασ≥ ≥αßδΦ÷≤ Φ ΦφΣσΩ±.

[CONLY]
Conly, C., "Organizing for Computer Crime Investigation and Prosecution", U.S. Dept. of Justice, Office of Justice Programs, Under Contract Number OJP-86-C-002, National Institute of Justice, Washington, DC, July 1989.

[FENWICK]
Fenwick, W., Chair, "Computer Litigation, 1985: Trial Tactics and Techniques", Litigation Course Handbook Series No. 280, Prepared for distribution at the Computer Litigation, 1985: Trial Tactics and Techniques Program, February-March 1985.

[GEMIGNANI]
Gemignani, M., "Viruses and Criminal Law", Communications of the ACM, Vol. 32, No. 6, Pgs. 669-671, June 1989.

[HUBAND]
Huband, F., and R. Shelton, Editors, "Protection of Computer Systems and Software: New Approaches for Combating Theft of Software and Unauthorized Intrusion", Papers presented at a workshop sponsored by the National Science Foundation, 1986.

[MCEWEN]
McEwen, J., "Dedicated Computer Crime Units", Report Contributors: D. Fester and H. Nugent, Prepared for the National Institute of Justice, U.S. Department of Justice, by Institute for Law and Justice, Inc., under contract number OJP-85-C-006, Washington, DC, 1989.

[PARKER]
Parker, D., "Computer Crime: Criminal Justice Resource Manual", U.S. Dept. of Justice, National Institute of Justice, Office of Justice Programs, Under Contract Number OJP-86-C-002, Washington, D.C., August 1989.

[SHAW]
Shaw, E., Jr., "Computer Fraud and Abuse Act of 1986, Congressional Record (3 June 1986), Washington, D.C., 3 June 1986.

[TRIBLE]
Trible, P., "The Computer Fraud and Abuse Act of 1986", U.S. Senate Committee on the Judiciary, 1986.

═αταΣ | ╤εΣσ≡µαφΦσ | ┬∩σ≡σΣ