
- 作 者:GERALDINE SZOTT MOOHR
- 出 版 社:THOMSON WEST
- 出版年份:2008
- ISBN:0314154310
- 注意:在使用云解压之前,请认真核对实际PDF页数与内容!
在线云解压
价格(点数)
购买连接
说明
转为PDF格式
15
(在线云解压服务)
云解压服务说明
1、本站所有的云解压默认都是转为PDF格式,该格式图书只能阅读和打印,不能再次编辑。
云解压下载及付费说明
1、所有的电子图书云解压均转换为PDF格式,支持电脑、手机、平板等各类电子设备阅读;可以任意拷贝文件到不同的阅读设备里进行阅读。
2、云解压在提交订单后一般半小时内处理完成,最晚48小时内处理完成。(非工作日购买会延迟)
PART Ⅰ. THE COMMON LAW OF THEFT AND MISAPPROPRIATION 2
Chapter 1. Introduction 2
A. "What Is Stolen Must Be Property" 2
B. Expanding Conceptions of Property and Conduct 4
Chapter 2. The Common Law of Theft 17
A. Introduction 17
B. The Mens Rea of Theft Offenses 18
C. The Property Element of Theft Offenses 29
D. Property Issues Raised by Computer Use 40
Chapter 3. Misappropriation and Conversion 60
A. What Is Misappropriation? 61
B. Modern Applications of Misappropriation Doctrine 72
C. What Is Conversion? 87
PART Ⅱ. CRIMES OF INTELLECTUAL PROPERTY AND INFORMATIO 112
NChapter 4. Trade Secrets and the Economic Espionage Act 112
A. What Is a Trade Secret? 113
B. Why Are Trade Secrets Protected? 128
C. The Economic Espionage Act 144
D. Policy Implications of the EEA 177
Chapter 5. Fraudulent Misappropriation of Information 192
A. Federal Mail and Wire Fraud 193
B. Fraud and Confidential Information 221
C. Refining the Property Element 238
D. Insider Trading 267
Chapter 6. Criminal Copyright Infringement 291
A. The Rationale of Copyright Law 292
B. Criminal Copyright Infringement—The Basic Offense 303
C. Copyright Infringement as Theft and Fraud 324
D. New Copyright Crimes 348
PART Ⅲ. RELATED OFFENSES 380
Chapter 7. Identity Theft 380
A. What Is Identity Theft? 381
B. The Federal Criminal Scheme 391
Chapter 8. Computer Fraud and Abuse 420
A. The Computer Fraud and Abuse Act 420
B. Damaging Computers 423
C. Using Computers to Defraud and Misappropriate 444
D. Using Computers for Spam 468
STATUTORY APPENDIX 482
INDEX 515