Computer thieves have traditionally been able to market their stolen goods as legitimate.

Monthly Plan

  • Access everything in the JPASS collection
  • Read the full-text of every article
  • Download up to 10 article PDFs to save and keep
$19.50/month

Yearly Plan

  • Access everything in the JPASS collection
  • Read the full-text of every article
  • Download up to 120 article PDFs to save and keep
$199/year

Log in through your institution

journal article

Criminal Redistribution of Stolen Property: The Need for Law Reform

Michigan Law Review

Vol. 74, No. 8 (Aug., 1976)

, pp. 1511-1626 (116 pages)

Published By: The Michigan Law Review Association

https://doi.org/10.2307/1287992

https://www.jstor.org/stable/1287992

Read and download

Log in through your school or library

Subscribe to JPASS

Unlimited reading + 10 downloads

Journal Information

The Michigan Law Review began publication in 1902 and is the sixth oldest legal journal in the country. The Review originally was intended as a forum for the faculty of the Law Department to publish their legal scholarship. From its inception until 1940, the Review's student members worked under the direction of faculty members who served as Editor-in-Chief. In 1940, the first student Editor-in-Chief was selected. During the years that followed, student editors were given increasing responsibility and autonomy; today, the Review is run with no faculty supervision. Seven of each volume's eight issues ordinarily are composed of articles by legal scholars and practitioners, and notes written by the student editors. One issue in each volume is devoted to book reviews. Occasionally special issues are devoted to symposia or colloquia.

Publisher Information

The Michigan Law Review publishes eight issues annually. Seven of each volume’s eight issues are composed of two major parts: Articles by legal scholars and practitioners, and Notes by law students. One issue in each volume is devoted to book reviews.

Rights & Usage

This item is part of a JSTOR Collection.
For terms and use, please refer to our Terms and Conditions
Michigan Law Review © 1976 The Michigan Law Review Association
Request Permissions

Computer thieves have traditionally been able to market their stolen goods as legitimate.

  • By:
  • Publisher: SAGE Publications Ltd
    • Publication year: 2006
    • Online pub date: June 19, 2012
  • Discipline: Criminology & Criminal Justice
  • Subject: Cybercrime / Computer Crime
  • DOI: https://dx.doi.org/10.4135/9781446212196
  • Keywords:

  • Summary

  • Contents

  • Subject index

Cybercrime and Society provides a clear, systematic, and critical introduction to current debates about cybercrime. It locates the phenomenon in the wider contexts of social, political, cultural, and economic change. It is the first book to draw upon perspectives spanning criminology, sociology, law, politics, and cultural studies to examine the whole range of cybercrime issues.

  • Front Matter

    • Copyright
    • Dedication
    • Preface
    • Acknowledgements

  • Chapters

    • Chapter 1: Cybercrime and the Internet: An Introduction
    • Perceptions of Cybercrime
    • Cybercrime: Questions and Answers
    • A Brief History and Analysis of the Internet
    • Defining and Classifying Cybercrime
    • What's ‘New’ about Cybercrime?
    • How Many Crimes? Assessing the Scale of Internet Offences
    • Challenges for Criminology, Criminal Justice and Policing
    • Summary
    • Study Questions
    • Further Reading
    • Chapter 2: Hackers, Crackers and Viral Coders
    • Hackers and Hacking – Contested Definitions
    • Representations of Hackers and Hacking: Technological Fears and Fantasies
    • What Hackers Actually Do: A Brief Guide for the Technologically Bewildered
    • Hacker Myths and Realities: Wizards or Button-Pushers?
    • ‘Why Do They Do it?’ Motivation, Psychology, Gender and Youth
    • Hacking and the Law: Legislative Innovations and Responses
    • Summary
    • Study Questions
    • Further Reading
    • Chapter 3: Political Hacking: From Hacktivism to Cyberterrorism
    • Introduction
    • Hacktivism and the Politics of Resistance in a Globalised World
    • The Spectre of Cyberterrorism
    • Why Cyber-Terror? Terrorist Advantages of Utilizing Internet Attacks
    • Rhetorics and Myths of Cyberterrorism
    • Alternative Conjunctions between Terrorism and the Internet
    • Summary
    • Study Questions
    • Further Reading
    • Chapter 4: Virtual ‘Pirates’: Intellectual Property Theft Online
    • Introduction
    • Intellectual Property, Copyright and ‘Piracy’: A Brief Guide for the Bewildered
    • Scope and Scale of ‘Piracy’ Activity
    • Explaining the Growth of Internet ‘Piracy’
    • Who are the ‘Pirates’?
    • The Development of ‘Anti-Piracy’ Initiatives
    • Thinking Critically about ‘Piracy’ Statistics
    • Thinking Critically about Intellectual Property Rights
    • Summary
    • Study Questions
    • Further Reading
    • Chapter 5: Cyber-Frauds, Scams and Cons
    • Introduction
    • Scope and Scale of Online Fraud
    • Varieties of Online Fraud
    • Online Fraud: Perpetrators' Advantages and Criminal Justice's Problems
    • Strategies for Policing and Combating Internet Frauds
    • Summary
    • Study Questions
    • Further Reading
    • Chapter 6: Illegal, Harmful and Offensive Content Online: From Hate Speech to Child Pornography
    • Introduction
    • Thinking about ‘Hate Speech’ Online
    • Hate Speech Online
    • Legal, Policing and Political Challenges in Tackling Online Hate Speech
    • The Growth and Popularity of Internet Pornography
    • Criminological Issues Relating to Internet Pornography
    • Child Pornography
    • Legislative and Policing Measures to Combat Online Child Pornography
    • Legal and Policing Challenges in Tackling Child Pornography
    • Summary
    • Study Questions
    • Further Reading
    • Chapter 7: The Victimization of Individuals Online: Cyberstalking and Paedophilia
    • Introduction
    • The Emergence of Stalking as a Crime Problem
    • Cyberstalking
    • Online Paedophilia
    • Thinking Critically about Online Victimization: Stalking and Paedophilia as Moral Panics?
    • Summary
    • Study Questions
    • Further Reading
    • Chapter 8: Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control
    • Introduction
    • From Surveillance to Dataveillance: The Rise of the Electronic Web
    • The Development of Internet Surveillance
    • The Dilemmas of Surveillance as Crime Control: The Case of Encryption
    • Summary
    • Study Questions
    • Further Reading

  • Back Matter

    • Glossary
    • Bibliography

locked icon

Sign in to access this content

Sign in

Get a 30 day FREE TRIAL

  • Watch videos from a variety of sources bringing classroom topics to life

  • Read modern, diverse business cases

  • Explore hundreds of books and reference titles

sign up today!

What motivates pure hackers to steal information?

A primary motivation for hackers is the money they can obtain by stealing your passwords, bank details, holding your customer information for ransom or selling your data to competitors or on the dark web.

Which of the following is true regarding bag operations as a physical method of identity theft?

Which of the following is true regarding bag operations as a physical method of identity theft? They include sifting through commercial or residential trash or waste for information deemed valuable.

Which of the following interprets program instructions and processes data in the computer?

The Processor and Memory: Data Manipulation The processor, as we noted, is also called the central processing unit (CPU). The central processing unit consists of electronic circuits that interpret and execute program instructions, as well as communicate with the input, output, and storage devices.

Which of the following allows perpetrators to commit multinational cybercrime with little fear of judicial sanctions?

The lack of physical boundaries and the removal of traditional jurisdictional demarcations allow perpetrators to commit multinational crime with little fear of judicial sanctions. Electronic purses come in two primary types: limited or closed, and multipurpose or open.