LawCite Search | LawCite Markup Tool | Help | Feedback

Law
Cite


Cases Referring to this Journal Article | Law Reform Reports Referring to this Journal Article | Law Journal Articles Referring to this Journal Article | Legislation Cited | Cases and Articles Cited

Help

"Phish to Fry: Responding to the Phishing Problem"   flag 

[2005] JlLawInfoSci 4
Black, Peter
Journal of Law and Information Science
Australia

Legislation Cited

s179
Legislation Name Provision
Fair Trading Act 1992 (ACT) s12
Privacy Act 1988 (Cth)
Spam Act 2003 (Cth) s6, s7, s16
Trade Marks Act 1995 (Cth)
Legislation Amendment (Telecommunications Offences and Other Measures) Act (No. (Cth)
Trade Practices Act (Cth) s52
Crimes Act 1900 (NSW)
Trading Act 1987 (NSW) s10
Consumer Affairs and Fair Trading Act 1990 (NT) s42
Fair Trading Act 1989 (Qld) s38
Criminal Law Consolidation Act 1935 (SA) s144B, s144C, s42
Fair Trading Act 1987 (WA)

Cases and Articles Cited

Case Name Citation(s) †  Court Jurisdiction Date Full Text Citation Index
""Phishing" for a Solution: Domestic and International Approaches to Decreasing Online Identity Theft" (2006) 20 Emory International Law Review 397 Emory International Law Review United States circa 2006 HeinOnline / LexisNexis flag 1
"Phishing for Elderly Victims: As the Elderly Migrate to the Internet Fraudulent Schemes Targeting Them Follow" (2006) 14 Elder Law Journal 423 Elder Law Journal United States circa 2006 HeinOnline / Westlaw flag 1
"Texas's New E-Consumer Protection Acts: A (Ph)arewell to Phishing and Spyware?" (2006) 13 Texas Wesleyan Law Review 265 Texas Wesleyan Law Review United States circa 2006 HeinOnline / LexisNexis flag 1
(2006) 13 Richmond Journal of Law & Technology 2 (2006) 13 Richmond Journal of Law & Technology 2 Richmond Journal of Law & Technology United States circa 2006 LexisNexis flag 1
"Catching a phish: protecting online identity" (2006) 8 Internet Law Bulletin 133 Internet Law Bulletin Australia circa 2006 flag 1
[2005] Tex Gen Laws 1468 [2005] Tex Gen Laws 1468 United States - Texas circa 2005 flag 1
[2005] Duke Law and Technology Review 6 [2005] Duke Law and Technology Review 6 Duke Law and Technology Review United States circa 2005 LexisNexis flag 1
"Identity Theft In Cyberspace: Crime Control Methods And Their Effectiveness In Combating Phishing Attacks" (2005) 20 Berkeley Technology Law Journal 259 Berkeley Technology Law Journal United States circa 2005 HeinOnline / LexisNexis flag 2
"Will the new code keep the lid on spam?" (2005) 8 Internet Law Bulletin 1 Internet Law Bulletin Australia circa 2005 flag 3
A Useful Tool Against Identity Theft ’ [2004] Writ 16 United Kingdom - Northern Ireland circa 2004 HeinOnline flag 1
Western Geophysical Co of America v Bolt Associates, Inc , DConn 1969 15 USC 18; 305 FSupp 1248 United States Code United States circa 1969 LII (Cornell) flag 144
"Criminal Law in Cyberspace" 149 University of Pennsylvania Law Review 1003 University of Pennsylvania Law Review United States circa 2005 HeinOnline / LexisNexis flag 9
18 USC 1344 18 USC 1344 United States Code United States circa 2005 LII (Cornell) flag 297
Wire Fraud Act 18 USC 1343; 82 FCC 1 United States Code United States circa 2005 LII (Cornell) flag 543
18 USC 1029 18 USC 1029 United States Code United States circa 2005 LII (Cornell) flag 151
18 USC 1028 18 USC 1028 United States Code United States circa 2005 LII (Cornell) flag 68
15 USC 6821 15 USC 6821 United States Code United States circa 2005 LII (Cornell) flag 1
15 USC 1643 15 USC 1643 United States Code United States circa 2005 LII (Cornell) flag 4

LawCite: Privacy | Disclaimers | Conditions of Use | Acknowledgements | Feedback