Abstract
Telecommunications technologies have changed not only the ways in which crimes are committed but also the ways in which offenders interact in committing them. The truism of “action at a distance” exemplified by online crime, whereby offenders and victims need not be located in the same place or even the same country, also holds for relationships between co-offenders. Online criminal groups can operate effectively without their members ever meeting in person, being able to recognize each other by sight, or knowing each other’s real names.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Bibliography
Anton, D. and Urbas, G. (2011) “Why Julian Assange May Have a Case to Answer in Australia,” Legal Theory Blog, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1733666## (accessed 11 February 2015).
Bronitt, S. and McSherry, B. (2010) Principles of Criminal Law 3rd edn, Sydney: Thomson Reuters.
Choo, K-K. R., Smith, R. G. and McCusker, R. (2007) “Future Directions in Technology-Enabled Crime 2007–09,” Research in Public Policy Series 78, Canberra, Australia: Australian Institute of Criminology.
Gilad, M. (2012) “Virtual or Reality: Prosecutorial Practices in Cyber Child Pornography Ring Cases,” Richmond Journal of Law and Technology 18: 1–66.
Hardy, K. (2010) “Operation Titstorm: Hacktivism or Cyber-Terrorism?,” University of New South Wales Law Journal 33 (2): 474–502.
Krone, T. (2004) “A Typology of Online Child Pornography Offending,” Trends & Issues in Crime and Criminal Justice no. 279, Canberra, Australia: Australian Institute of Criminology.
McCusker, R. (2006) “Transnational Organised Cyber Crime: Distinguishing Threat From Reality,” Crime, Law and Social Change 46: 257–73.
Odgers, S. (2010) Principles of Federal Criminal Law 2nd edn, Sydney: Thomson Reuters.
Terre des Hommes (2013) “Webcam Child Sex Tourism,” http://www.terredeshommes.org/webcam-child-sex-tourism-2/ (accessed 11 February 2015).
Urbas, G. (2007) “Cross-National Investigation and Prosecution of Intellectual Property Crimes: The Example of ‘Operation Buccaneer’,” Crime, Law and Social Change 46: 207–21.
Urbas, G. (2008) “Look Who’s Stalking: Cyberstalking, Online Vilification and Child Grooming Offences in Australian Legislation,” Internet Law Bulletin 10 (6): 62–9.
Urbas, G. (2012) “Copyright, Crime and Computers: New Legislative Frameworks for Intellectual Property Rights Enforcement,” Journal of International Commercial Law and Technology 7: 11–26.
Urbas, G. (2012) “Cybercrime, Jurisdiction and Extradition: The Extended Reach of Cross-Border Law Enforcement,” Journal of Internet Law 16 (1): 7–17.
Urbas, G. (2013) “Australia’s Accession to the Convention on Cybercrime,” Inter-net Law Bulletin 16: 2–3.
Urbas, G. and Choo, R. (2008) “Resource Materials on Technology-Enabled Crime,” Technical and Background Paper no. 28, Canberra, Australia: Australian Institute of Criminology.
Urbas, G. and Grabosky, P. (2006) “Cybercrime and Jurisdiction: An Australian Perspective,” in Cybercrime and Jurisdiction: A Global Survey, B. -J. Koops and S. Brenner (eds.), IT and Law Series no. 11, The Hague, the Netherlands: TMC Asser Press.
Editor information
Editors and Affiliations
Copyright information
© 2015 Gregor Urbas
About this chapter
Cite this chapter
Urbas, G. (2015). Complicity in Cyberspace: Applying Doctrines of Accessorial Liability to Online Groups. In: Smith, R.G., Cheung, R.CC., Lau, L.YC. (eds) Cybercrime Risks and Responses. Palgrave Macmillan’s Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, London. https://doi.org/10.1057/9781137474162_13
Download citation
DOI: https://doi.org/10.1057/9781137474162_13
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-55788-2
Online ISBN: 978-1-137-47416-2
eBook Packages: Palgrave Social Sciences CollectionSocial Sciences (R0)