You are on page 1of 1

133

(Cyber pornography) I THT (Software piracy); 3T-3 73TET, IHTTEZ T

TUEIT CtehtUT (Traditional Classification)


HrT (Sieber) 3HTT HTET 3777 YTTA TifT A zTT
3TTE T (1) 3TT}YT F6Y HTT 377T (Cyber Crime of Ecomonic Type)
7 (2) f T TaT 3 (Cyber Crimes against Privacy) I 7a ë f

HIHTR athUT (General Classification)

TH7, HT-BIA, GZT fHEH T TATH 3A erE 37HTH (unauthorised access), *13

S I 3TT HEYA (indecent exposures), 37, 44HI2 7 U7ATA FTER TZTA 3TTE

2. u7 fa HIGar 3 THtAT T , 3HH ATT


G T , HAT 3UT IAT (denial of service attack); aitg TYET TR*

theft), afaafea ad I 4-47 3T HATSYTI


,RTTZ E4-TN (time

737, 377TTaT, 31f HfHfara

Cvbe Systems)
Crimes committed in Cyber Space through Computer

F(Sieher Ll
Sicher 1 ich: the International Handbook of Computer Crime p.

You might also like