The Association of Digital Forensics, Security and Law (ADFSL)
Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which results in an unjustifiable infringement of civil rights. Since countries worldwide are focusing attention on the control of information on the Internet, the debate in respect of state control and the consequences of state control is relevant on a global level as it impacts on all Internet-connected countries.
Bowrey, K. (2005), Law and Internet Cultures, BPA Print Group, Australia, pages 20, 62 - 67.
Gringras, C. (2003), The Laws of the Internet, Cromwell Press Limited, UK, page i.
Hiller, J.S. and Cohen, R. (2002), Internet Law and Policy, Pearson Education Inc, New Jersey, pages 6, 7 – 76, 95, 98 – 102, 170 - 171.
Janczewski, L and Colarik, A. (2005), Managerial Guide for Handling Cyberterrorism and Information Warfare, Idea Group Publishing, USA, page 43.
Lyon, D. (2003), Surveillance after September 11, Blackwell Publishing Inc, USA, pages 29, 158.
Rustad, M. and Daftary, C. (2002), E-business Legal Handbook, Aspen Publishers, Inc, New York, pages xxxix, 5, 6.
Chapter in Books
Edwards, L. and Howells G. (2003), “Anonymity, consumers and the Internet: where everyone knows you’re a dog”, in Digital Anonymity and the Law: Tensions and Dimensions, eds.C.Nicoll, J.E.J. Prins, M.J.M. van Dellen, TMC Asser Press, The Hague, pages 216 – 217, 222 – 224.
Goemans, C. and Dumortier, J. (2003), “Enforcement issues – Mandatory Retention of Traffic Data in the EU: Possible Impact on Privacy and On-line Anonymity”, in Digital Anonymity and the Law: Tensions and Dimensions, eds.C.Nicoll, J.E.J. Prins, M.J.M. van Dellen, TMC Asser Press, The Hague, pages 165 – 172.
McCellan, G.S. (1976), “Privacy in a Free Society,” in The Right to Privacy, eds G.S. McCellan, H.W.Wilson Company, New York, page 25.
Opperman, C.P. (2000), “Internet Law in South Africa”, in Cyberlaw@SA: The law of the Internet, ed. R. Buys, Van Schaik Publishers, SA, page x11.
Poore, R.S. (2002), “Computer forensics and privacy: At what price do we police the Internet” in The Privacy Papers Managing Technology, Consumer, Employee, and Legislative Actions, ed. R Herold, Auerbach Publications, New York, page 33.
Author unknown (Editorial notes). (2006), “Immunizing the Internet”, Harvard Law Review, Vol 119, pages 2445 – 2463.
Defilippis, A. J. (2006), “Securing Informationships: Recognizing a Right to Privity in Fourth Amendment Jurisprudence”, The Yale Law Journal, Vol 115, pages 1086 – 1093.
Flint, D. (2006), “Don’t be evil” Business Law Review, pages 102 – 104.
Schulz, E. (2005), “Personal information comprises: It is time for the U.S. Government to wake up”, Computers and Security, Vol 24, pages 261 – 262.
Watney, M.M. (2006), “Regulation of Internet Pornography in South Africa”, Journal of Contemporary Roman Dutch Law, pages 227 – 237, 381 – 395.
Author unknown. (2006), “United Nations forum on control of the Internet opens in Athens” http://www.mg.co.za/printPage.aspx?area=/breaking_news/breaking_n ews_business/&a. (30/10/2006).
Author unknown. (2006), “Privacy in Cyberspace”, http://www.privcy/rights.org/index,htm, see file:E:\Privacy in Cyberspace.htm.
Author unknown. (2006), “Iran bans fast internet to cut West’s influence” http://ww.mg.co.za/printPage.aspx?area=/breaking_news/breaking_ne ws_international (18/10/2006).
McCullough, D. (2006), “America debates data retention” http://insight.zdnet.co.uk/0,39020415,39263973,00.htm (24/09/2006).
Morphy, E. (2006), “AG wants law compelling ISPs to hold Customer Data” http://www.ecommercetimes.com/story/53142.html?u=crbuys&p=EN NSS_0be3a1d63b9517 (30/09/2006).
"The Evolution of Internet Legal Regulation in Addressing Crime and Terrorism,"
Journal of Digital Forensics, Security and Law: Vol. 2
, Article 3.
Available at: https://commons.erau.edu/jdfsl/vol2/iss2/3