Résumés
Résumé
Cet article a pour but de clarifier la notion de cybercrime et de la situer dans un cadre criminologique où elle pourrait être utile à la compréhension du processus d’incrimination de nouvelles conduites et de l’organisation de la réponse organisationnelle et individuelle à la criminalité. En limitant la catégorie de cybercriminalité aux conduites faisant appel aux réseaux informatiques, des questions intéressantes sont soulevées au sujet du concept d’opportunité criminelle, de dommage, de victimisation, etc.
Mots clés:
- cybercrime,
- cyberterrorisme,
- criminologie,
- contrôle social,
- commerce électronique,
- criminalité,
- droit
Abstract
This paper analyses the notion of “cybercrime” from a criminological point of view and proposes a number of ways in which it can be useful in the study of criminalisation and the organisation of official, organisational and individual responses. “Cybercrime” is defined as the use of computer networks in activities defined as criminal. This definition raises new questions regarding opportunity, harm, victimisation and other related concepts.
Keywords:
- Cyber-crime,
- Cyber-terrorism,
- Criminology,
- Social Control,
- Electronic Commerce,
- Crime,
- Law
Parties annexes
Références
- 01Net (2005). Les FAI mis en cause pour l’accès à un site révisionniste. http://www.01net.com/editorial/279716/justice/les-fai-mis-en-cause-pour-l-acces-a-un-site-revisionniste.
- Associated Press (AP) (2005). ChoicePoint Was Targeted Before. http://www.wired.com/news/politics/0,1283,66767,00.htm.
- Beardwood, J. (2003). Creeping Law ? An Analysis of the Canadian Lawful Access Consultation Document and Its Approach to Implement the Council of Europe’s Convention on Cyber-Crime. Computer Law Review International, 3, 77-83.
- Benedikt, M. (1992). Cyberspace : First Steps. Cambridge, Massachusetts : Massachusetts Institute of Technology Press.
- Branigan, S. (2005). High-Tech Crimes Revealed : Cyberwar Stories from the Digital Front. Boston : Addison-Wesley.
- Brenner, S. (2004). U.S. Cybercrime Law : Defining Offenses. Information Systems Frontiers, 6 (2), 115-132.
- Bureau de la protection des infrastructures essentielles et de la protection civile (BPIEPC) (2003). Les menaces aux infrastructures essentielles canadiennes. http://www.ocipep.gc.ca/opsprods/other/TA03-001_f.pdf.
- Cable News Network (CNN) (2005). Bank security breach may be biggest yet : Account info at Bank of America, Wachopar sold by employees ; more arrests expected, NJ police say. CNNMoney. http://money.cnn.com/2005/05/23/news/fortune500/bank_info/.
- Canada (2003). Loi visant à empêcher la diffusion sur l’Internet de messages non sollicités. http://www.parl.gc.ca/37/2/parlbus/chambus/senate/bills/public/pdf/s-23_1.pdf
- Carnegie Mellon Computer Emergency Response Team (CERT) (2004). 2004 E-Crime Watch Survey Shows Significant Increase in Electronic Crimes. http://www.cert.org/about/ecrime.html.
- Carter, D. (1995, juillet). Computer Crime Categories : How Techno-Criminals Operate. The FBI Law Enforcement Bulletin. http://nsi.org/Library/Compsec/crimecom.html.
- Chen, Y.-C., Chen, P., Song, R. & Korba, L. (2004). Online Gaming Crime and Security Issue — Cases and Countermeasures from Taiwan. Fredericton, NB (Canada) : National Research Council of Canada.
- ChoicePoint (2005). Response to 5/3. Article in The Wall Street Journal. http://www.choicepoint.com/news/statement_050405_1.html.
- Clarke, R. (2005). Ten Years Later. The Atlantic Monthly, 295 (1), 61-77.
- Cohen, S. (2003). Folk Devils and Moral Panics : The Creation of Mods and Rockers (3rd Edition). New York : Routledge.
- Computer Security Institute (CSI) (2005). CSI/FBI Computer Crime and Security Survey. http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2004.pdf.
- Conseil de l’Europe (2001). Convention sur la cybercriminalité. http://conventions.coe.int/Treaty/fr/Treaties/Html/185.htm. (Pas cité dans le texte.)
- Denning, D. (1999). Information Warfare and Security. New York : ACM Press.
- Department of Homeland Security (DHS) (2005). Review of the Transportation Security Administration’s Role in the Use and Dissemination of Airline Passenger Data. DHS, Office of the Inspector General. http://www.dhs.gov/interweb/assetlibrary/OIGr-05-12_Mar05.pdf.
- Etter, B. (2001). Computer Crime, conférence donnée au 4e symposium sur le crime en Australie, Institut australien de criminologie. http://www.aic.gov.au/conferences/outlook4/Etter.pdf.
- Europol (2004). Terrorist Activity in the European Union : Situation and Trends Report (TE-SAT). La Haye : Europol, no 100927.
- FBI (2005). IC3 2004 Annual Internet Fraud Report. http://www1.ifccfbi.gov/strategy/2004_IC3Report.pdf.
- Furnell, S. (2005). Computer Insecurity : Systems at Risk. New York : Springer.
- Government Accountability Office (GAO) (2001). Critical Infrastructure Protection Significant Challenges in Developing National Capabilities. Washington : GAO, no 01-323.
- Gibson, W. (1984). Neuromancer. New York : Penguin Books.
- Herman, A. & Swiss, T. (2000). The World Wide Web and Contemporary Cultural Theory. New York : Routledge.
- Juriscom (2005). Contenus illicites. http://www.juriscom.net/txt/jurisfr/cti/resum.htm.
- Larivière, J. (1998). Les bibliothèques et la nouvelle loi canadienne sur le Droit d’auteur : un commentaire. http://www.robic.ca/cpi/Cahiers/10-2/03LariviereW97.htm. (Pas cité dans le texte.)
- Leman-Langlois, S. (2005). Theft in the Information Age : Music, Technology, Crime and Claims-Making. Knowledge, Technology and Policy, 17 (3-4), 140-163.
- Lessig, L. (2002). The Future of Ideas. New York : Random House.
- Ministère de la Sécurité publique (MSP) (2004). Rapport annuel de gestion, 2003-2004. Québec : MSP. http://www.msp.gouv.qc.ca/msp/biblivir/rappann/2003/rapport_annuel_2003-2004.pdf
- News.com (2005). Gamer Murdered over Cyber-sword Sale. http://www.news.com.au/story/0,10117,12700877-13762,00.html
- PhillyBurbs.com (2005). Hacker Teenager Pleads Guilty. http://www.phillyburbs.com/pb-dyn/news/112-05142005-489320.html.
- Recording Industry Association of America (RIAA) (2005). 2004 Yearend Statistics.http://www.riaa.com/news/newsletter/pdf/2004yearEndStats.pdf.
- Service canadien du renseignement de sécurité (SCRS) (2000). Opérations informatiques (la « cybermenace »). http://www.csis-scrs.gc.ca/fra/operat/io2_f.html.
- Sofaer, A. & Goodman, S. (2001). The Transnational Dimension of Cyber Crime and Terrorism. Stanford : Hoover Institution Press. (Pas cité dans le texte.)
- Speer, D. (2000). Redefining Borders : the Challenges of Cybercrime. Crime, Law and Social Change, 34, 259-273.
- Statistique Canada (2002). Cybercriminalité : enjeux, sources de données et faisabilité de recueillir des données auprès de la police. Ottawa : ministère de l’Industrie.
- Thatcher, S. (2005). Public Policy and the Social Construction of Cyberterror : The Hunt for the Paper Tiger. Thèse de doctorat non publiée, Londres : London School of Economics.
- Thomas, D. & Loader, B. (2000). Cybercrime : Law Enforcement, Security and Surveillance in the Information Age. New York : Routledge. (Pas cité dans le texte.)
- Wall, D. (2003). Cybercrimes : New Wine, No Bottles ? In D. Wall, Cyberspace Crime (105-137). Burlington (VT) : Ashgate.