2 Overview of Real Space Trespass
2.1 Common
Law Trespass Actions
2.2 Statuatory
Trespass Actions
2.3 Trespass
Case Law
3 Overview of Cyberspace Trespass
3.1 Computer
Fraud and Abuse Act of 1984
3.2 State Statutes
Regarding Computer Crime and Trespass
4 Technical and Legal Discussion of Cyberspace
Cases
4.1 Element
I: Intent
4.2 Element
II: Entry
4.3 Element
III: Property
4.4 Element
IV: Permission
5 Technical and Legal Discussion of Potential Trespass
in Cyberspace
5.1 Spam Email
5.2 Active
Email
5.3 Web Page
Hack
5.4 Breaking
Into a Personal Computer
6 Current Strategies for Dealing With Trespass
in Cyberspace
6.1 Technology
6.2 Legislation
and Government
6.3 Social
Norms and Markets
7 The Metaphor of Trespass Breaks Down
7.1 Problems
of Trespass in Cyberspace
7.2 Should
Trespass Be Applied to Cyberspace?
9 Guiding Metaphors
9.1
Web Hacking as Exploring a Street of Doors
9.2
Spam as Direct Marketing
9.3
The Usefulness and Limits of Metaphors
9.4
Conceptualization: A More Helpful Approach
10 Definitions
11 Proposed Legal and Technical Architecture
12 Evaluation
13 Projections
14 Conclusion
Appendices
Appendix A Credit of Authors
Appendix B Acknowledgements
Appendix C References
Appendix D Executive Summary