60
H ?H H >;$; 4 $C+;$ GC^'<'^
% . *
X-
,
"
,
" ,
,
! ,
.#.
,
X
, -
!
"
X .
*
,
# (
:
X
,
!X
X .
%
!
(
.#.
),
-
(
.#.
X
),
-
(
) . .
3
.
2.2.
+
«
$" . $ !) # ! )! " *
»
" -
"
% X
,
X ,
X !X , !
" -
,
,
! -
.
'
%
!
"
-
:
X
,
#
"
X . H X
:
( )
"
,
!
,
(")
-
X ,
!
!
-
( )
X ,
! -
# !
.
,
#
-
"
. H X
:
3. E . #
U. Sieber,
Computer Crimes, cyber – terrorism, child pornography and financial
crimes, : D. Spinellis (ed.) Computer Crimes, cyber – terrorism, child pornography and fi-
nancial crimes, . ;.
, 2004, . 11 .