Normal view MARC view

Entry Topical Term

Number of records used in: 3

001 - CONTROL NUMBER

  • control field: 112348

003 - CONTROL NUMBER IDENTIFIER

  • control field: DLC

005 - DATE AND TIME OF LATEST TRANSACTION

  • control field: 20200604175001.0

008 - FIXED-LENGTH DATA ELEMENTS

  • fixed length control field: 060303i| anannbabn |a ana

010 ## - LIBRARY OF CONGRESS CONTROL NUMBER

  • LC control number: sh 85029492

040 ## - CATALOGING SOURCE

  • Original cataloging agency: DLC
  • Transcribing agency: DLC
  • Modifying agency: DLC
  • Modifying agency: NNU
  • Modifying agency: ViU
  • Modifying agency: DLC

053 #0 - LC CLASSIFICATION NUMBER

  • Classification number element--single number or beginning number of span: HV6772
  • Classification number element--ending number of span: HV6773.3

150 ## - HEADING--TOPICAL TERM

  • Topical term or geographic name entry element: Computer crimes

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Computers and crime

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Cyber crimes

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Cybercrimes

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Electronic crimes (Computer crimes)

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Internet crimes

550 ## - SEE ALSO FROM TRACING--TOPICAL TERM

  • Control subfield: g
  • Topical term or geographic name entry element: Crime

550 ## - SEE ALSO FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Privacy, Right of

670 ## - SOURCE DATA FOUND

  • Source citation: 00351496: Adamski, A. Prawo kame komputerowe, c2000.

670 ## - SOURCE DATA FOUND

  • Source citation: Excite WWW directory of subjects, July 10, 2001
  • Information found: (cybercrimes; subcategory under Criminal, Branches of law, Law, Education)

670 ## - SOURCE DATA FOUND

  • Source citation: Electronic crime needs assessment for state and local law enforcement, 2001:
  • Information found: glossary, p. 41 (electronic crime includes but is not limited to fraud, theft, forgery, child pornography or exploitation, stalking, traditional white-collar crimes, privacy violations, illegal drug transactions, espionage, computer intrusions; no synonyms given)

670 ## - SOURCE DATA FOUND

  • Source citation: U.S. Federal Bureau of Investigation. Connecticut Computer Crimes Task Force press release, June 30, 2004 via WWW, Jan. 16, 2005
  • Information found: (the Connecticut Computer Crimes Taskforce was formed to investigate crimes occuring over the internet)

Powered by Koha