Vol. 59 No. 2 (2011)

Studies

Imre Szabó (Author)
5-20
Dangers of IT terrorism in Hungary
PDF (Hungarian)
DOI: https://doi.org/10.38146/bsz-ajia.2011.v59.i2.pp5-20
Nándor Lajos Mezey (Author)
21-48
Is cyberterrorism a real danger?
PDF (Hungarian)
DOI: https://doi.org/10.38146/bsz-ajia.2011.v59.i2.pp21-48
Tibor Ibolya (Author)
49-59
Torrent raids under Hungarian criminal law
PDF (Hungarian)
DOI: https://doi.org/10.38146/bsz-ajia.2011.v59.i2.pp49-59
Krisztina Karsai (Author)
60-84
Counterfeit products: a legal minefield: Legal application and interpretation anomalies revealed in the analysis of an apparently harmless crime.
PDF (Hungarian)
DOI: https://doi.org/10.38146/bsz-ajia.2011.v59.i2.pp60-84
István Ambrus, Zoltán Deák (Author)
85-103
Major issues in bank card-related crimes
PDF (Hungarian)
DOI: https://doi.org/10.38146/bsz-ajia.2011.v59.i2.pp85-103
Attila Rigó, Babett Mátrai Lászlóné Dr. Ózsvárth (Author)
104-115
Asset recovery in theory and practice: examples from the UK and Germany
PDF (Hungarian)
DOI: https://doi.org/10.38146/bsz-ajia.2011.v59.i2.pp104-115

Instructive investigations

István Szikinger (Author)
116-129
The End of Al Capone's Career
PDF (Hungarian)
DOI: https://doi.org/10.38146/bsz-ajia.2011.v59.i2.pp116-129

Other studies

Erika Asztalos, Adrienn Szabó (Author)
130-134
Monthly overview of EU legislation and relevant events (January-February)
PDF (Hungarian)
DOI: https://doi.org/10.38146/bsz-ajia.2011.v59.i2.pp130-134