Show Less


Protecting Information Through Criminal Law

Eli Lederman

It has often been said that information is power. This is more true in the information age than ever. The book profiles the tools used by criminal law to protect confidential information. It deals with the essence of information, the varieties of confidential information, and the basic models for its protection within the context of the Internet and social networks.
Buy Book in Print
Show Summary Details
You do not have access to this content

Chapter 5: Epilogue

Eli Lederman


The three suggested models do not form a closed or final list. Nor are they mutually exclusive. Despite the theoretical distinctions between the models, in practice their external boundaries are not always distinct, and their internal subdivision is at times hazy. As a result, certain situations can meet the requirements of more than one model and can be simultaneously covered by two or even all three models. In such a case, every model seeks the circumstantial derivative relevant to its requirements.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information

or login to access all content.