1,631
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

Managing the technical resource capability of cybercrime investigation: a UK law enforcement perspective

Pages 225-232 | Published online: 23 Mar 2012

References

  • ACPO . 2006 . Good Practice Guide for ComputerBased Electronic Evidence London
  • ACPO . 2009a . E-crime Strategy London
  • ACPO . 2009b . See http://library.npia.police.uk/docs/acpo/Advice-for-Managers-E-CrimeInvestigations.pdf
  • Anwar , Z. , Montanari , M. , Gutierrez , A. and Campbell , R. 2009 . Budget constrained optimal security hardening of control networks for critical cyber-infrastructures . International Journal of Critical Infrastructure Protection , 2 : 13 – 25 .
  • Ayers , D. 2009 . A second generation computer forensic analysis system . Digital Investigation , 6 : S34 – S42 .
  • Berners-Lee , T. 2009 . The inventor's eye view . New Scientist , 6 June
  • Brady , H. 2008 . Europol and the European Criminal Intelligence Model . Policing , 2 : 103 – 109 .
  • Brenner , S. W. 2007 . Private-public sector co-operation in combating cybercrime: in search of a model . Journal of International Law and Technology , 2 : 2
  • Bryant , R. 2008 . Investigating Digital Crime , Edited by: Bryant , R. Chichester : Wiley .
  • Cabinet Office . 2009 . Cyber Security Strategy of the United Kingdom , London : The Stationery Office .
  • Carson , D. 2009 . Detecting, developing and disseminating detectives ‘creative’ skills . Policing and Society , 19 ( 3 ) : 216 – 225 .
  • Cisco . 2008 . Annual Security Report See http://cisco.com/en/US/prod/collateral/vpndevc/securityreview12-2.pdf
  • Cisco . 2009 . Annual Security Report See http://www.cisco.com/en/US/prod/collateral/vpndevc/cisco_2009_asr.pdf
  • Commonwealth of Australia . 2010 . Hackers, Fraudsters and Botnets: Tackling the Problem of Cyber Crime , Canberra : Parliament of the Commonwealth of Australia .
  • CPP . 2010 . Millions snared in web fraud . See http://blog.cpp.co.uk
  • Cross , M. 2008 . Scene of the Cybercrime , 2 , Waltham : Syngress .
  • Cyberspace Policy Review . 2009 . See http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf
  • Estonia . 2008 . Cyber Security Strategy , Tallinn : Estonia Ministry of Defence .
  • Europol . 2007 . High Tech Crimes Within the EU, Threat Assessment , The Hague .
  • Fahsing , I. A. , Glomseth , R. and Gottschalk , P. 2008 . Characteristics of effective SIOs: a content analysis for management in police investigations . International Journal of Management and Enterprise Development , 5 ( 6 ) : 708 – 722 .
  • Fleming , J. and Grabosky , P. 2009 . Managing the demand for police services, or how to control an insatiable appetite . Policing , 3 ( 3 ) : 281-291
  • Fletcher , N. 2007 . Challenges for regulating financial fraud in cyberspace . Journal of Financial Crime , 14 : 2
  • Gallagher , F. 2009 . The future of fighting crime . Police Professional , 10 September
  • Goldsmith , A. J. 2010 . Policing's new visibility . British Journal of Criminology , 50 ( 5 ) : 914 – 934 .
  • Guo , Y. , Slay , J. and Beckett , J. 2009 . Validation and verification of computer forensic software tools . Digital Investigations , 6 : S12 – S22 .
  • Hibbert , K. and Robinson , A. 2009 . Combating e-crime . Police Professional , 18 June
  • HM Government . 2010 . A Strong Britain in an Age of Uncertainty: The National Security Strategy , London : The Stationery Office .
  • Hoare , P. 2010 . SOCA emphasises value of collaboration in fight against cyber crime . Police Professional , 25 March
  • Hunton , P. 2009 . The growing phenomenon of crime and the internet: a cybercrime execution and analysis model . Computer Law & Security Review , 25 ( 6 ) : 528 – 535 .
  • Hunton , P. 2010 . Cyber crime and security: a new model of law enforcement investigation . Policing , 4 ( 4 ) : 385 – 395 .
  • Labovitz , C. 2010 . Attack severs Burma internet . See http://asert.arbornetworks.com/2010/11/attac-severs-myanmar-internet/
  • Levi , M. 2010 . Proceeds of crime: fighting the financing of terrorism . Criminal Justice Matters , 81 ( 1 ) : 38 – 39 .
  • McAfee . 2008 . McAfee Virtual Criminology Report See http://resources.mcafee.com/content/NAMcAfeeCriminologyReport
  • McMurdie , C. 2008 . The e-crime gap . Police Professional , 11 December
  • McMurdie , C. 2010 . Cyber skills a top challenge, says police cyber crime unit . See www.computerweekly.com
  • Moulton , E. 2008 . The future of cybercrime . Police Professional , September
  • New Zealand Police . 2009 . Electronic Crime Strategy to 2010. Policing With Confidence Wellington
  • Nikkel , B. J. 2006 . Improving evidence acquisition from live network sources . Digital Investigations , 3 : 89 – 96 .
  • Qin , J. , Zhou , Y. , Reid , E. , Lai , G. and Chen , H. 2007 . Analyzing terror campaigns on the internet: technical sophistication, content richness and web interactivity . International Journal of Human-Computer Studies , 65 : 71 – 84 .
  • Reedy , P. , Diplock , B. and Dunlop , M. 2010 . Interpol's Forensic Science Review , Edited by: Daeid , N. N. and Houck , M. Boca Raton : CRC Press .
  • Rodgers , M. , Goldman , J. , Mislan , R. , Wedge , T. and Debrota , S. 2006 . Computer forensics triage process model. Conference on Digital Forensics, Security and Law
  • Wall , D. 2007 . Cybercrime: The Transformation of Crime in the Information Age , Cambridge : Polity Press .
  • Yar , M. 2006 . Cybercrime and Society , London : Sage .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.