References
- ACPO . 2006 . Good Practice Guide for ComputerBased Electronic Evidence London
- ACPO . 2009a . E-crime Strategy London
- ACPO . 2009b . See http://library.npia.police.uk/docs/acpo/Advice-for-Managers-E-CrimeInvestigations.pdf
- Anwar , Z. , Montanari , M. , Gutierrez , A. and Campbell , R. 2009 . Budget constrained optimal security hardening of control networks for critical cyber-infrastructures . International Journal of Critical Infrastructure Protection , 2 : 13 – 25 .
- Ayers , D. 2009 . A second generation computer forensic analysis system . Digital Investigation , 6 : S34 – S42 .
- Berners-Lee , T. 2009 . The inventor's eye view . New Scientist , 6 June
- Brady , H. 2008 . Europol and the European Criminal Intelligence Model . Policing , 2 : 103 – 109 .
- Brenner , S. W. 2007 . Private-public sector co-operation in combating cybercrime: in search of a model . Journal of International Law and Technology , 2 : 2
- Bryant , R. 2008 . Investigating Digital Crime , Edited by: Bryant , R. Chichester : Wiley .
- Cabinet Office . 2009 . Cyber Security Strategy of the United Kingdom , London : The Stationery Office .
- Carson , D. 2009 . Detecting, developing and disseminating detectives ‘creative’ skills . Policing and Society , 19 ( 3 ) : 216 – 225 .
- Cisco . 2008 . Annual Security Report See http://cisco.com/en/US/prod/collateral/vpndevc/securityreview12-2.pdf
- Cisco . 2009 . Annual Security Report See http://www.cisco.com/en/US/prod/collateral/vpndevc/cisco_2009_asr.pdf
- Commonwealth of Australia . 2010 . Hackers, Fraudsters and Botnets: Tackling the Problem of Cyber Crime , Canberra : Parliament of the Commonwealth of Australia .
- CPP . 2010 . Millions snared in web fraud . See http://blog.cpp.co.uk
- Cross , M. 2008 . Scene of the Cybercrime , 2 , Waltham : Syngress .
- Cyberspace Policy Review . 2009 . See http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf
- Estonia . 2008 . Cyber Security Strategy , Tallinn : Estonia Ministry of Defence .
- Europol . 2007 . High Tech Crimes Within the EU, Threat Assessment , The Hague .
- Fahsing , I. A. , Glomseth , R. and Gottschalk , P. 2008 . Characteristics of effective SIOs: a content analysis for management in police investigations . International Journal of Management and Enterprise Development , 5 ( 6 ) : 708 – 722 .
- Fleming , J. and Grabosky , P. 2009 . Managing the demand for police services, or how to control an insatiable appetite . Policing , 3 ( 3 ) : 281-291
- Fletcher , N. 2007 . Challenges for regulating financial fraud in cyberspace . Journal of Financial Crime , 14 : 2
- Gallagher , F. 2009 . The future of fighting crime . Police Professional , 10 September
- Goldsmith , A. J. 2010 . Policing's new visibility . British Journal of Criminology , 50 ( 5 ) : 914 – 934 .
- Guo , Y. , Slay , J. and Beckett , J. 2009 . Validation and verification of computer forensic software tools . Digital Investigations , 6 : S12 – S22 .
- Hibbert , K. and Robinson , A. 2009 . Combating e-crime . Police Professional , 18 June
- HM Government . 2010 . A Strong Britain in an Age of Uncertainty: The National Security Strategy , London : The Stationery Office .
- Hoare , P. 2010 . SOCA emphasises value of collaboration in fight against cyber crime . Police Professional , 25 March
- Hunton , P. 2009 . The growing phenomenon of crime and the internet: a cybercrime execution and analysis model . Computer Law & Security Review , 25 ( 6 ) : 528 – 535 .
- Hunton , P. 2010 . Cyber crime and security: a new model of law enforcement investigation . Policing , 4 ( 4 ) : 385 – 395 .
- Labovitz , C. 2010 . Attack severs Burma internet . See http://asert.arbornetworks.com/2010/11/attac-severs-myanmar-internet/
- Levi , M. 2010 . Proceeds of crime: fighting the financing of terrorism . Criminal Justice Matters , 81 ( 1 ) : 38 – 39 .
- McAfee . 2008 . McAfee Virtual Criminology Report See http://resources.mcafee.com/content/NAMcAfeeCriminologyReport
- McMurdie , C. 2008 . The e-crime gap . Police Professional , 11 December
- McMurdie , C. 2010 . Cyber skills a top challenge, says police cyber crime unit . See www.computerweekly.com
- Moulton , E. 2008 . The future of cybercrime . Police Professional , September
- New Zealand Police . 2009 . Electronic Crime Strategy to 2010. Policing With Confidence Wellington
- Nikkel , B. J. 2006 . Improving evidence acquisition from live network sources . Digital Investigations , 3 : 89 – 96 .
- Qin , J. , Zhou , Y. , Reid , E. , Lai , G. and Chen , H. 2007 . Analyzing terror campaigns on the internet: technical sophistication, content richness and web interactivity . International Journal of Human-Computer Studies , 65 : 71 – 84 .
- Reedy , P. , Diplock , B. and Dunlop , M. 2010 . Interpol's Forensic Science Review , Edited by: Daeid , N. N. and Houck , M. Boca Raton : CRC Press .
- Rodgers , M. , Goldman , J. , Mislan , R. , Wedge , T. and Debrota , S. 2006 . Computer forensics triage process model. Conference on Digital Forensics, Security and Law
- Wall , D. 2007 . Cybercrime: The Transformation of Crime in the Information Age , Cambridge : Polity Press .
- Yar , M. 2006 . Cybercrime and Society , London : Sage .