References
- Action Fraud, 2017. What is Action Fraud? Available from: http://www.actionfraud.police.uk/about-us/who-we-are.
- Anderson, R., et al., 2013. Measuring the cost of cybercrime. In: T. Moore, D. Pym, and C. Ioannidis, eds. The economics of information security and privacy. Berlin: Springer, 265–300.
- Bossler, A.M. and Burrus, G.B., 2011. The general theory of crime and computer hacking: low self-control hackers?. In: T.J. Holt and B.H. Schell, eds. Corporate hacking and technology-driven crime: social dynamics and implications. Hershey, PA: ISI Global, 38–67.
- Bossler, A.M. and Holt, T.J., 2012. Patrol officers’ perceived role in responding to cybercrime. Policing: an international journal of police strategies and management, 35, 16–181. doi: 10.1108/13639511211215504
- Brenner, S.W., 2008. Cyberthreats: the emerging fault lines of the nation state. New York: Oxford University Press.
- Burns, R.G., Whitworth, K.H., and Thompson, C.Y., 2004. Assessing law enforcement preparedness to address internet fraud. Journal of criminal justice, 32, 477–493. doi: 10.1016/j.jcrimjus.2004.06.008
- Cross, C., 2015. No laughing matter: blaming the victim of online fraud. International review of victimology, 21, 187–204. doi: 10.1177/0269758015571471
- Cross, C. and Blackshaw, D., 2015. Improving the police response to online fraud. Policing: a journal of policy and practice, 9, 119–128. doi: 10.1093/police/pau044
- Davis, J.T., 2012. Examining perceptions of local law enforcement in the fight against crimes with a cyber component. Policing: an international journal of police strategies & management, 35, 272–284. doi: 10.1108/13639511211230039
- Dillman, D.A., 2007. Mail and internet surveys: the tailored design, – 2007 update. Hoboken: John Wiley.
- Durkin, K.F. and Bryant, C.D., 1999. Propagandizing pederasty: a thematic analysis of the online exculpatory accounts of unrepentant pedophiles. Deviant behavior, 20, 103–127. doi: 10.1080/016396299266524
- Furnell, S., 2002. Cybercrime: vandalizing the information society. New York, NY: Springer.
- Goodman, M.D., 1997. Why the police don’t care about computer crime. Harvard journal of law and technology, 10, 465–494.
- Hinduja, S., 2004. Perceptions of local and state local law enforcement concerning the role of computer crime investigative teams. Policing: an international journal of police strategies and management, 3, 341–357. doi: 10.1108/13639510410553103
- Hinduja, S., 2007. Computer crime investigations in the United States: leveraging knowledge from the past to address the future. International journal of cyber criminology, 1, 1–26.
- HM Government, 2011. National cyber security strategy 2011–2015. Available from https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/567242/national_cyber_security_strategy_2011.pdf.
- HM Government, 2016. National cyber security strategy 2016–2021. Available from: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/567242/national_cyber_security_strategy_2016.pdf.
- HMIC, 2014a. State of policing: the annual assessment of policing in England and Wales, 2013/2014. Available from https://www.justiceinspectorates.gov.uk/hmicfrs/wp-content/uploads/state-of-policing-13-14.pdf.
- HMIC, 2014b. The strategic policing requirement: An inspection of how police forces in England and Wales deal with threats of a large-scale cyber incident (including criminal attack). London: HM Inspectorate of the Constabulary.
- HMIC, 2017. State of Policing: The annual assessment of policing in England and Wales, 2016. Available from https://www.justiceinspectorates.gov.uk/hmicfrs/wp-content/uploads/state-of-policing-16.pdf
- Holt, T.J. and Bossler, A.M., 2012. Police perceptions of computer crimes in two southeastern cities: an examination from the viewpoint of patrol officers. American journal of criminal justice, 37(3), 396–412. doi: 10.1007/s12103-011-9131-5
- Holt, T.J. and Bossler, A.M., 2016Cybercrime in progress: theory and prevention of technology-enabled offenses. London: Routledge.
- Holt, T.J., Bossler, A.M., and Fitzgerald, S., 2010. Examining state and local law enforcement perceptions of computer crime. In: T. J. Holt, ed, Crime on-line: correlates, causes, and context. Raleigh, NC: Carolina Academic Press, 221–246.
- Holt, T.J., Bossler, A.M., and May, D.C., 2012. Low self-control, deviant peer associations, and juvenile cyberdeviance. American journal of criminal justice, 37(3), 378–395. doi: 10.1007/s12103-011-9117-3
- Holt, T.J., Burruss, G.W., and Bossler, A.M., 2015. Policing cybercrime and cyberterror. Durham, NC: Carolina Academic Press.
- Huey, L.J., 2002. Policing the abstract: some observations on policing cyberspace. Canadian journal of criminology, 44, 243–254.
- Hutchings, A. and Holt, T.J., 2015. A crime script analysis of the online stolen data market. British journal of criminology, 55, 596–614. doi: 10.1093/bjc/azu106
- Jenkins, P., 2001. Beyond tolerance: child pornography on the internet. New York: New York University Press.
- Lanier, M.M. and Cooper, A.T., 2016. From papyrus to cyber: how technology has directed law enforcement policy and practice. Criminal justice studies: a critical journal of crime, Law and society, 29, 92–104. doi: 10.1080/1478601X.2016.1170280
- Lavorgna, A., 2015. Organized crime goes online: realities and challenges. Journal of money laundering control, 18, 153–168. doi: 10.1108/JMLC-10-2014-0035
- Levi, M., et al., 2016. The implications of economic cybercrime for policing. City of London Corporation. Available from: https://www.cityoflondon.gov.uk/business/economic-research-and-information/research-publications/Documents/Research-2015/Economic-Cybercrime-FullReport.pdf.
- Lurigio, A.J. and Skogan, W.G., 1994. Winning the hearts and minds of police officers: an assessment of staff perceptions of community policing in Chicago. Crime and delinquency, 40 (3), 315–330. doi: 10.1177/0011128794040003002
- Marcum, C., et al., 2010. Policing possession of child pornography online: investigating the training and resources dedicated to the investigation of cybercrime. International journal of police science and management, 12, 516–525.
- Marcum, C. and Higgins, G.E., 2011. Combating child exploitation online: predictors of successful ICAC task forces. Policing: a journal of policy and practice, 5, 310–316. doi: 10.1093/police/par044
- McAfee, 2017. McAfee labs threats report, June 2017. Available from: https://www.mcafee.com/us/resources/reports/rp-quarterly-threats-jun-2017.pdf.
- National Institute of Justice, 2008. Electronic crime scene investigations: a guide for first responders (2nd ed.)NCJ 219941. Washington, DC: National Institute of Justice.
- Navarro, J.N., Clevenger, S., and Marcum, C.D., eds. 2016. The intersection between intimate partner abuse, technology, and cybercrime: examining the virtual enemy. Raleigh, NC: Carolina Academic Press.
- NCA, 2017. Pathways into cyber Crime. National Cyber Crime Unit/Prevent Team, National Crime Agency. Available from: http://www.nationalcrimeagency.gov.uk/publications/791-pathways-into-cyber-crime/file.
- Office for National Statistics, 2016. Overview of fraud statistics: year ending March 2016. Available from: https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/articles/overviewoffraudstatistics/yearendingmarch2016.
- Police Executive Research Forum, 2014. The role of local law enforcement agencies in preventing and investigating cybercrime. Washington, DC: Police Executive Research Forum.
- Rogers, M., Smoak, N.D., and Liu, J., 2006. Self-reported deviant computer behavior: a big-5 moral choice, and manipulative exploitive behavior analysis. Deviant behavior, 27(3), 245–268. doi: 10.1080/01639620600605333
- Senjo, S.R., 2004. An analysis of computer-related crime: comparing police officer perceptions with empirical data. Security journal, 17, 55–71. doi: 10.1057/palgrave.sj.8340168
- Stambaugh, H., et al., 2001. Electronic crime needs assessment for state and local law enforcement. Washington, DC: National Institute of Justice. Available from: http://www.ncjrs.gov/pdffiles1/nij/186276.pdf.
- Symantec, 2017. 2017 Internet security threat report. Available from: https://resource.elq.symantec.com/LP=3980?cid=70138000001BjppAACandmc=202671andot=wpandtt=swandinid=symc_threat-report_regular_to_leadgen_form_LP-3980_ISTR22-report-main.
- UK Home Office, 2015. Crime against businesses: findings from the 2014 commercial victimization survey. Available from: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/505066/crime-against-businesses-2014.pdf.
- UK Home Office, 2016. Police workforce, England and Wales, 31 March 2016. UK Home Office National Statistics. Available from: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/544849/hosb0516-police-workforce.pdf.
- Wall D. S., 2001. Cybercrimes and the internet. In: D.S. Wall, ed. Crime and the internet. New York: Routledge, 1–17.
- Wall, D.S., 2007a. Cybercrime: the transformation of crime in the information age. Cambridge: Polity Press.
- Wall, D.S., 2007b. Policing cybercrimes: situating the public police in networks of security within cyberspace. Police practice and research: an international journal, 8, 183–205. doi: 10.1080/15614260701377729
- Wall, D.S. and Williams, M.L., eds. 2014. Policing cybercrime: networked and social media technologies and the challenge for policing. London: Routledge.
- Whitty, M.T. 2013. The scammers persuasive techniques model: development of a stage model to explain the online dating romance scam. British journal of criminology, 53(4), 665–684. doi: 10.1093/bjc/azt009
- Wolak, J, Finkelhor, D, Mitchell, K.J., and Jones, L.M. 2011. Arrests for child pornography production: data at two time points from a national sample of U.S. Law enforcement agencies. Child maltreatment, 16, 184–195. doi: 10.1177/1077559511415837
- Yar, M. 2013. Cybercrime and society. London: SAGE Publications.