References
- Anderson , R. 2007 . Closing the phishing hole – fraud, risk and nonbanks , Cambridge : Cambridge University Press .
- Association of Chief Police Officers of England . 2009 . ACPO e-crime strategy 2009 report , London : Association of Chief Police Officers .
- Australian Institute of Criminology and The Australian High Tech Crime Centre . 2005 . High tech crime brief No. 9: Phishing , Canberra : Australian Institute of Criminology .
- Bauer , J. and Van Eeten , M. 2009 . Cybersecurity: Stakeholder incentives, externalities and policy options . Telecommunications Policy , 33 : 706 – 719 .
- BBC News . 2001 . Tackling computer crime 19 April 2001. Retrieved from http://news.bbc.co.uk/1/hi/sci/tech/1283866.stm
- BBC News . 2009 . UK e-mail law attack on rights 9 June 2009. Retrieved from http://news.bbc.co.uk/1/hi/uk/7819230.stm
- BBC News . 2010a . Beware cyber scams on the net 8 January 2010. Retrieved from http://news.bbc.co.uk/1/hi/programmes/click_online/8448304.stm
- BBC News . 2010b . Flaws in chip and pin bank card security identified 11 February 2010. Retrieved from http://news.bbc.co.uk/1/hi/sci/tech/8511710.stm
- Bohm , N. , Brown , I. and Gladman , B. 2000 . Electronic commerce: who carries the risk of fraud? . Journal of Information, Law and Technology , 3
- Bryant , R. 2008 . Investigating digital crime , Chichester : Wiley .
- Chung , W. , Chen , H. , Chang , W. and Shihchieh , C. 2006 . Fighting cybercrime: a review and the Taiwan experience . Decision Support Systems , 4 ( 3 ) : 669 – 682 .
- CIFAS . 2009 . The anonymous attacker: a special report on identity fraud and account takeover , London : CIFAS .
- Cisco . 2009 . Cisco 2009 annual security report: highlighting global security threats and trends , California : Cisco .
- Commission Nationale de l'informatique et des libertés . Definitions: spam Retrieved from http://www.cnil.fr/dossiers/conso-pub-spam/halte-au-spam/definitions/
- Council of Europe . 2001 . Convention on cybercrime , Budapest : Council of Europe .
- Cross , M. 2008 . Scene of cybercrime , New York : Syngress Elsevier .
- Department of Business Innovation, and Skillsand, Department for Culture., Media and, Sports . 2009 . White paper final report: June 2009 – digital Britain , London : Department for Innovation and Skills .
- DiMarco , H. 2003 . “ Electronic cloak: secret sexual deviance in cybersociety. In ” . In Dot.cons: crime, deviance and identity on the Internet , Edited by: Jewkes , Y. London : Willan .
- Facebook . 2010 . Statistics Retrieved from http://www.facebook.com/press/info.php?statistics
- Federal Networking Council . 1995 . FNC resolution: definition of ‘Internet’ , Washington, DC : Federal Networking Council .
- Federation of Small Businesses . 2009 . Online crime and fraud costs small businesses £800 each year, says FSB 20 February. Retrieved from http://www.epolitix.com/stakeholder-websites/press-releases/press-release-details/newsarticle/online-crime-and-fraud-costs-small-businesses-800-each-year-says-fsb///sites/federation-of-small-businesses/
- Financial Fraud Action UK . 2009 . Financial Fraud Action UK announces latest fraud figures 7 October. Retrieved from http://www.banksafeonline.org.uk/documents/2009H1FraudPressRelease.pdf
- Financial Services Authority . 2000 . E banking: risks and responses 29 March. Retrieved from http://www.fsa.gov.uk/Pages/Library/Communication/Speeches/2000/sp46.shtml
- Finjan Malicious Code Research Centre . 2009 . Cybercrime intelligence report September. Retrieved from http://www.finjan.com/Content.aspx?id=1367
- Fletcher , N. 2007 . Challenges for regulating financial fraud in cyberspace . Journal of Financial Crime , 14 (2 ) : 190 – 207 .
- Fraud Advisory Panel . 2009 . Fraud facts: cybercrime – social networks and virtual world October. Retrieved from http://www.fraudadvisorypanel.org/newsite/pdf_show.php?id=119
- Furnell , S. 2010 . “ Hackers, viruses and malicious software ” . In Handbook of Internet crime , Edited by: Jewkes , Y. and Majid , Y. Devon : Willan .
- Gagnot , B. 2008 . “ Cyberwars and cybercrimes ” . In Technocrime: technology, crime and social control , Edited by: Leman-Langlois , S. Devon : Willan .
- Garlik . 2009 . UK cybercrime report 2009 September. Retrieved from www.garlik.com/press.php?id=613-GRLK_PRD
- Gartner Group . 2009 . Major financial services firms call online banking dangerous 31 August. Retrieved from http://www.gartner.com/resources/170800/170881/major_financial_services_fir_170881.pdf
- Gordon , S. and Ford , R. 2002 . Cyberterrorism? . Computers & Security , 21 (7 ) : 636 – 647 .
- Gordon , S. and Ford , R. 2006 . On the definition and classification of cybercrime . Journal in Computer Virology , 2 (1 ) : 13 – 20 .
- Grabosky , P . 2001 . Virtual criminality: old wine in new bottles? . Social and Legal Studies , 10 (2 ) : 243 – 249 .
- Granville , J. 2003 . Dot.Con: the dangers of cyber crime and a Cal fro proactive solutions . Australia Journal of Politics and History , 49 (1 ) : 102 – 109 .
- Guest , S. 2007 . Management/IT: E-crimes needs more e-police . Law Society Gazette , 12 (2 )
- Harvey , D. 2003 . Cyberstalking and Internet harassment: what the law can do Society, Safety and the Internet Conference Proceedings, Paper presented at Netsafe II, Retrieved from http://www.netsafe.org.nz/Doc_Library/netsafepapers_davidharvey_cyberstalking.pdf
- HM Treasury . 2007 . Fraud report 2006–07: an analysis of reported fraud in government departments , London : HM Treasury .
- Home Office. (2009) . Fraud Retrieved from http://www.homeoffice.gov.uk/crime-victims/reducing-crime/fraud/
- House of Lords Science and Technology Committee . 2007 . Personal internet security , London : House of Lords . HL Paper 165-I, 5th Report of Session 2006–07
- House of Lords . 2008 . Personal internet security: follow-up House of Lords Science and Technology Committee, 4th Report of Session 2007–2008. Retrieved from http://www.publications.parliament.uk/pa/ld200708.ldselect/ldsctech/131/131.pdf
- Hunter , P. 2004 . Chip and pin – biggest UK retail project since decimalisation, but not enough on its own to defeat card fraud . Computer Fraud & Security , 5 : 4 – 5 .
- Hunton , P. 2009 . The growing phenomenon of crime and the Internet: a cybercrime execution and analysis model . Computer Law & Security Review , 25 : 528 – 535 .
- Identity Fraud Steering Committe . 2010 . Frequently asked questions , London : Home Office .
- Internet Glossary Working Group . 1993 . Internet engineering task force's request for comments (RFC) 1392 January. Retrieved from www.ietf.org/rfc/rfc1392.txt
- Jenkins , J . 2009 . Hacked to pieces Radio 4, Bristol, 28 April
- Jewkes , Y. 2010 . “ Public policing and Internet crime ” . In Handbook of Internet crime , Edited by: Jewkes , Y. and Majid , Y. Devon : Willan .
- Jewkes , Y. and Majid , Y. 2010a . Handbook of Internet crime , Devon : Willan .
- Jewkes , Y. and Majid , Y. 2010b . “ Histories and contexts ” . In Handbook of Internet crime , Edited by: Jewkes , Y. and Majid , Y. Devon : Willan .
- Krone , T. 2005 . High tech crime brief no. 1 , Canberra : Australian Institute of Criminology . Retrieved from http://www.aic.gov.au/documents/6/B/6/%7B6B679000–637F–4A27–9229–3C42928B364B%7Dhtcb001.pdf
- Kvarnstrom , H. , Lundin , E. and Johnsson , E. 2000 . “ Combining fraud and intrusion detection – meeting new requirements ” . In Proceedings at the Fifth Nordic Workshop on Secure IT Systems Paper presented October 2010. Retrieved from http://www.eurescum.eu
- Levi , M. 1998 . The prevention of fraud , London : Home Office . Home Office Crime Prevention Unit
- Levi , M. 2009 . Suite revenge?: The shaping of folk devils and moral panics about white-collar crimes . British Journal of Criminology , 49 (1 ) : 48 – 67 .
- Levi , M. and Burrows , J. 2008 . Measuring the impact of fraud in the UK: a conceptual and empirical journey . British Journal of Criminology , 48 (2 ) : 293 – 318 .
- Levi , M. , Burrows , J. , Fleming , M. and Hopkins , M. 2007 . The nature, extent and economic impact of fraud in the UK , London : Association of Chief Police Officers .
- Levy , S. 2002 . Heroes of the computer revolution New York: Penguin
- Lockie , M. 2009 . Card fraud rises in the United Kingdom . Card Technology Today , 21 (3 ) : 3 – 4 .
- McAfee . 2008 . McAfee virtual criminology report: cybercrime versus cyberlaw Retrieved from http://img.en25.com/Web/McAfee/mcafee_VCR_US_lowResFinal_REV.pdf
- Metropolitan Police Service . 2008 . Sterling: an economic crime strategy for London – Report 2005–2008 , London : Metropolitan Police Service .
- Murdoch , S. and Anderson , R. 2009 . Verified by Visa and MasterCard SecureCode: or, how not to design authentication , Cambridge : University of Cambridge .
- National Fraud Authority . 2008 . The national fraud strategy: a new approach to combating fraud , London : National Fraud Authority .
- National Fraud Authority . 2010 . National Fraud Authority annual fraud indicator , London : National Fraud Authority .
- Nehaluddin , A. 2009 . Hacker's criminal behaviour and laws related to hacking . Computer and Telecommunications Law Review , 15 (7 ) : 159 – 165 .
- Office of Fair Trading . 2006 . Fraud Review final report: a consultation response by the Office of Fair Trading , London : Office of Fair Trading .
- Office of Fair Trading . 2007 . Research on impact of mass marketed scams , London : Office of Fair Trading .
- Office of National Statistics . 2009 . Internet access 26 August. Retrieved from http://www.statistics.gov.uk/CCI/nugget.asp?ID=8
- Parker , D. 1998 . Fighting computer crime: a new framework for protecting information , New York : Wiley .
- Philippsohn , S. and Thomas , S. 2003 . E-fraud – what companies face today . Computer Fraud & Security , 1 : 7 – 9 .
- Police Oracle . 2008 . Cyber cops face a tough challenge Retrieved from http://constantcontentsource.com/pdf/article-12097.pdf
- Raywood , D. 2010 . Online banking credentials are used by two-thirds of users on other websites, 3rd February Retrieved from http://www.scmagazineuk.com/online-banking-credentials-are-used-by-two-thirds-of-users-on-other-websites/article/163034/
- Royal Bank of Scotland. (2010) . Secure terms of use Retrieved from https://www.rbssecure.co.uk/rbs/tdsecure/terms_of_use.jsp
- Reid , A. and Ryder , N. 2001 . For whose eyes-only? A critique of the United Kingdom's Regulation of Investigatory Powers Act 2000 . Information and Communications Technology , 10 (2 ) : 179 – 201 .
- Ryder , N. 2007 . A false sense of security? An analysis of legislative approaches to the prevention of terrorist finance in the United States of America and the United Kingdom . Journal of Business Law, November , : 821 – 850 .
- Saksena , P. and Fox , M. 2004 . Accounting fraud and the Sarbanes–Oxley Act . International Company and Commercial Law Review , 15 (8 ) : 244 – 251 .
- Sandywell , B. 2010 . “ On the globalisation of crime: the Internet and new criminality ” . In Handbook of internet crime , Edited by: Jewkes , Y. and Yar , M. Devon : Willan .
- Serious Organised Crime Agency . 2009 . The United Kingdom threat assessment of organised crime , London : Serious Organised Crime Agency .
- Smith , R. 2010 . “ Identity theft and fraud ” . In Handbook of Internet crime , Edited by: Jewkes , Y. and Majid , M. Devon : Willan .
- Soper , M. 2009 . Conficker worm shuts down French and UK Air Forces 10 February. Retrieved from http://www.maximumpc.com/article/news/conficker_worm_shuts_down_french_and_uk_air_forces
- Symantec Intelligence . 2009 . Quarterly Report October–December, 2009 Retrieved from http://eval.symantec.com/mktginfo/enterprise/other_resources/b-symc_intelligence_quarterly_oct-dec_2009_20949850.en-us.pdf
- The Audit Commission . 1987 . Audit Commission computer fraud survey , London : HMSO .
- The Law Commission . 2002 . Fraud: report on a reference under Section 3(1)(e) of the Law Act 1965/ , London : Law Commission .
- Thomas , D. and Loader , B. 2000 . CyberCrime: law enforcement, security and surveillance in the information age , London : Routledge .
- Trend Micro . 2009 . Data-stealing malware on the rise – solutions to keep businesses and consumers safe Retrieved from http://us.trendmicro.com/imperia/md/content/us/pdf/threats/securitylibrary/data_stealing_malware_focus_report_-_june_2009.pdf
- Turner , M. and Callaghan , D. 2006 . Is shopping online now risk free for UK consumers? . Computer Law & Security Report , 22 (4 ) : 333 – 337 .
- United Nations . 1997 . UN manual on the prevention and control of computer related crime , New York : United Nations .
- VeriSign . 2009 . VeriSign advises retailers to build trust online , London : VeriSign .
- Wall , D. 2001 . Crime and the Internet , London : Routledge .
- Wall , D. 2010 . “ Criminalising the cyberspace: the rise of the Internet as a ‘crime problem’ ” . In Handbook of internet crime , Edited by: Jewkes , Y. and Majid , Y. Devon : Willan .
- Yar , M. 2006 . Cybercrime and society , London : Sage .
- Zeviar-Geese , G. 1998 . The state of the law on cyberjurisdiction and cybercrime on the internet . Gonzaga Journal of International Law , 1 : 5 – 7 .