References
- Allen , J. , Forrest , S. , Levi , M. , Roy , H. and Sutton , M. 2005 . Fraud and technology crimes: findings from the 2002/03 British Crime Survey and 2003 Offending, Crime and Justice Survey . Home Office Online Report 34/05 , [Online] Available at: http://www.homeoffice.gov.uk/rds/pdfs05/rdsolr3405.pdf (30 January 2008)
- Balkin , J. , Grimmelmann , J. , Katz , E. , Kozlovski , N. , Wagman , S. and Zarsky , T. 2006 . Cybercrime: Digital Cops in a Networked Environment , Edited by: Balkin , J. , Grimmelmann , J. , Katz , E. , Kozlovski , N. , Wagman , S. and Zarsky , T. New York : New York University Press .
- Barlow , J. P. 1996 . A declaration of the independence of cyberspace . John Perry Barlow Library , [Online] Available at: www.eff.org/Misc/Publications/John_Perry_Barlow/barlow_0296.declaration.txt (30 January 2008)
- Baudrillard , J. 1994 . Simulacra and Simulation , Ann Arbor : University of Michigan Press .
- Baudrillard , J. 1998 . The Consumer Society: Myths and Structures , London : Sage .
- BBC . 2007a . Hi-tech crime “is big business” . BBC News Online , 17 September, [Online] Available at: http://news.bbc.co.uk/1/hi/technology/6998068.stm (30 January 2008)
- BBC . 2007b . E-mails reveal data check warning . BBC News Online , 22 November, [Online] Available at: http://news.bbc.co.uk/1/hi/uk_politics/7106987.stm (30 January 2008)
- BBC . 2007c . Arrests made in botnet crackdown . BBC News Online , 30 November, [Online] Available at: http://news.bbc.co.uk/1/hi/technology/7120251.stm (30 January 2008)
- BBC . 2007d . Up to 3,000 patients' data stolen . BBC News Online , 14 December, [Online] Available at: http://news.bbc.co.uk/1/hi/wales/7143358.stm (30 January 2008)
- BBC . 2007e . Data of 60,000 on stolen computer . BBC News Online , 7 December, [Online] Available at: http://news.bbc.co.uk/1/hi/northern_ireland/7133194.stm (30 January 2008)
- BBC . 2007f . Russia accused of “attack on EU” . BBC News Online , 2 May, [Online] Available at: http://news.bbc.co.uk/1/hi/world/europe/6614273.stm (30 January 2008)
- BBC . 2008a . Web worries after suicide spate . BBC News Online , 23 January, [Online] Available at: http://news.bbc.co.uk/1/hi/wales/7204172.stm (30 January 2008)
- BBC . 2008b . Do social network websites romanticise suicide? Views of 100 respondents . BBC News Online , [Online] Available at: http://newsforums.bbc.co.uk/nol/thread.jspa?forumID=4138&edition=1&ttl=20080124213959 (30 January 2008)
- BBC . 2008c . Estonia fines man for “cyber war” . BBC News Online , 25 January, Available at: http://news.bbc.co.uk/1/hi/technology/7208511.stm (30 January 2008)
- BBC . 2008d . Web disrupted “across Mid-East” . BBC News Online , 30 January, [Online] Available at: http://news.bbc.co.uk/1/hi/technology/7218008.stm (30 January 2008)
- BBC . 2008e . Coroner denies 13 suicides linked . BBC News Online , 8 February, [Online] Available at: http://news.bbc.co.uk/1/hi/wales/7234115.stm (8 February 2008)
- Bell , D. 2001 . An Introduction to Cybercultures , London : Routledge .
- Bethke , B. 1997 . The Etymology of “Cyberpunk” . [Online] Available at: http://www.brucebethke.com/nf_cp.html (30 January 2008)
- Brenner , S. 2002 . Organized cybercrime? How cyberspace may affect the structure of criminal relationships . North Carolina Journal of Law & Technology , 4 ( 1 ) : 1 – 41 .
- Burrows , R. 1997 . “ Cyberpunk as social theory ” . In Imagining Cities: Scripts, Signs and Memories , Edited by: Westwood , S. and Williams , J. 235 – 248 . London : Routledge .
- C'T . 2004 . Uncovered: trojans as spam robots . C'T Magazine , 23 February, [Online] Available at: www.heise.de/english/newsticker/news/44879 (30 January 2008)
- Furedi , F. 2002 . Culture of Fear , London : Continuum .
- Garland , D. 2001 . The Culture of Control , Oxford : Oxford University Press .
- Garland , D. 2008 . On the concept of moral panic . Crime, Media, Culture , 4 ( 1 ) : 9 – 30 .
- Gibbs , J. , Ellison , N. and Heino , R. 2006 . Self-presentation in online personals: the role of anticipated future interaction, self-disclosure, and perceived success in Internet dating . Communication Research , 33 ( 2 ) : 152 – 177 .
- Gibson , W. 1982 . Burning chrome . Omni Magazine , July (Also reproduced in Gibson 1986, p. 176)
- Gibson , W. 1984 . Neuromancer , London : Grafton .
- Gibson , W. 1986 . Count Zero , London : Grafton .
- Gibson , W. 1986 . Burning Chrome , New York : Arbor .
- Gibson , W. 1988 . Mona Lisa Overdrive , London : Grafton .
- Goodin , D. 2007a . Botmaster owns up to 250,000 zombie PCs: He's a security consultant. Jail beckons . The Register , 9 November, [Online] Available at: http://www.theregister.co.uk/2007/11/09/botmaster_to_plea_guilty/ (30 January 2008)
- Goodin , D. 2007b . FBI crackdown on botnets gets results, but damage continues: 2 million zombies and counting . The Register , 29 November, [Online] Available at: http://www.theregister.co.uk/2007/11/29/fbi_botnet_progress_ report/ (30 January 2008)
- Haggerty , K. and Ericson , R. 2000 . The surveillant assemblage . British Journal of Sociology , 51 ( 4 ) : 605 – 622 .
- Hanley , R. 2003 . Simulacra and simulation: Baudrillard and the Matrix . Whatisthematrix , December, [Online] Available at: http://whatisthematrix.warnerbros.com/rl_cmp/new_phil_fr_hanley2.html (30 January 2008)
- House of Lords . Personal Internet security, Volume I: report . Science and Technology Committee . 5th Report of Session 2006–07, HL Paper 165–I, 10 August 2007, London, The Stationery Office Limited, [Online] Available at: http://www.publications.parliament.uk/pa/ld200607/ldselect/ldsctech/165/165i.pdf (30 January 2008)
- Innes , M. 2004 . Reinventing tradition? Reassurance, neighbourhood security and policing . Criminal Justice , 4 ( 2 ) : 151 – 171 .
- Innes , M. Why disorder matters? Antisocial behaviour and incivility as signals of risk . Paper given to the Social Contexts and Responses to Risk (SCARR) Conference . 28–30 , Kent, UK. January, [Online] Available at: http://www.kent.ac.uk/scarr/events/papers/Innes.pdf (30 January 2008)
- Jordan , T. 1999 . Cyberpower: The Culture and Politics of Cyberspace and the Internet , London : Routledge .
- Lewis , L. 2007 . Digital mafia threatens internet integrity . The Times , 7 April, [Online] Available at: http://business.timesonline.co.uk/tol/business/industry_sectors/technology/article1624030.ece (30 January 2008)
- Leyden , J. 2001 . Haxploitation: the complete Reg guide to hackers in film . The Register , 3 August, [Online] Available at: http://www.theregister.co.uk/2001/08/03/haxploitation_the_complete_reg_guide/ (30 January 2008)
- Leyden , J. 2007 . Tiger team brings haxploitation to TV: Penetration testing telly show up against the Queen . The Register , 19 December, [Online] Available at: http://www.theregister.co.uk/2007/12/19/tiger_team/ (30 January 2008)
- Leyden , J. 2008 . CIA claims crackers took out power grids: Future threat or urban myth in the making . The Register , 21 January, [Online] Available at: http://www.theregister.co.uk/2008/01/21/scada_threat_warning/ (30 January 2008)
- Mitnick , K. and Simon , W. L. 2002 . The Art of Deception: Controlling the Human Element of Security , New York : John Wiley and Sons .
- NISCC . 2005 . Targeted trojan email attacks . NISCC Briefing 08/2005 , 16 June, [Online] Available at: http://www.cpni.gov.uk/Docs/ttea.pdf (30 January 2008)
- Nissenbaum , H. 2004 . Hackers and the contested ontology of cyberspace . New Media & Society , 6 ( 2 ) : 195 – 217 .
- O'Harrow , R. 2008 . Spies’ Battleground turns virtual: intelligence officials See 3-D online worlds as havens for criminals . Washington Post , 6 February, p. D01, [Online] Available at: http://www.washingtonpost.com/wp-dyn/content/article/2008/02/05/AR2008020503144.html (8 February 2008)
- Ohm , P. 2007 . “ The myth of the superuser: fear, risk, and harm online, (May 22, 2007) ” . In University of Colorado Law Legal Studies Research Paper No. 07-14 [Online] Available at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=967372 (30 January 2008)
- Ortega . 2006 . News . Security & Privacy Magazine , 4 ( 6 ) : 6 – 9 .
- Orwell , G. 1990 [1949] . 1984 Nineteen Eighty-Four , London : Penguin .
- Parizo , E. 2005 . Busted: The inside story of ‘Operation Firewall . SearchSecurity. com, 28 November, [Online] Available at: http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1146949,00.html (30 January 2008)
- Person , L. 1998 . Notes toward on a postcyberpunk manifesto . Nova Express , no. 16, [Online] Available at: http://slachdot.org/features/99/10/08/2123255.shtml
- Rodgers , L. 2007 . Smashing the criminals’ e-bazaar . BBC News Online , 20 December, [Online] Available at: http://news.bbc.co.uk/1/hi/uk/7084592.stm (30 January 2008)
- Rosenberger , R. 2008 . SANS director confirms the CIA confirmed … absolutely nothing . Vmyths , 20 January, [Online] Available at: http://vmyths.com/column/1/2008/1/20/ (30 January 2008)
- Saltzer , J. , Reed , D. and Clark , D. 1984 . End-to-end arguments in system design . ACM Transactions in Computer Systems , 2 ( 4 ) : 277 – 288 .
- Sambrook , R. 2006 . How the net is transforming news . BBC News Online , 20 January, [Online] Available at: http://news.bbc.co.uk/1/hi/technology/4630890.stm (30 January 2008)
- Simon , J. 2007 . Governing through Crime: How the War on Crime Transformed American Democracy and Created a Culture of Fear , New York : Oxford University Press .
- Sommer , P. 2004 . The future for the policing of cybercrime . Computer Fraud & Security , 1 : 8 – 12 .
- Stephenson , N. 1992 . Snowcrash , London : ROC/Penguin .
- Sterling , B. 1994 . The Hacker Crackdown: Law and Disorder on the Electronic Frontier , London : Penguin .
- Symantec . 2007 . Internet Security Threat Report Trends for January–June 07 , XII Symantec, September
- Taipale , K. 2006 . “ Why can't we all get along: how technology, security, and privacy can coexist in the digital age ” . In Cybercrime: Digital Cops in a Networked Environment , Edited by: Balkin , J. , Grimmelmann , J. , Katz , E. , Kozlovski , N. , Wagman , S. and Zarsky , T. 151 – 183 . New York : New York University Press .
- Toffler , A. 1970 . Future Shock , New York : Bantam Books .
- Trevor-Roper , H. 1972 . The Last Days of Hitler , London : Pan Books .
- University of Bath . 2005 . Internet dating is much more successful than previously thought, study shows . University of Bath Press Release , 14 February, [Online] Available at: http://www.bath.ac.uk/news/2005/2/14/internet-dating.html (30 January 2008)
- Wall , D. S. 2007 . Cybercrimes: The Transformation of Crime in the Information Age , Cambridge : Polity .
- Wall , D. S. 2008 . Cybercrime, media and insecurity: the shaping of public perceptions of cybercrime . International Review of Law, Computers and Technology , 22 ( 1 ) : 45 – 66 .
- Wall , D. S. and Williams , M. 2007 . Policing diversity in the digital age: maintaining order in virtual communities . Criminology and Criminal Justice , 7 ( 4 ) : 391 – 415 .
- Walker , R. and Bakopoulos , B. 2005 . Conversations in the dark: how young people manage chatroom relationships . First Monday , vol. 10, no. 4, [Online] Available at: http://firstmonday.org/issues/issue10_4/walker/index.html (30 January 2008)
- Ward , M. 2008 . Boom times for hi-tech criminals . BBC News Online , 2 January, [Online] Available at: http://news.bbc.co.uk/1/hi/technology/7154187.stm (30 January 2008)
- Warren , P. 2005 . UK trojan siege has been running over a year . The Register , 17 June, [Online] Available at: www.theregister.co.uk/2005/06/17/niscc_warning/ (30 January 2008)
- Williams , M. 2006 . Virtually Criminal: Crime, Deviance and Regulation Online , London : Routledge .
- Wilson , D. , Patterson , A. , Powell , G. and Hembury , R. 2006 . Fraud and technology crimes: findings from the 2003/04 British Crime Survey, the 2004 Offending, Crime and Justice Survey and administrative sources . Home Office Online Report 09/06 , [Online] Available at: www.homeoffice.gov.uk/rds/pdfs06/rdsolr0906.pdf (30 January 2008)