8,404
Views
98
CrossRef citations to date
0
Altmetric
Original Articles

Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace

Pages 183-205 | Published online: 18 May 2007

References

  • Agger , B. 2004 . The virtual self: A contemporary sociology , Oxford : Blackwell .
  • Appel , E. . US cybercrime: Model solutions . Paper presented at the Technologies for Public Safety in Critical Incident Response, National Institute of Justice, Office of Science & Technology . September 23 , Retrieved November 5, 2004 from http://www.nlectc.org/training/nij2003/Appel.pdf
  • BBC . April 30 2003 . “ Spammers and virus writers unite ” . In BBC News Online April 30 , Retrieved November 5, 2004, from http://news.bbc.co.uk/1/hi/technology/2988209.stm
  • Bevan , M. 2001 . 4.2.6. Mathew Bevan, infamous hackers and phreaks Retrieved November 5, 2004, from http://alt.ph.uk.com/node20.html
  • Braithwaite , J. and Drahos , P. 2000 . Global business regulation , Cambridge : Cambridge University Press .
  • Braverman , H. 1976 . Labour and monopoly capital , New York : Monthly Review Press .
  • Brenner , S. 2001 . Is there such a thing as ‘virtual crime’? . California Criminal Law Review , 4 (1) : 11
  • Brodeur , J.‐P. 1983 . High policing and low policing: Remarks about the policing of political activities . Social Problems , 30 (5) : 507 – 520 .
  • Campbell , D. November 27 1997 . “ More naked gun than top gun ” . In The Guardian November 27 , 2 (Online)
  • Castells , M. 2000 . Materials for an explanatory theory of the network society . British Journal of Sociology , 51 : 5 – 24 .
  • Chan , J. , Brereton , D. , Legosz , M. and Doran , S. 2001 . E‐Policing: The impact of information technology on police practices , Brisbane : Queensland Criminal Justice Commission .
  • Clarke , R. 1994 . “ Dataveillance: Delivering 1984 ” . In Framing technology: Society, choice and change , Edited by: Green , L. and Guinery , R. 117 – 130 . Sydney : Allen & Unwin .
  • Crawford , A. 2003 . Contractual governance of deviant behaviour . Journal of Law and Society , 30 (4) : 479 – 505 .
  • Crawford , A. and Lister , S. 2004 . The patchwork future of reassurance policing in England & Wales: Integrated local security quilts or frayed, fragmented and fragile tangled webs? . Policing: An International Journal of Police Strategies & Management , 27 (3) : 413 – 430 .
  • Critchley , T. A. 1978 . A history of the police in England and Wales , London : Constable .
  • Dupont , B. 2004 . Security in the age of networks . Policing and Society , 14 (1) : 76 – 91 .
  • Ericson , R. and Haggerty , K. 1997 . Policing the risk society , Oxford : Oxford University Press .
  • Foucault , M. 1983 . “ Afterword: The subject and power ” . In Michel Foucault: Beyond structuralism and hermeneutics , (2nd ed. , Edited by: Dreyfus , H. and Rainbow , P. 208 – 226 . Chicago : University of Chicago Press .
  • Gandy , O. 2003 . “ Data mining and surveillance in the post‐9.11 environment ” . In The intensification of surveillance: Crime terrorism and warfare in the information age , Edited by: Ball , K. and Webster , F. 26 – 41 . London : Pluto Press .
  • Goodman , M. 1997 . Why the police don’t care about computer crime . Harvard Journal of Law and Technology , 10 : 645 – 694 .
  • Gordon , D. 1987 . The electronic panopticon: A case‐study of the development of the national criminal records system . Politics and Society , 15 : 483 – 511 .
  • Gorman , S. August 1 2003 . “ FBI, CIA remain worlds apart ” . In The National Journal August 1 , Retrieved November 5, 2004, from http://198.65.138.161/org/news/2003/030801-fbi-cia01.htm
  • Haggerty , K. and Ericson , R. 2000 . The surveillant assemblage . British Journal of Sociology , 51 (4) : 605 – 622 .
  • Honeynet Project . 2002 . Know your enemy: Revealing the security tools, tactics, and motives of the Blackhat Community , Harlow, Essex : Addison‐Wesley .
  • Hughes , G. , McLaughlin , E. and Muncie , J. 2001 . “ Teetering on the edge: The futures of crime control and community safety ” . In Crime prevention and community safety: Future directions , Edited by: Hughes , G. , McLaughlin , E. and Muncie , J. London : Sage .
  • Innes , M. 2004 . Reinventing tradition?: Reassurance, neighbourhood security and policing . Criminal Justice , 4 (2) : 151 – 171 .
  • Johnston , L. and Shearing , C. 2003 . Governing security. Explorations in policing and justice , London : Routledge .
  • Katyal , N. K. 2003 . Digital architecture as crime control . Yale Law Journal , 112 : 2261 – 2289 .
  • Law Commission . 1997 . Legislating the criminal code: Misuse of trade secrets Consultation Paper 150. Retrieved November 5, 2004, from http://www.lawcom.gov.uk/library/lccp150/summary.htm
  • Lessig , L. 1999 . Code and other laws of cyberspace , New York : Basic Books .
  • Levi , M. and Wall , D. S. 2004 . Technologies, security and privacy in the post‐9/11 European information society . Journal of Law and Society , 312 : 194 – 220 .
  • Lyon , D. 1994 . The electronic eye: The rise of surveillance society , Minneapolis : University of Minnesota Press .
  • Manning , P. K. 1998 . “ The police: Mandate, strategies, and appearances ” . In Policing: A view from the street , Edited by: Manning , P. and Van Maanen , J. 7 – 32 . New York : Random House .
  • Mathieson , T. 1997 . The viewer society: Foucault’s Panopticon revisited . Theoretical Criminology , 1 : 215 – 234 .
  • McBarnet , D. 1979 . “ Arrest: The legal context of policing ” . In The British police , Edited by: Holdaway , S. London : Arnold .
  • Miller , P. and Rose , N. 1990 . Governing economic life . Economy and Society , 19 : 1 – 31 .
  • NCIS . 2000 . The National Intelligence Model , London : NCIS .
  • Newburn , T. and Hayman , S. 2001 . Policing, CCTV and social control: Police surveillance of suspects in custody , Cullompton : Willan .
  • Pease , K. 2001 . “ Crime futures and foresight ” . In Crime and the Internet , Edited by: Wall , D. S. 18 – 28 . London : Routledge .
  • Poster , M. 2000 . Second media age , Cambridge : Polity Press .
  • Power , R. 2000 . Tangled web: Tales of digital crime from the shadows of cyberspace , Indianapolis : Que .
  • Reiner , R. 2000 . The politics of the police , (3rd ed.) , Oxford : Oxford University Press .
  • Savona , E. and Mignone , M. 2004 . The fox and the hunters: How IC technologies change the crime race . European Journal on Criminal Policy and Research , 10 (1) : 3 – 26 .
  • Shearing , C. 2004 . Thoughts on sovereignty . Policing and Society , 14 (1) : 5 – 12 .
  • Shearing , C. and Ericson , R. 1991 . Culture as figurative action . British Journal of Sociology , 42 (4) : 481 – 506 .
  • Sheptycki , J. E. 2000 . “ Introduction ” . In Issues in transnational policing , Edited by: Sheptycki , J. E. 1 – 20 . London : Routledge .
  • Smith , R. G. , Grabosky , P. N. and Urbas , G. 2004 . Cyber criminals on trial , Cambridge : Cambridge University Press .
  • Sommer , P. 2004 . The future for the policing of cybercrime . Computer Fraud & Security , 1 : 8 – 12 .
  • Sophos . 2004 . “ The threat of the spam economy ” . In SysAdmin Magazine (Spam Supplement) Retrieved November 5, 2004, from http://www.sysadminmag.com/articles/2004/0413/
  • Sussman , V. January 23 1995 . “ Policing cyberspace ” . In U.S. News & World Report January 23 , 54 – 61 .
  • Toyne , S. October 24 2003 . “ Scam targets NatWest customers ” . In BBC News Online October 24 , Retrieved November 5, 2004, from http://news.bbc.co.uk/1/hi/business/3211635.stm
  • Vincent‐Jones , P. 2000 . Contractual governance: Institutional and organisational analysis . Oxford Journal of Legal Studies , 20 : 317 – 351 .
  • Vinge , V. 2000 . The Digital Gaia: As computing power accelerates, the network knows all—and it’s everywhere . Wired , 8 (1) Retrieved November 5, 2004, from http://www.wired.com/wired/archive/8.01/forward.html
  • Walden , I. 2003 . “ Computer crime ” . In Computer law , Edited by: Reed , C. and Angel , J. 295 – 329 . Oxford : Oxford University Press .
  • Walker , C. and Akdeniz , Y. 1998 . “ The governance of the Internet in Europe with special reference to illegal and harmful content [Special issue: Crime, criminal justice and the Internet] ” . In Criminal Law Review 5 – 18 .
  • Walker , C. and Akdeniz , Y. 2003 . Anti‐terrorism laws and data retention: War is over? . Northern Ireland Legal Quarterly , 50 (2) : 159 – 182 .
  • Wall , D. S. 1997 . “ Policing the virtual community: The internet, cyber‐crimes and the policing of cyberspace ” . In Policing futures , Edited by: Francis , P. , Davies , P. and Jupp , V. 208 – 236 . London : Macmillan .
  • Wall , D. S. 1998 . The Chief Constables of England and Wales: The socio‐legal history of a criminal justice elite , Aldershot : Dartmouth .
  • Wall , D. S. 2001 . “ Maintaining order and law on the internet ” . In Crime and the internet , Edited by: Wall , D. S. 167 – 183 . London : Routledge .
  • Wall , D. S. 2002a . “ Insecurity and the policing of cyberspace ” . In Crime and insecurity , Edited by: Crawford , A. 186 – 209 . Cullompton : Willan .
  • Wall , D. S. 2002b . DOT.CONS: Internet related frauds and deceptions upon individuals within the UK. Final Report to the Home Office , March
  • Wall , D. S. 2005a . “ The Internet as a conduit for criminals ” . In Information technology and the criminal justice system , Edited by: Pattavina , A. 77 – 98 . Thousand Oaks, CA : Sage .
  • Wall , D. S. 2005b . Digital realism and the governance of spam as cybercrime . European Journal on Criminal Policy and Research , 10 (4) : 309 – 335 .
  • Wall , D. S. 2007 . Cybercrime: The transformation of crime in the information age , Cambridge : Polity .
  • Wood , J. 2004 . Cultural change in the governance of security . Policing and Society , 14 (1) : 31 – 48 .

Cases

  • R v. Fellows; R v. Arnold, 2 All ER 548 (1997)
  • United States of America v. Robert A. Thomas and Carleen Thomas, 74 F.3d 701 (6th Cir. 1996)

Internet Sources

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.