Referrences
- Attorney-General's Department . 2004 . last accessed 2 Dec 2004) Model Criminal Code—Chapter 4 Damage and Computer Offences and Amendments to Chapter 2 (Jurisdiction) http://www.ag.gov.au/agd/WWW/agdHome.nsf/Page/Publications_ Model_Criminal_Code_Chapter_4
- Australasian Centre for Policing Research (ACPR) . 2000 . Adelaide last accessed 6 December 2004 The Virtual Horizon: Meeting the Law Enforcement Challenges—Developing an Australasian Law Enforcement Strategy for Dealing with Electronic Crime, Publication No. 134.1, ACPR http://www.acpr.gov.au/ pdf/ACPR134_1.pdf
- CSI/FBI . 2002 . 2002 Computer Crime and Security Survey . Computer Security Issues and Trends , 3 ( 1 ) : 1 – 22 . Spring
- Council of Europe . 2004 . last accessed 2 December 2004 Convention on Cybercrime CETS No.:185 http://conventions. coe.int/Treaty/Commun/QueVoulezVous.asp?NT=185&CM=8&DF=06/02/04&CL=ENG
- Department of Foreign Affairs and Trade . 1997 . Canberra last accessed 6 December 2004 Treaty between the Government of Australia and the Government of the United States of America on Mutual Assistance in Criminal Matters, and Exchange of Notes (Washington, 30 April 1997), Entry into force: 30 September 1999Australian Treaty Series 1999 No.19 http://www.austlii.edu.au/au/other/dfat/treaties/1999/19.html
- Denzin , N. K. and Lincoln , Y. S. 1994 . Handbook of Qualitative Research London
- EFA . 2003 . last accessed 2 Dec. 2004 Electronic Frontiers of Australia, Security Computer Crime pages http://www. efa.org.au/Issues/Security/
- Etter , B. 2001 . last accessed 6 December 2004 The Forensics Challenges of E-Crime, Australasian Centre for Policing Research Publication CC 3, October, Adelaide http://www.acpr.gov.au/pdf/ACPR_CC3.pdf
- European Union (EU) . 1995 . last accessed 6 December 2004 Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, No.: 31995L0046, Official Journal L 281, 23/11/1995, 0031—0050 http://europa.eu.int/smartapi/cgi/sga_doc?smartapi!celexapi!prod!CELEXnumdoc&lg=EN&numdoc=31995L0046&model=guichett
- European Union (EU) . 2002 . last accessed 6 December 2004 DIRECTIVE 2002/58/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 12 July 2002. Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector (Directive on Privacy and Electronic Communications) http:// europa.eu.int/eur-lex/pri/en/oj/dat/2002/l_201/ l_20120020731en00370047.pdf
- Global Internet Policy Initiative (GIPI) . 2002 . last accessed 6 December 2004 EU Directive on Privacy Protection in the Electronic Communications Sector, October 2002 http://www.internetpolicy.net/privacy/privacy-memo. pdf
- Interpol . 2002 . last accessed 6 December 2004 Interpol's Contribution to Combating Information Technology Crime http://www.interpol.int/Public/TechnologyCrime/default.asp
- Judd , M. , Smith , E. and Kidder , L. 1991 . Research Methods in Social Relations , Sydney : Harcourt Brace .
- McKemmish , R. June 1999 . What is Forensic Computing , June , Australian Institute of Criminology . Trends and Issues, No. 118
- Merton , R. K. , Fiske , M. and Kendall , P. L. 1990 . The Focused Interview: A Manual of Problems and Procedures , 2nd ed. , London : Collier MacMillan .
- NSW Crimes Amendment (Computer Offences) Act 2001, NSW Parliament
- Schmidt , R. , Lyytinen , K. , Keil , M. and Cule , P. 2001 . Identifying Software Project Risks: An International Delphi Study . Journal of Management Information Systems , 17 ( 4 ) : 5 – 36 . Spring
- Tennyenhuis , A. and Jamieson , R. 2004 . An Investigation into Computer Forensics Methodologies and Competencies: A Research Report, Research Report, SAFE Research Program, SIRCA, May
- United States Department of Commerce (2004) E-Stats, April 15, http://www.census.gov/eos/www/papers/2002/2002finaltext.pdf (last accessed 6 December 2004)