Skip to main content Accessibility help
×
  • Cited by 49
Publisher:
Cambridge University Press
Online publication date:
June 2012
Print publication year:
2010
Online ISBN:
9780511845123
Subjects:
Criminology, Law, Criminal Law, Sociology

Book description

We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the US, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes.

Reviews

'Principles of Cybercrime is a much welcomed and excellent work on an increasingly important topic that has added new threats to the growing body of humanity using the Internet in their daily lives.'

Eugene Clark Source: Journal of Law, Information and Science

Refine List

Actions for selected content:

Select all | Deselect all
  • View selected items
  • Export citations
  • Download PDF (zip)
  • Save to Kindle
  • Save to Dropbox
  • Save to Google Drive

Save Search

You can save your searches here and later view and run them again in "My saved searches".

Please provide a title, maximum of 40 characters.
×

Contents

Bibliography
Adler, A., ‘The perverse law of child pornography’ (2001) 101 The Columbia Law Review209
,Agence France Presse, ‘Briton sentenced to 51 months prison in US for Internet piracy’, The Sydney Morning Herald, 23 June 2007, www.smh.com.au/news/ Technology/Briton-sentenced-to-51-months-prison-in-US-for-Internet-piracy/2007/06/23/1182019396798.html
,Agence France Presse ‘Conficker worm wiggles into millions of computers’, The Age, 21 January 2009
Akdeniz, Y., ‘Possession and Dispossession: A critical assessment of defences in cases of possession of indecent photographs of children’ (2007) Criminal Law Review 274
Akdeniz, Y., Taylor, , N. and Walker, , , C., ‘Regulation of Investigatory Powers Act 2000 (1): BigBrother.gov.uk: State surveillance in the age of information and rights’ (2001) Criminal Law Review 73
,All Party Parliamentary Internet Group, ‘Spam’: Report of an Inquiry by the All Party Internet Group (2003)
,All Party Parliamentary Internet GroupRevision of the Computer Misuse Act: Report of an Inquiry by the All Party Internet Group (2004)
,All Party Parliamentary Internet Group‘Digital Rights Management’: Report of an Inquiry by the All Party Internet Group (2006)
,American Psychiatric Association, Diagnostic and Statistical Manual of Mental Disorders IV-TR (Washington DC: APA, 2000)
,Anti-Phishing Working Group, Phishing Activity Trends Report: Q2/2008 (2008)
,Anti-Phishing Working GroupOrigins of the Word ‘Phishing’ (2008), www.antiphishing.org/word_phish.html
,APACS – the UK Payments Association, Key Facts and Figures: Card fraud facts and figures (2008), www.apacs.org.uk/resources_publications/card_fraud_ facts_and_figures.html
Armagh, D. S., ‘The fate of the Child Pornography Act of 1996: Virtual child pornography: Criminal conduct or protected speech?’ (2002) 23 Cardozo Law Review1993
Arora, V., ‘The CAN-SPAM Act: An inadequate attempt to deal with a growing problem’ (2006) 39 Columbia Journal of Law and Social Problems299
Ashworth, A., Principles of Criminal Law (New York: Oxford University Press, 2006)
,Attorney-General's Department, Review of Commonwealth Criminal Law: Interim report, computer crime (1988)
Audal, J., Lu, Q. and Roman, P., ‘Computer crimes’ (2008) American Criminal Law Review 233
,AusCERT, Australian Computer Crime and Security Survey (2006)
,Australasian Centre for Policing Research and the Australian Transaction Reports and Analysis Centre, Standardisation of Definitions of Identity Crime Terms: A step towards consistency, Report Series no. 145.3, Australasian Centre for Policing Research (2006)
,Australian Bureau of Statistics, Personal Fraud, Cat. no. 4528.0 (Canberra: ABS, 2007)
,Australian Bureau of Statistics, Household Use of Information Technology, Australia 2007–08, Cat. no. 8146.0 (Canberra: ABS, 2008)
,Australian High Tech Crime Centre, Malware: Viruses, worms, Trojan horses, High Tech Crime Brief no. 10 (Australian Institute of Criminology, 2006)
,Australian High Tech Crime Centre, Money Mules, High Tech Crime Brief no. 16 (Australian Institute of Criminology, 2007)
,Australian Institute of Criminology, Intellectual Property Crime and Enforcement in Australia, Research and Public Policy Series no. 94 (2008)
,Australian Law Reform Commission, Film and Literature Censorship Procedure, Report no. 55 (1991)
,Australian Law Reform Commission, For Your Information: Australian privacy law and practice, Report 108 (2008), vol. i
,Australian Payments Clearing Association, Payment Fraud in Australia, Media Release, 15 December 2008, www.apca.com.au/Public/apca01_live.nsf/ ResourceLookup/Press_Release_Payments_Fraud_Statistics_5.pdf/$File/ Press_Release_Payments_Fraud_Statistics_5.pdf
Bartholomew, M., Cops, Robbers, and Search Engines: The role of criminal law in contributory infringement doctrine, Buffalo Legal Studies Research Paper Series Paper no. 2008–19 (2008)
Baum, K., Identity Theft 2004, Bureau of Justice Statistics Bulletin (US Department of Justice, 2006)
,BBC News, ‘“Virtual theft” leads to arrest’, BBC News Online (Asia-Pacific) 14 November 2007, http://news.bbc.co.uk/2/hi/technology/7094764.stm
,BBC News, ‘Caution for Who star Townshend’, BBC News Online, 7 May 2003, http://news.bbc.co.uk/1/hi/uk/3007871.stm
,BBC News, ‘Web paedophile given nine years’, BBC News, 22 June 2006, http://news.bbc.co.uk/2/hi/uk_news/england/5106612.stm
,BBC News, ‘Q&A: Child benefit records lost: How worried should people be by the loss of discs containing child benefit recipients’ personal details?', BBC News, 22 November 2007, http://news.bbc.co.uk/2/hi/uk_news/politics/7103828.stm
,BBC News, ‘Woman in jail over virtual murder’, BBC News Online (Asia-Pacific), 24 October 2008, http://news.bbc.co.uk/2/hi/asia-pacific/7688091.stm
,BBC News, ‘Internet piracy trio sent to jail’, BBC News: Technology, 6 May 2005, http://news.bbc.co.uk/1/hi/technology/4518771.stm
,BC Freedom of Information and Privacy Association, PIPEDA and Identity Theft: Solutions for protecting Canadians' (FIPA, 2006)
Bellia, P. L., ‘Spyware and the limits of surveillance law’ (2005) 20 Berkeley Technology Law Journal1283
Bellia, P. L. and Freiwald, S., ‘Fourth Amendment protection for stored e-mail’ (2008) The University of Chicago Law Forum 121
Biever, C., ‘New hacking tool hijacks file-sharing networks’, New Scientist.com News Service, 19 March 2004, www.newscientisttech.com/channel/tech/electronicthreats/dn4799
,Binational Working Group on Cross-Border Mass Marketing Fraud, Report on Phishing: A report to the Minister of Public Safety and Emergency Preparedness Canada and the Attorney General of the United States (2006)
Blunn, A., Report of the Review of the Regulation of Access to Communications (Australian Government, Attorney-General's Department, 2005)
Bocij, P., Cyberstalking: Harassment in the Internet age and how to protect your family (Westport: Praeger Publishers, 2004)
Boland, M. L., ‘Model Code revisited: Taking aim at the high-tech stalker’ (2005) 20 Criminal Justice40
Bradfield, J. L., ‘Anti-stalking laws: Do they adequately protect stalking victims?’ (1998) 21 Harvard Women's Law Journal229
Bradfield, J. L., ‘True threats: A more appropriate standard for analyzing First Amendment protection and free speech when violence is perpetrated over the Internet’ (2002) 78 North Dakota Law Review753
Brenner, S. W., ‘Is there such a thing as “virtual crime”?’ (2001) 4 California Criminal Law Review1
Brenner, S. W., ‘Cybercrime metrics: Old wine, new bottles?’ (2004) 9 Virginia Journal of Law and Technology1
Brenner, S. W., ‘Toward a criminal law for cyberspace: Distributed security’ (2004) 10 Buffalo Journal of Science and Technology1
Brenner, S. W., ‘The next step: Prioritizing jurisdiction’ in Koops, B. J. and Brenner, S. W., Cybercrime and Jurisdiction: A global survey (The Hague: TMC Asser Press, 2006)
Brenner, S. W., ‘Fantasy crime: The role of criminal law in virtual worlds’ (2008) 11 Vanderbilt Journal of Entertainment and Technology Law1
Brenner, S.W., Carrier, B. and Henninger, J., ‘The Trojan horse defense in cybercrime cases’ (2004) 21 Santa Clara Computer and High Technology Law Journal1
Bronitt, S. and Gani, M., ‘Shifting boundaries of cybercrime: From computer hacking to cyberterrorism’ (2003) 27 Criminal Law Journal303
Brown, I., ‘The evolution of anti-circumvention law’ (2006) 20 International Review of Law, Computers and Technology271
Budd, T. and Mattinson, J., The Extent and Nature of Stalking: Findings from the 1998 British Crime Survey, Home Office Research Study no. 210 (2000)
Burgess, A. G., Douglas, J. E. and Halloran, R., ‘Stalking behaviours within domestic violence’ (1997) 12 Journal of Family Violence389
Butcher, S., ‘Upskirt student jailed for six months’, The Age, 25 January 2007
Calvert, C., ‘Regulating sexual images on the web: Last call for Miller time, but new issues remain untapped’ (2001) 23 Hastings Communications and Entertainment Law Journal507
Calvert, C., ‘Opening up an academic privilege and shutting down child modeling sites: Revising child pornography laws in the United States’ (2002) 107 Dickinson Law Review253
Calvert, C. and Brown, J., ‘Video voyeurism, privacy and the Internet: Exposing Peeping Toms in cyberspace’ (2000) 18 Cardozo Arts & Entertainment Law Journal469
,Canada Law Reform Commission, Electronic Surveillance, Working Paper no. 47 (1986)
,Canadian Anti-fraud Call Centre, Phonebusters: Monthly summary report (Competition Bureau Canada, 2008)
,Canadian Internet Policy and Public Interest Clinic, Identity Theft: Introduction and background, CIPPIC Working Paper no. 1, ID Theft Series (2007)
,Canadian Internet Policy and Public Interest Clinic, Techniques of Identity Theft, CIPPIC Working Paper no. 2, ID Theft Series (2007)
,Canadian Internet Policy and Public Interest Clinic, Canadian Legislation Relevant to Identity Theft: An annotated review, CIPPIC Working Paper no. 3A, ID Theft Series (2007)
,Canadian Internet Policy and Public Interest Clinic, United States Legislation Relevant to Identity Theft: An annotated review, CIPPIC Working Paper no. 3B, ID Theft Series (2007)
,Canadian Internet Policy and Public Interest Clinic, Australian, French and UK Legislation Relevant to Identity Theft: An annotated review, CIPPIC Working Paper no. 3C, ID Theft Series (2007)
,Canadian Internet Policy and Public Interest Clinic, Policy Approaches to Identity Theft, CIPPIC Working Paper no. 6, ID Theft Series (2007)
Carr, A., Internet Traders of Child Pornography and Other Censorship Offenders in New Zealand (Department of Internal Affairs, 2004)
Carr, J., Child Abuse, Child Pornography and the Internet (NCH, 2005)
Charlesworth, A.Legislating against computer misuse: The trials and tribulations of the Computer Misuse Act 1990’ (1993) 4 Journal of Law and Information Science80
Charlton, K. and Taylor, N., Online Credit Card Fraud against Small Businesses, Research and Public Policy Series no. 60 (Australian Institute of Criminology, 2004)
,CIFAS, Identity Fraud and Identity Theft, CIFAS Online (2009)
Clarke, R., ‘Human identification in information systems: Management challenges and public policy issues’ (1994) Information Technology and People 6
Clough, J., ‘Now you see it, now you don't: Digital images and the meaning of “possession”’ (2008) 19 Criminal Law Forum209
Cohen, L. and Felson, M., ‘Social change and crime rate trends: A routine activity approach’ (1979) 44 American Sociological Review588
,Commission on Online Child Protection, Report to Congress (2000)
,Commonwealth of Australia, Parliamentary Debates, Senate, 30 August 2004, 26620 (Christopher Ellison, Minister for Justice and Customs)
,Computer Bulletin Board Systems Task Force, Regulation of Computer Bulletin Board Systems (Canberra: AGPS, 1995)
,Computer Crime and Intellectual Property Section, Manual on Prosecuting Computer Crime (US Department of Justice, 2007), www.cybercrime.gov/ ccmanual/01ccma.pdf
,Computer Crime and Intellectual Property Section, Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations (US Department of Justice, 2002)
,Computer Crime and Intellectual Property Section, The National Information Infrastructure Protection Act of 1996: Legislative analysis (US Department of Justice, 2003), www.cybercrime.gov/ 1030analysis.html
,Computer Crime and Intellectual Property Section, Operation Buccaneer: The investigation, US Department of Justice, www.usdoj.gov/criminal/cybercrime/ob/OBinvest.htm
,Congressional Findings, Pub. L. 108–21, title V, § 501, Apr. 30, 2003, 117 Stat. 676
,Congressional Findings, Section 101(a) [title I, § 121 [1]] of Pub. L. 104–208
,Council of Europe, ‘Convention on Cybercrime: Explanatory Report’ (ETS no. 185)
,Council of Europe: European Committee on Crime Problems, ‘Extraterritorial criminal jurisdiction’ (1992) 3 Criminal Law Forum 441
Craven, S., Brown, S. and Gilchrist, E., ‘Sexual grooming of children: Review of literature and theoretical considerations’ (2006) 12 Journal of Sexual Aggression287
Cuganesan, S. and Lacey, D., Identity Fraud in Australia: An evaluation of its nature, cost and extent (New South Wales: SIRCA, 2003)
Deirmenjian, J. M., ‘Stalking in cyberspace’ (1999) 27 Journal of the American Academy of Psychiatry and the Law407
Denning, D. E., Cyberterrorism: Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services, US House of Representatives, 23 May 2000, www.cs.georgetown.edu/∼denning/infosec/cyberterror. html
,Department of Broadband, Communications and the Digital Economy, Online Statistics (Australian Government, 2008), www.archive.dbcde.gov. au/2008/01/statistical_benchmarking/online_statistics
,Department of Communications, Information Technology and the Arts, Report on the Spam Act 2003 Review (Australian Government, Department of Communications, Information Technology and the Arts, 2006)
,Department of Justice, Canada, Lawful Access: Consultation document (Department of Justice, Industry Canada, and Solicitor General Canada, 2002)
,Department of Justice, Canada, Voyeurism as a Criminal Offence, Consultation Paper (2002)
,Department of Justice, Canada, A Handbook for Police and Crown Prosecutors on Criminal Harassment (2004)
,Department of Justice, Victoria, Crimes Amendment (Identity Crime) Bill Exposure Draft: Discussion paper (2008)
Dibbell, J., ‘A rape in cyberspace: How an evil clown, a Haitian trickster spirit, two wizards, and a cast of dozens turned a database into a society’, The Village Voice 23 December 1993, http://juliandibbell.com/texts/bungle_vv.html
,Drugs and Crime Prevention Committee, Inquiry into Fraud and Electronic Commerce, Final Report, Parliament of Victoria (2004)
Dutton, W. H., di Gennaro, C. and Hargrave, A. M., The Internet in Britain: The Oxford Internet survey (Oxford Internet Institute, United Kingdom, 2005)
Dutton, W. H., Helsper, E. J. and Gerber, M. M., The Oxford Internet Survey: The Internet in Britain 2009 (Oxford Internet Institute, United Kingdom, 2009)
,Economic and Domestic Secretariat, Identity Fraud: A study (Cabinet Office, 2002)
Ellison, L., ‘Cyberstalking: Tackling harassment on the Internet’ in Wall, D. S. (ed.), Crime and the Internet (London: Routledge, 2001)
Ellison, L. and Akdeniz, Y., ‘Cyberstalking: The regulation of harassment on the Internet’ (1998) Criminal Law Review, Special Edition: ‘Crime, Criminal Justice and the Internet’ 29
Evans, C. and Nguyen, K., ‘Second man arrested for upskirt pics’, The Age, 23 January 2007
,Explanatory Memorandum, Law and Justice Amendment (Identity Crimes and Other Measures) Bill 2008 (Cth), Commonwealth Parliament (2008)
Explanatory Memorandum, Telecommunications (Interception and Access) Amendment Bill 2007 (Cth)
,Explanatory Notes, Police and Justice Act 2006, c. 48 (UK)
,Explanatory Notes, Regulation of Investigatory Powers Act (2000) c. 23 (UK)
,Explanatory Notes, Sexual Offences Act 2003, c. 42 (UK)
Fafinski, S., ‘Computer misuse: The implications of the Police and Justice Act 2006’ (2008) 72 Journal of Criminal Law53
Fallows, D., Data Memo (PEW Internet and American Life Project, 2007)
Farhangian, J. J., ‘A problem of “virtual” proportions: The difficulties inherent in tailoring virtual child pornography laws to meet constitutional standards’ (2003) 12 Journal of Law and Policy241
,Federal Bureau of Investigation, Innocent Images National Initiative, US Department of Justice, www.fbi.gov/page2/feb06/innocent_images_statistics.htm
,Federal Bureau of Investigation, National Incident-Based Reporting System, i: Data collection guidelines (US Department of Justice, 2000)
,Federal Trade Commission, 2006 Identity Theft Survey Report (2007)
,Federal Trade Commission, ‘Facts for consumers: Dot cons’ (2000), www.ftc.gov/bcp/edu/pubs/consumer/ tech/tec09.shtm
,Federal Trade Commission, FTC Consumer Alert: ‘Free security scan’ could cost time and money (Federal Trade Commission, Bureau of Consumer Protection, 2008)
,Federal Trade Commission, Spam Summit: The next generation of threats and solutions (Federal Trade Commission, 2007)
Feldmeier, J. P., ‘Close enough for government work: An examination of Congressional efforts to reduce the government's burden of proof in child pornography cases’ (2003) 30 Northern Kentucky Law Review205
Finch, E., The Criminalisation of Stalking (London: Routledge-Cavendish, 2001)
Finch, E., ‘The objective standard of reasonableness and the mentally ill stalker’ (2001) 65 The Journal of Criminal Law489
Finch, E., ‘Stalking the perfect stalking law: An evaluation of the efficacy of the Protection from Harassment Act 1997’ (2002) Criminal Law Review703
Finch, E., ‘The problem of stolen identity and the Internet’ in Jewkes, Y. (ed.), Crime Online (United Kingdom: Willan Publishing, 2007)
Fisher, B. S., Cullen, F. T. and Turner, M. G., ‘Being pursued: Stalking victimization in a national study of college women’ (2002) 1 Criminology and Public Policy257
Foss, M. and Johnson, E, Symantec Report on the Underground Economy July 07–June 08 (Symantec, 2008)
,Fraud Prevention Expert Group, Report on Identity Theft/Fraud (European Commission, 2007)
Garfinkel, S. L. and Shelat, A., ‘Remembrance of data passed: A study of disk sanitization practices’ (2003) 1 IEEE Security & Privacy17
Geltzer, J. N., ‘The new pirates of the Caribbean: How data havens can provide safe harbors on the Internet beyond governmental reach’ (2004) Southwestern Journal of Law and Trade in the Americas433
Gilbert, D., Kerr, I. R. and McGill, J., ‘The medium and the message: Personal privacy and the forced marriage of police and telecommunications providers’ (2007) 51 Criminal Law Quarterly469
Gillespie, A. A., ‘Children, chatrooms and the law’ (2001) Criminal Law Review435
Gillespie, A. A., ‘Child protection on the Internet: Challenges for criminal law’ (2002) 14 Child and Family Law Quarterly411
Gillespie, A. A., ‘The Sexual Offences Act 2003 (3): Tinkering with “child pornography”’ (2004) Criminal Law Review 361
Gillespie, A. A., ‘Child pornography: Balancing substantive and evidential law to safeguard children effectively from abuse’ (2005) 9 The International Journal of Evidence and Proof29
Gillespie, A. A., ‘Cyber-bullying and harassment of teenagers: The legal response’ (2006) 28 Journal of Social Welfare & Family Law123
Gillespie, A. A., ‘Enticing children on the Internet: The response of the criminal law’ (2006) 3 Juridical Review229
Gillespie, A. A., ‘Indecent images, grooming and the law’ (2006) Criminal Law Review412
Gillespie, A. A., ‘“Up-skirts” and “down-blouses”: Voyeurism and the law’ (2008) Criminal Law Review 370
Goldman, E., ‘A road to no warez: The No Electronic Theft Act and criminal copyright infringement’ (2003) Oregon Law Review369
Goldsmith, J., ‘Against cyberanarchy’ (1998) University of Chicago Law Review 1199
Goodman, M. D and Brenner, S. W., ‘The emerging consensus on criminal conduct in cyberspace’ (2002) UCLA Journal of Law and Technology 3
Goodno, N. H., ‘Cyberstalking: A new crime: Evaluating the effectiveness of current state and federal laws’ (2007) 72 Missouri Law Review125
Grabosky, P., Electronic Crime (New Jersey: Pearson Prentice Hall, 2007)
Grabosky, P., Smith, R. G. and Dempsey, G., Electronic Theft: Unlawful acquisition in cyberspace (Cambridge: Cambridge University Press, 2001)
Grant, I., Bone, N. and Grant, K., ‘Canada's criminal harassment provisions: A review of the first ten years’ (2003) 29 Queen's Law Journal175
Griffith, G. and Roth, L., Protecting Children from Online Sexual Predators, Briefing Paper no. 10/107 (NSW Parliamentary Library Research Service, 2007)
Griffith, G. and Simon, K., Child Pornography Law, Briefing Paper no. 9/08,(NSW Parliamentary Library Research Service, 2008)
Gross, A. V., ‘Criminal liability for theft of, interference with, or unauthorized use of, computer programs, files, or systems’ (2003) 51 ALR 4th 971
Hammack, S., ‘The Internet loophole: Why threatening speech on-line requires a modification of the courts’ approach to true threats and incitement' (2002) 36 Columbia Journal of Law and Social Problems65
Hébert, M. and Pilon, H., Computer Crime (Department of Justice Canada, 1991)
Hedley, S., ‘A brief history of spam’ (2006) 15 Information and Communications Technology Law223
Herrera-Flanigan, J. R., ‘Cybercrime and jurisdiction in the United States’ in Koops, B. J and Brenner, S. W., Cybercrime and Jurisdiction: A global survey (The Hague: TMC Asser Press, 2006)
Hirst, M., Jurisdiction and the Ambit of the Criminal Law (Oxford: Oxford University Press, 2003)
Hitt, J., ‘Child pornography and technology: The troubling analysis of United States v Mohrbacher’ (2001) 34 University of California Davis Law Review1129
Holmes, N. and Valiquet, D., Bill S-4: An Act to Amend the Criminal Code (Identity Theft and Related Misconduct), Legislative Summary LS-637E (Legal and Legislative Affairs Division, Canada, 2009)
,Home Office, Setting the Boundaries: Reforming the law on sex offences (2000), vol. i
Hong, H., ‘Hacking through the Computer Fraud and Abuse Act’ (1997) 31 University of California Davis Law Review283
Horstmann, T. J., ‘Protecting traditional privacy rights in a brave new digital world: The threat posed by cellular phone-cameras and what states should do to stop it’ (2007) 111 Pennsylvania State Law Review739
,House of Commons Standing Committee on Justice And Legal Affairs, Computer Crime, Final Report (1983)
Hubbard, R. W., Brauti, P. M. and Fenton, S. K., Wiretapping and Other Electronic Surveillance: Law and procedure (Ontario: Canada Law Book, 2008)
Hughes, D. M., ‘The use of new communications and information technologies for sexual exploitation of women and children’ (2002) 13 Hastings Women's Law Journal127
Hyde-Bales, K., Morris, S. and Charlton, A., The Police Recording of Computer Crime, Development and Practice Report (Home Office, 2004)
,Industry Canada, Stopping Spam: Creating a stronger, safer Internet, Report of the Task Force on Spam (Industry Canada, 2005)
,Interac, Consumers – Security: Fraud (2008), www.interac.ca/consumers/security_fraud.php
,Interception Legislation Team – Home Office, Interception of Communications in the United Kingdom, Consultation Paper, Cm. 4368 (1999)
International Federation of the Photographic Industry, IFPI Digital Music Report 2008, www.ifpi.org/content/section_resources/dmr2008.html
,Internet Crime Complaint Center, Internet Crime Report 2007 (Internet Crime Complaint Center, 2007)
,Internet Crime Forum Legal Subgroup, Reform of the Computer Misuse Act 1990 (2003)
,Internet Crime Forum, Chat Wise, Street Wise: Children and Internet chat services (2001), www.internetcrimeforum.org.uk/chatwise_streetwise.pdf
,Internet World Stats, Internet Usage Statistics: The Internet big picture – world Internet users and population stats (2009), www.internetworldstats.com/ stats.htm
Jefferson, S. and Sharfritz, R., ‘A survey of cyberstalking legislation’ (2001) 32 University of West Los Angeles Law Review323
Jenkins, P., Beyond Tolerance: Child pornography on the Internet (New York: New York University Press, 2001)
Johannes, R., 2006 Identity Fraud Survey Report (Javelin Strategy and Research, 2006)
Johnson, D. R. and Post, D., ‘Law and borders: The rise of law in cyberspace’ (1996) 48 Stanford Law Review1367
,Joint Standing Committee on Treaties, Extradition: A review of Australia's law and policy, Report 40 (Parliament of Australia, 2001)
Jones, A. and Doobay, A., Jones and Doobay on Extradition and Mutual Assistance (London: Sweet and Maxwell, 2005)
Karst, K. L., ‘Threats and meanings: How the facts govern First Amendment doctrine’ (2006) 58 Stanford Law Review1337
Kaspersen, H. W. K., ‘Jurisdiction in the Cybercrime Convention’ in Koops, B. J. and Brenner, S. W., Cybercrime and Jurisdiction: A global survey (The Hague: TMC Asser Press, 2006)
Kastens, A. H., ‘State v Stevenson, the “Peeping Tom” case: Overbreadth or overblown?’ (2001) Wisconsin Law Review 1371
Katyal, N. K., ‘Criminal law in cyberspace’ (2001) 149 University of Pennsylvania Law Review1003
Keith, S., ‘Fear-mongering or fact: The construction of “cyber-terrorism” in US, UK, and Canadian news media’, Paper presented at Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities sponsored by the Oxford Internet Institute, Oxford, England, 8–10 September, 2005
Kerr, O. S., ‘Cybercrime's scope: Interpreting “access” and “authorization” in computer misuse statutes’ (2003) 78 New York University Law Review1596
Kerr, O. S., ‘Internet surveillance law after the USA Patriot Act: The big brother that isn't’ (2003) 97 Northwestern University Law Review607
Kerr, O. S., ‘Lifting the “fog” of Internet surveillance: How a suppression remedy would change computer crime law’ (2003) 54 Hastings Law Journal805
Kerr, O. S., ‘The problem of perspective in Internet law’ (2003) Georgetown Law Journal 357
Kerr, O. S., ‘A user's guide to the Stored Communications Act – and a legislator's guide to amending it’ (2004) 72 George Washington Law Review1701
Kerr, O. S., ‘Virtual crime, virtual deterrence: A skeptical view of self help, architecture and civil liability’ (2005) Journal of Law, Economics and Policy 197
Kerr, O. S., Computer Crime Law (St. Paul: Thomson West, 2006)
Kerr, O. S., ‘Searches and seizures in a digital world’ (2006) 119 Harvard Law Review531
Kerr, O. S., ‘Criminal law in virtual worlds’ (2008) University of Chicago Legal Forum415
Kerr, O. S., ‘The case for the third-party doctrine’ (2009) 107 Michigan Law Review561
Kershaw, C., Nicholas, S. and Walker, A., Crime in England and Wales 2007/08, Home Office Statistical Bulletin (2008)
Kohl, U., Jurisdiction and the Internet: Regulatory competence over online activity (Cambridge: Cambridge University Press, 2007)
Koops, B. J. and Brenner, S. W., Cybercrime and Jurisdiction: A global survey (The Hague: TMC Asser Press, 2006)
Kotadia, M., ‘Trojan horse found responsible for child porn’, ZDNet.co.uk, 1 August 2003, http://news.zdnet.co.uk/security/0,1000000189,39115422,00.htm
Kowalski, M., Cyber-Crime: Issues, data sources, and feasibility of collecting police-reported statistics, Cat. no. 85–558, Canadian Centre for Justice Statistics (2002)
Kreston, S. S., ‘Defeating the virtual defense in child pornography prosecutions’ (2004) Journal of High Technology Law49
Krone, T., A Typology of Online Child Pornography Offending, Trends and Issues in Crime and Criminal Justice (Australian Institute of Criminology, 2004)
Krone, T., Does Thinking Make it So? Defining online child pornography possession offences, Trends and Issues in Crime and Criminal Justice (Australian Institute of Criminology, 2005)
Krone, T., International Police Operations against Online Child Pornography, Trends and Issues in Crime and Criminal Justice (Australian Institute of Criminology, 2005)
LaFave, W. R., Criminal Law, 4th edn (St. Paul: Thomson, 2003)
Lamb, H., Principal Current Data Types, Internet Crime Forum (2001), found at Home Office, Retention of Communications Data Under Part 11: Anti-Terrorism, Crime and Security Act 2001, Voluntary Code of Practice (2001)
Lamplugh, D. and Infield, P., ‘Harmonizing anti-stalking laws’ (2003) 34 George Washington International Law Review853
Lanham, D., Cross-Border Criminal Law (Sydney: FT Law & Tax, 1997)
Lanning, K., Child Molesters: A behavioural analysis (Washington DC: National Center for Missing and Exploited Children, 1992)
Lastowka, F. G. and Hunter, D., ‘Virtual crimes’ (2004–5) New York Law School Law Review 293
,Law Commission, Computer Misuse, Working Paper no. 110 (1988)
,Law Commission, Computer Misuse, Final Report no. 186 (1989)
,Law Commission, Offences of Dishonesty: Money Transfers, Item 11 of the Sixth Programme of Law Reform: Criminal Law (1996)
,Law Commission, Fraud, Final Report, Law Com no. 276 (2002)
,Law Ministers from the Commonwealth, Model Law on Computer and Computer Related Crime (2002), www.thecommonwealth.org/shared_asp_files/ uploadedfiles/%7BDA109CD2–5204–4FAB-AA77–86970A639B05%7D_Computer%20Crime.pdf
,Law Reform Commission Ireland, Report on Privacy: Surveillance and the interception of communications, no. 57 (1998)
Lessig, L., Code and Other Laws of Cyberspace (New York: Basic Books, 1999)
Loren, L., ‘Digitization, commodification, criminalization: The evolution of criminal copyright infringement and the importance of the willfulness requirement’ (1999) 77 Washington University Law Quarterly835
Lynch, J., ‘Identity theft in cyberspace: Crime control methods and their effectiveness in combating phishing attacks’ (2005) 20 Berkley Technology Law Journal259
Madison, M. J., ‘Rights of access and the shape of the Internet’ (2003) Boston College Law Review 433
Magee, J., ‘The law regulating unsolicited commercial e-mail: An international perspective’ (2003) 19 Santa Clara Computer and High Technology Law Journal333
McCann, A. E., ‘Comment: Are courts taking Internet threats seriously enough? An analysis of true threats transmitted over the Internet, as interpreted in United States v. Carmichael’ (2006) 26 Pace Law Review523
McConvill, J., ‘Contemporary comment: Computer trespass in Victoria’ (2001) 25 Criminal Law Journal220
McCusker, R., ‘Spam: Nuisance or menace, prevention or cure?’ Trends and Issues in Criminal Justice no. 294 (Australian Institute of Criminology, 2005) 3
McDonald, S., ‘Wireless hotspots: The truth about their evil twins’ (2006) 9 Internet Law Bulletin13
McEwan, T., Mullen, P. and MacKenzie, R., ‘Anti-stalking legislation in practice: Are we meeting community needs?’ (2007) 14 Psychiatry, Psychology and Law207
McGrath, M. and Casey, E., ‘Forensic psychiatry and the Internet: Practical perspectives on sexual predators and obsessional harassers in cyberspace’ (2002) 30 Journal of the American Academy of Psychiatry and the Law81
McKnight, G., Computer Crime (London: Joseph, 1973)
Merschman, J. C., ‘The dark side of the web: Cyberstalking and the need for contemporary legislation’ (2001) 24 Harvard Women's Law Journal255
,MessageLabs, MessageLabs Intelligence Report April 2008, www.messagelabs.com.au/intelligence.aspx
,MessageLabsMessageLabs Intelligence Report June 2009, www.messagelabs.com.au/resources/mlireports.
Miano, T. J., ‘Formalist statutory construction and the doctrine of fair warning: An examination of United States v. Councilman’ (2007) 14 George Mason Law Review513
Miletic, D., ‘“Groomer” guilty of procuring girl, 14, for sex’, The Age, 26 May 2006
Mishler, J. L., ‘Cyberstalking: Can communication via the Internet constitute a credible threat, and should an Internet service provider be liable if it does?’ (2000) 17 Santa Clara Computer and High Technology Law Journal115
Mitchell, K. J., Wolak, J. and Finkelhor, D., ‘Police posing as juveniles online to catch sex offenders: Is it working?’ (2005) 17 Sexual Abuse: A Journal of Research and Treatment241
Mnookin, J. L., ‘Virtual(ly) law: The emergence of law in LambdaMOO’ (1996) 2 Journal of Computer-Mediated Communication
,Model Criminal Code Officers Committee, Chapter 5: Sexual Offences Against the Person, Final Report (1999)
,Model Criminal Code Officers Committee, Chapter 4: Damage and Computer Offences, Discussion Paper (2000)
,Model Criminal Code Officers Committee, Chapter 4: Damage and Computer Offences, Final Report (2001)
,Model Criminal Code Officers Committee, Chapter 3: Credit Card Skimming Offences, Final Report (2006)
,Model Criminal Law Officers Committee, Identity Crime, Discussion Paper (2007)
,Model Criminal Code Officers Committee, Identity Crime, Final Report (2008)
Moohr, G. S., ‘The crime of copyright infringement: An inquiry based on morality, harm and criminal theory’ (2003) 83 Boston University Law Review731
Morris, S., The Future of Netcrime Now: Part 1 – Threats and challenges, Home Office Online Report 62/04 (Home Office, 2004)
Muir, D., Violence against Children in Cyberspace. A contribution to the United Nations study on violence against children (Bangkok: ECPAT International, 2005)
Mullen, P. E., Pathé, M. and Purcell, R., Stalkers and Their Victims (New York: Cambridge University Press, 2000)
Naraine, R., ‘Computer virus “hijacks” American Express web site’, Fox News, 1 May 2006, www.foxnews.com/story/0,2933,193784,00.html
Nash, V. and Peltu, M., Rethinking Safety and Security in a Networked World: Reducing harm by increasing cooperation, Oxford Internet Institute Forum, Discussion Paper no. 6 (2005)
,Nathanson Centre on Transnational Human Rights, Crime and Security, Organized Crime in Canada: A quarterly summary, July to September 2003, York University, www.yorku.ca/nathanson/CurrentEvents/2003_Q3.htm
,Nathanson Centre on Transnational Human Rights, Crime and Security, Organized Crime in Canada: A quarterly summary, January to March 2006, York University, www.yorku.ca/nathanson/CurrentEvents/2006_Q1_.htm
,National Criminal Intelligence Service, Project Trawler: Crime on the information highways (1999), www.cyber-rights.org/documents/trawler.htm
,National Institute of Justice, Project to Develop a Model Anti-Stalking Code for States (Department of Justice 1993)
,National Offender Management Service and Scottish Executive, Consultation: On the possession of extreme pornographic material (Home Office, 2005)
,National Statistics, ‘Value of Internet sales rises 56 per cent in 2005’, News Release (National Statistics, UK 2006)
,National Statistics, First Release: Internet access 2007: Households and individuals (2007), www.statistics.gov.uk/pdfdir/inta0807.pdf
,National Statistics, Adult Mobile Phone Ownership or Use: By age, 2001 and 2003, Social Trends 34 (2009), www.statistics.gov.uk/STATBASE/ssdataset.asp?vlnk=7202>
New South Wales Law Reform Commission, Surveillance: Final Report, Report 108 (2005)
,New Zealand Law Commission, Intimate Covert Filming Study Paper, no. 15 (2004)
Newman, G. R. and McNally, M. M., Identity theft literature review (Office of Justice Programs, US Department of Justice, 2005)
Ng, K., ‘Spam legislation in Canada: Federalism, freedom of expression and the regulation of the Internet’ (2005) 2 University of Ottawa Law and Technology Journal447
Norfolk, A., ‘Computer expert faces jail over “made-up” child porn image’, Times Online, 10 August 2006, http://technology.timesonline.co.uk/tol/news/ tech_and_web/article604825.ece
O'Connell, R., A Typology of Cybersexploitation and On-line Grooming Practices (Cyberspace Research Unit, University of Central Lancashire, 2003)
O'Neill, M. E., ‘Old crimes in new bottles: Sanctioning cybercrime’ (2000) 9 George Mason Law Review237
Ogilvie, E., ‘Cyberstalking’, Trends and Issues in Crime and Criminal Justice, no.166 (AIC, 2000)
Ogilvie, E., Stalking: Legislative, policing and prosecution patterns in Australia, AIC Research and Public Policy Series no. 34 (AIC, 2000)
Ogilvie, E., ‘The Internet and cyberstalking’, Paper Presented at the Stalking: Criminal Justice Responses Conference, Australian Institute of Criminology, Sydney, 7–8 December 2000
Olivenbaum, J. M., ‘<CTRL><ALT><DEL>: Rethinking federal computer crime legislation’ (1997) 27 Seton Hall Law Review574
,Organisation for Economic Co-Operation and Development, OECD Guidelines for the Security of Information Systems and Networks: Towards a culture of security (OECD, 2002)
,Organisation for Economic Co-Operation and Development, Scoping Paper on Online Identity Theft, Ministerial Background Report (2007)
Ost, S., ‘Getting to grips with sexual grooming? The new offence under the Sexual Offences Act 2003’ (2004) 26 Journal of Social Welfare and Family Law147
Oyama, K. A., ‘E-mail privacy after United States v. Councilman: Legislative options for amending ECPA’ (2006) 21 Berkeley Technology Law Journal499
Packard, A., ‘Does proposed federal cyberstalking legislation meet constitutional requirements?’ (2000) 5 Communication Law and Policy505
Paget, F., ‘Identity Theft’, White Paper (McAfee, 2007)
Parker, D. B., Crime by Computer (New York: Scribner, 1976)
Parker, D. B., Fighting Computer Crime (New York: Scribner, 1983)
,Parliamentary Joint Committee on the National Crime Authority, Organised Criminal Paedophile Activity (Commonwealth of Australia, 1995)
,Parliamentary Joint Committee on the National Crime Authority, Cybercrime (Parliament of the Commonwealth of Australia, 2004)
Pastrikos, C., ‘Identity theft statutes: Which will protect Americans the most?’ (2004) 67 Albany Law Review1137
Paust, J., ‘Panel: Cybercrimes and the domestication of international criminal law’ (2007) 5 Santa Clara Journal of International Law432
Penney, S., ‘Crime, copyright, and the digital age’ in Law Commission of Canada, What is a Crime? Defining criminal conduct in contemporary society (Vancouver: UBC Press, 2004)
Peretti, K., ‘Data breaches: What the underground world of “carding” reveals’ (2008) 25 Santa Clara Computer and High Technology Journal375
Podgor, E. S., ‘International computer fraud: A paradigm for limiting national jurisdiction’ (2002) 35 University of California Davis Law Review267
Podgor, E. S., ‘Extraterritorial criminal jurisdiction: Replacing “objective territoriality” with “defensive territoriality”’ in Sarat, A. and Ewick, P. (eds.), Studies in Law, Politics, and Society (2003)
,Postini Inc., 2007 Postini Communications Intelligence Report (Postini Inc., 2007)
Potashman, M., ‘International spam regulation and enforcement: Recommendations following the world summit on the information society’ (2006) 29 Boston College International & Comparative Law Review323
,President's Working Group on Unlawful Conduct on the Internet, The Electronic Frontier: The challenge of unlawful conduct involving the use of the Internet (2000), www.usdoj.gov/criminal/cybercrime/unlawful.htm
Purcell, R., Pathé, M. and Mullen, P. E., ‘The prevalence and nature of stalking in the Australian community’ (2002) 36 Australian and New Zealand Journal of Psychiatry114
Purcell, R., ‘Stalking: Defining and prosecuting a new category of offending’ (2004) 27 International Journal of Law and Psychiatry157
Radosevich, A. C., ‘Thwarting the stalker: Are anti-stalking measures keeping pace with today's stalker?’ (2000) University of Illinois Law Review1371
Ramasastry, A., Winn, J. K. and Winn, P., ‘Will wi-fi make your private network public? Wardriving, criminal and civil liability, and the security risks of wireless networks’ (2005) 1 Shidler Journal of Law, Commerce and Technology9
Rathmell, A., Valeri, L., Robinson, N. and Servida, A., Handbook of Legislative Procedures of Computer and Network Misuse in EU Countries, Study for the European Commission Directorate-General Information Society (2002)
Reed, C., Why Must You Be Mean to Me? – Crime, punishment and online personality, School of Law Working Paper Series, Queen Mary University of London (2008)
Restatement (Third) of Foreign Relations Law of the United States
Richardson, R., 2008: CSI Computer Crime and Security Survey (Computer Security Institute, 2008)
Ricketson, S. and Ginsburg, J.C., Inducers and Authorisers: A comparison of the US Supreme Court's Grokster decision and the Australian Federal Court's KaZaa ruling, Columbia Public Law and Legal Theory Working Papers, Paper no. 0698, Columbia Law School (2006)
Roach, G. and Michiels, W.J., ‘Damages is the gatekeeper issue for federal computer fraud’ (2006) 8 Tulane Journal of Technology and Intellectual Property61
Roddy, J., ‘The Federal Computer Systems Protection Act’ (1979) 7 Rutgers Journal of Computers Technology and the Law343
Rogers, A., ‘Playing hide and seek: How to protect virtual pornographers and actual children on the Internet’ (2005) Villanova Law Review 87
Rogers, K., ‘Viagra, viruses and virgins: A pan-Atlantic comparative analysis on the vanquishing of spam’ (2006) 22 Computer Law and Security Report228
Rothenberg, L. E., ‘Re-thinking privacy: Peeping Toms, video voyeurs, and failure of the criminal law to recognize a reasonable expectation of privacy in the public space’ (2000) 49 American University Law Review1127
Roundy, M. D., ‘The Wiretap Act – reconcilable differences: A framework for determining the “interception” of electronic communications following United States v. Councilman's rejection of the storage/transit dichotomy’ (2006) 28 Western New England Law Review403
Ryan, P. S., ‘War, peace, or stalemate: Wargames, wardialing, wardriving, and the emerging market for hacker ethics’ (2004) 9 Virginia Journal of Law and Technology7
Schjølberg, S. and Hubbard, A. M., Harmonizing National Legal Approaches on Cybercrime, Background Paper, International Telecommunications Union (2005)
Schryen, G., ‘Anti-spam legislation: An analysis of laws and their effectiveness’ (2007) 16 Information and Communications Technology Law17
Scott, A. H., Computer and Intellectual Property Crime: Federal and state law (Washington DC: The Bureau of National Affairs, Inc., 2001)
,Scottish Law Commission, Report on Computer Crime, Final Report no. 106 (1987)
,Senate Legal and Constitutional Legislation Committee, Provisions of the Telecommunications Amendment Bill 2004 (Canberra, 2004)
,Senate Legal and Constitutional Legislation Committee, Provisions of the Telecommunications (Interception) Amendment Bill 2006 (Canberra, 2006)
Siebecker, M. R., ‘Cookies and the common law: Are Internet advertisers trespassing on our computers?’ (2003) 76 Southern California Law Review893
Sieber, U., Legal Aspects of Computer-Related Crime in the Information Society, COMCRIME Study, European Commission (1998)
Singleton, S., ‘Comment: Computer Misuse Act 1990 – recent developments’ (1993) 57 Journal of Criminal Law181
Sinrod, E. J. and Reilly, W. P., ‘Cyber-crimes: A practical approach to the application of federal computer crime laws’ (2000) 16 Santa Clara Computer and High Tech Law Journal177
Siwek, S. E., Copyright Industries in the US Economy: The 2004 report (International Intellectual Property Alliance, 2004)
Smith, J. C., ‘Case & comment’ (1999) Criminal Law Review 970
Smith, R. G., Grabosky, P. and Urbas, G., Cyber Criminals on Trial (Cambridge: Cambridge University Press, 2004)
Smith, R.G., Holmes, M. N. and Kaufmann, P., ‘Nigerian advance fee fraud’ Trends and Issues in Criminal Justice no. 121 (AIC, 1996)
,Solicitor General, Canada and US Department of Justice, Public Advisory: Special report for consumers on identity theft (2003)
Solove, D. J., ‘The future of the Internet surveillance law: A symposium to discuss Internet surveillance, privacy & the USA PATRIOT Act: Surveillance law: Reshaping framework: Electronic surveillance law’ (2004) 72 George Washington Law Review1264
Soma, J., Singer, P. and Hurdd, J., ‘Spam still pays: The failure of the CAN-SPAM Act of 2003 and proposed legal solutions’ (2008) 45 Harvard Journal on Legislation165
Soma, J. T., Muther, Jr, T. F. and Brissette, H. M. L., ‘Transnational extradition for computer crimes: Are new treaties and laws needed?’ (1997) 34 Harvard Journal on Legislation317
Sommer, P., ‘Criminalising hacking tools’ (2006) 3 Digital Investigation68
,Sophos, Security Threat Report: 2009, www.sophos.com/sophos/docs/eng/marketing_material/sophos-security-threat-report-jan-2009-na.pdf
Sorkin, D., ‘Technical and legal approaches to unsolicited electronic mail’ (2001) 35 University of San Francisco Law Review325
,Staff Report Prepared for the Use of the Committee on Energy and Commerce, Sexual Exploitation of Children over the Internet, US House of Representatives, 109th Congress, January 2007
,Standing Committee of Attorney's-General, Unauthorised Photographs on the Internet and Ancillary Privacy Issues, Discussion Paper, Civil Law Policy (Melbourne: Department of Justice, 2005)
,Standing Committee on Legal and Constitutional Affairs, Telecommunications (Interception and Access) Amendment Bill 2007 (Canberra, Commonwealth of Australia, 2007)
,Statistics Canada, Household Internet Use Survey-Microdata User's Guide 2003, Cat no. 56M0002GIE (2004), http://dsp-psd.pwgsc.gc.ca/Collection/Statcan/ 56M0002G/56M0002GIE.html
,Statistics Canada, Electronic Commerce Households Spending in Canada and in Other Countries, by Region (2005), www40.statcan.ca/l01/cst01/comm07a.htm
,Statistics Canada, Residential Telephone Service Survey (2007), www.statcan.gc.ca/daily-quotidien/070504/dq070504a-eng.htm
Steel, A., ‘Vaguely going where no-one has gone: The expansive new computer access offences’ (2002) 26 Criminal Law Journal72
Steiner, P., ‘On the Internet, nobody knows you're a dog’, The New Yorker, 5 July 1993
Steinhauer, J., ‘Verdict in MySpace suicide case’, New York Times, 26 November 2008
Sullivan, C., ‘The response of the criminal law in Australia to computer abuse’ (1988) 12 Criminal Law Journal228
,Symantec, Spam Monthly Report January 2009, http://eval.symantec.com/ mktginfo/enterprise/otherresources/b-state_of_spam_report_01–2009.en-us. pdf
,Task Force on Child Protection on the Internet, Protecting the Public, Cm. 5668 (Home Office, 2002)
,Task Force on Intellectual Property, Progress Report of the Department of Justice's Task Force on Intellectual Property (US Department of Justice, 2006)
,Task Force on Spam, Anti-Spam Law Enforcement (Organisation for Economic Co-operation and Development, 2005)
,Task Force on Spam, Anti-Spam Regulation (Organisation for Economic Co-operation and Development, 2005)
,Task Force on Spam, Report of the OECD Task Force on Spam: Anti-spam toolkit of recommended policies and measures (Organisation for Economic Co-operation and Development, 2006)
,Tasmanian Law Reform Commission, Report on Computer Misuse, Report no. 47 (1986)
Taylor, M. and Quayle, E., Child Pornography: An Internet crime (East Sussex: Brunner-Routledge, 2003)
,The President's Identity Theft Task Force, Combating Identity Theft: A strategic plan (2007)
,The White House, The National Strategy to Secure Cyberspace (Washington DC, 2003)
Tjaden, P. and Thoennes, J., Prevalence, Incidence, and Consequences of Violence against Women: Findings from the national violence against women survey, US Department of Justice, Office of Justice Programs (1998)
,UK Sentencing Advisory Panel, The Panel's Advice to the Court of Appeal on Offences Involving Child Pornography (2002)
,United Nations, Model Treaty on the Transfer of Proceedings in Criminal Matters, A/RES/45/118, 14 (1990)
,United Nations, Manual on the Prevention and Control of Computer Related Crime, International Review of Criminal Policy Nos. 43–4 (1999)
,US Attorney, District of New Jersey, ‘Multi-million dollar home equity line of credit, identity theft and computer intrusion ring busted’ Press Release (US Department of Justice, 2008)
,US Attorney, Southern District of New York, ‘U.S. announces sentencing of man in largest identity theft case in nation's history’, Press Release, (US Department of Justice, 2005), www.usdoj.gov/usao/nys/pressreleases/ January05/cummingssentencingpr.pdf
,US Attorney General, Report to Congress on Stalking and Domestic Violence (US Department of Justice, Office of Justice Programs, 2001)
,US Attorney's Office, District of New Jersey, ‘“Shadowcrew” identity theft ringleader gets 32 months in prison’, News Release (2006), www.usdoj.gov/usao/nj/press/files/mant0629_r.htm
,US Attorney's Office, Western District of New York and US Department of Justice Computer Crimes and Intellectual Property Section, The Online World and Law Enforcement, www.fpd-fln.org/online_world_and_ law_enforcement.htm
,US Census Bureau, Computer and Internet Use in the United States 2003 (US Department of Commerce, 2005)
,US Census Bureau, ‘Quarterly retail e-commerce sales 4th Quarter 2007’ (US Department of Commerce, 2007), www.census.gov/mrts/www/data/pdf/07Q4.pdf
,US Computer Emergency Readiness Team, The Continuing Denial of Service Threat Posed by DNS Recursion (v 2.0) (2006)
,US Department of Justice, Attorney General's Commission on Pornography: Final Report (1986)
,US Department of Justice, ‘Warez leader sentenced to 46 months’ (2002), www.cybercrime.gov/ sankusSent.htm
,US Department of Justice, ‘“Shadowcrew” Internet identity and credit card thieves plead guilty’ Department of Justice Press Release (2005), www.usdoj.gov/usao/nj/press/ files/shad1117_r.htm
,US Department of Justice, Prosecuting Intellectual Property Crimes, 3rd edn (Office of Legal Education, 2006)
,US Department of Justice, ‘Extradited software piracy ringleader pleads guilty’ Press Release, 20 April 2007, www.usdoj.gov/criminal/pr/press_releases/2007/04/2007_5117_04–20–07rgriffiths-plea.pdf
,US Department of Justice, ‘Alan Ralsky, ten others, indicted in international spamming and stock-fraud scheme’ (2008), www.usdoj.gov/opa/pr/2008/January/08_crm_003.html
,US Department of Justice, FY 2008 Performance and Accountability Report (2008)
,US Department of Justice, ‘Retail hacking ring charged for stealing and distributing credit and debit card numbers from major US retailers: More than 40 million credit and debit card numbers stolen’, Press Release (2008), www.usdoj.gov/criminal/ cybercrime/gonzalezIndict.pdf
,US Department of Justice, United States Attorneys' Manual, Title 9: Criminal Resource Manual, 9–15.000
,US Department of Justice, Computer Crimes and Intellectual Property Section, The Online World And Law Enforcement (US Attorney's Office, Western District of New York), www.fpd-fln.org/online_world_and_law_enforcement.htm
,US Department of Justice, Western District of North Carolina, ‘Hacker sentenced to prison for breaking into Lowe's companies’ computers with intent to steal credit card information', Press Release (2004), www.usdoj.gov/criminal/cybercrime/salcedoSent.htm
,US Government Accountability Office, Personal Information: Data breaches are frequent, but evidence of resulting identity theft is limited; however, the full extent is unknown, Report to Congressional Requesters (Government Accountability Office, 2007)
,US Securities Exchange Commission, ‘Regulators launch fake scam websites to warn investors about fraud’, News Release (2002), www.sec.gov/news/ headlines/scamsites.htm
,US Senate, Phony Identification and Credentials Via the Internet, Permanent Subcommittee on Investigations of the Committee on Governmental Affairs (2002)
Urbas, G. and Choo, K. R., Resource Material on Technology-enabled Crime, Technical and Background Paper no. 28 (AIC, 2008)
Valiquet, D., Telecommunications and Lawful Access: I. The legislative situation in Canada (Library of Parliament, 2006)
,Virtual Global Taskforce, ‘Website snares its first online grooming offender’, Press Release, 22 June 2006 www.virtualglobaltaskforce.com/news/article 22062006.html
Walby, S. and Allen, J., Domestic Violence, Sexual Assault and Stalking: Findings from the British Crime Survey, Home Office Research Study 276 (2004)
Walden, I., Computer Crimes and Digital Investigations (New York: Oxford University Press, 2007)
Walker, C., ‘Cyber-terrorism: Legal principle and law in the United Kingdom’ (2006) Pennsylvania State Law Review 625
Wall, D. S., ‘Digital realism and the governance of spam as cybercrime’ (2005) 10 European Journal of Criminal Policy and Research309
Wall, D. S., ‘Surveillant Internet technologies and the growth in information capitalism: Spams and public trust in the information society’ in Haggerty, K. and Ericson, R. (eds.), The New Politics of Surveillance and Visibility (Toronto: University of Toronto Press, 2005)
Wall, D. S., Cybercrime (Cambridge: Polity, 2007)
Warren, S. D. and Brandeis, L. D., ‘The right to privacy’ (1890) 4 Harvard Law Review193
Wasik, M., Crime and the Computer (Oxford: Clarendon Press, 1991)
Weimann, G., ‘Cyberterrorism: The sum of all fears?’ (2005) Studies in Conflict and Terrorism 129
Wells, C., ‘Stalking: The criminal law response’ (1997) Criminal Law Review 463
Williams, K. S., ‘Child pornography law: Does it protect children?’ (2004) 26 Journal of Social Welfare and Family Law245
Wilson, C., Computer Attack and Cyberterrorism: Vulnerabilities and policy issues for Congress, Congressional Research Service Report for Congress, (Congressional Research Service, 2005)
Wilson, D. et al., Fraud and Technology Crimes: Findings from the 2003/04 British Crime Survey, the 2004 Offending, Crime and Justice Survey and administrative sources (Home Office Online Report, 2006)
Wolak, J., Mitchell, K. and Finkelhor, D., ‘Escaping or connecting? Characteristics of youth who form close online relationships’ (2003) 26 Journal of Adolescence105
Wolak, J., Internet Sex Crimes against Minors: The response of law enforcement (Crimes against Children Research Center, 2003)
Wolak, J., ‘Internet-initiated sex crimes against minors: Implications for prevention based on findings from a national study’ (2004) 35 Journal of Adolescent Health424e11
Wolak, J., Finkelhor, D. and Mitchell, K. J., Child-Pornography Possessors Arrested in Internet-Related Crimes: Findings from the national juvenile online victimization study (National Center for Missing and Exploited Children, 2005)
Wolak, J., ‘The varieties of child pornography production’ in Quayle, E. and Taylor, M. (eds.), Viewing Child Pornography on The Internet: Understanding the offense, managing the offender, helping the victims (Russell House, 2005)
Wolak, J., Online victimization of youth: Five years later (National Center for Missing and Exploited Children, 2006)
Wood, J. R. T., Royal Commission into the New South Wales Police Service: Final report, v: The paedophile inquiry (NSW Government, 1997)
Yar, M., Cybercrime and Society (London: Sage Publications, 2006)
Yu, M. A., Lehrer, R. and Roland, W., ‘Intellectual property crimes’ (2008) 45 American Criminal Law Review665
Zappen, M. J., ‘How well do you know your computer? The level of scienter in 18 USC § 1462’ (2003) 66 Albany Law Review1161

Metrics

Altmetric attention score

Full text views

Total number of HTML views: 0
Total number of PDF views: 0 *
Loading metrics...

Book summary page views

Total views: 0 *
Loading metrics...

* Views captured on Cambridge Core between #date#. This data will be updated every 24 hours.

Usage data cannot currently be displayed.