Skip to main content Accessibility help
×
Hostname: page-component-5c6d5d7d68-txr5j Total loading time: 0 Render date: 2024-08-13T07:24:10.234Z Has data issue: false hasContentIssue false

Bibliography

Published online by Cambridge University Press:  05 June 2012

Jonathan Clough
Affiliation:
Monash University, Victoria
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2010

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Adler, A., ‘The perverse law of child pornography’ (2001) 101 The Columbia Law Review209CrossRefGoogle Scholar
,Agence France Presse, ‘Briton sentenced to 51 months prison in US for Internet piracy’, The Sydney Morning Herald, 23 June 2007, www.smh.com.au/news/ Technology/Briton-sentenced-to-51-months-prison-in-US-for-Internet-piracy/2007/06/23/1182019396798.htmlGoogle Scholar
,Agence France Presse ‘Conficker worm wiggles into millions of computers’, The Age, 21 January 2009
Akdeniz, Y., ‘Possession and Dispossession: A critical assessment of defences in cases of possession of indecent photographs of children’ (2007) Criminal Law Review 274Google Scholar
Akdeniz, Y., Taylor, , N. and Walker, , , C., ‘Regulation of Investigatory Powers Act 2000 (1): BigBrother.gov.uk: State surveillance in the age of information and rights’ (2001) Criminal Law Review 73Google Scholar
,All Party Parliamentary Internet Group, ‘Spam’: Report of an Inquiry by the All Party Internet Group (2003)
,All Party Parliamentary Internet GroupRevision of the Computer Misuse Act: Report of an Inquiry by the All Party Internet Group (2004)
,All Party Parliamentary Internet Group‘Digital Rights Management’: Report of an Inquiry by the All Party Internet Group (2006)
,American Psychiatric Association, Diagnostic and Statistical Manual of Mental Disorders IV-TR (Washington DC: APA, 2000)Google Scholar
,Anti-Phishing Working Group, Phishing Activity Trends Report: Q2/2008 (2008)
,Anti-Phishing Working GroupOrigins of the Word ‘Phishing’ (2008), www.antiphishing.org/word_phish.html
,APACS – the UK Payments Association, Key Facts and Figures: Card fraud facts and figures (2008), www.apacs.org.uk/resources_publications/card_fraud_ facts_and_figures.html
Armagh, D. S., ‘The fate of the Child Pornography Act of 1996: Virtual child pornography: Criminal conduct or protected speech?’ (2002) 23 Cardozo Law Review1993Google Scholar
Arora, V., ‘The CAN-SPAM Act: An inadequate attempt to deal with a growing problem’ (2006) 39 Columbia Journal of Law and Social Problems299Google Scholar
Ashworth, A., Principles of Criminal Law (New York: Oxford University Press, 2006)Google Scholar
,Attorney-General's Department, Review of Commonwealth Criminal Law: Interim report, computer crime (1988)
Audal, J., Lu, Q. and Roman, P., ‘Computer crimes’ (2008) American Criminal Law Review 233Google Scholar
,AusCERT, Australian Computer Crime and Security Survey (2006)
,Australasian Centre for Policing Research and the Australian Transaction Reports and Analysis Centre, Standardisation of Definitions of Identity Crime Terms: A step towards consistency, Report Series no. 145.3, Australasian Centre for Policing Research (2006)
,Australian Bureau of Statistics, Personal Fraud, Cat. no. 4528.0 (Canberra: ABS, 2007)Google Scholar
,Australian Bureau of Statistics, Household Use of Information Technology, Australia 2007–08, Cat. no. 8146.0 (Canberra: ABS, 2008)Google Scholar
,Australian High Tech Crime Centre, Malware: Viruses, worms, Trojan horses, High Tech Crime Brief no. 10 (Australian Institute of Criminology, 2006)Google Scholar
,Australian High Tech Crime Centre, Money Mules, High Tech Crime Brief no. 16 (Australian Institute of Criminology, 2007)Google Scholar
,Australian Institute of Criminology, Intellectual Property Crime and Enforcement in Australia, Research and Public Policy Series no. 94 (2008)
,Australian Law Reform Commission, Film and Literature Censorship Procedure, Report no. 55 (1991)
,Australian Law Reform Commission, For Your Information: Australian privacy law and practice, Report 108 (2008), vol. i
,Australian Payments Clearing Association, Payment Fraud in Australia, Media Release, 15 December 2008, www.apca.com.au/Public/apca01_live.nsf/ ResourceLookup/Press_Release_Payments_Fraud_Statistics_5.pdf/$File/ Press_Release_Payments_Fraud_Statistics_5.pdf
Bartholomew, M., Cops, Robbers, and Search Engines: The role of criminal law in contributory infringement doctrine, Buffalo Legal Studies Research Paper Series Paper no. 2008–19 (2008)
Baum, K., Identity Theft 2004, Bureau of Justice Statistics Bulletin (US Department of Justice, 2006)Google Scholar
,BBC News, ‘“Virtual theft” leads to arrest’, BBC News Online (Asia-Pacific) 14 November 2007, http://news.bbc.co.uk/2/hi/technology/7094764.stm
,BBC News, ‘Caution for Who star Townshend’, BBC News Online, 7 May 2003, http://news.bbc.co.uk/1/hi/uk/3007871.stm
,BBC News, ‘Web paedophile given nine years’, BBC News, 22 June 2006, http://news.bbc.co.uk/2/hi/uk_news/england/5106612.stm
,BBC News, ‘Q&A: Child benefit records lost: How worried should people be by the loss of discs containing child benefit recipients’ personal details?', BBC News, 22 November 2007, http://news.bbc.co.uk/2/hi/uk_news/politics/7103828.stm
,BBC News, ‘Woman in jail over virtual murder’, BBC News Online (Asia-Pacific), 24 October 2008, http://news.bbc.co.uk/2/hi/asia-pacific/7688091.stm
,BBC News, ‘Internet piracy trio sent to jail’, BBC News: Technology, 6 May 2005, http://news.bbc.co.uk/1/hi/technology/4518771.stm
,BC Freedom of Information and Privacy Association, PIPEDA and Identity Theft: Solutions for protecting Canadians' (FIPA, 2006)Google Scholar
Bellia, P. L., ‘Spyware and the limits of surveillance law’ (2005) 20 Berkeley Technology Law Journal1283Google Scholar
Bellia, P. L. and Freiwald, S., ‘Fourth Amendment protection for stored e-mail’ (2008) The University of Chicago Law Forum 121Google Scholar
Biever, C., ‘New hacking tool hijacks file-sharing networks’, New Scientist.com News Service, 19 March 2004, www.newscientisttech.com/channel/tech/electronicthreats/dn4799Google Scholar
,Binational Working Group on Cross-Border Mass Marketing Fraud, Report on Phishing: A report to the Minister of Public Safety and Emergency Preparedness Canada and the Attorney General of the United States (2006)
Blunn, A., Report of the Review of the Regulation of Access to Communications (Australian Government, Attorney-General's Department, 2005)Google Scholar
Bocij, P., Cyberstalking: Harassment in the Internet age and how to protect your family (Westport: Praeger Publishers, 2004)Google Scholar
Boland, M. L., ‘Model Code revisited: Taking aim at the high-tech stalker’ (2005) 20 Criminal Justice40Google Scholar
Bradfield, J. L., ‘Anti-stalking laws: Do they adequately protect stalking victims?’ (1998) 21 Harvard Women's Law Journal229Google Scholar
Bradfield, J. L., ‘True threats: A more appropriate standard for analyzing First Amendment protection and free speech when violence is perpetrated over the Internet’ (2002) 78 North Dakota Law Review753Google Scholar
Brenner, S. W., ‘Is there such a thing as “virtual crime”?’ (2001) 4 California Criminal Law Review1Google Scholar
Brenner, S. W., ‘Cybercrime metrics: Old wine, new bottles?’ (2004) 9 Virginia Journal of Law and Technology1Google Scholar
Brenner, S. W., ‘Toward a criminal law for cyberspace: Distributed security’ (2004) 10 Buffalo Journal of Science and Technology1Google Scholar
Brenner, S. W., ‘The next step: Prioritizing jurisdiction’ in Koops, B. J. and Brenner, S. W., Cybercrime and Jurisdiction: A global survey (The Hague: TMC Asser Press, 2006)Google Scholar
Brenner, S. W., ‘Fantasy crime: The role of criminal law in virtual worlds’ (2008) 11 Vanderbilt Journal of Entertainment and Technology Law1Google Scholar
Brenner, S.W., Carrier, B. and Henninger, J., ‘The Trojan horse defense in cybercrime cases’ (2004) 21 Santa Clara Computer and High Technology Law Journal1Google Scholar
Bronitt, S. and Gani, M., ‘Shifting boundaries of cybercrime: From computer hacking to cyberterrorism’ (2003) 27 Criminal Law Journal303Google Scholar
Brown, I., ‘The evolution of anti-circumvention law’ (2006) 20 International Review of Law, Computers and Technology271CrossRefGoogle Scholar
Budd, T. and Mattinson, J., The Extent and Nature of Stalking: Findings from the 1998 British Crime Survey, Home Office Research Study no. 210 (2000)
Burgess, A. G., Douglas, J. E. and Halloran, R., ‘Stalking behaviours within domestic violence’ (1997) 12 Journal of Family Violence389CrossRefGoogle Scholar
Butcher, S., ‘Upskirt student jailed for six months’, The Age, 25 January 2007Google Scholar
Calvert, C., ‘Regulating sexual images on the web: Last call for Miller time, but new issues remain untapped’ (2001) 23 Hastings Communications and Entertainment Law Journal507Google Scholar
Calvert, C., ‘Opening up an academic privilege and shutting down child modeling sites: Revising child pornography laws in the United States’ (2002) 107 Dickinson Law Review253Google Scholar
Calvert, C. and Brown, J., ‘Video voyeurism, privacy and the Internet: Exposing Peeping Toms in cyberspace’ (2000) 18 Cardozo Arts & Entertainment Law Journal469Google Scholar
,Canada Law Reform Commission, Electronic Surveillance, Working Paper no. 47 (1986)
,Canadian Anti-fraud Call Centre, Phonebusters: Monthly summary report (Competition Bureau Canada, 2008)Google Scholar
,Canadian Internet Policy and Public Interest Clinic, Identity Theft: Introduction and background, CIPPIC Working Paper no. 1, ID Theft Series (2007)
,Canadian Internet Policy and Public Interest Clinic, Techniques of Identity Theft, CIPPIC Working Paper no. 2, ID Theft Series (2007)
,Canadian Internet Policy and Public Interest Clinic, Canadian Legislation Relevant to Identity Theft: An annotated review, CIPPIC Working Paper no. 3A, ID Theft Series (2007)
,Canadian Internet Policy and Public Interest Clinic, United States Legislation Relevant to Identity Theft: An annotated review, CIPPIC Working Paper no. 3B, ID Theft Series (2007)
,Canadian Internet Policy and Public Interest Clinic, Australian, French and UK Legislation Relevant to Identity Theft: An annotated review, CIPPIC Working Paper no. 3C, ID Theft Series (2007)
,Canadian Internet Policy and Public Interest Clinic, Policy Approaches to Identity Theft, CIPPIC Working Paper no. 6, ID Theft Series (2007)
Carr, A., Internet Traders of Child Pornography and Other Censorship Offenders in New Zealand (Department of Internal Affairs, 2004)Google Scholar
Carr, J., Child Abuse, Child Pornography and the Internet (NCH, 2005)Google Scholar
Charlesworth, A.Legislating against computer misuse: The trials and tribulations of the Computer Misuse Act 1990’ (1993) 4 Journal of Law and Information Science80Google Scholar
Charlton, K. and Taylor, N., Online Credit Card Fraud against Small Businesses, Research and Public Policy Series no. 60 (Australian Institute of Criminology, 2004)Google Scholar
,CIFAS, Identity Fraud and Identity Theft, CIFAS Online (2009)
Clarke, R., ‘Human identification in information systems: Management challenges and public policy issues’ (1994) Information Technology and People 6Google Scholar
Clough, J., ‘Now you see it, now you don't: Digital images and the meaning of “possession”’ (2008) 19 Criminal Law Forum209CrossRefGoogle Scholar
Cohen, L. and Felson, M., ‘Social change and crime rate trends: A routine activity approach’ (1979) 44 American Sociological Review588CrossRefGoogle Scholar
,Commission on Online Child Protection, Report to Congress (2000)
,Commonwealth of Australia, Parliamentary Debates, Senate, 30 August 2004, 26620 (Christopher Ellison, Minister for Justice and Customs)
,Computer Bulletin Board Systems Task Force, Regulation of Computer Bulletin Board Systems (Canberra: AGPS, 1995)Google Scholar
,Computer Crime and Intellectual Property Section, Manual on Prosecuting Computer Crime (US Department of Justice, 2007), www.cybercrime.gov/ ccmanual/01ccma.pdf
,Computer Crime and Intellectual Property Section, Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations (US Department of Justice, 2002)
,Computer Crime and Intellectual Property Section, The National Information Infrastructure Protection Act of 1996: Legislative analysis (US Department of Justice, 2003), www.cybercrime.gov/ 1030analysis.html
,Computer Crime and Intellectual Property Section, Operation Buccaneer: The investigation, US Department of Justice, www.usdoj.gov/criminal/cybercrime/ob/OBinvest.htm
,Congressional Findings, Pub. L. 108–21, title V, § 501, Apr. 30, 2003, 117 Stat. 676
,Congressional Findings, Section 101(a) [title I, § 121 [1]] of Pub. L. 104–208
,Council of Europe, ‘Convention on Cybercrime: Explanatory Report’ (ETS no. 185)
,Council of Europe: European Committee on Crime Problems, ‘Extraterritorial criminal jurisdiction’ (1992) 3 Criminal Law Forum 441
Craven, S., Brown, S. and Gilchrist, E., ‘Sexual grooming of children: Review of literature and theoretical considerations’ (2006) 12 Journal of Sexual Aggression287CrossRefGoogle Scholar
Cuganesan, S. and Lacey, D., Identity Fraud in Australia: An evaluation of its nature, cost and extent (New South Wales: SIRCA, 2003)Google Scholar
Deirmenjian, J. M., ‘Stalking in cyberspace’ (1999) 27 Journal of the American Academy of Psychiatry and the Law407Google ScholarPubMed
Denning, D. E., Cyberterrorism: Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services, US House of Representatives, 23 May 2000, www.cs.georgetown.edu/∼denning/infosec/cyberterror. html
,Department of Broadband, Communications and the Digital Economy, Online Statistics (Australian Government, 2008), www.archive.dbcde.gov. au/2008/01/statistical_benchmarking/online_statistics
,Department of Communications, Information Technology and the Arts, Report on the Spam Act 2003 Review (Australian Government, Department of Communications, Information Technology and the Arts, 2006)
,Department of Justice, Canada, Lawful Access: Consultation document (Department of Justice, Industry Canada, and Solicitor General Canada, 2002)
,Department of Justice, Canada, Voyeurism as a Criminal Offence, Consultation Paper (2002)
,Department of Justice, Canada, A Handbook for Police and Crown Prosecutors on Criminal Harassment (2004)
,Department of Justice, Victoria, Crimes Amendment (Identity Crime) Bill Exposure Draft: Discussion paper (2008)
Dibbell, J., ‘A rape in cyberspace: How an evil clown, a Haitian trickster spirit, two wizards, and a cast of dozens turned a database into a society’, The Village Voice 23 December 1993, http://juliandibbell.com/texts/bungle_vv.htmlGoogle Scholar
,Drugs and Crime Prevention Committee, Inquiry into Fraud and Electronic Commerce, Final Report, Parliament of Victoria (2004)
Dutton, W. H., di Gennaro, C. and Hargrave, A. M., The Internet in Britain: The Oxford Internet survey (Oxford Internet Institute, United Kingdom, 2005)Google Scholar
Dutton, W. H., Helsper, E. J. and Gerber, M. M., The Oxford Internet Survey: The Internet in Britain 2009 (Oxford Internet Institute, United Kingdom, 2009)Google Scholar
,Economic and Domestic Secretariat, Identity Fraud: A study (Cabinet Office, 2002)Google Scholar
Ellison, L., ‘Cyberstalking: Tackling harassment on the Internet’ in Wall, D. S. (ed.), Crime and the Internet (London: Routledge, 2001)Google Scholar
Ellison, L. and Akdeniz, Y., ‘Cyberstalking: The regulation of harassment on the Internet’ (1998) Criminal Law Review, Special Edition: ‘Crime, Criminal Justice and the Internet’ 29Google Scholar
Evans, C. and Nguyen, K., ‘Second man arrested for upskirt pics’, The Age, 23 January 2007Google Scholar
,Explanatory Memorandum, Law and Justice Amendment (Identity Crimes and Other Measures) Bill 2008 (Cth), Commonwealth Parliament (2008)
Explanatory Memorandum, Telecommunications (Interception and Access) Amendment Bill 2007 (Cth)
,Explanatory Notes, Police and Justice Act 2006, c. 48 (UK)
,Explanatory Notes, Regulation of Investigatory Powers Act (2000) c. 23 (UK)
,Explanatory Notes, Sexual Offences Act 2003, c. 42 (UK)
Fafinski, S., ‘Computer misuse: The implications of the Police and Justice Act 2006’ (2008) 72 Journal of Criminal Law53CrossRefGoogle Scholar
Fallows, D., Data Memo (PEW Internet and American Life Project, 2007)
Farhangian, J. J., ‘A problem of “virtual” proportions: The difficulties inherent in tailoring virtual child pornography laws to meet constitutional standards’ (2003) 12 Journal of Law and Policy241Google Scholar
,Federal Bureau of Investigation, Innocent Images National Initiative, US Department of Justice, www.fbi.gov/page2/feb06/innocent_images_statistics.htm
,Federal Bureau of Investigation, National Incident-Based Reporting System, i: Data collection guidelines (US Department of Justice, 2000)
,Federal Trade Commission, 2006 Identity Theft Survey Report (2007)
,Federal Trade Commission, ‘Facts for consumers: Dot cons’ (2000), www.ftc.gov/bcp/edu/pubs/consumer/ tech/tec09.shtm
,Federal Trade Commission, FTC Consumer Alert: ‘Free security scan’ could cost time and money (Federal Trade Commission, Bureau of Consumer Protection, 2008)
,Federal Trade Commission, Spam Summit: The next generation of threats and solutions (Federal Trade Commission, 2007)
Feldmeier, J. P., ‘Close enough for government work: An examination of Congressional efforts to reduce the government's burden of proof in child pornography cases’ (2003) 30 Northern Kentucky Law Review205Google Scholar
Finch, E., The Criminalisation of Stalking (London: Routledge-Cavendish, 2001)Google Scholar
Finch, E., ‘The objective standard of reasonableness and the mentally ill stalker’ (2001) 65 The Journal of Criminal Law489Google Scholar
Finch, E., ‘Stalking the perfect stalking law: An evaluation of the efficacy of the Protection from Harassment Act 1997’ (2002) Criminal Law Review703Google Scholar
Finch, E., ‘The problem of stolen identity and the Internet’ in Jewkes, Y. (ed.), Crime Online (United Kingdom: Willan Publishing, 2007)Google Scholar
Fisher, B. S., Cullen, F. T. and Turner, M. G., ‘Being pursued: Stalking victimization in a national study of college women’ (2002) 1 Criminology and Public Policy257CrossRefGoogle Scholar
Foss, M. and Johnson, E, Symantec Report on the Underground Economy July 07–June 08 (Symantec, 2008)
,Fraud Prevention Expert Group, Report on Identity Theft/Fraud (European Commission, 2007)
Garfinkel, S. L. and Shelat, A., ‘Remembrance of data passed: A study of disk sanitization practices’ (2003) 1 IEEE Security & Privacy17CrossRefGoogle Scholar
Geltzer, J. N., ‘The new pirates of the Caribbean: How data havens can provide safe harbors on the Internet beyond governmental reach’ (2004) Southwestern Journal of Law and Trade in the Americas433Google Scholar
Gilbert, D., Kerr, I. R. and McGill, J., ‘The medium and the message: Personal privacy and the forced marriage of police and telecommunications providers’ (2007) 51 Criminal Law Quarterly469Google Scholar
Gillespie, A. A., ‘Children, chatrooms and the law’ (2001) Criminal Law Review435Google Scholar
Gillespie, A. A., ‘Child protection on the Internet: Challenges for criminal law’ (2002) 14 Child and Family Law Quarterly411Google Scholar
Gillespie, A. A., ‘The Sexual Offences Act 2003 (3): Tinkering with “child pornography”’ (2004) Criminal Law Review 361Google Scholar
Gillespie, A. A., ‘Child pornography: Balancing substantive and evidential law to safeguard children effectively from abuse’ (2005) 9 The International Journal of Evidence and Proof29CrossRefGoogle Scholar
Gillespie, A. A., ‘Cyber-bullying and harassment of teenagers: The legal response’ (2006) 28 Journal of Social Welfare & Family Law123CrossRefGoogle Scholar
Gillespie, A. A., ‘Enticing children on the Internet: The response of the criminal law’ (2006) 3 Juridical Review229Google Scholar
Gillespie, A. A., ‘Indecent images, grooming and the law’ (2006) Criminal Law Review412Google Scholar
Gillespie, A. A., ‘“Up-skirts” and “down-blouses”: Voyeurism and the law’ (2008) Criminal Law Review 370Google Scholar
Goldman, E., ‘A road to no warez: The No Electronic Theft Act and criminal copyright infringement’ (2003) Oregon Law Review369Google Scholar
Goldsmith, J., ‘Against cyberanarchy’ (1998) University of Chicago Law Review 1199Google Scholar
Goodman, M. D and Brenner, S. W., ‘The emerging consensus on criminal conduct in cyberspace’ (2002) UCLA Journal of Law and Technology 3Google Scholar
Goodno, N. H., ‘Cyberstalking: A new crime: Evaluating the effectiveness of current state and federal laws’ (2007) 72 Missouri Law Review125Google Scholar
Grabosky, P., Electronic Crime (New Jersey: Pearson Prentice Hall, 2007)Google Scholar
Grabosky, P., Smith, R. G. and Dempsey, G., Electronic Theft: Unlawful acquisition in cyberspace (Cambridge: Cambridge University Press, 2001)Google Scholar
Grant, I., Bone, N. and Grant, K., ‘Canada's criminal harassment provisions: A review of the first ten years’ (2003) 29 Queen's Law Journal175Google Scholar
Griffith, G. and Roth, L., Protecting Children from Online Sexual Predators, Briefing Paper no. 10/107 (NSW Parliamentary Library Research Service, 2007)Google Scholar
Griffith, G. and Simon, K., Child Pornography Law, Briefing Paper no. 9/08,(NSW Parliamentary Library Research Service, 2008)Google Scholar
Gross, A. V., ‘Criminal liability for theft of, interference with, or unauthorized use of, computer programs, files, or systems’ (2003) 51 ALR 4th 971
Hammack, S., ‘The Internet loophole: Why threatening speech on-line requires a modification of the courts’ approach to true threats and incitement' (2002) 36 Columbia Journal of Law and Social Problems65Google Scholar
Hébert, M. and Pilon, H., Computer Crime (Department of Justice Canada, 1991)
Hedley, S., ‘A brief history of spam’ (2006) 15 Information and Communications Technology Law223CrossRefGoogle Scholar
Herrera-Flanigan, J. R., ‘Cybercrime and jurisdiction in the United States’ in Koops, B. J and Brenner, S. W., Cybercrime and Jurisdiction: A global survey (The Hague: TMC Asser Press, 2006)Google Scholar
Hirst, M., Jurisdiction and the Ambit of the Criminal Law (Oxford: Oxford University Press, 2003)CrossRefGoogle Scholar
Hitt, J., ‘Child pornography and technology: The troubling analysis of United States v Mohrbacher’ (2001) 34 University of California Davis Law Review1129Google Scholar
Holmes, N. and Valiquet, D., Bill S-4: An Act to Amend the Criminal Code (Identity Theft and Related Misconduct), Legislative Summary LS-637E (Legal and Legislative Affairs Division, Canada, 2009)
,Home Office, Setting the Boundaries: Reforming the law on sex offences (2000), vol. i
Hong, H., ‘Hacking through the Computer Fraud and Abuse Act’ (1997) 31 University of California Davis Law Review283Google Scholar
Horstmann, T. J., ‘Protecting traditional privacy rights in a brave new digital world: The threat posed by cellular phone-cameras and what states should do to stop it’ (2007) 111 Pennsylvania State Law Review739Google Scholar
,House of Commons Standing Committee on Justice And Legal Affairs, Computer Crime, Final Report (1983)
Hubbard, R. W., Brauti, P. M. and Fenton, S. K., Wiretapping and Other Electronic Surveillance: Law and procedure (Ontario: Canada Law Book, 2008)Google Scholar
Hughes, D. M., ‘The use of new communications and information technologies for sexual exploitation of women and children’ (2002) 13 Hastings Women's Law Journal127Google Scholar
Hyde-Bales, K., Morris, S. and Charlton, A., The Police Recording of Computer Crime, Development and Practice Report (Home Office, 2004)
,Industry Canada, Stopping Spam: Creating a stronger, safer Internet, Report of the Task Force on Spam (Industry Canada, 2005)
,Interac, Consumers – Security: Fraud (2008), www.interac.ca/consumers/security_fraud.php
,Interception Legislation Team – Home Office, Interception of Communications in the United Kingdom, Consultation Paper, Cm. 4368 (1999)
International Federation of the Photographic Industry, IFPI Digital Music Report 2008, www.ifpi.org/content/section_resources/dmr2008.html
,Internet Crime Complaint Center, Internet Crime Report 2007 (Internet Crime Complaint Center, 2007)
,Internet Crime Forum Legal Subgroup, Reform of the Computer Misuse Act 1990 (2003)
,Internet Crime Forum, Chat Wise, Street Wise: Children and Internet chat services (2001), www.internetcrimeforum.org.uk/chatwise_streetwise.pdf
,Internet World Stats, Internet Usage Statistics: The Internet big picture – world Internet users and population stats (2009), www.internetworldstats.com/ stats.htm
Jefferson, S. and Sharfritz, R., ‘A survey of cyberstalking legislation’ (2001) 32 University of West Los Angeles Law Review323Google Scholar
Jenkins, P., Beyond Tolerance: Child pornography on the Internet (New York: New York University Press, 2001)Google Scholar
Johannes, R., 2006 Identity Fraud Survey Report (Javelin Strategy and Research, 2006)
Johnson, D. R. and Post, D., ‘Law and borders: The rise of law in cyberspace’ (1996) 48 Stanford Law Review1367CrossRefGoogle Scholar
,Joint Standing Committee on Treaties, Extradition: A review of Australia's law and policy, Report 40 (Parliament of Australia, 2001)
Jones, A. and Doobay, A., Jones and Doobay on Extradition and Mutual Assistance (London: Sweet and Maxwell, 2005)Google Scholar
Karst, K. L., ‘Threats and meanings: How the facts govern First Amendment doctrine’ (2006) 58 Stanford Law Review1337Google Scholar
Kaspersen, H. W. K., ‘Jurisdiction in the Cybercrime Convention’ in Koops, B. J. and Brenner, S. W., Cybercrime and Jurisdiction: A global survey (The Hague: TMC Asser Press, 2006)Google Scholar
Kastens, A. H., ‘State v Stevenson, the “Peeping Tom” case: Overbreadth or overblown?’ (2001) Wisconsin Law Review 1371Google Scholar
Katyal, N. K., ‘Criminal law in cyberspace’ (2001) 149 University of Pennsylvania Law Review1003CrossRefGoogle Scholar
Keith, S., ‘Fear-mongering or fact: The construction of “cyber-terrorism” in US, UK, and Canadian news media’, Paper presented at Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities sponsored by the Oxford Internet Institute, Oxford, England, 8–10 September, 2005
Kerr, O. S., ‘Cybercrime's scope: Interpreting “access” and “authorization” in computer misuse statutes’ (2003) 78 New York University Law Review1596Google Scholar
Kerr, O. S., ‘Internet surveillance law after the USA Patriot Act: The big brother that isn't’ (2003) 97 Northwestern University Law Review607Google Scholar
Kerr, O. S., ‘Lifting the “fog” of Internet surveillance: How a suppression remedy would change computer crime law’ (2003) 54 Hastings Law Journal805Google Scholar
Kerr, O. S., ‘The problem of perspective in Internet law’ (2003) Georgetown Law Journal 357Google Scholar
Kerr, O. S., ‘A user's guide to the Stored Communications Act – and a legislator's guide to amending it’ (2004) 72 George Washington Law Review1701Google Scholar
Kerr, O. S., ‘Virtual crime, virtual deterrence: A skeptical view of self help, architecture and civil liability’ (2005) Journal of Law, Economics and Policy 197Google Scholar
Kerr, O. S., Computer Crime Law (St. Paul: Thomson West, 2006)Google Scholar
Kerr, O. S., ‘Searches and seizures in a digital world’ (2006) 119 Harvard Law Review531Google Scholar
Kerr, O. S., ‘Criminal law in virtual worlds’ (2008) University of Chicago Legal Forum415Google Scholar
Kerr, O. S., ‘The case for the third-party doctrine’ (2009) 107 Michigan Law Review561Google Scholar
Kershaw, C., Nicholas, S. and Walker, A., Crime in England and Wales 2007/08, Home Office Statistical Bulletin (2008)
Kohl, U., Jurisdiction and the Internet: Regulatory competence over online activity (Cambridge: Cambridge University Press, 2007)CrossRefGoogle Scholar
Koops, B. J. and Brenner, S. W., Cybercrime and Jurisdiction: A global survey (The Hague: TMC Asser Press, 2006)CrossRefGoogle Scholar
Kotadia, M., ‘Trojan horse found responsible for child porn’, ZDNet.co.uk, 1 August 2003, http://news.zdnet.co.uk/security/0,1000000189,39115422,00.htmGoogle Scholar
Kowalski, M., Cyber-Crime: Issues, data sources, and feasibility of collecting police-reported statistics, Cat. no. 85–558, Canadian Centre for Justice Statistics (2002)
Kreston, S. S., ‘Defeating the virtual defense in child pornography prosecutions’ (2004) Journal of High Technology Law49Google Scholar
Krone, T., A Typology of Online Child Pornography Offending, Trends and Issues in Crime and Criminal Justice (Australian Institute of Criminology, 2004)Google Scholar
Krone, T., Does Thinking Make it So? Defining online child pornography possession offences, Trends and Issues in Crime and Criminal Justice (Australian Institute of Criminology, 2005)Google Scholar
Krone, T., International Police Operations against Online Child Pornography, Trends and Issues in Crime and Criminal Justice (Australian Institute of Criminology, 2005)Google Scholar
LaFave, W. R., Criminal Law, 4th edn (St. Paul: Thomson, 2003)Google Scholar
Lamb, H., Principal Current Data Types, Internet Crime Forum (2001), found at Home Office, Retention of Communications Data Under Part 11: Anti-Terrorism, Crime and Security Act 2001, Voluntary Code of Practice (2001)
Lamplugh, D. and Infield, P., ‘Harmonizing anti-stalking laws’ (2003) 34 George Washington International Law Review853Google Scholar
Lanham, D., Cross-Border Criminal Law (Sydney: FT Law & Tax, 1997)Google Scholar
Lanning, K., Child Molesters: A behavioural analysis (Washington DC: National Center for Missing and Exploited Children, 1992)Google Scholar
Lastowka, F. G. and Hunter, D., ‘Virtual crimes’ (2004–5) New York Law School Law Review 293Google Scholar
,Law Commission, Computer Misuse, Working Paper no. 110 (1988)
,Law Commission, Computer Misuse, Final Report no. 186 (1989)
,Law Commission, Offences of Dishonesty: Money Transfers, Item 11 of the Sixth Programme of Law Reform: Criminal Law (1996)
,Law Commission, Fraud, Final Report, Law Com no. 276 (2002)
,Law Ministers from the Commonwealth, Model Law on Computer and Computer Related Crime (2002), www.thecommonwealth.org/shared_asp_files/ uploadedfiles/%7BDA109CD2–5204–4FAB-AA77–86970A639B05%7D_Computer%20Crime.pdf
,Law Reform Commission Ireland, Report on Privacy: Surveillance and the interception of communications, no. 57 (1998)
Lessig, L., Code and Other Laws of Cyberspace (New York: Basic Books, 1999)Google Scholar
Loren, L., ‘Digitization, commodification, criminalization: The evolution of criminal copyright infringement and the importance of the willfulness requirement’ (1999) 77 Washington University Law Quarterly835Google Scholar
Lynch, J., ‘Identity theft in cyberspace: Crime control methods and their effectiveness in combating phishing attacks’ (2005) 20 Berkley Technology Law Journal259Google Scholar
Madison, M. J., ‘Rights of access and the shape of the Internet’ (2003) Boston College Law Review 433Google Scholar
Magee, J., ‘The law regulating unsolicited commercial e-mail: An international perspective’ (2003) 19 Santa Clara Computer and High Technology Law Journal333Google Scholar
McCann, A. E., ‘Comment: Are courts taking Internet threats seriously enough? An analysis of true threats transmitted over the Internet, as interpreted in United States v. Carmichael’ (2006) 26 Pace Law Review523Google Scholar
McConvill, J., ‘Contemporary comment: Computer trespass in Victoria’ (2001) 25 Criminal Law Journal220Google Scholar
McCusker, R., ‘Spam: Nuisance or menace, prevention or cure?’ Trends and Issues in Criminal Justice no. 294 (Australian Institute of Criminology, 2005) 3
McDonald, S., ‘Wireless hotspots: The truth about their evil twins’ (2006) 9 Internet Law Bulletin13Google Scholar
McEwan, T., Mullen, P. and MacKenzie, R., ‘Anti-stalking legislation in practice: Are we meeting community needs?’ (2007) 14 Psychiatry, Psychology and Law207CrossRefGoogle Scholar
McGrath, M. and Casey, E., ‘Forensic psychiatry and the Internet: Practical perspectives on sexual predators and obsessional harassers in cyberspace’ (2002) 30 Journal of the American Academy of Psychiatry and the Law81Google ScholarPubMed
McKnight, G., Computer Crime (London: Joseph, 1973)Google Scholar
Merschman, J. C., ‘The dark side of the web: Cyberstalking and the need for contemporary legislation’ (2001) 24 Harvard Women's Law Journal255Google Scholar
,MessageLabs, MessageLabs Intelligence Report April 2008, www.messagelabs.com.au/intelligence.aspx
,MessageLabsMessageLabs Intelligence Report June 2009, www.messagelabs.com.au/resources/mlireports.
Miano, T. J., ‘Formalist statutory construction and the doctrine of fair warning: An examination of United States v. Councilman’ (2007) 14 George Mason Law Review513Google Scholar
Miletic, D., ‘“Groomer” guilty of procuring girl, 14, for sex’, The Age, 26 May 2006Google Scholar
Mishler, J. L., ‘Cyberstalking: Can communication via the Internet constitute a credible threat, and should an Internet service provider be liable if it does?’ (2000) 17 Santa Clara Computer and High Technology Law Journal115Google Scholar
Mitchell, K. J., Wolak, J. and Finkelhor, D., ‘Police posing as juveniles online to catch sex offenders: Is it working?’ (2005) 17 Sexual Abuse: A Journal of Research and Treatment241CrossRefGoogle ScholarPubMed
Mnookin, J. L., ‘Virtual(ly) law: The emergence of law in LambdaMOO’ (1996) 2 Journal of Computer-Mediated CommunicationGoogle Scholar
,Model Criminal Code Officers Committee, Chapter 5: Sexual Offences Against the Person, Final Report (1999)
,Model Criminal Code Officers Committee, Chapter 4: Damage and Computer Offences, Discussion Paper (2000)
,Model Criminal Code Officers Committee, Chapter 4: Damage and Computer Offences, Final Report (2001)
,Model Criminal Code Officers Committee, Chapter 3: Credit Card Skimming Offences, Final Report (2006)
,Model Criminal Law Officers Committee, Identity Crime, Discussion Paper (2007)
,Model Criminal Code Officers Committee, Identity Crime, Final Report (2008)
Moohr, G. S., ‘The crime of copyright infringement: An inquiry based on morality, harm and criminal theory’ (2003) 83 Boston University Law Review731Google Scholar
Morris, S., The Future of Netcrime Now: Part 1 – Threats and challenges, Home Office Online Report 62/04 (Home Office, 2004)
Muir, D., Violence against Children in Cyberspace. A contribution to the United Nations study on violence against children (Bangkok: ECPAT International, 2005)Google Scholar
Mullen, P. E., Pathé, M. and Purcell, R., Stalkers and Their Victims (New York: Cambridge University Press, 2000)CrossRefGoogle Scholar
Naraine, R., ‘Computer virus “hijacks” American Express web site’, Fox News, 1 May 2006, www.foxnews.com/story/0,2933,193784,00.html
Nash, V. and Peltu, M., Rethinking Safety and Security in a Networked World: Reducing harm by increasing cooperation, Oxford Internet Institute Forum, Discussion Paper no. 6 (2005)Google Scholar
,Nathanson Centre on Transnational Human Rights, Crime and Security, Organized Crime in Canada: A quarterly summary, July to September 2003, York University, www.yorku.ca/nathanson/CurrentEvents/2003_Q3.htmGoogle Scholar
,Nathanson Centre on Transnational Human Rights, Crime and Security, Organized Crime in Canada: A quarterly summary, January to March 2006, York University, www.yorku.ca/nathanson/CurrentEvents/2006_Q1_.htmGoogle Scholar
,National Criminal Intelligence Service, Project Trawler: Crime on the information highways (1999), www.cyber-rights.org/documents/trawler.htm
,National Institute of Justice, Project to Develop a Model Anti-Stalking Code for States (Department of Justice 1993)
,National Offender Management Service and Scottish Executive, Consultation: On the possession of extreme pornographic material (Home Office, 2005)Google Scholar
,National Statistics, ‘Value of Internet sales rises 56 per cent in 2005’, News Release (National Statistics, UK 2006)
,National Statistics, First Release: Internet access 2007: Households and individuals (2007), www.statistics.gov.uk/pdfdir/inta0807.pdf
,National Statistics, Adult Mobile Phone Ownership or Use: By age, 2001 and 2003, Social Trends 34 (2009), www.statistics.gov.uk/STATBASE/ssdataset.asp?vlnk=7202>
New South Wales Law Reform Commission, Surveillance: Final Report, Report 108 (2005)
,New Zealand Law Commission, Intimate Covert Filming Study Paper, no. 15 (2004)
Newman, G. R. and McNally, M. M., Identity theft literature review (Office of Justice Programs, US Department of Justice, 2005)
Ng, K., ‘Spam legislation in Canada: Federalism, freedom of expression and the regulation of the Internet’ (2005) 2 University of Ottawa Law and Technology Journal447Google Scholar
Norfolk, A., ‘Computer expert faces jail over “made-up” child porn image’, Times Online, 10 August 2006, http://technology.timesonline.co.uk/tol/news/ tech_and_web/article604825.eceGoogle Scholar
O'Connell, R., A Typology of Cybersexploitation and On-line Grooming Practices (Cyberspace Research Unit, University of Central Lancashire, 2003)Google Scholar
O'Neill, M. E., ‘Old crimes in new bottles: Sanctioning cybercrime’ (2000) 9 George Mason Law Review237Google Scholar
Ogilvie, E., ‘Cyberstalking’, Trends and Issues in Crime and Criminal Justice, no.166 (AIC, 2000)
Ogilvie, E., Stalking: Legislative, policing and prosecution patterns in Australia, AIC Research and Public Policy Series no. 34 (AIC, 2000)
Ogilvie, E., ‘The Internet and cyberstalking’, Paper Presented at the Stalking: Criminal Justice Responses Conference, Australian Institute of Criminology, Sydney, 7–8 December 2000
Olivenbaum, J. M., ‘<CTRL><ALT><DEL>: Rethinking federal computer crime legislation’ (1997) 27 Seton Hall Law Review574Google Scholar
,Organisation for Economic Co-Operation and Development, OECD Guidelines for the Security of Information Systems and Networks: Towards a culture of security (OECD, 2002)
,Organisation for Economic Co-Operation and Development, Scoping Paper on Online Identity Theft, Ministerial Background Report (2007)
Ost, S., ‘Getting to grips with sexual grooming? The new offence under the Sexual Offences Act 2003’ (2004) 26 Journal of Social Welfare and Family Law147CrossRefGoogle Scholar
Oyama, K. A., ‘E-mail privacy after United States v. Councilman: Legislative options for amending ECPA’ (2006) 21 Berkeley Technology Law Journal499Google Scholar
Packard, A., ‘Does proposed federal cyberstalking legislation meet constitutional requirements?’ (2000) 5 Communication Law and Policy505CrossRefGoogle Scholar
Paget, F., ‘Identity Theft’, White Paper (McAfee, 2007)Google Scholar
Parker, D. B., Crime by Computer (New York: Scribner, 1976)Google Scholar
Parker, D. B., Fighting Computer Crime (New York: Scribner, 1983)Google Scholar
,Parliamentary Joint Committee on the National Crime Authority, Organised Criminal Paedophile Activity (Commonwealth of Australia, 1995)
,Parliamentary Joint Committee on the National Crime Authority, Cybercrime (Parliament of the Commonwealth of Australia, 2004)
Pastrikos, C., ‘Identity theft statutes: Which will protect Americans the most?’ (2004) 67 Albany Law Review1137Google Scholar
Paust, J., ‘Panel: Cybercrimes and the domestication of international criminal law’ (2007) 5 Santa Clara Journal of International Law432Google Scholar
Penney, S., ‘Crime, copyright, and the digital age’ in Law Commission of Canada, What is a Crime? Defining criminal conduct in contemporary society (Vancouver: UBC Press, 2004)Google Scholar
Peretti, K., ‘Data breaches: What the underground world of “carding” reveals’ (2008) 25 Santa Clara Computer and High Technology Journal375Google Scholar
Podgor, E. S., ‘International computer fraud: A paradigm for limiting national jurisdiction’ (2002) 35 University of California Davis Law Review267Google Scholar
Podgor, E. S., ‘Extraterritorial criminal jurisdiction: Replacing “objective territoriality” with “defensive territoriality”’ in Sarat, A. and Ewick, P. (eds.), Studies in Law, Politics, and Society (2003)
,Postini Inc., 2007 Postini Communications Intelligence Report (Postini Inc., 2007)
Potashman, M., ‘International spam regulation and enforcement: Recommendations following the world summit on the information society’ (2006) 29 Boston College International & Comparative Law Review323Google Scholar
,President's Working Group on Unlawful Conduct on the Internet, The Electronic Frontier: The challenge of unlawful conduct involving the use of the Internet (2000), www.usdoj.gov/criminal/cybercrime/unlawful.htm
Purcell, R., Pathé, M. and Mullen, P. E., ‘The prevalence and nature of stalking in the Australian community’ (2002) 36 Australian and New Zealand Journal of Psychiatry114CrossRefGoogle ScholarPubMed
Purcell, R., ‘Stalking: Defining and prosecuting a new category of offending’ (2004) 27 International Journal of Law and Psychiatry157CrossRefGoogle ScholarPubMed
Radosevich, A. C., ‘Thwarting the stalker: Are anti-stalking measures keeping pace with today's stalker?’ (2000) University of Illinois Law Review1371Google Scholar
Ramasastry, A., Winn, J. K. and Winn, P., ‘Will wi-fi make your private network public? Wardriving, criminal and civil liability, and the security risks of wireless networks’ (2005) 1 Shidler Journal of Law, Commerce and Technology9Google Scholar
Rathmell, A., Valeri, L., Robinson, N. and Servida, A., Handbook of Legislative Procedures of Computer and Network Misuse in EU Countries, Study for the European Commission Directorate-General Information Society (2002)
Reed, C., Why Must You Be Mean to Me? – Crime, punishment and online personality, School of Law Working Paper Series, Queen Mary University of London (2008)Google Scholar
Restatement (Third) of Foreign Relations Law of the United States
Richardson, R., 2008: CSI Computer Crime and Security Survey (Computer Security Institute, 2008)Google Scholar
Ricketson, S. and Ginsburg, J.C., Inducers and Authorisers: A comparison of the US Supreme Court's Grokster decision and the Australian Federal Court's KaZaa ruling, Columbia Public Law and Legal Theory Working Papers, Paper no. 0698, Columbia Law School (2006)
Roach, G. and Michiels, W.J., ‘Damages is the gatekeeper issue for federal computer fraud’ (2006) 8 Tulane Journal of Technology and Intellectual Property61Google Scholar
Roddy, J., ‘The Federal Computer Systems Protection Act’ (1979) 7 Rutgers Journal of Computers Technology and the Law343Google Scholar
Rogers, A., ‘Playing hide and seek: How to protect virtual pornographers and actual children on the Internet’ (2005) Villanova Law Review 87Google Scholar
Rogers, K., ‘Viagra, viruses and virgins: A pan-Atlantic comparative analysis on the vanquishing of spam’ (2006) 22 Computer Law and Security Report228CrossRefGoogle Scholar
Rothenberg, L. E., ‘Re-thinking privacy: Peeping Toms, video voyeurs, and failure of the criminal law to recognize a reasonable expectation of privacy in the public space’ (2000) 49 American University Law Review1127Google Scholar
Roundy, M. D., ‘The Wiretap Act – reconcilable differences: A framework for determining the “interception” of electronic communications following United States v. Councilman's rejection of the storage/transit dichotomy’ (2006) 28 Western New England Law Review403Google Scholar
Ryan, P. S., ‘War, peace, or stalemate: Wargames, wardialing, wardriving, and the emerging market for hacker ethics’ (2004) 9 Virginia Journal of Law and Technology7Google Scholar
Schjølberg, S. and Hubbard, A. M., Harmonizing National Legal Approaches on Cybercrime, Background Paper, International Telecommunications Union (2005)
Schryen, G., ‘Anti-spam legislation: An analysis of laws and their effectiveness’ (2007) 16 Information and Communications Technology Law17CrossRefGoogle Scholar
Scott, A. H., Computer and Intellectual Property Crime: Federal and state law (Washington DC: The Bureau of National Affairs, Inc., 2001)Google Scholar
,Scottish Law Commission, Report on Computer Crime, Final Report no. 106 (1987)
,Senate Legal and Constitutional Legislation Committee, Provisions of the Telecommunications Amendment Bill 2004 (Canberra, 2004)Google Scholar
,Senate Legal and Constitutional Legislation Committee, Provisions of the Telecommunications (Interception) Amendment Bill 2006 (Canberra, 2006)Google Scholar
Siebecker, M. R., ‘Cookies and the common law: Are Internet advertisers trespassing on our computers?’ (2003) 76 Southern California Law Review893Google Scholar
Sieber, U., Legal Aspects of Computer-Related Crime in the Information Society, COMCRIME Study, European Commission (1998)Google Scholar
Singleton, S., ‘Comment: Computer Misuse Act 1990 – recent developments’ (1993) 57 Journal of Criminal Law181CrossRefGoogle Scholar
Sinrod, E. J. and Reilly, W. P., ‘Cyber-crimes: A practical approach to the application of federal computer crime laws’ (2000) 16 Santa Clara Computer and High Tech Law Journal177Google Scholar
Siwek, S. E., Copyright Industries in the US Economy: The 2004 report (International Intellectual Property Alliance, 2004)
Smith, J. C., ‘Case & comment’ (1999) Criminal Law Review 970Google Scholar
Smith, R. G., Grabosky, P. and Urbas, G., Cyber Criminals on Trial (Cambridge: Cambridge University Press, 2004)CrossRefGoogle Scholar
Smith, R.G., Holmes, M. N. and Kaufmann, P., ‘Nigerian advance fee fraud’ Trends and Issues in Criminal Justice no. 121 (AIC, 1996)
,Solicitor General, Canada and US Department of Justice, Public Advisory: Special report for consumers on identity theft (2003)
Solove, D. J., ‘The future of the Internet surveillance law: A symposium to discuss Internet surveillance, privacy & the USA PATRIOT Act: Surveillance law: Reshaping framework: Electronic surveillance law’ (2004) 72 George Washington Law Review1264Google Scholar
Soma, J., Singer, P. and Hurdd, J., ‘Spam still pays: The failure of the CAN-SPAM Act of 2003 and proposed legal solutions’ (2008) 45 Harvard Journal on Legislation165Google Scholar
Soma, J. T., Muther, Jr, T. F. and Brissette, H. M. L., ‘Transnational extradition for computer crimes: Are new treaties and laws needed?’ (1997) 34 Harvard Journal on Legislation317Google Scholar
Sommer, P., ‘Criminalising hacking tools’ (2006) 3 Digital Investigation68CrossRefGoogle Scholar
,Sophos, Security Threat Report: 2009, www.sophos.com/sophos/docs/eng/marketing_material/sophos-security-threat-report-jan-2009-na.pdf
Sorkin, D., ‘Technical and legal approaches to unsolicited electronic mail’ (2001) 35 University of San Francisco Law Review325Google Scholar
,Staff Report Prepared for the Use of the Committee on Energy and Commerce, Sexual Exploitation of Children over the Internet, US House of Representatives, 109th Congress, January 2007
,Standing Committee of Attorney's-General, Unauthorised Photographs on the Internet and Ancillary Privacy Issues, Discussion Paper, Civil Law Policy (Melbourne: Department of Justice, 2005)Google Scholar
,Standing Committee on Legal and Constitutional Affairs, Telecommunications (Interception and Access) Amendment Bill 2007 (Canberra, Commonwealth of Australia, 2007)Google Scholar
,Statistics Canada, Household Internet Use Survey-Microdata User's Guide 2003, Cat no. 56M0002GIE (2004), http://dsp-psd.pwgsc.gc.ca/Collection/Statcan/ 56M0002G/56M0002GIE.html
,Statistics Canada, Electronic Commerce Households Spending in Canada and in Other Countries, by Region (2005), www40.statcan.ca/l01/cst01/comm07a.htm
,Statistics Canada, Residential Telephone Service Survey (2007), www.statcan.gc.ca/daily-quotidien/070504/dq070504a-eng.htm
Steel, A., ‘Vaguely going where no-one has gone: The expansive new computer access offences’ (2002) 26 Criminal Law Journal72Google Scholar
Steiner, P., ‘On the Internet, nobody knows you're a dog’, The New Yorker, 5 July 1993Google Scholar
Steinhauer, J., ‘Verdict in MySpace suicide case’, New York Times, 26 November 2008Google Scholar
Sullivan, C., ‘The response of the criminal law in Australia to computer abuse’ (1988) 12 Criminal Law Journal228Google Scholar
,Symantec, Spam Monthly Report January 2009, http://eval.symantec.com/ mktginfo/enterprise/otherresources/b-state_of_spam_report_01–2009.en-us. pdf
,Task Force on Child Protection on the Internet, Protecting the Public, Cm. 5668 (Home Office, 2002)Google Scholar
,Task Force on Intellectual Property, Progress Report of the Department of Justice's Task Force on Intellectual Property (US Department of Justice, 2006)
,Task Force on Spam, Anti-Spam Law Enforcement (Organisation for Economic Co-operation and Development, 2005)
,Task Force on Spam, Anti-Spam Regulation (Organisation for Economic Co-operation and Development, 2005)
,Task Force on Spam, Report of the OECD Task Force on Spam: Anti-spam toolkit of recommended policies and measures (Organisation for Economic Co-operation and Development, 2006)
,Tasmanian Law Reform Commission, Report on Computer Misuse, Report no. 47 (1986)
Taylor, M. and Quayle, E., Child Pornography: An Internet crime (East Sussex: Brunner-Routledge, 2003)
,The President's Identity Theft Task Force, Combating Identity Theft: A strategic plan (2007)
,The White House, The National Strategy to Secure Cyberspace (Washington DC, 2003)Google Scholar
Tjaden, P. and Thoennes, J., Prevalence, Incidence, and Consequences of Violence against Women: Findings from the national violence against women survey, US Department of Justice, Office of Justice Programs (1998)
,UK Sentencing Advisory Panel, The Panel's Advice to the Court of Appeal on Offences Involving Child Pornography (2002)
,United Nations, Model Treaty on the Transfer of Proceedings in Criminal Matters, A/RES/45/118, 14 (1990)
,United Nations, Manual on the Prevention and Control of Computer Related Crime, International Review of Criminal Policy Nos. 43–4 (1999)
,US Attorney, District of New Jersey, ‘Multi-million dollar home equity line of credit, identity theft and computer intrusion ring busted’ Press Release (US Department of Justice, 2008)
,US Attorney, Southern District of New York, ‘U.S. announces sentencing of man in largest identity theft case in nation's history’, Press Release, (US Department of Justice, 2005), www.usdoj.gov/usao/nys/pressreleases/ January05/cummingssentencingpr.pdf
,US Attorney General, Report to Congress on Stalking and Domestic Violence (US Department of Justice, Office of Justice Programs, 2001)
,US Attorney's Office, District of New Jersey, ‘“Shadowcrew” identity theft ringleader gets 32 months in prison’, News Release (2006), www.usdoj.gov/usao/nj/press/files/mant0629_r.htm
,US Attorney's Office, Western District of New York and US Department of Justice Computer Crimes and Intellectual Property Section, The Online World and Law Enforcement, www.fpd-fln.org/online_world_and_ law_enforcement.htm
,US Census Bureau, Computer and Internet Use in the United States 2003 (US Department of Commerce, 2005)
,US Census Bureau, ‘Quarterly retail e-commerce sales 4th Quarter 2007’ (US Department of Commerce, 2007), www.census.gov/mrts/www/data/pdf/07Q4.pdf
,US Computer Emergency Readiness Team, The Continuing Denial of Service Threat Posed by DNS Recursion (v 2.0) (2006)
,US Department of Justice, Attorney General's Commission on Pornography: Final Report (1986)
,US Department of Justice, ‘Warez leader sentenced to 46 months’ (2002), www.cybercrime.gov/ sankusSent.htm
,US Department of Justice, ‘“Shadowcrew” Internet identity and credit card thieves plead guilty’ Department of Justice Press Release (2005), www.usdoj.gov/usao/nj/press/ files/shad1117_r.htm
,US Department of Justice, Prosecuting Intellectual Property Crimes, 3rd edn (Office of Legal Education, 2006)
,US Department of Justice, ‘Extradited software piracy ringleader pleads guilty’ Press Release, 20 April 2007, www.usdoj.gov/criminal/pr/press_releases/2007/04/2007_5117_04–20–07rgriffiths-plea.pdf
,US Department of Justice, ‘Alan Ralsky, ten others, indicted in international spamming and stock-fraud scheme’ (2008), www.usdoj.gov/opa/pr/2008/January/08_crm_003.html
,US Department of Justice, FY 2008 Performance and Accountability Report (2008)
,US Department of Justice, ‘Retail hacking ring charged for stealing and distributing credit and debit card numbers from major US retailers: More than 40 million credit and debit card numbers stolen’, Press Release (2008), www.usdoj.gov/criminal/ cybercrime/gonzalezIndict.pdf
,US Department of Justice, United States Attorneys' Manual, Title 9: Criminal Resource Manual, 9–15.000
,US Department of Justice, Computer Crimes and Intellectual Property Section, The Online World And Law Enforcement (US Attorney's Office, Western District of New York), www.fpd-fln.org/online_world_and_law_enforcement.htm
,US Department of Justice, Western District of North Carolina, ‘Hacker sentenced to prison for breaking into Lowe's companies’ computers with intent to steal credit card information', Press Release (2004), www.usdoj.gov/criminal/cybercrime/salcedoSent.htm
,US Government Accountability Office, Personal Information: Data breaches are frequent, but evidence of resulting identity theft is limited; however, the full extent is unknown, Report to Congressional Requesters (Government Accountability Office, 2007)
,US Securities Exchange Commission, ‘Regulators launch fake scam websites to warn investors about fraud’, News Release (2002), www.sec.gov/news/ headlines/scamsites.htm
,US Senate, Phony Identification and Credentials Via the Internet, Permanent Subcommittee on Investigations of the Committee on Governmental Affairs (2002)
Urbas, G. and Choo, K. R., Resource Material on Technology-enabled Crime, Technical and Background Paper no. 28 (AIC, 2008)
Valiquet, D., Telecommunications and Lawful Access: I. The legislative situation in Canada (Library of Parliament, 2006)
,Virtual Global Taskforce, ‘Website snares its first online grooming offender’, Press Release, 22 June 2006 www.virtualglobaltaskforce.com/news/article 22062006.html
Walby, S. and Allen, J., Domestic Violence, Sexual Assault and Stalking: Findings from the British Crime Survey, Home Office Research Study 276 (2004)
Walden, I., Computer Crimes and Digital Investigations (New York: Oxford University Press, 2007)Google Scholar
Walker, C., ‘Cyber-terrorism: Legal principle and law in the United Kingdom’ (2006) Pennsylvania State Law Review 625Google Scholar
Wall, D. S., ‘Digital realism and the governance of spam as cybercrime’ (2005) 10 European Journal of Criminal Policy and Research309CrossRefGoogle Scholar
Wall, D. S., ‘Surveillant Internet technologies and the growth in information capitalism: Spams and public trust in the information society’ in Haggerty, K. and Ericson, R. (eds.), The New Politics of Surveillance and Visibility (Toronto: University of Toronto Press, 2005)Google Scholar
Wall, D. S., Cybercrime (Cambridge: Polity, 2007)Google Scholar
Warren, S. D. and Brandeis, L. D., ‘The right to privacy’ (1890) 4 Harvard Law Review193CrossRefGoogle Scholar
Wasik, M., Crime and the Computer (Oxford: Clarendon Press, 1991)Google Scholar
Weimann, G., ‘Cyberterrorism: The sum of all fears?’ (2005) Studies in Conflict and Terrorism 129Google Scholar
Wells, C., ‘Stalking: The criminal law response’ (1997) Criminal Law Review 463Google Scholar
Williams, K. S., ‘Child pornography law: Does it protect children?’ (2004) 26 Journal of Social Welfare and Family Law245CrossRefGoogle Scholar
Wilson, C., Computer Attack and Cyberterrorism: Vulnerabilities and policy issues for Congress, Congressional Research Service Report for Congress, (Congressional Research Service, 2005)
Wilson, D. et al., Fraud and Technology Crimes: Findings from the 2003/04 British Crime Survey, the 2004 Offending, Crime and Justice Survey and administrative sources (Home Office Online Report, 2006)
Wolak, J., Mitchell, K. and Finkelhor, D., ‘Escaping or connecting? Characteristics of youth who form close online relationships’ (2003) 26 Journal of Adolescence105CrossRefGoogle ScholarPubMed
Wolak, J., Internet Sex Crimes against Minors: The response of law enforcement (Crimes against Children Research Center, 2003)
Wolak, J., ‘Internet-initiated sex crimes against minors: Implications for prevention based on findings from a national study’ (2004) 35 Journal of Adolescent Health424e11CrossRefGoogle ScholarPubMed
Wolak, J., Finkelhor, D. and Mitchell, K. J., Child-Pornography Possessors Arrested in Internet-Related Crimes: Findings from the national juvenile online victimization study (National Center for Missing and Exploited Children, 2005)
Wolak, J., ‘The varieties of child pornography production’ in Quayle, E. and Taylor, M. (eds.), Viewing Child Pornography on The Internet: Understanding the offense, managing the offender, helping the victims (Russell House, 2005)Google Scholar
Wolak, J., Online victimization of youth: Five years later (National Center for Missing and Exploited Children, 2006)
Wood, J. R. T., Royal Commission into the New South Wales Police Service: Final report, v: The paedophile inquiry (NSW Government, 1997)
Yar, M., Cybercrime and Society (London: Sage Publications, 2006)Google Scholar
Yu, M. A., Lehrer, R. and Roland, W., ‘Intellectual property crimes’ (2008) 45 American Criminal Law Review665Google Scholar
Zappen, M. J., ‘How well do you know your computer? The level of scienter in 18 USC § 1462’ (2003) 66 Albany Law Review1161Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Bibliography
  • Jonathan Clough, Monash University, Victoria
  • Book: Principles of Cybercrime
  • Online publication: 05 June 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9780511845123.016
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Bibliography
  • Jonathan Clough, Monash University, Victoria
  • Book: Principles of Cybercrime
  • Online publication: 05 June 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9780511845123.016
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Bibliography
  • Jonathan Clough, Monash University, Victoria
  • Book: Principles of Cybercrime
  • Online publication: 05 June 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9780511845123.016
Available formats
×