Skip to main content Accessibility help
×
Hostname: page-component-84b7d79bbc-fnpn6 Total loading time: 0 Render date: 2024-07-27T16:25:23.227Z Has data issue: false hasContentIssue false

Bibliography

Published online by Cambridge University Press:  05 October 2015

Jonathan Clough
Affiliation:
Monash University, Victoria
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Akdeniz, Y., ‘Possession and dispossession: A critical assessment of defences in cases of possession of indecent photographs of children’ (2007) Criminal Law Review 274
Akdeniz, Y., Taylor, N. and Walker, C., ‘Regulation of Investigatory Powers Act 2000 (1): BigBrother.gov.uk: State surveillance in the age of information and rights’ (2001) Criminal Law Review 73
All Party Parliamentary Internet Group, “Spam”: Report of an inquiry by the All Party Internet Group (2003)
All Party Parliamentary Internet Group, Revision of the Computer Misuse Act: Report of an inquiry by the All Party Internet Group (2004)
All Party Parliamentary Internet Group, ‘Digital rights management’: Report of an inquiry by the All Party Internet Group (2006)
American Psychiatric Association, Diagnostic and statistical manual of mental disorders – DSM-5, (Arlington VA: APA, 2013)
Anderson, R., Barton, C., Böhme, R., Clayton, R., Eeten, M. J. G. van, Levi, M., Moore, T. and Savage, S., ‘Measuring the cost of cybercrime’, in Böhme, R. (ed.), The economics of information security and privacy (Berlin: Springer, 2013)Google Scholar
Anti-Phishing Working Group, Phishing activity trends report: 1st quarter 2014 (2014)
Anti-Phishing Working Group, ‘Origins of the word “Phishing”’, http://docs.apwg.org/word_phish.html
Apple, Apple press info: Apple's app store downloads top 25 billion, Press Release (5 March 2012), www.apple.com/pr/library/2012/03/05Apples-App-Store-Downloads-Top-25-Billion.html
Arbor Networks, Worldwide infrastructure security report, Vol. X (2015)
Arcabascio, C., ‘Sexting and teenagers: OMG R U Going 2 Jail???’ (2010) 16 Richmond Journal of Law & Technology1Google Scholar
Ashworth, A., Principles of criminal law, (New York, Oxford University Press, 2006)Google Scholar
Attorney General's Department (Australia), Review of Commonwealth criminal law: Interim Report, computer crime (1988)
Attorney General's Department (Australia), Equipping Australia against emerging and evolving threats, Discussion Paper (July 2012)
Attorney General's Department (Australia), National plan to combat cybercrime (2013)
Attorney General's Department (Australia), Telecommunications (Interception and Access Act) 1979 – Annual report 2012–13 (2013)
AusCERT, Australian computer crime and security survey report (2013)
Australasian Centre for Policing Research and the Australian Transaction Reports and Analysis Centre, Standardisation of definitions of identity crime terms: A step towards consistency, Report Series No. 145.3 (Australasian Centre For Policing Research, 2006)
Australian Bureau of Statistics, Personal fraud, 2010–2011, Cat No. 4528.0 (Canberra: ABS, 2012)
Australian Bureau of Statistics, Household use of information technology, Australia 2012–13, Cat. No. 8146.0 (ABS: 2014)
Australian Communications and Media Authority, Communications report 2011–12 series, Report 3 – Smartphones and tablets take-up and use in Australia (2013)
Australian Communications and Media Authority, Like, post, share: Young Australians’ experience of social media, Quantitative Research Report (2013)
Australian Communications and Media Authority, Spam statistics: March 2013 (21 November 2013)
Australian High Tech Crime Centre, Malware: Viruses, worms, Trojans horses, High Tech Crime Brief No. 10 (AIC, 2006)
Australian High Tech Crime Centre, Money mules, High Tech Crime Brief No. 16 (AIC, 2007)
Australian Institute of Criminology, Intellectual property crime and enforcement in Australia, Research and Public Policy Series No. 94 (2008)
Australian Law Reform Commission, Film and literature censorship procedure, Report No. 55 (1991)
Australian Law Reform Commission, For your information: Australian privacy law and practice, Report 108, Vol 1. (2008)
Australian Law Reform Commission, Serious invasions of privacy in the digital era, Discussion Paper 80 (2014)
Australian Payments Clearing Association, ‘Payment fraud in Australia’ (Media Release Australian Payments Clearing Association, 17 December 2013)
Australian Payments Clearing Association, Fraud statistics: 2013 financial year, www.apca.com.au/payment-statistics/fraud-statistics/2013-financial-year
Awan, I., ‘Debating the term cyber-terrorism: Issues and problems’ (2014) Internet Journal of Criminology 1Google Scholar
Ball, M., ‘Documenting acts of cruelty: The practice of violent criminals making visual records of their crimes’ (2012) 25 Visual Anthropology421CrossRefGoogle Scholar
Baer, M. R., ‘Cyberstalking, and the internet landscape we have constructed’ (2010) 15(2) Virginia Journal of Law and Technology155Google Scholar
Bartholomew, M., Cops, robbers, and search engines: The role of criminal law in contributory infringement doctrine, Buffalo Legal Studies Research Paper Series Paper No. 2008–19 (2008)
BBC News Online, ‘Woman in Jail Over Virtual Murder’, BBC News Online (Asia-Pacific), 24 October 2008
BC Freedom of Information and Privacy Association, PIPEDA and identity theft: Solutions for protecting Canadians (FIPA, 2006)
Bell, K., ‘Facebook “colour change” malware resurfaces, infects 10,000 users’, The Age, 8 August 2014
Bellia, P. L., ‘Defending cyberproperty’ (2004) 79 New York University Law Review2164Google Scholar
Biller, J. T., ‘Cyber-terrorism: Finding a common starting point’ (2013) 4 Journal of Law, Technology and the Internet275Google Scholar
Binational Working Group on Cross-Border Mass Marketing Fraud, Report on Phishing: A report to the Minister of Public Safety and Emergency Preparedness Canada and the Attorney General of the United States (2006)
Bipartisan Policy Center, Today's rising terrorist threat and the danger to the United States: Reflections on the tenth anniversary of the 9/11 Commission report (July 2014)
Black, M. C., Basile, K. C., Breiding, M. J., Smith, S. G., Walters, M. L., Merrick, M. T., Chen, J. and Stevens, M. R., The national intimate partner and sexual violence survey (NISVS): 2010, Summary Report (National Center for Injury Prevention and Control, 2011)Google Scholar
Bloom, D., ‘Computer hacker stole virtual property from online fantasy gamers to pay off REAL gambling debts’, Daily Mail, 7 December 2013
Blunn, A., Report of the review of the regulation of access to communications (Australian Government Attorney General's Department, 2005)Google Scholar
Bocij, P., Cyberstalking: Harassment in the Internet age and how to protect your family (Westport: Praeger Publishers, 2004)Google Scholar
Boyce, J., Cotter, A. and Perreault, S., Police-reported crime statistics in Canada, 2013 (Canadian Centre for Justice Statistics, 23 July 2014)Google Scholar
Brenner, S. W., ‘Is there such a thing as “virtual crime”?’ (2001) 4 California Criminal Law Review1Google Scholar
Brenner, S. W., ‘Cybercrime metrics: Old wine, new bottles?’ (2004) 9 Virginia Journal of Law and Technology1Google Scholar
Brenner, S. W., ‘The next step: Prioritizing jurisdiction’, in Koops, B. J and Brenner, S. W. (eds.), Cybercrime and jurisdiction: A global survey (The Hague: TMC Asser Press, 2006)Google Scholar
Brenner, S. W., ‘Fantasy crime: The role of criminal law in virtual worlds’ (2008) 11 Vanderbilt Journal of Entertainment and Technology Law1Google Scholar
Brenner, S. W., ‘Nanocrime?’ (2011) University of Illinois Journal of Law, Technology and Policy 39
Brenner, S. W., ‘Bits, bytes, and bicycles: Theft and cyber theft’ (2012) 47 New England Law Review817Google Scholar
Brenner, S. W., Carrier, B. and Henninger, J., ‘The Trojan horse defense in cybercrime cases’ (2004) 21 Santa Clara Computer and High Technology Law Journal1Google Scholar
Brewer, N., Telecommunications data retention – an overview, Background Note (Parliament of Australia, 24 October 2012)
British Phonographic Industry (BPI), Digital Music Nation 2010 (2010)
BPI, Digital Music Nation 2013 (2013)
Bronitt, S., and Gani, M., ‘Shifting boundaries of cybercrime: From computer hacking to cyberterrorism’ (2003) 27 Criminal Law Journal303Google Scholar
Brown, I., ‘The evolution of anti-circumvention law’ (2006) 20 International Review of Law, Computers and Technology271CrossRefGoogle Scholar
Bryce, J., ‘Online sexual exploitation of children and young people’, in Jewkes, Y. and Yar, M. (eds.), Handbook of internet crime (Cullompton: Willan, 2010)Google Scholar
Buckels, E. E., Trapnell, P. D. and Paulhus, D. L., ‘Trolls just want to have fun’ (2014) 67 Personality and Individual Differences97CrossRefGoogle Scholar
Cabinet Office (UK), The UK cyber security strategy: Protecting and promoting the UK in a digital world (Cabinet Office, 2011)
Calvert, C., ‘Opening up an academic privilege and shutting down child modeling sites: Revising child pornography laws in the United States’ (2002) 107 Dickinson Law Review253Google Scholar
Calvert, C., and Brown, J., ‘Video voyeurism, privacy and the internet: Exposing Peeping Toms in cyberspace’ (2000) 18 Cardozo Arts & Entertainment Law Journal469Google Scholar
Canada Law Reform Commission, Electronic surveillance, Working Paper No. 47 (1986)
Canadian Anti-Fraud Centre, Mass marketing fraud & ID theft activities, Annual Statistical Report 2013 (2013)
Canadian Internet Policy and Public Interest Clinic, Identity theft: Introduction and background, CIPPIC Working Paper No. 1, ID Theft Series (2007)
Canadian Internet Policy and Public Interest Clinic, Techniques of identity theft, CIPPIC Working Paper No. 2, ID Theft Series (2007)
Carey, A., ‘Passengers warned about credit-card skimming cabbies’ The Age, 29 March 2014
Catalano, S., Stalking victims in the United States – Revised (US Department of Justice, Bureau of Justice Statistics, September 2012)
Cattaneo, C., Ritz-Timme, S., Gabriel, P., Gibelli, D., Giudici, E., Poppa, P., Nohrden, D., Assmann, S., Schmitt, R. and Grandi, M., ‘The difficult issue of age assessment on pedo-pornographic material’ (2009) 183 Forensic Science Internationale21–e24.CrossRefGoogle ScholarPubMed
CERT Australia, Cyber crime & security survey report 2013 (Commonwealth of Australia, 2014)
CIFAS, Fraudscape: Depicting the UK's fraud landscape (March 2013)
Citron, D., and Franks, M., ‘Criminalizing revenge porn’ (2014) 49 Wake Forest Law Review345Google Scholar
Clapper, J. C., Worldwide threat assessment of the US intelligence community (Senate Select Committee on Intelligence, 2013)Google Scholar
Clarke, R., ‘Human identification in information systems: Management challenges and public policy issues’ (1994) Information Technology and People 6
Clough, J., ‘Now you see it, now you don't: Digital images and the meaning of “possession”’ (2008) 19 Criminal Law Forum209CrossRefGoogle Scholar
Clough, J., ‘Data theft? Cybercrime and the increasing criminalization of access to data’ (2011) 22 Criminal Law Forum145CrossRefGoogle Scholar
Clough, J., ‘“Just looking”: When does viewing online constitute possession?’ (2012) 36 Criminal Law Journal233Google Scholar
Clough, J., ‘Lawful acts, unlawful images: The problematic definition of “child” pornography’ (2012) 38 Monash University Law Review213Google Scholar
Cohen, L., and Felson, M., ‘Social change and crime rate trends: A routine activity approach (1979) 44 American Sociological Review588CrossRefGoogle Scholar
Commonwealth of Australia, Explanatory Memorandum, Crimes Legislation Amendment (Telecommunications Offences and Other Measures) Bill (No. 2) 2004 (Cth)
Commonwealth of Australia, Parliamentary Debates, Senate, 30 August 2004, 26620 (Christopher Ellison, Minister for Justice and Customs)
Commonwealth of Australia, Explanatory Memorandum, Law and Justice Amendment (Identity Crimes and Other Measures) Bill 2008 (Cth)
Commonwealth of Australia, Explanatory Memorandum, Cybercrime Legislation Amendment Bill 2011 (Cth)
Commonwealth Director of Public Prosecutions, Annual Report 2009/10
Commonwealth Director of Public Prosecutions, Annual Report 2011/12
Commonwealth Director of Public Prosecutions, Annual Report 2012/13
Commonwealth Parliament, High-wire act: Cyber-safety and the young, Joint Select Committee on Cyber Safety, Interim Report (June 2011)
Commonwealth Parliament, Review of the Cybercrime Legislation Amendment Bill 2011 (Joint Select Committee on Cyber-Safety, August 2011)
Computer Bulletin Board Systems Task Force, Regulation of computer bulletin board systems (Canberra: AGPS, 1995)
Computer Crime and Intellectual Property Section, The National Information Infrastructure Protection Act of 1996, Legislative Analysis (US Department of Justice, 1998)
Computer Crime and Intellectual Property Section Criminal Division, Searching and seizing computers and obtaining electronic evidence in criminal investigations (Office of Legal Education Executive Office for United States Attorneys, 2009)
Computer Crime and Intellectual Property Section Criminal Division, Prosecuting computer crimes, Manual (US Department of Justice, 2010)
Convention Committee, ‘T-CY Guidance Note #2 Provisions of the Budapest Convention Covering Botnets’ (Guidance Note No. T-CY(2013) 6E Rev, Council of Europe, 5 June 2013)
Council of Europe, Convention on the counterfeiting of medical products and similar crimes involving threats to public health: Explanatory report (CETS No. 211)
Council of Europe, ‘Project on Cybercrime: Final Report’, Report No. ECD/567(2009)1 (Council of Europe, 15 June 2009)
Council of Europe: European Committee on Crime Problems, ‘Extraterritorial criminal jurisdiction’ (1992) 3 Criminal Law Forum441CrossRef
Cross, C., Smith, R. G. and Richards, K., Challenges of responding to online fraud victimisation in Australia, Trends and Issues in Criminal Justice No. 474 (AIC, 2014)
Cross, D., Shaw, T., Hearn, L., Epstein, M., Monks, H., Lester, L. and Thomas, L., Australian covert bullying prevalence study (Child Health Promotion Research Centre, 2009)Google Scholar
Cross, E., Piggin, R., Douglas, T. and Vonkaenel-Flatt, J., Virtual violence II: Progress and challenges in the fight against cyberbullying (Beatbullying, 2012)Google Scholar
Crown Prosecution Service (UK), The Fraud Act 2006 www.cps.gov.uk/legal/d_to_g/fraud_act/#a13
Cuganesan, S., and Lacey, D., Identity fraud in Australia: An evaluation of its nature, cost and extent (New South Wales: SIRCA, 2003)Google Scholar
Denning, D. E., Cyberterrorism: Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services (US House of Representatives, 23 May 2000)
de Preez, L., ‘Developing approaches to combat cyber bullying through a comparative study between the United Kingdom, Australia and South Africa’, in Delener, N., Fuxman, L., Lu, F. V., Rodrigues, S. and Rivera, L. (eds.), Globalizing businesses for the next century: Visualizing and developing contemporary approaches to harness future opportunities (Global Business and Technology Association, 15th Annual International Conference, Helsinki, 2013)Google Scholar
Department of Communications, Information Technology and the Arts (Australia), Report on the Spam Act 2003 review (Australian Government, 2006)
Department of Justice, Canada, Lawful access – Consultation document (Department of Justice, Industry Canada, and Solicitor General Canada, 2002)
Department of Justice, Canada, Voyeurism as a criminal offence, Consultation Paper (2002)
Department of Justice, Canada, A handbook for police and crown prosecutors on criminal harassment (2004)
Detica, The cost of cyber crime, Report (2011)
De Zwart, M., ‘Contractual communities: Effective governance of virtual worlds’ (2010) 33 University of New South Wales Law Journal605Google Scholar
Dorman, C., ‘Beware that hotel Wi-Fi connection’, 28 July 2014, www.traveller.com.au/beware-that-hotel-wifi-connection-3coxp
Dutton, W. H., and Blank, G., Cultures of the internet: The internet in Britain – Oxford internet survey 2013 report (Oxford Internet Institute, 2013)Google Scholar
Economic and Domestic Secretariat (UK), Identity fraud: A study (Cabinet Office, 2002)
The Economist, ‘Credit cards: Skimming off the top’, 15 February 2014
Eleven, Internet threats trend report Q2 2013 (2013)
Ellison, L., ‘Cyberstalking: Tackling harassment on the internet’, in Wall, D. S. (ed.), Crime and the internet (London: Routledge, 2001)Google Scholar
Envisional, An estimate of infringing use of the internet, Technical Report (2011)
Eraker, E. C., ‘Sexting: Sensible legal approaches to stemming teenagers’ exchange of self-produced pornography’ (2010) 25 Berkeley Technology Law Journal555Google Scholar
European Commission, Proposal for a directive of the European Parliament and of the Council on attacks against information systems and repealing Council Framework Decision 2005/222/JHA (30 August 2010)
European Commission, Study for an impact assessment on a proposal for a new legal framework on identity theft, Final Report (11 December 2012)
European Network and Information Security Agency, What are the measures used by European providers to reduce the amount of spam received by their customers: Third ENISA Anti-spam measures survey (16 December 2009)
Facebook, ‘Facebook Reports Third Quarter 2014 Results’, Press Release (28 October 2014)
Fafinski, S., ‘Computer misuse: The implications of the Police and Justice Act 2006’ (2008) 72 Journal of Criminal Law53CrossRefGoogle Scholar
Farhangian, J. J., ‘A problem of “virtual” proportions: The difficulties inherent in tailoring virtual child pornography laws to meet constitutional standards’ (2003) 12 Journal of Law and Policy241Google Scholar
Federal Bureau of Investigation, Innocent Images National Initiative, US Department of Justice (2006), www.fbi.gov/news/stories/2006/february/innocent-images-statistics-1
Federal Bureau of Investigation, ‘Malware targets bank accounts’, Press Release (1 June 2012)
Federal Bureau of Investigation, ‘Manhattan U.S. Attorney and FBI Assistant Director in Charge announce 24 arrests in eight countries as part of international cyber crime takedown’, Press Release (26 June 2012)
Federal Bureau of Investigation, ‘Nine individuals indicted in one of the largest international penny stock frauds and advance fee schemes in history’, Press Release (13 August 2013)
Federal Bureau of Investigation, Internet social networking risks, www.fbi.gov/about-us/investigate/counterintelligence/internet-social-networking-risks
Federal Trade Commission, Spam summit: The next generation of threats and solutions (2007)
Federal Trade Commission, FTC consumer alert: ‘Free security scan’ could cost time and money (Federal Trade Commission, Bureau of Consumer Protection, 2008)
File, T., and Ryan, C., Computer and internet use in the United States: 2013 (US Census Bureau, November 2014)Google Scholar
Financial Fraud Action UK, Annual Review 2013 (2013)
Financial Fraud Action UK, Annual Review 2014 (2014)
Financial Fraud Action UK, Scams and computer attacks contribute to increase in fraud, as total card spending rises (News Release, March 2014)
Finch, E., The criminalisation of stalking (London: Routledge-Cavendish, 2001)Google Scholar
Finch, E., ‘The problem of stolen identity and the internet’, in Jewkes, Y. (ed.), Crime online (United Kingdom: Willan Publishing, 2007)Google Scholar
Finklea, K. M., Identity theft: Trends and issues (Congressional Research Service, Report for Congress, 15 February 2012)
Fortinet, Anatomy of a botnet, White Paper (2013)
Foss, M., and Johnson, E., Symantec report on the underground economy July 07–June 08 (Symantec, 2008)
Fox, S., 51% of U.S. adults bank online: 32% of adults transact bank business on their mobile phones (PewResearch Center, 7 August 2013)Google Scholar
Fraud Prevention Expert Group, Report on identity theft/fraud (European Commission, 2007)
Furnell, S., ‘Hackers, viruses and malicious software’, in Jewkes, Y. and Yar, M. (eds.), Handbook of internet crime (Cullompton: Wilan, 2010)Google Scholar
Gable, K. A., ‘Cyber-apocalypse now: Securing the internet against cyberterrorism and using universal jurisdiction as a deterrent’ (2010) 43 Vanderbilt Journal of Transnational Law57Google Scholar
Gamble, R., Srivastava, A. and Boey, J., ‘Cyberbullying in Australia: Clarifying the problem, considering the solutions’ (2013) 21 The International Journal of Children's Rights25Google Scholar
Garcia, M. J., and Doyle, C., Extradition to and from the United States: Overview of the law and recent treaties (CRS Report for Congress, 7-5700, 17 March 2010)
Gaus, A., ‘Trolling attacks and the need for new approaches to privacy torts’ (2012) 47 University of San Francisco Law Review353Google Scholar
Geltzer, J. N., ‘The new Pirates of the Caribbean: How data havens can provide safe harbors on the internet beyond governmental reach’ (2004) Southwestern Journal of Law and Trade in the Americas 433
Gercke, M., Internet-related identity theft, Discussion Paper (Council of Europe, 22 November 2007)
Gillespie, A. A., ‘Children, chatrooms and the law’ (2001) Criminal Law Review 435
Gillespie, A. A., ‘Child protection on the internet – Challenges for criminal law’ (2002) 14 Child and Family Law Quarterly411Google Scholar
Gillespie, A. A., ‘The Sexual Offences Act 2003: (3) Tinkering with “child pornography”’ (2004) Criminal Law Review 361
Gillespie, A. A., ‘Cyber-bullying and harassment of teenagers: The legal response’ (2006) 28 Journal of Social Welfare & Family Law123CrossRefGoogle Scholar
Gillespie, A. A., ‘Enticing children on the internet: The response of the criminal law’ (2006) 3 Juridical Review229Google Scholar
Gillespie, A. A., ‘Indecent images, grooming and the law’ (2006) Criminal Law Review 412
Gillespie, A. A., ‘“Up-skirts” and “Down-blouses”: Voyeurism and the law’ (2008) Criminal Law Review 370
Gillespie, A. A., Child pornography: Law and policy (Abingdon: Routledge, 2011)Google Scholar
Gillespie, A. A., ‘Cyberstalking and the law: A response to Neil MacEwan’ (2013) 1 Criminal Law Review38Google Scholar
Goldman, E., ‘A road to no warez: The No Electronic Theft Act and criminal copyright infringement’ (2003) Oregon Law Review 369
Goldsmith, J., ‘Against cyberanarchy’ (1998) University of Chicago Law Review 1199
Goldsmith, J., ‘Unilateral regulation of the internet: A modest defence’ (2000) 11 European Journal of International Law135CrossRefGoogle Scholar
Goodman, M. D., and Brenner, S. W., ‘The emerging consensus on criminal conduct in cyberspace’ (2002) UCLA Journal of Law and Technology 3
Gottschalk, P., ‘Stage model for online grooming offenders’, in Davidson, J. and Gottschalk, P. (eds.), Internet child abuse: Current research and policy (Abingdon: Routledge, 2011)Google Scholar
Grabosky, P., Smith, R. G. and Dempsey, G., Electronic theft: Unlawful acquisition in cyberspace (Cambridge: Cambridge University Press, 2001)Google Scholar
Grant, I., Bone, N. and Grant, K., ‘Canada's criminal harassment provisions: A review of the first ten years’ (2003) 29 Queen's Law Journal175Google Scholar
Grant, N. P., ‘Mean girls and boys: The intersection of cyberbullying and privacy law and its social-political implications’ (2012) 56 Howard Law Journal169Google Scholar
Griffith, G., and Roth, L., Protecting children from online sexual predators, Briefing Paper No. 10/107 (NSW Parliamentary Library Research Service, 2007)Google Scholar
Griffith, G., and Simon, K., Child pornography law, Briefing Paper No. 9/08 (NSW Parliamentary Library Research Service, 2008)Google Scholar
Hardy, K., ‘Operation titstorm: Hacktivism or cyberterrorism’ (2010) 33 University of New South Wales Law Journal474Google Scholar
Hargreaves, I., Digital opportunity. A review of intellectual property and growth (2011)
Harrell, E., and Langton, L., Victims of identity theft, 2012 (US Department of Justice, December 2013)Google Scholar
Hazelwood, S. D., and Koon-Magnin, S., ‘Cyber stalking and cyber harassment legislation in the United States: A qualitative analysis’ (2013) 7 International Journal of Cyber Criminology155Google Scholar
Hébert, M., and Pilon, H., Computer crime (Department of Justice Canada, 1991)Google Scholar
Hedley, S., ‘A brief history of spam’ (2006) 15 Information and Communications Technology Law223CrossRefGoogle Scholar
Herrera-Flanigan, J. R., ‘Cybercrime and jurisdiction in the United States’, in Koops, B. J. and Brenner, S. W., Cybercrime and jurisdiction: A global survey (The Hague: TMC Asser Press, 2006)Google Scholar
Holt, T. J., ‘Examining the forces shaping cybercrime markets online’ (2013) 31 Social Science Computer Review165CrossRefGoogle Scholar
Home Office (UK), Cyber crime strategy, Cm. 7842 (2010)
Home Office (UK), Consultation on stalking (November 2011)
House of Commons Standing Committee on Justice and Legal Affairs, Computer crime, Final Report (1983)
House of Commons Committee on Standards and Privileges, Privilege: Hacking of Members’ Mobile Phones (Fourteenth Report of Session 2010–11, 31 March 2011)
House of Commons Home Affairs Committee, Unauthorised tapping into or hacking of mobile communications, Thirteenth Report of Session 2010–12
House of Commons Home Affairs Committee, E Crime, Fifth Report of Session 2013–14 (2013)
House of Representatives Standing Committee on Communications, Hackers, fraudsters and botnets: Tackling the problem of cyber crime, The Report of the Inquiry into Cyber Crime (June 2011)
Howard, T. E., ‘Don't cache out your case: Prosecuting child pornography possession laws based on images located in temporary internet files’ (2004) 19 Berkeley Technology Law Journal1227Google Scholar
Hubbard, R. W., Brauti, P. M. and Fenton, S. K., Wiretapping and other electronic surveillance: Law and procedure (Ontario: Canada Law Book, 2000–)Google Scholar
Humphreys, S., and de Zwart, M., ‘Griefing, massacres, discrimination, and art: The limits of overlapping rule sets in online games’ (2012) 2 UC Irvine Law Review507.Google Scholar
Hutchings, A., Computer security threats faced by small businesses in Australia, Trends and Issues in Criminal Justice No. 433 (AIC, February 2012)
Huthwaite, T., ‘High stakes on the digital high seas: Copyright and piracy in the 21st century’ (2013) 93 Intellectual Property Forum9Google Scholar
ICB4PAC, Electronic crimes: Knowledge-based report (Assessment) (2013)
IFPI, Digital Music Report 2012 (2012)
Industry Canada, Stopping spam: Creating a stronger, safer internet, Report of the Task Force on Spam, Industry Canada (2005)
Information Commissioner's Office (UK), Unscrubbed hard drives report (2010) http://ico.org.uk/news/latest_news/2012/~/media/documents/library/Data_Protection/Research_and_reports/unscrubbed_hard_drives_report.ashx
Information Commissioner's Office (UK), Guidance on the rules on use of cookies and similar technologies (May 2012)
Interception Legislation Team, Home Office (UK), Interception of communications in the United Kingdom, Consultation Paper, Cm. 4368 (1999)
International Telecommunication Union, ITU internet reports 2005: The internet of things, Report (2005)
International Telecommunication Union, Final Acts of the world conference on international telecommunications (Dubai, 3–14 December 2012)
International Telecommunication Union, World conference on international telecommunications (Dubai, 3–14 December 2012)– Signatories of the Final Acts: 89, www.itu.int/osg/wcit-12/highlights/signatories.html
International Telecommunication Union, ICT facts and figures: The world in 2014 (2014)
Internet Crime Complaint Center, Internet crime report 2011 (2011)
Internet Crime Complaint Center, Internet crime report 2012 (2012)
Internet Watch Foundation, Internet Watch Foundation annual & charity report 2013 (2013)
Jenkins, P., Beyond tolerance: Child pornography on the internet (New York: New York University Press, 2001)Google Scholar
Jerker, D., and Svantesson, B., ‘“Sexting” and the law – How Australia regulates electronic communication of non-professional sexual content’ (2010) 22 Bond Law Review41Google Scholar
Johnson, D. R., and Post, D., ‘Law and borders – The rise of law in cyberspace’ (1996) 48 Stanford Law Review1367CrossRefGoogle Scholar
Joint Standing Committee on Treaties, Extradition – A review of Australia's law and policy, Report 40 (Parliament of Australia, 2001)
Jones, A., and Doobay, A., Jones and Doobay on extradition and mutual assistance, (London: Sweet and Maxwell, 2014)Google Scholar
Jones, L. M., Mitchell, K. J. and Finkelhor, D., ‘Online harassment in context: Trends from three youth internet safety surveys (2000, 2005, 2010)’ (2013) 3(1) Psychology of Violence53CrossRefGoogle Scholar
Jorna, P., and Hutchings, A., Australasian consumer fraud taskforce: Results of the 2012 online consumer fraud survey, Technical and Background Paper 56 (AIC, 2013)Google Scholar
Karlinsky, N., and Effron, L., ‘Revenge porn mogul indicted on federal conspiracy charges’, ABC News (23 January 2014)
Kaspersen, H. W. K., ‘Cybercrime and internet jurisdiction’, Discussion Paper (draft) (Council of Europe, 5 March 2009)
Kastens, A. H., ‘State v Stevenson, The “Peeping Tom” case: Over breadth or Overblown?’ (2001) Wisconsin Law Review 1371
Katyal, N. K., ‘Criminal law in cyberspace’ (2001) 149 University of Pennsylvania Law Review1003CrossRefGoogle Scholar
Kerr, O. S., ‘Cybercrime's scope: Interpreting “access” and “authorization” in computer misuse statutes’ (2003) 78 New York University Law Review1596Google Scholar
Kerr, O. S., ‘Internet surveillance law after the USA Patriot Act: The Big Brother that isn't’ (2003) 97 Northwestern University Law Review607Google Scholar
Kerr, O. S., ‘Lifting the “fog” of internet surveillance: How a suppression remedy would change computer crime law’ (2003) 54 Hastings Law Journal805Google Scholar
Kerr, O. S., ‘The problem of perspective in internet law’ (2003) Georgetown Law Journal 357
Kerr, O. S., ‘A user's guide to the Stored Communications Act – And a legislator's guide to amending it’ (2004) 72 George Washington Law Review1208Google Scholar
Kerr, O. S., ‘Virtual crime, virtual deterrence: A skeptical view of self-help, architecture and civil liability’ (2005) 1 Journal of Law, Economics and Policy197Google Scholar
Kerr, O. S., ‘Criminal law in virtual worlds’ (2008) University of Chicago Legal Forum 415
Kerr, O. S., ‘Vagueness challenges to the Computer Fraud and Abuse Act’ (2009) 94 Minnesota Law Review1561Google Scholar
Kerr, O. S., Computer Crime Law, (St. Paul: Thomson West, 2013)Google Scholar
Kerr, O. S., ‘The next generation Communications Privacy Act’ (2013) 162 University of Pennsylvania Law Review373Google Scholar
Kerr, J., Owen, E., Nicholls, C. McNaughton and Button, M., Research on sentencing online fraud offences (Sentencing Council, 2013)Google Scholar
Klettke, B., Hallford, D. J. and Mellor, D. J., ‘Sexting prevalence and correlates: A systematic literature review’ (2014) 34 Clinical Psychology Review44CrossRefGoogle ScholarPubMed
Knaus, C., and Riordan, P., ‘“Click fraudsters” set up fake Facebook pages in names of MH17 victims’ (The Age, 21 July 2014)
Kohl, U., Jurisdiction and the internet: Regulatory competence over online activity (Cambridge: Cambridge University Press, 2007)CrossRefGoogle Scholar
Koops, B. J., Leenes, R., Meints, M., Meulen, N. van der and Jaquet-Chiffelle, D. O., ‘A typology of identity-related crime’ (2009) 12 Information, Communication and Society1CrossRefGoogle Scholar
Kowalski, M., Cyber-crime: Issues, data sources, and feasibility of collecting police-reported statistics, Cat. No. 85–558 (Canadian Centre for Justice Statistics, 2002)Google Scholar
Kreston, S. S., ‘Defeating the virtual defense in child pornography prosecutions’ (2004) Journal of High Technology Law 49
Krone, T., International police operations against online child pornography, Trends and Issues in Crime and Criminal Justice (AIC, 2005)Google Scholar
Lamb, H., Principal current data types, Internet Crime Forum (2001), found at Home Office, Retention of communications data under Part 11: Anti-Terrorism, Crime and Security Act 2001, Voluntary Code of Practice (2001)
Langos, C., ‘Cyberbullying: The challenge to define’ (2012) 15 Cyberpsychology, Behavior, and Social Networking285CrossRefGoogle Scholar
Langos, C., ‘Regulating cyberbullying: A South Australian perspective’ (2014) Flinders Law Journal 74
Lanham, D., Cross-border criminal law (Sydney: FT Law & Tax, 1997)Google Scholar
Lastowka, F. G., and Hunter, D., ‘Virtual Crimes’ (2004–05) New York Law School Law Review 293
Law Commission (UK), Computer misuse, Working Paper No.110 (1988)
Law Commission (UK), Computer misuse, Final Report No. 186 (1989)
Law Commission (UK), Offences of dishonesty: Money transfers, Item 11 of the Sixth Programme of Law Reform: Criminal Law (1996)
Law Commission (UK), Fraud, Final Report, Law Com No. 276 (2002)
Law Reform Commission Ireland, Report on privacy: Surveillance and the interception of communications, No. 57 (1998)
Law Reform Committee, Parliament of Victoria, Inquiry into sexting, Report (May 2013)
Leader-Elliott, I., ‘Framing preparatory inchoate offences in the Criminal Code: The identity crime debacle’ (2011) 35 Criminal Law Journal80Google Scholar
Lessig, L., Code and other laws of cyberspace (New York: Basic Books, 1999)Google Scholar
Lilley, C., Ball, R. and Vernon, H., The experiences of 11–16 year olds on social networking sites (NSPCC, 2014)Google Scholar
Livingstone, S., Haddon, L., Görzig, A. and Ólafsson, K., Risks and safety for children on the internet: The UK report (EU Kids Online, 2010)
Lorentz, D., ‘The effectiveness of litigation under the CAN-SPAM Act’ (2011) 30 The Review of Litigation559Google Scholar
Lounsbury, K., Mitchell, K. J. and Finkelhor, D., The true prevalence of ‘sexting’, Factsheet (Crimes Against Children Research Center, 2011)Google Scholar
Lynch, J., ‘Identity theft in cyberspace: Crime control methods and their effectiveness in combating phishing attacks’ (2005) 20 Berkeley Technology Law Journal259Google Scholar
MacEwan, N., ‘The new stalking offences in English law: Will they provide effective protection from cyberstalking?’ (2012) 10 Criminal Law Review767Google Scholar
MacKay, A. W., Respectful and responsible relationships: There's no App for that (Report of the Nova Scotia Task Force On Bullying And Cyberbullying, 2012)
Madison, M. J., ‘Rights of access and the shape of the internet’ (2003) Boston College Law Review 433
Magee, J., ‘The law regulating unsolicited commercial e-mail: An international perspective’ (2003) 19 Santa Clara Computer and High Technology Law Journal333Google Scholar
Maple, C., Short, E. and Brown, A., Cyberstalking in the United Kingdom (National Centre for Cyberstalking Research, 2011)Google Scholar
Martellozzo, E., ‘Understanding the perpetrators’ online behaviour’, in Davidson, J. and Gottschalk, P. (eds.), Internet child abuse: Current research and policy (Abingdon: Routledge, 2011)Google Scholar
Martellozzo, E., Online child sexual abuse: Grooming, policing and child protection in a multi-media world (New York: Routledge, 2013)Google Scholar
Martin, B. C., and Newhall, J. R., ‘Criminal copyright enforcement against filesharing services’ (2013) 15 North Carolina Journal of Law and Technology101Google Scholar
Maurushat, A., ‘Australia's accession to the Cybercrime Convention: Is the Convention still relevant in combating cybercrime in the era of botnets and obfuscation crime tools?’ (2010) 33 University of New South Wales Law Journal431Google Scholar
Mazowita, B., and Vézina, M., Juristat: Police reported cybercrime in Canada, 2012 (Statistics Canada, 2014)Google Scholar
McAfee, McAfee Threats Report: First Quarter 2013 (2013)
McAlinden, A., ‘Grooming’ and the sexual abuse of children: Institutional, internet and familial dimensions (Oxford: Oxford University Press, 2012)CrossRefGoogle Scholar
McLeod, D., ‘Regulating damage on the internet: A tortious approach?’ (2001) 27 Monash University Law Review344Google Scholar
McConvill, J., ‘Contemporary comment: Computer trespass in Victoria’ (2001) 25 Criminal Law Journal220Google Scholar
McCusker, R., Spam: Nuisance or menace, prevention or cure? Trends and Issues in Criminal Justice, No. 294 (AIC, 2005)Google Scholar
McDonald, S., ‘Wireless hotspots: The truth about their evil twins’ (2006) 9 Internet Law Bulletin13Google Scholar
McEwan, T., Mullen, P. and MacKenzie, R., ‘Anti-stalking legislation in practice: Are we meeting community needs?’ (2007) 14 Psychiatry, Psychology and Law207CrossRefGoogle Scholar
McGrath, M., and Casey, E., ‘Forensic psychiatry and the internet: Practical perspectives on sexual predators and obsessional harassers in cyberspace’ (2002) 30 Journal of the American Academy of Psychiatry and the Law81Google ScholarPubMed
McGuire, M., and Dowling, S., Cyber crime: A review of the evidence, Research Report 75 (Home Office, October 2013)Google Scholar
McHenry, A., ‘Combating cyberbullying within the metes and bounds of existing Supreme Court precedent’ (2011) 62 Case Western Reserve Law Review231Google Scholar
McKnight, G., Computer crime (London: Joseph, 1973)Google Scholar
Mitchell, K. J., Finkelhor, D., Jones, L. M. and Wolak, J., ‘Use of social networking sites in online sex crimes against minors: An examination of national incidence and means of utilization’ (2010) Journal of Adolescent Health 1
Mitchell, K. J., Jones, L., Finkelhor, D. and Wolak, J., Trends in unwanted online experiences and sexting, Final Report (Crimes Against Children Research Center, 2014)Google Scholar
Mitchell, K. J., Wolak, J., Finkelhor, D. and Jones, L., ‘Investigators using the Internet to apprehend sex offenders: findings from the Second National Juvenile Online Victimization Study’ (2011) Police Practice and Research 1
Mnookin, J. L., ‘Virtual(ly) law: The emergence of law in LambdaMOO’ (1996) 2 Journal of Computer-Mediated CommunicationGoogle Scholar
Model Criminal Code Officers Committee, Chapter 4: Damage and computer offences, Discussion Paper (2000)
Model Criminal Code Officers Committee, Chapter 4: Damage and computer offences, Final Report (2001)
Model Criminal Code Officers Committee, Chapter 3: Credit card skimming offences, Final Report (2006)
Model Criminal Code Officers Committee, Identity crime, Discussion Paper (2007)
Model Criminal Code Officers Committee, Identity crime, Final Report (2008)
Morris, S., The future of netcrime now: Part 1 – Threats and challenges, Home Office Online Report 62/04 (Home Office, 2004)Google Scholar
Morris, S., ‘British hacker jailed over £7m virtual gaming chips scam’, The Guardian, 19 March 2011
Muir, D., Violence against children in cyberspace: A contribution to the United Nations study on violence against children (Bangkok, ECPAT International, 2005)Google Scholar
Mullen, P. E., Pathé, M. and Purcell, R., Stalkers and their victims, (New York: Cambridge University Press, 2009)Google Scholar
Naraine, R., ‘Computer virus ‘hijacks’ American Express web site’, Fox News, 1 May 2006
Nash, V., and Peltu, M., Rethinking safety and security in a networked world: Reducing harm by increasing cooperation, Discussion Paper No. 6 (Oxford Internet Institute Forum, 2005)Google Scholar
National Conference of State Legislatures, ‘Cyberbullying’ (2015), www.ncsl.org/research/education/cyberbullying.aspx
National Conference of State Legislatures, ‘State cyberstalking and cyberharassment laws’ (12 January 2015), www.ncsl.org/research/telecommunications-and-information-technology/cyberstalking-and-cyberharassment-laws.aspx
National Fraud Authority (UK), Annual fraud indicator (June 2013)
National Institute of Justice (US), Project to develop a model anti-stalking code for states (Department of Justice, 1993)
National Offender Management Service and Scottish Executive (UK), Consultation: On the possession of extreme pornographic material (Home Office, 2005)
New South Wales Law Reform Commission, Surveillance: Final report, Report 108 (2005)
New Zealand Law Commission, Intimate covert filming, Study Paper, No. 15 (2004)
New Zealand Law Commission, Harmful digital communications: The adequacy of the current sanctions and remedies (Ministerial Briefing Paper, 2012)
O'Connell, R., A typology of cybersexploitation and on-line grooming practices (Cyberspace Research Unit, University of Central Lancashire, 2003)Google Scholar
OECD, Recommendation on cross-border co-operation in the enforcement of laws against spam (13 April 2006)
OECD, Scoping paper on online identity theft, Ministerial Background Report (2007)
OECD, Review of the 2006 OECD recommendation on cross-border co-operation in the enforcement of laws against spam (2012)
Office for National Statistics (UK), Statistical bulletin: Internet access – households and individuals (2013)
Office for National Statistics (UK), Retail sales, December 2013 (17 January 2014)
Office for National Statistics (UK), Discussion paper on the coverage of crime statistics, Discussion Paper (23 January 2014)
Office for National Statistics (UK), Work to extend the crime survey for England and Wales to include fraud and cyber-crime, Methodological Note (16 October 2014)
Ogilvie, E., Cyberstalking, Trends and Issues in Crime and Criminal Justice No. 166 (AIC, 2000)
Ogilvie, E., Stalking: Legislative, policing and prosecution patterns in Australia, AIC Research and Public Policy Series No. 34 (AIC, 2000)
OPTA, Decision to impose fine on dollar revenue, Fact Sheet (December 2007)
Ospina, M., Harstall, C. and Dennett, L., Sexual exploitation of children and youth over the internet: A rapid review of the scientific literature, Information Paper (Institute of Health Economics, 2010)Google Scholar
Ost, S., ‘Getting to grips with sexual grooming? The new offence under the Sexual Offences Act 2003’ (2004) 26 Journal of Social Welfare and Family Law147CrossRefGoogle Scholar
Ost, S., Child pornography and sexual grooming: Legal and societal responses (New York: Cambridge University Press, 2009)CrossRefGoogle Scholar
Oyama, K. A., ‘E-mail privacy after United States v. Councilman: Legislative options for amending ECPA’ (2006) 21 Berkeley Technology Law Journal499Google Scholar
Packard, A., ‘Does proposed federal cyberstalking legislation meet constitutional requirements?’ (2000) 5 Communication Law and Policy505CrossRefGoogle Scholar
Paget, F., Identity theft, White Paper (McAfee, 2007)Google Scholar
Parker, D. B., Crime by computer (New York: Scribner, 1976)Google Scholar
Parker, D. B., Fighting computer crime (New York: Scribner, 1983)Google Scholar
Parliament of Canada, Private Member's Bill 40th Parliament, 2nd Session (2009)
Parliamentary Joint Committee on Intelligence and Security (Australia), Report of the inquiry into potential reforms of Australia's National Security Legislation (May 2013)
Parliamentary Joint Committee on the National Crime Authority (Australia), Organised criminal paedophile activity (Commonwealth of Australia, 1995)
Paust, J., ‘Panel: Cybercrimes and the domestication of international criminal law’ (2007) 5 Santa Clara Journal of International Law432Google Scholar
Peretti, K., ‘Data breaches: What the underground world of “carding” reveals’ (2008) 25 Santa Clara Computer and High Technology Journal375Google Scholar
Podgor, E. S., ‘International computer fraud: A paradigm for limiting national jurisdiction’ (2002) 35 University of California Davis Law Review267Google Scholar
Podgor, E. S., ‘Extraterritorial criminal jurisdiction: Replacing “objective territoriality” with “defensive territoriality”’ (2003) 28 Studies in Law, Politics, and Society117CrossRefGoogle Scholar
Podgor, E. S., ‘Cybercrime: Discretionary jurisdiction’ (2008) 47 University of Louisville Law Review727Google Scholar
Potashman, M., ‘International spam regulation & enforcement: Recommendations following the world summit on the information society’ (2006) 29 Boston College International & Comparative Law Review323Google Scholar
Powell, A., ‘Configuring consent: Emerging technologies, unauthorized sexual images and sexual assault’ (2010) 43(1) Australian & New Zealand Journal of Criminology76CrossRefGoogle Scholar
Purcell, R., Pathé, M. and Mullen, P. E., ‘Stalking: Defining and prosecuting a new category of offending’ (2004) 27 International Journal of Law and Psychiatry157CrossRefGoogle ScholarPubMed
Quayle, E., Allegro, S., Hutton, L., Sheath, M. and Lööf, L., Online behaviour related to child sexual abuse – Creating a private space in which to offend: Interviews with online child sex offenders, Robert Project (Council of the Baltic Sea States, 2012)Google Scholar
Radosevich, A. C., ‘Thwarting the stalker: Are anti-stalking measures keeping pace with today's stalker?’ (2000) University of Illinois Law Review 1371
Ramasastry, A., Winn, J. K. and Winn, P., ‘Will wi-fi make your private network public? Wardriving, criminal and civil liability, and the security risks of wireless networks’ (2005) 1 Shidler Journal of Law, Commerce and Technology9Google Scholar
Reed, C., ‘Why must you be mean to me? Crime and the online persona’ (2010) 13 New Criminal Law Review485Google Scholar
Restatement (Third) of Foreign Relations Law of the United States (Philadelphia: American Law Institute, 1987)
Reuters and CNBC, ‘US Attorney General confirms probe of Target data breach’, CNBC, 29 January 2014
Richardson, R., CSI computer crime and security survey (Computer Security Institute, 2011)Google Scholar
Roach, G., and Michiels, W. J., ‘Damages is the gatekeeper issue for federal computer fraud’ (2006) 8 Tulane Journal of Technology and Intellectual Property61Google Scholar
Roddy, J., ‘The Federal Computer Systems Protection Act’ (1979) 7 Rutgers Journal of Computer Technology and the Law343Google Scholar
Rogers, A., ‘Playing hide and seek: How to protect virtual pornographers and actual children on the internet’ (2005) Villanova Law Review 87
Ross, S., and Smith, R. G., Risk factors for advance fee fraud victimisation, Trends and Issues in Criminal Justice, No. 420 (AIC, 2011)Google Scholar
Rothenberg, L. E., ‘Re-thinking privacy: Peeping Toms, video voyeurs, and failure of the criminal law to recognize a reasonable expectation of privacy in the public space’ (2000) 49 American University Law Review1127Google Scholar
Roundy, M. D., ‘The Wiretap Act – reconcilable differences: A framework for determining the “interception” of electronic communications following United States v. Councilman's rejection of the storage/transit dichotomy’ (2006) 28 Western New England Law Review403Google Scholar
RSA, The current state of cybercrime 2014: An inside look at the changing threat landscape, White Paper (2014)
Ryan, P. S., ‘War, peace, or stalemate: Wargames, wardialing, wardriving, and the emerging market for hacker ethics’ (2004) 9 Virginia Journal of Law and Technology7Google Scholar
Schjølberg, S., and Hubbard, A. M., Harmonizing national legal approaches on cybercrime, Background Paper, International Telecommunications Union (2005)Google Scholar
Schryen, G., ‘Anti-spam legislation: An analysis of laws and their effectiveness’ (2007) 16 Information and Communications Technology Law17CrossRefGoogle Scholar
Scott, A. H., ‘Computer and intellectual property crime: Federal and state law’ (Washington, DC, The Bureau of National Affairs, Inc., 2001)
Scottish Law Commission, Report on Computer Crime, Final Report, No.106 (1987)
Sedak, C. J., and Durojaiye, P., US cybercrime: Rising risks, reduced readiness – Key findings from the 2014 US State of Cybercrime Survey (PWC, 10 June 2014)Google Scholar
Seger, A., ‘Identity theft and the convention on cybercrime’, in Chryssikos, D., Passas, N. and Ram, C. D. (eds.), The evolving challenge of identity-related crime: Addressing fraud and the criminal misuse and falsification of identity (Courmayer: ISPAC, 2007)Google Scholar
Selvadurai, N., and Islam, R., ‘The application of criminal defamation to inflammatory comments made on social networking sites: A new role for an old law?’ (2012) 36 Criminal Law Journal38Google Scholar
Selvadurai, N., Gillies, N. and Islam, R., ‘Maintaining an effective legislative framework for telecommunication interception in Australia’ (2009) 33 Criminal Law Journal34Google Scholar
Senate Legal and Constitutional Legislation Committee (Australia), Provisions of the Telecommunications (Interception) Amendment Bill 2006 (Canberra: March 2006)
Sentencing Council (UK), Sexual offences guideline consultation, Consultation Paper (2012)
Sentencing Council (UK), Sexual offences definitive guideline (2013)
Seto, M. C., Internet sex offenders (Washington, DC: American Psychological Association, 2013)CrossRefGoogle Scholar
Seybert, H., Internet use in households and by individuals in 2012 (Eurostat, 2012)Google Scholar
Shiffman, B., Goldman, D. and Pomeroy, L., ‘Intellectual property crimes’ (2012) 49(2) American Criminal Law Review929Google Scholar
Shimizu, A., ‘Domestic violence in the digital age: Towards the creation of a comprehensive cyberstalking statute’ (2013) 28 Berkeley Journal of Gender, Law & Justice116Google Scholar
Sieber, U., Legal aspects of computer-related crime in the information society, COMCRIME Study, European Commission (1998)
Sinrod, E. J., and Reilly, W. P., ‘Cyber-crimes: A practical approach to the application of federal computer crime laws’ (2000) 16 Santa Clara Computer and High Tech Law Journal177Google Scholar
Siwek, S. E., Copyright industries in the U.S. Eronomy: The 2013 report (International Intellectual Property Alliance, 2013)Google Scholar
Smith, K., Coleman, K., Eder, S. and Hall, P. (eds.), Homicides, firearm offences and intimate violence 2009/10 (Home Office Statistical Bulletin, 2011)Google Scholar
Smith, K., Taylor, P. and Elkin, M. (eds.), Crimes detected in England and Wales 2012/2013, (Home Office Statistical Bulletin, 2013)Google Scholar
Smith, R. G., ‘The development of cybercrime’, in Lincoln, R. and Robinson, S. (eds.), Crime over time: Temporal perspectives on crime and punishment in Australia (Newcastle-upon-Tyne: Cambridge Scholars Publishing, 2010)Google Scholar
Smith, R. G., ‘Transnational cybercrime and fraud’, in Reichel, P. and Albanese, J. (eds.), Handbook of transnational crime and justice, (California: Sage Publishing, 2014)Google Scholar
Smith, R. G., Grabosky, P. and Urbas, G., Cyber criminals on trial (Cambridge: Cambridge University Press, 2004)CrossRefGoogle Scholar
Smith, R. G., Holmes, M. N. and Kaufmann, P., Nigerian advance fee fraud, Trends and Issues in Criminal Justice No. 121 (AIC, 1996)Google Scholar
Smyth, S. M., Child pornography and the law in Canada (Boston: Pearson, 2010)Google Scholar
Solicitor General, Canada and US Department of Justice, Public advisory: Special report for consumers on identity theft (2003)
Soma, J. T., Muther, T. F. Jr and Brissette, H. M. L., ‘Transnational extradition for computer crimes: Are new treaties and laws needed?’ (1997) 34 Harvard Journal on Legislation317Google Scholar
Sommer, P., ‘Criminalising hacking tools’ (2006) 3 Digital Investigation68CrossRefGoogle Scholar
Sophos, Security threat report 2013 (2013)
Sophos, Security threat report 2014 (2014)
Sorkin, D., ‘Technical and legal approaches to unsolicited electronic mail’ (2001) 35 University of San Francisco Law Review325Google Scholar
Standing Committee of Attorneys General (Australia), Unauthorised photographs on the internet and ancillary privacy issues, Discussion Paper (2005)
Standing Committee on Legal and Constitutional Affairs (Australia), Telecommunications (Interception and Access) Amendment Bill 2007 (Canberra: Commonwealth of Australia, 2007)
Statista, Number of World of Warcraft subscribers from 1st quarter 2005 to 3rd quarter 2014 (in millions), www.statista.com/statistics/276601/number-of-world-of-warcraft-subscribers-by-quarter/
Statistics Canada, Individual internet use and e-commerce, 2012 (28 October 2013)
Steel, A., ‘The true identity of Australian identity theft offences: A measured response or an unjustified status offence?’ (2010) 33 University of New South Wales Law Journal503Google Scholar
Steiner, P., ‘On the internet, nobody knows you're a dog’, The New Yorker, 5 July 1993
Symantec, Internet security threat report 2013 (2013)
Symantec, Internet security threat report 2014 (2014)
Task Force on Child Protection on the Internet (UK), Protecting the public, Cm. 5668 (Home Office, 2002)
Task Force on Spam, Anti-spam law enforcement (OECD, 2005)
Task Force on Spam, Report of the OECD task force on spam: Anti-spam toolkit of recommended policies and measures (OECD, 2006)
Taylor, M., and Quayle, E., Child pornography: An internet crime (East Sussex: Brunner-Routledge, 2003)Google Scholar
Telecompaper, OPTA fine for spyware whittled down by district court (8 February 2010)
Thaw, D., ‘Criminalizing hacking, not dating: Reconstructing the CFAA intent requirement’ (2013) 103 Journal of Criminal Law and Criminology907Google Scholar
The President's Identity Theft Task Force (US), Combating identity theft: A strategic plan (2007)
The White House, The national strategy to secure cyberspace (Washington, DC, February, 2003)
Theohary, C. A., and Rollins, J., Terrorist use of the internet: Information operations in cyberspace (Congressional Research Service, 2011)Google Scholar
Thomas, T. J., and Erin, V., ‘Bill C-28: An Act to promote the efficiency and adaptability of the Canadian economy by regulating certain activities that discourage reliance on electronic means of carrying out commercial activities’, Legislative Summary of Bill C-28 (Library of Parliament, 15 November 2012)
Tokson, M. J., ‘The content/envelope distinction in internet law’ (2008) 50 William and Mary Law Review2105Google Scholar
Trend Micro, Mobile threats go full throttle: Device flaws lead to risky trail, TrendLabs 2Q 2013 Security Roundup (2013)
UK Cards Association, ‘Scams and computer attacks contribute to increase in fraud, as total card spending rises’ (2013), www.theukcardsassociation.org.uk/news/EOYFFfor2013.asp
UK Sentencing Advisory Panel, The panel's advice to the Court of Appeal on offences involving child pornography (2002)
United Nations, Report of the Twelfth United Nations Congress on Crime Prevention and Criminal Justice, UN Doc A/CONF.213/18 (18 May 2010)
Resolution adopted by the General Assembly on 21 December 2010, Twelfth United Nations Congress on Crime Prevention and Criminal Justice, A/RES/65/230, 1 April 2011
United Nations Office on Drugs and Crime, Handbook on identity-related crime (2011)
Manual on mutual legal assistance and extradition (September 2012)
Comprehensive study on cybercrime, Report (2013)
Urbas, G., ‘Copyright, crime and computers: New legislative frameworks for intellectual property rights enforcement’ (2012) 7(1) Journal of International Commercial Law and Technology11Google Scholar
Urbas, G., and Choo, K. R., Resource materials on technology-enabled crime, Technical and Background Paper No. 28 (AIC, 2008)Google Scholar
US Attorney General, Report to Congress on stalking and domestic violence (US Department of Justice, Office of Justice Programs, 2001)
US Census Bureau News, ‘Quarterly retail e-commerce sales 3rd Quarter 2014’ (US Department of Commerce, 2014)
US Department of Justice, Attorney General's Commission on Pornography, Final Report (1986)
US Department of Justice, ‘Leader of internet software piracy organization pleads guilty to conspiracy’, Press Release (27 February 2002)
US Department of Justice, ‘Creator of Melissa computer virus sentenced to 20 months in federal prison’, Press Release (1 May 2002)
US Department of Justice, ‘Warez Leader Sentenced to 46 Months’, Press Release (2002)
US Department of Justice, ‘Justice Department announces eight charged in internet piracy crackdown’, Press Release (28 July 2005)
US Department of Justice, ‘Dayton man pleads guilty to sexual exploitation crimes involving minors’, Press Release (19 January 2006)
US Department of Justice, ‘“Botherder” dealt record prison sentence for selling and spreading malicious computer code’, Press Release (8 May 2006)
US Department of Justice, ‘Extradited software piracy ringleader pleads guilty’, Press Release (20 April 2007)
US Department of Justice, ‘Comcast hackers sentenced to prison’, Press Release (24 September 2010)
US Department of Justice, ‘Extradited hacker sentenced to 10 years in federal prison for masterminding first-ever hack into internet phone networks’, Press Release (24 September 2010)
US Department of Justice, ‘Fannie Mae computer intruder sentenced to over 3 years in prison for attempting to wipe out Fannie Mae financial data’, Press Release (17 December 2010)
US Department of Justice, The national strategy for child exploitation prevention and interdiction (Report to Congress, 2010)
US Department of Justice, ‘Computer programmer sentenced to federal prison for unauthorized computer access’, Press Release (19 May 2011)
US Department of Justice, ‘Leader of NinjaVideo.net website sentenced to 22 months in prison for criminal copyright conspiracy’, Press Release (6 January 2012)
US Department of Justice, ‘Payment processor for scareware cybercrime ring sentenced to 48 months in prison’, Press Release (14 December 2012)
US Department of Justice, ‘Florida man convicted in wiretapping scheme targeting celebrities sentenced to 10 years in federal prison for stealing personal data’, Press Release (17 December 2012)
US Department of Justice, FY 2012 Performance and accountability report (2012)
US Department of Justice, ‘Former student pleads guilty to computer hacking at University of Central Missouri’, Press Release (12 April 2013)
US Department of Justice, ‘Second member of hacking group sentenced to more than a year in prison for stealing customer information from Sony Pictures computers’, Press Release (8 August 2013)
US Department of Justice, ‘Glendale man who admitted hacking into hundreds of computers in “sextortion” case sentenced to five years in federal prison’, Press Release (9 December 2013)
US Department of Justice, Prosecuting Intellectual Property Crimes, (Office of Legal Education, 2013)
US Department of Justice, ‘Cyber criminal pleads guilty to developing and distributing notorious spyeye malware’, Press Release (28 January 2014)
US Department of Justice, ‘US charges five Chinese military hackers for cyber espionage against US corporations and a labor organization for commercial advantage’, Press Release (19 May 2014)
US Department of Justice, ‘International hacker sentenced’, Press Release (24 October 2014)
US Department of Justice, ‘California resident pleaded guilty to wiretapping law enforcement communications and others’, Press Release (10 November 2014)
US Government Accountability Office, Intellectual property: Observations on efforts to quantify the economic effects of counterfeit and pirated goods, Report to Congressional Committees, GA-10-423 (2010)
US Government Accountability Office, Information security: Agency responses to breaches of personally identifiable information need to be more consistent, Report to Congressional Requesters (December 2013)
Valiquet, D., Telecommunications and Lawful Access: I The Legislative Situation in Canada (Library of Parliament, 2006)
Verizon, 2013 Data breach investigation report (2013)
Victorian Law Reform Commission, Surveillance in public places, Final Report 18 (2010)
Volokh, E., ‘One-to-one speech vs. one-to-many speech, criminal harassment laws, and cyberstalking’ (2012) 107 Northwestern University Law Review731Google Scholar
Walden, I., Computer crimes and digital investigations (New York: Oxford University Press, 2007)Google Scholar
Walker, C., ‘Cyber-terrorism: Legal principle and law in the United Kingdom’ (2006) Pennsylvania State Law Review 625
Wall, D. S., ‘Digital realism and the governance of spam as cybercrime’ (2005) 10 European Journal of Criminal Policy and Research309CrossRefGoogle Scholar
Wall, D. S., ‘Surveillant internet technologies and the growth in information capitalism: Spams and public trust in the information society’, in Haggerty, K. and Ericson, R. (eds.), The new politics of surveillance and visibility (Toronto: University of Toronto Press, 2005)Google Scholar
Wall, D. S., Cybercrime: The transformation of crime in the information age (Cambridge: Polity, 2007)Google Scholar
Wall, D. S., ‘Micro-frauds: Virtual robberies, stings and scams in the information age’, in Holt, T. and Schell, B. (eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (Hershey: IGI Global, 2011)Google Scholar
Warren, I., and Palmer, D., Crime risks of three-dimensional virtual environments, Trends and Issues in Crime and Criminal Justice No. 388 (AIC, February 2010)Google Scholar
Warren, S. D., and Brandeis, L. D., ‘The right to privacy’ (1890) 4 Harvard Law Review193CrossRefGoogle Scholar
Wasik, M., Crime and the computer (Oxford: Clarendon Press, 1991)Google Scholar
Webster, S., Davidson, J., Bifulco, A., Gottschalk, P., Caretti, V., Pham, T., Grove-Hills, J., Turley, C., Tompkins, C., Ciulla, S., Milazzo, V., Schimmenti, A. and Craparo, G., European survey, European online grooming project, Final Report (European Commission Safer Internet Plus Programme, May 2010)Google Scholar
Weimann, G., ‘Cyberterrorism: The sum of all fears?’ (2005) Studies in Conflict and Terrorism 129
Whittle, H., Hamilton-Giachritsis, C., Beech, A. and Collings, G., ‘A review of online grooming: Characteristics and concerns’ (2013) 18 Aggression and Violent Behavior62CrossRefGoogle Scholar
Whittle, H., Hamilton-Giachritsis, C., Beech, A. and Collings, G., ‘A review of young people's vulnerabilities to online grooming’ (2013) 18 Aggression and Violent Behavior135CrossRefGoogle Scholar
Wilson, C., Computer attack and cyberterrorism: Vulnerabilities and policy issues for Congress, Congressional Research Service Report for Congress (Congressional Research Service, 2005)Google Scholar
Wilson, C., ‘Cyber threats to critical information infrastructure’, in Chen, T. M., Jarvis, L. and Macdonald, S. (eds.), Cyberterrorism: Understanding, assessment, and response (New York: Springer, 2014)Google Scholar
Wolak, J., and Finkelhor, D., ‘Are crimes by online predators different from crimes by sex offenders who know youth in-person?’ (2013) 53 Journal of Adolescent Health736CrossRefGoogle ScholarPubMed
Wolak, J., Finkelhor, D. and Mitchell, K. J., ‘The varieties of child pornography production’, in Quayle, E. and Taylor, M. (eds.), Viewing child pornography on the internet: Understanding the offence, managing the offender, helping the victims (Dorset, UK: Russell House, 2005)Google Scholar
Wolak, J., Finkelhor, D. and Mitchell, K. J., Trends in arrests of ‘online predators’ (Crimes Against Children Research Center, 2009)Google Scholar
Wolak, J., Finkelhor, D. and Mitchell, K. J., ‘Child pornography possessors: Trends in offender and case characteristics’ (2011) 23 Sexual Abuse22CrossRefGoogle ScholarPubMed
Wolak, J., Finkelhor, D. and Mitchell, K. J., Trends in arrests for child pornography possession: The Third National Juvenile Online Victimization Study (NJOV-3) (Crimes Against Children Research Center, 2012)Google Scholar
Wolak, J., Finkelhor, D. and Mitchell, K. J., Trends in law enforcement responses to technology – facilitated child sexual exploitation crimes: The third national juvenile online victimization study (NJOV-3) (Crimes Against Children Research Center, 2012)Google Scholar
Wolak, J., Mitchell, K. and Finkelhor, D., ‘Escaping or connecting? Characteristics of youth who form close online relationships’ (2003) 26 Journal of Adolescence105CrossRefGoogle ScholarPubMed
Wolak, J., Mitchell, K. and Finkelhor, D., ‘Internet-initiated sex crimes against minors: Implications for prevention based on findings from a national study’ (2004) 35 Journal of Adolescent Health424e11CrossRefGoogle ScholarPubMed
Wolak, J., Finkelhor, D., Mitchell, K. J. and Jones, L. M., ‘Arrests for child pornography production: Data at two time points from a national sample of U.S. law enforcement agencies’ (2011) Child Maltreatment 1
Wolak, J., Finkelhor, D., Mitchell, K. J. and Ybarra, M. L., ‘Online “predators” and their victims: Myths, realities, and implications for prevention and treatment’ (2010) 1 Psychology of Violence13CrossRefGoogle Scholar
Wood, J. R. T., Royal Commission into the New South Wales Police Service: Final report Vol. V: The Paedophile Inquiry (New South Wales Government, 1997)Google Scholar
Yannakogeorgos, P. A., ‘Rethinking the threat of cyberterrorism’, in Chen, T. M., Jarvis, L. and Macdonald, S. (eds.), Cyberterrorism: Understanding, assessment, and response (New York: Springer, 2014)Google Scholar
Yar, M., Cybercrime and society (London: Sage Publications, 2006)Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Bibliography
  • Jonathan Clough, Monash University, Victoria
  • Book: Principles of Cybercrime
  • Online publication: 05 October 2015
  • Chapter DOI: https://doi.org/10.1017/CBO9781139540803.016
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Bibliography
  • Jonathan Clough, Monash University, Victoria
  • Book: Principles of Cybercrime
  • Online publication: 05 October 2015
  • Chapter DOI: https://doi.org/10.1017/CBO9781139540803.016
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Bibliography
  • Jonathan Clough, Monash University, Victoria
  • Book: Principles of Cybercrime
  • Online publication: 05 October 2015
  • Chapter DOI: https://doi.org/10.1017/CBO9781139540803.016
Available formats
×