-
2
-
-
80955159170
-
-
Australian Associated Press (AAP) News.com.au 9 October [Date last accessed: 06.07.11.]
-
Australian Associated Press (AAP) Military faces huge cyber espionage threat News.com.au 9 October 2010 http://www.news.com.au/technology/military- faces-huge-cyber-espionage-threat/story-e6frfrnr-1225936268254 [Date last accessed: 06.07.11.]
-
(2010)
Military Faces Huge Cyber Espionage Threat
-
-
-
4
-
-
78751478754
-
-
Australian Government House of Representatives Standing Committee on Communications Commonwealth of Australia Canberra
-
Australian Government House of Representatives Standing Committee on Communications Hackers, fraudsters and botnets: tackling the problem of cyber crime 2010 Commonwealth of Australia Canberra
-
(2010)
Hackers, Fraudsters and Botnets: Tackling the Problem of Cyber Crime
-
-
-
5
-
-
80955132868
-
-
Australian Institute of Criminology (AIC). Date accessed 01.08.2011.
-
Australian Institute of Criminology (AIC). Money mules, High Tech Crime Brief No 16, 2008. Available on: http://www.aic.gov.au/publications/ current%20series/htcb/1-20/htcb016.aspx [Date accessed 01.08.2011.].
-
(2008)
Money Mules, High Tech Crime Brief No 16, 2008
-
-
-
6
-
-
80955155727
-
-
AVG [Date last accessed: 06.07.11.]
-
AVG AVG Community powered threat report: Q2, 2011 2011 http://www.avg.com.au/files/media/avg-threat-report-2011-q2.pdf [Date last accessed: 06.07.11.]
-
(2011)
AVG Community Powered Threat Report: Q2, 2011
-
-
-
8
-
-
80955132864
-
-
News.com.au 29 March [Date last accessed: 06.07.11.]
-
S. Benson China spies suspected of hacking Julia Gillard's emails News.com.au 29 March 2011 http://www.news.com.au/technology/federal-ministers- emails-suspected-of-being-hacked/story-e6frfrnr-1226029713668 [Date last accessed: 06.07.11.]
-
(2011)
China Spies Suspected of Hacking Julia Gillard's Emails
-
-
Benson, S.1
-
10
-
-
80955155209
-
Cybercrime and on-line safety in cyberspace
-
C. Smith, S. Zhang, R. Barberet, Routledge NY
-
R. Broadhurst, and K.-K.R. Choo Cybercrime and on-line safety in cyberspace C. Smith, S. Zhang, R. Barberet, Routledge International Handbook of Criminology 2011 Routledge NY 153 165
-
(2011)
Routledge International Handbook of Criminology
, pp. 153-165
-
-
Broadhurst, R.1
Choo, K.-K.R.2
-
11
-
-
70449670320
-
-
Center for Strategic and International Studies (CSIS) Center for Strategic and International Studies Washington, DC
-
Center for Strategic and International Studies (CSIS) Securing cyberspace for the 44th presidency 2008 Center for Strategic and International Studies Washington, DC
-
(2008)
Securing Cyberspace for the 44th Presidency
-
-
-
13
-
-
77957695303
-
Organised crime groups in cyberspace: A typology
-
K.K.R. Choo Organised crime groups in cyberspace: a typology Trends in Organized Crime 11 3 2008 270 295
-
(2008)
Trends in Organized Crime
, vol.11
, Issue.3
, pp. 270-295
-
-
Choo, K.K.R.1
-
16
-
-
80955135932
-
Cyber crime
-
Letizia Paoli, editor New York: Oxford University Press
-
Choo KKR & Grabosky P forthcoming. Cyber crime. In Letizia Paoli, editor, Oxford Handbook of Organized Crime, New York: Oxford University Press.
-
Oxford Handbook of Organized Crime
-
-
Kkr, C.1
Grabosky, P.2
-
18
-
-
0000204509
-
Social change and crime rate trends: A routine activity approach
-
L.E. Cohen, and M. Felson Social change and crime rate trends: a routine activity approach American Sociological Review 44 4 1979 588 608
-
(1979)
American Sociological Review
, vol.44
, Issue.4
, pp. 588-608
-
-
Cohen, L.E.1
Felson, M.2
-
19
-
-
80955155213
-
Recruiting, development, and retention of cyber warriors despite an inhospitable culture
-
[Date last accessed: 06.07.11.]
-
G. Conti, and J. Easterly Recruiting, development, and retention of cyber warriors despite an inhospitable culture Small Wars Journal 2010 http://smallwarsjournal.com/blog/journal/docs-temp/482-conti-easterly.pdf [Date last accessed: 06.07.11.]
-
(2010)
Small Wars Journal
-
-
Conti, G.1
Easterly, J.2
-
20
-
-
36749100989
-
Measures and mechanisms to strengthen international cooperation among prosecution services
-
Y. Dandurand, G. Colombo, and N. Passas Measures and mechanisms to strengthen international cooperation among prosecution services Crime, Law and Social Change 47 4-5 2007 261 289
-
(2007)
Crime, Law and Social Change
, vol.47
, Issue.45
, pp. 261-289
-
-
Dandurand, Y.1
Colombo, G.2
Passas, N.3
-
27
-
-
84896464484
-
-
[Date last accessed: 06.07.11.]
-
T. Gjelten Volunteer cyber army emerges In Estonia 2011 http://www.npr.org/2011/01/04/132634099/in-estonia-volunteer-cyber-army-defends- nation [Date last accessed: 06.07.11.]
-
(2011)
Volunteer Cyber Army Emerges in Estonia
-
-
Gjelten, T.1
-
29
-
-
36849069363
-
The internet, technology, and organized crime
-
P. Grabosky The internet, technology, and organized crime Asian Journal of Criminology 2 2 2007 145 161
-
(2007)
Asian Journal of Criminology
, vol.2
, Issue.2
, pp. 145-161
-
-
Grabosky, P.1
-
33
-
-
81455154221
-
-
IBM X-Force® IBM Corporation Somers, NY [Date last accessed: 06.07.11.]
-
IBM X-Force® IBM X-Force® 2010 trend and risk report 2011 IBM Corporation Somers, NY http://public.dhe.ibm.com/common/ssi/ecm/en/wgl03007usen/ WGL03007USEN.PDF [Date last accessed: 06.07.11.]
-
(2011)
IBM X-Force® 2010 Trend and Risk Report
-
-
-
35
-
-
80054028550
-
-
CIO.com 6 June [Date last accessed: 06.07.11.]
-
J. Kirk ATM malware spreading around the world CIO.com 6 June 2009 http://www.cio.com/article/494341/ATM-Malware-Spreading-Around-the-World [Date last accessed: 06.07.11.]
-
(2009)
ATM Malware Spreading Around the World
-
-
Kirk, J.1
-
37
-
-
84907814397
-
-
Lookout [Date last accessed: 05.08.11.]
-
Lookout Lookout mobile threat report: August 2011 2011 https://www.mylookout.com/-downloads/lookout-mobile-threat-report-2011.pdf [Date last accessed: 05.08.11.]
-
(2011)
Lookout Mobile Threat Report: August 2011
-
-
-
38
-
-
80955159158
-
-
NYTimes 19 November [Date last accessed: 06.07.11.]
-
J. Markoff Worm can deal double blow to nuclear program NYTimes 19 November 2010 http://www.nytimes.com/2010/11/20/world/middleeast/20stuxnet.html? ref=technology [Date last accessed: 06.07.11.]
-
(2010)
Worm Can Deal Double Blow to Nuclear Program
-
-
Markoff, J.1
-
40
-
-
80955135400
-
-
Govinfosecurity 15 March [Date last accessed: 06.07.11.]
-
L. McGlasson Agencies issue ACH, wire fraud advisory Govinfosecurity 15 March 2010 http://www.govinfosecurity.com/articles.php?art-id=2298 [Date last accessed: 06.07.11.]
-
(2010)
Agencies Issue ACH, Wire Fraud Advisory
-
-
McGlasson, L.1
-
41
-
-
80955159155
-
-
CSO 10 January [Date last accessed:.06.07.11.]
-
R. McMillan NSA helped Microsoft make vista secure CSO 10 January 2007 http://www.csoonline.com.au/index.php?id=2112787630&eid=-302 [Date last accessed:.06.07.11.]
-
(2007)
NSA Helped Microsoft Make Vista Secure
-
-
McMillan, R.1
-
42
-
-
80955155202
-
-
Computerworld 15 June [Date last accessed: 06.07.11.]
-
R. McMillan Comerica bank ordered to pay after customer hacked Computerworld 15 June 2011 http://www.computerworld.com/s/article/9217662/ Comerica-Bank-ordered-to-pay-after-customer-hacked?taxonomyName= Security&taxonomyId=17 [Date last accessed: 06.07.11.]
-
(2011)
Comerica Bank Ordered to Pay after Customer Hacked
-
-
McMillan, R.1
-
43
-
-
80955135393
-
-
PC World 29 July [Date last accessed: 03.08.11.]
-
R. McMillan US Phisher Who Hit 38,500 Gets Long Prison Sentence PC World 29 July 2011 http://www.pcworld.com/businesscenter/article/236877/us-phisher- who-hit-38500-gets-long-prison-sentence.html [Date last accessed: 03.08.11.]
-
(2011)
US Phisher Who Hit 38,500 Gets Long Prison Sentence
-
-
McMillan, R.1
-
46
-
-
80955155198
-
-
[Date last accessed: 06.07.11.]
-
A. Pras, A. Sperotto, G.C.M. Moura, I. Drago, R. Barbosa, and R. Sadre Attacks by "Anonymous" WikiLeaks proponents not anonymous 2010 http://www.geenstijl.nl/archives/images/loic-report.pdf [Date last accessed: 06.07.11.]
-
(2010)
Attacks by "anonymous" WikiLeaks Proponents Not Anonymous
-
-
Pras, A.1
Sperotto, A.2
Moura, G.C.M.3
Drago, I.4
Barbosa, R.5
Sadre, R.6
-
48
-
-
80955159151
-
-
RSA [Date last accessed: 06.07.11.]
-
RSA RSA online fraud report: September, 2010 2010 http://www.rsa.com/ solutions/consumer-authentication/intelreport/11094-Online-Fraud-report-0910. pdf [Date last accessed: 06.07.11.]
-
(2010)
RSA Online Fraud Report: September, 2010
-
-
-
52
-
-
80955159154
-
-
Symantec [Date last accessed:.06.07.11.]
-
Symantec Symantec global internet security threat report: trends for 2009 Vol. XV 2010 http://eval.symantec.com/mktginfo/enterprise/white-papers/b- whitepaper-internet-security-threat-report-xv-04-2010.en-us.pdf [Date last accessed:.06.07.11.]
-
(2010)
Symantec Global Internet Security Threat Report: Trends for 2009
, vol.15
-
-
-
53
-
-
84870046687
-
-
Symantec [Date last accessed: 06.07.11.]
-
Symantec Symantec internet security threat report: trends for 2010 2011 https://www4.symantec.com/mktginfo/downloads/21182883-GA-REPORT-ISTR-Main- Report-04-11-HI-RES.pdf [Date last accessed: 06.07.11.]
-
(2011)
Symantec Internet Security Threat Report: Trends for 2010
-
-
-
54
-
-
80955132843
-
-
Sydney Morning Herald (SMH) SMH.com.au 31 December[Date last accessed: 06.07.11.]
-
Sydney Morning Herald (SMH) Most sophisticated mobile virus starts spreading on Android smartphones 2010 http://www.smh.com.au/digital-life/ mobiles/most-sophisticated-mobile-virus-starts-spreading-on-android-smartphones- 20101231-19bne.html SMH.com.au 31 December[Date last accessed: 06.07.11.]
-
(2010)
Most Sophisticated Mobile Virus Starts Spreading on Android Smartphones
-
-
-
57
-
-
34247657469
-
The novelty of 'cybercrime': An assessment in light of routine activity theory
-
M. Yar The novelty of 'cybercrime': an assessment in light of routine activity theory European Journal of Criminology 2 4 2005 407 427
-
(2005)
European Journal of Criminology
, vol.2
, Issue.4
, pp. 407-427
-
-
Yar, M.1
|