-
1
-
-
85064704367
-
-
( ), “”, June 17, Australian Institute of Criminology, : (accessed October 25, 2008&rpar
-
AIC (2003), “Understanding stituational crime prevention”, June 17, Australian Institute of Criminology, available at: www.aic.gov.au/publications/crm/crm003.pdf (accessed October 25, 2008).
-
(2003)
Understanding stituational crime prevention
-
-
-
2
-
-
85064672187
-
-
( ), “”, March 8, Press Release, Association for Payment Clearing Services, : (accessed May 19, 2009&rpar
-
APACS (2005), “UK card fraud losses reach £504.8M: criminals increase their efforts as chip and PIN starts to make its mark”, March 8, Press Release, Association for Payment Clearing Services, available at: www.apacs.org.uk/media_centre/press%5C05_03_08.html (accessed May 19, 2009).
-
(2005)
UK card fraud losses reach £504.8M: criminals increase their efforts as chip and PIN starts to make its mark
-
-
-
3
-
-
85051453587
-
-
( ), “”, March 12, Press Release, Association for Payment Clearing Services, : (accessed May 19, 2009&rpar
-
APACS (2008a), “Fraud abroad pushes up losses on UK cards following two‐year fall”, March 12, Press Release, Association for Payment Clearing Services, available at: www.apacs.org.uk/2007Fraudfiguresrelease.html (accessed May 19, 2009).
-
(2008)
Fraud abroad pushes up losses on UK cards following two‐year fall
-
-
-
4
-
-
76749101845
-
-
( ), April, Association for Payment Clearing Services, : (accessed January 17, 2009&rpar
-
APACS (2008b), Fraud the Facts 2008, April, Association for Payment Clearing Services, available at: www.cardwatch.org.uk/images/uploads/publications/Fraud%20the%20Facts%202008_links.pdf (accessed January 17, 2009).
-
(2008)
Fraud the Facts 2008
-
-
-
5
-
-
85064710544
-
-
( ), “”, July, Australian Payments Clearing Association, Parliament of Australia, : (accessed November 16, 2009&rpar
-
APCA (2009), “Submission to the inquiry into cyber crime”, July, Australian Payments Clearing Association, Parliament of Australia, available at: www.aph.gov.au/house/committee/coms/cybercrime/subs/sub50.pdf (accessed November 16, 2009).
-
(2009)
Submission to the inquiry into cyber crime
-
-
-
6
-
-
85064717751
-
-
( ), Australian Payments Clearing Association, : (accessed November 5, 2010&rpar
-
APCA (2010), Fraud Perpetrated on Australian Issued Payment Instruments 1 January 2009‐31 December 2009, Australian Payments Clearing Association, available at: www.apca.com.au/Public/apca01_live.nsf/ResourceLookup/Payment_Fraud_Statistics_20099_PrintFriendly.pdf/$File/Payment_Fraud_Statistics_20099_PrintFriendly.pdf (accessed November 5, 2010).
-
(2010)
Fraud Perpetrated on Australian Issued Payment Instruments 1 January 2009‐31 December 2009
-
-
-
7
-
-
0010809548
-
-
( ), W.C. Little & Co, Albany, NY
-
Beccaria, C.B. and Voltaire (1872), An Essay on Crimes and Punishments, W.C. Little & Co, Albany, NY.
-
(1872)
An Essay on Crimes and Punishments
-
-
Beccaria, C.B.1
Voltaire, V.2
-
8
-
-
84935432660
-
Routine activities: a cross‐national assessment of a criminological perspective
-
( ), “”, &hyphen
-
Bennett, R.R. (1991), “Routine activities: a cross‐national assessment of a criminological perspective”, Social Forces, Vol. 70 No. 1, pp. 147‐63.
-
(1991)
Social Forces
, vol.70
, Issue.1
, pp. 147-163
-
-
Bennett, R.R.1
-
9
-
-
84870972089
-
The UK national identity card
-
( ), “”, ‐Association for Information Systems, Phoenix, AZ
-
Beynon‐Davies, P. (2009), “The UK national identity card”, Thirtieth International Conference on Information Systems, Association for Information Systems, Phoenix, AZ, pp. 1‐10.
-
(2009)
Thirtieth International Conference on Information Systems
, pp. 1-10
-
-
Beynon&hyphen1
Davies, P.2
-
10
-
-
4243076810
-
-
( ), “”, Cards Business Review#2003–01, Tata Consultancy Services, June
-
Bhatla, T.P., Prabhu, V. and Dua, A. (2003), “Understanding credit card frauds”, Cards Business Review#2003–01, Tata Consultancy Services, June.
-
(2003)
Understanding credit card frauds
-
-
Bhatla, T.P.1
Prabhu, V.2
Dua, A.3
-
11
-
-
48949107833
-
-
( ), “”, discussion paper, April.Federal Reserve Bank of Philadelphia, Philadelphia, PA
-
Burns, P. and Stanley, A. (2002), “Fraud management in the credit card industry”, discussion paper, Federal Reserve Bank of Philadelphia, Philadelphia, PA, April.
-
(2002)
Fraud management in the credit card industry
-
-
Burns, P.1
Stanley, A.2
-
12
-
-
85064602986
-
-
( ), “”, April 29, Reuters, : (accessed October 27, 2009&rpar
-
Business Wire (2009), “PCI compliance important to 80% of UK organisations, according to Breach and Evolution Security Survey”, April 29, Reuters, available at: www.reuters.com/article/pressRelease/idUS38151+29‐Apr‐2009+BW20090429 (accessed October 27, 2009).
-
(2009)
PCI compliance important to 80% of UK organisations, according to Breach and Evolution Security Survey
-
-
-
13
-
-
84949804500
-
Technology, criminology, and crime science
-
( ), “”, &hyphen
-
Clark, R.V. (2004), “Technology, criminology, and crime science”, European Journal on Criminal Policy and Research, Vol. 10 No. 1, pp. 55‐63.
-
(2004)
European Journal on Criminal Policy and Research
, vol.10
, Issue.1
, pp. 55-63
-
-
Clark, R.V.1
-
14
-
-
0000204509
-
Social change and crime rate trends: a routine activity approach
-
( ), “”, &hyphen
-
Cohen, L.E. and Felson, M. (1979), “Social change and crime rate trends: a routine activity approach”, American Sociological Review, Vol. 44, August, pp. 588‐608.
-
(1979)
American Sociological Review
, vol.44
, Issue.August
, pp. 588-608
-
-
Cohen, L.E.1
Felson, M.2
-
15
-
-
84861909009
-
-
( ), : (accessed January 17, 2008).University of Missouri, St Louis, MO
-
Cornish, M., Delpha, K. and Erslon, M. (2008), MasterCard International Security and Risk Management: Credit Card Fraud, University of Missouri, St Louis, MO, available at: www.umsl.edu/∼lacitym/olpaperf04g5.pdf (accessed January 17, 2008).
-
(2008)
MasterCard International Security and Risk Management: Credit Card Fraud
-
-
Cornish, M.1
Delpha, K.2
Erslon, M.3
-
16
-
-
85167748573
-
-
( ), 2nd ed., Syngress Publishing, Burlington, VT
-
Cross, M. (2008), Scene of the Cybercrime, 2nd ed., Syngress Publishing, Burlington, VT.
-
(2008)
Scene of the Cybercrime
-
-
Cross, M.1
-
17
-
-
84937188751
-
Hiding crimes in cyberspace
-
( ), “”, &hyphen
-
Denning, D.E. and Baugh, W.E. (1999), “Hiding crimes in cyberspace”, Information, Communication & Society, Vol. 2 No. 3, pp. 251‐76.
-
(1999)
Information, Communication & Society
, vol.2
, Issue.3
, pp. 251-276
-
-
Denning, D.E.1
Baugh, W.E.2
-
18
-
-
0004152943
-
-
( ), 2nd ed., Pine Forge Press, Thousand Oaks, CA
-
Felson, M. (1998), Crime and Everyday Life, 2nd ed., Pine Forge Press, Thousand Oaks, CA.
-
(1998)
Crime and Everyday Life
-
-
Felson, M.1
-
19
-
-
0041810273
-
-
Webb, B.and ( )(Ed.), Police Research Series Paper 98, Home Office, London
-
Felson, M. and Clarke, R.V. (1998) in Webb, B. (Ed.), Opportunity Makes the Thief: Practical Theory for Crime Prevention, Police Research Series Paper 98, Home Office, London.
-
(1998)
Opportunity Makes the Thief: Practical Theory for Crime Prevention
-
-
Felson, M.1
Clarke, R.V.2
-
20
-
-
78049233109
-
-
( ), “”, Financial Fraud Action UK™: reproduced with permission, : (accessed December 27, 2010&rpar
-
Financial Fraud Action UK (2010), “Fraud the facts 2010”, Financial Fraud Action UK™: reproduced with permission, available at: www.financialfraudaction.org.uk/download.asp?file=749 (accessed December 27, 2010).
-
(2010)
Fraud the facts 2010
-
-
-
21
-
-
85064710016
-
Identity theft: trends and issues
-
( ), “”, May 27.Congressional Reserach Service, Washington, DC
-
Finklea, K.M. (2009), “Identity theft: trends and issues”, Prepared for Members and Committees of Congress, Congressional Reserach Service, Washington, DC, May 27.
-
(2009)
Prepared for Members and Committees of Congress
-
-
Finklea, K.M.1
-
22
-
-
17644400102
-
-
( ), Artofwarsuntzu.com, : (accessed December 31, 2007&rpar
-
Giles, L. (1910), Sun Tzu on the Art of War, Artofwarsuntzu.com, available at: www.artofwarsuntzu.com/Art%20of%20War%20PDF.pdf (accessed December 31, 2007).
-
(1910)
Sun Tzu on the Art of War
-
-
Giles, L.1
-
23
-
-
34249743998
-
Problems with the problem‐oriented approach
-
Homel, R.( ), “”,(Ed.), ‐Criminal Justice Press, Monsey, NY
-
Gilling, D. (1996), “Problems with the problem‐oriented approach”, in Homel, R. (Ed.), The Politics and Practice of Situational Crime Prevention: Crime Prevention Studies, Vol. 5, Criminal Justice Press, Monsey, NY, pp. 9‐23.
-
(1996)
The Politics and Practice of Situational Crime Prevention: Crime Prevention Studies
, vol.5
, pp. 9-23
-
-
Gilling, D.1
-
24
-
-
0035381384
-
Virtual criminality: old wine in new bottles?
-
( ), “”, &hyphen
-
Grabosky, P. (2001), “Virtual criminality: old wine in new bottles?”, Social & Legal Studies, Vol. 10 No. 2, pp. 243‐9.
-
(2001)
Social & Legal Studies
, vol.10
, Issue.2
, pp. 243-249
-
-
Grabosky, P.1
-
25
-
-
85064622125
-
-
( ), “”, Australian Payments Clearing Association, : (accessed November 2, 2009&rpar
-
Halliday, S., Kendall, A. and Pearce, C. (2007), “The four layers of fraud prevention”, Australian Payments Clearing Association, available at: www.apca.com.au/AR2007/07_Fraud‐prevention.htm (accessed November 2, 2009).
-
(2007)
The four layers of fraud prevention
-
-
Halliday, S.1
Kendall, A.2
Pearce, C.3
-
26
-
-
34249029893
-
Situational crime prevention and its discontents: rational choice theory versus the ‘culture of now’
-
( ), “”, &hyphen
-
Hayward, K. (2007), “Situational crime prevention and its discontents: rational choice theory versus the ‘culture of now’”, Social Policy & Administration, Vol. 41 No. 3, pp. 232‐50.
-
(2007)
Social Policy & Administration
, vol.41
, Issue.3
, pp. 232-250
-
-
Hayward, K.1
-
27
-
-
85064698005
-
-
( ), Identity Cards Scheme – Benefits Overview, Privacy International, : (accessed October 3, 2010&rpar
-
Home Office (2005), Identity Cards Scheme – Benefits Overview, Privacy International, available at: www.privacyinternational.org/issues/idcard/uk/hobenefitsjun2005.pdf (accessed October 3, 2010).
-
(2005)
-
-
Home Office, H.O.1
-
28
-
-
85064710285
-
-
( ), “”, May, Identity and Passport Service, : (accessed October 2, 2010&rpar
-
Identity and Passport Service (2010), “Identity cards and national identity register to be scrapped”, May, Identity and Passport Service, available at: www.ips.gov.uk/cps/rde/xchg/ips_live/hs.xsl/1691.htm (accessed October 2, 2010).
-
(2010)
Identity cards and national identity register to be scrapped
-
-
Identity, I.1
Passport Service, P.S.2
-
29
-
-
77958615428
-
-
( ), PricewaterhouseCoopers, : (accessed October 3, 2010&rpar
-
Infosecurity Europe and PricewaterhouseCoopers (2010), Information Security Breaches Survey 2010, PricewaterhouseCoopers, available at: www.pwc.co.uk/pdf/premium/isbs_survey_2010_technical_report.pdf (accessed October 3, 2010).
-
(2010)
Information Security Breaches Survey 2010
-
-
Infosecurity Europe, I.E.1
PricewaterhouseCoopers, P.2
-
30
-
-
33751366356
-
-
( ), June 27, The Identity Project, : (accessed October 1, 2010&rpar
-
London School of Economics (2005), The Identity Project: An Assessment of the UK Identity Cards Bill and Its Implications, June 27, The Identity Project, available at: http://identityproject.lse.ac.uk/identityreport.pdf (accessed October 1, 2010).
-
(2005)
The Identity Project: An Assessment of the UK Identity Cards Bill and Its Implications
-
-
-
31
-
-
84861862549
-
-
( ), “”, September, IPSA International, : (accessed November 2, 2008&rpar
-
Lormel, D.M. (2008), “Terrorism and credit card information theft: connecting the dots”, September, IPSA International, available at: www.ipsaintl.com/news‐and‐events/articles/pdf/lormel‐terrorism‐and‐credit‐cards.pdf (accessed November 2, 2008).
-
(2008)
Terrorism and credit card information theft: connecting the dots
-
-
Lormel, D.M.1
-
32
-
-
85055213117
-
-
( ), Ministry of Communication and Information Technology of the Republic of Indonesia, Jakarta
-
Ministry of Communication and Information Technology of the Republic of Indonesia (2008), Law of The Republic of Indonesia Number 11 of 2008 on Electronic Information and Electronic Transaction, Ministry of Communication and Information Technology of the Republic of Indonesia, Jakarta.
-
(2008)
Law of The Republic of Indonesia Number 11 of 2008 on Electronic Information and Electronic Transaction
-
-
-
33
-
-
85064711368
-
-
( ), July, The Attorney General's Office, : (accessed October 4, 2009&rpar
-
National Fraud Strategic Authority (2007), Fraud Review Second Phase Communications Strategy, July, The Attorney General's Office, available at: www.attorneygeneral.gov.uk/Fraud%20Review/Second%20Phase%20Communications%20Strategy%20July%202007.pdf (accessed October 4, 2009).
-
(2007)
Fraud Review Second Phase Communications Strategy
-
-
-
34
-
-
85064619038
-
-
( ), “”, News Release, March 19, The Attorney General's Office, : (accessed September 27, 2009&rpar
-
National Fraud Strategic Authority (2009), “The national fraud strategy – new rules to crackdown on fraud will provide real help now to consumers and businesses”, News Release, March 19, The Attorney General's Office, available at: www.attorneygeneral.gov.uk/attachments/090317%20NFS%20news%20release%20FINAL%20electronic.pdf (accessed September 27, 2009).
-
(2009)
The national fraud strategy – new rules to crackdown on fraud will provide real help now to consumers and businesses
-
-
-
35
-
-
85064662847
-
-
( ), National Science and Technology Council, : (accessed September 5, 2009&rpar
-
National Science and Technology Council (2008), Identity Management Task Force Report 2008, National Science and Technology Council, available at: www.ostp.gov/galleries/NSTC%20Reports/IdMReport%20Final.pdf (accessed September 5, 2009).
-
(2008)
Identity Management Task Force Report 2008
-
-
National Science, N.S.1
Technology Council, T.C.2
-
36
-
-
84996156822
-
-
( ), February, Foresight, : (accessed September 18, 2010&rpar
-
Newman, G. and Clarke, R.V. (2002), Etailing: New Opportunities for Crime, New Opportunities for Prevention, February, Foresight, available at: www.foresight.gov.uk/Crime%20Prevention/Etailing_New_Opportunities_April_2002.pdf (accessed September 18, 2010).
-
(2002)
Etailing: New Opportunities for Crime, New Opportunities for Prevention
-
-
Newman, G.1
Clarke, R.V.2
-
37
-
-
38049065451
-
-
( ), “”, prepared for presentation and discussion at the National Institute of Justice Focus Group Meeting to Develop a Research Agenda to Identify the Most Effective Avenues of Research that will Impact on Prevention, Harm Reduction and Enforcement, ‐National Criminal Justice Reference Service, Rockville, MD
-
Newman, G.R. and McNally, M.M. (2005), “Identity theft literature review”, prepared for presentation and discussion at the National Institute of Justice Focus Group Meeting to Develop a Research Agenda to Identify the Most Effective Avenues of Research that will Impact on Prevention, Harm Reduction and Enforcement, National Criminal Justice Reference Service, Rockville, MD, pp. i‐103.
-
(2005)
Identity theft literature review
, pp. 1-103
-
-
Newman, G.R.1
McNally, M.M.2
-
38
-
-
85064699487
-
-
( ), New South Wales Government, : (accessed October 27, 2008&rpar
-
New South Wales Attorney General's Department (2008a), Displacement Theory and Crime Prevention, New South Wales Government, available at: www.crimeprevention.nsw.gov.au/Lawlink/cpd/ll_cpdiv.nsf/vwFiles/DisplacementTheoryFactsheet_2008.pdf/$file/DisplacementTheoryFactsheet_2008.pdf (accessed October 27, 2008).
-
(2008)
Displacement Theory and Crime Prevention
-
-
-
39
-
-
85064627098
-
-
( ), New South Wales Attorney General's Department, : (accessed October 10, 2008&rpar
-
New South Wales Attorney General's Department (2008b), Routine Activity Theory: Crime Prevention, New South Wales Attorney General's Department, available at: www.crimeprevention.nsw.gov.au/Lawlink/cpd/ll_cpdiv.nsf/vwFiles/RoutineActivityFactsheet_April2008.pdf/$file/RoutineActivityFactsheet_April2008.pdf (accessed October 10, 2008).
-
(2008)
Routine Activity Theory: Crime Prevention
-
-
-
40
-
-
85064617721
-
-
( ), October 23, University of Wollongong, : (accessed September 15, 2010&rpar
-
Prabowo, H.Y. (2009), Fighting the Unknown: Do We Stand a Chance against Credit Card Fraud?, October 23, University of Wollongong, available at: http://media.uow.edu.au/opinions/UOW068213.html (accessed September 15, 2010).
-
(2009)
Fighting the Unknown: Do We Stand a Chance against Credit Card Fraud?
-
-
Prabowo, H.Y.1
-
41
-
-
67650362258
-
-
( ), April, Idtheft.gov, : (accessed July 18, 2009&rpar
-
President's Identity Theft Task Force (2007), Combating Identity Theft: A Strategic Plan, April, Idtheft.gov, available at: www.idtheft.gov/reports/StrategicPlan.pdf (accessed July 18, 2009).
-
(2007)
Combating Identity Theft: A Strategic Plan
-
-
President's Identity Theft Task Force, P.I.T.T.F.1
-
42
-
-
80051930046
-
-
( ), “”, PhD thesis, Graduate School of the University of Cincinnati, In the School of Criminal Justice of the College of Education, Criminal Justice, and Human Services, Cincinnati, OH
-
Reyns, B.W. (2010), “Being pursued online: extent and nature of cyberstalking victimization from a lifestyle/routine activities perspective”, PhD thesis, Graduate School of the University of Cincinnati, In the School of Criminal Justice of the College of Education, Criminal Justice, and Human Services, Cincinnati, OH.
-
(2010)
Being pursued online: extent and nature of cyberstalking victimization from a lifestyle/routine activities perspective
-
-
Reyns, B.W.1
-
43
-
-
85064628829
-
-
( ), December, Australian Institute of Criminology, : (accessedOctober 1, 2007&rpar
-
Smith, R.G. (1998), Best Practice in Fraud Prevention, December, Australian Institute of Criminology, available at: www.aic.gov.au/publications/tandi/ti100.pdf (accessedOctober 1, 2007).
-
(1998)
Best Practice in Fraud Prevention
-
-
Smith, R.G.1
-
44
-
-
85013497014
-
ID cards scheme to be scrapped within 100 days
-
( ), “”, May 27, : (accessed October 3, 2010&rpar
-
Travis, A. (2010), “ID cards scheme to be scrapped within 100 days”, The Guardian, May 27, available at: www.guardian.co.uk/politics/2010/may/27/theresa‐may‐scrapping‐id‐cards (accessed October 3, 2010).
-
(2010)
The Guardian
-
-
Travis, A.1
-
45
-
-
0842281973
-
Burglary victimization in England and Wales, the United States and The Netherlands; a cross‐national comparative test of routine activities and lifestyle theories
-
( ), “”, &hyphen
-
Tseloni, A., Wittebrood, K., Farrell, G. and Pease, K. (2004), “Burglary victimization in England and Wales, the United States and The Netherlands; a cross‐national comparative test of routine activities and lifestyle theories”, The British Journal of Criminology, Vol. 44 No. 1, pp. 66‐91.
-
(2004)
The British Journal of Criminology
, vol.44
, Issue.1
, pp. 66-91
-
-
Tseloni, A.1
Wittebrood, K.2
Farrell, G.3
Pease, K.4
-
46
-
-
85064619849
-
-
( ), “”, Testimony before the Subcommittee on Social Security, Committee on Ways and Means, House of Representatives: Statement of Barbara D. Bovbjerg, Director Education, Workforce, and Income Security Issues, April 29.United States General Accounting Office, Washington, DC
-
United States General Accounting Office (2002), “SSNs are widely used by government and could be better protected”, Testimony before the Subcommittee on Social Security, Committee on Ways and Means, House of Representatives: Statement of Barbara D. Bovbjerg, Director Education, Workforce, and Income Security Issues, United States General Accounting Office, Washington, DC, April 29.
-
(2002)
SSNs are widely used by government and could be better protected
-
-
-
47
-
-
85064606534
-
-
( ), 2009 Global Security Summit Summary, Visa USA, : (accessed October 28, 2009&rpar
-
VISA (2009), 2009 Global Security Summit Summary, Visa USA, available at: http://usa.visa.com/download/merchants/2009‐security‐summit‐summary.pdf (accessed October 28, 2009).
-
(2009)
-
-
-
48
-
-
58149191569
-
Doing the politics of technological decision making: due process and the debate about identity cards in the UK
-
( ), “”, &hyphen
-
Whitley, E.A. and Hosein, I.R. (2008), “Doing the politics of technological decision making: due process and the debate about identity cards in the UK”, European Journal of Information Systems, Vol. 17, pp. 668‐77.
-
(2008)
European Journal of Information Systems
, vol.17
, pp. 668-677
-
-
Whitley, E.A.1
Hosein, I.R.2
-
49
-
-
34247657469
-
The novelty of ‘cybercrime’: an assessment in light of routine activity theory
-
( ), “”, &hyphen
-
Yar, M. (2005), “The novelty of ‘cybercrime’: an assessment in light of routine activity theory”, European Journal of Criminology, Vol. 2 No. 4, pp. 407‐27.
-
(2005)
European Journal of Criminology
, vol.2
, Issue.4
, pp. 407-427
-
-
Yar, M.1
|