Abstract

Get full access to this article
View all access options for this article.
References
1.Audit Commision (1994 ) Opportunity Makes a Thief: An Analysis of Computer Abuse , London : HMSO .
2.Audit Commission (1998 ) Ghost In The Machine: An Analysis of IT Fraud and Abuse , London : HMSO .
3.
Campbell
D.
(1998 ) “Police tighten the Net” , The Guardian (Online Section), September 17, p. 2 –3 .
4.
Campbell
M.
(1998 ) “US at the mercy of cyber terrorists” , The Sunday Times , May 17, p. 26 .
5.
Charlesworth
A.
(1995 ) “Never having to say sorry” , The Times Higher Educational Supplement (Multimedia Section), May 10, p. viii .
6.
Equinoxe (1997 ) Superhighway Robbery (Channel 4 Documentary). October 20, 1997 .
7.
Graham-Cumming
J.
(1998 ) “Computing and the Net: Attack of the Trojan Smurfs” , The Guardian (Online Section), March 12, p. 5 .
8.
Grey
S.
and
Warren
P.
(1997 ) “Hackers hit online bank revolution” , The Sunday Times , May 25, p. 5 .
9.
Griffiths
M.D.
(1999 ) “Internet gambling and crime” , The Police Journal , see article ante.
10.
Hencke
D.
(1999 ) “Code experts to crack Internet crime” , The Guardian , May 27, p. 6 .
11.
Lillington
K.
(1999 ) “Computing and the Net: And what kind of hacker are you?” The Guardian (Online Section), January 28, p. 5 .
12.
Littman
J.
(1996 ) The Fugitive , New York : Little, Brown & Co.
13.
Littman
J.
(1997 ) The Watchman , New York : Little, Brown & Co.
14.
McClellan
J.
(1997 ) “Hack meets hacker” , The Guardian (Online Section), June 5, p. 15 .
15.
Sparrow
P.
and
Griffiths
M.D.
(1997 ) “Crime and IT: Hacking and pornography on the internet” , Probation Journal , 44 , 144 –147 .
16.
Sweeting
A.
(1997 ) “Cybercops and robbers” , The Guardian (Section Two), October 21, p. 19 .
