Australian Institute of Criminology

Skip to content

Cybercrime: November 2014

The latest crime and justice alerts are now available on our new catalogue at

Wherever possible, open access to full text documents are provided, but for licensing reasons, they cannot be given for most journal articles. Please contact your own library for any items that are not freely available - we are happy to help them with inter-library loans if needed.

For further assistance please email


Journal articles

  • A face in the crowd / Holly Gilbert Stowell
    Security management 58(10) Oct 2014: 26-28
  • AUSTRAC and the ACCC warn on dating scams
    GRC professional no. 4 2014: 19
  • Cybercrime and social ties : phishing in Amsterdam / E R Leukfeldt
    Trends in organized crime 17(4) Dec 2014: 231-249
  • Digital forensics unlocked / Yuval Ben-Moshe
    Intersec : the journal of international security 24(9) Oct 2014: 14-16
  • From victim to victor : corporate crime in the internet era / Mark Mermelstein and Mona S Amer
    Business law today. Nov 2013:
  • Hackers in high demand / Holly Gilbert Stowell
    Security management 58(10) Oct 2014: 34-35
  • Law enforcement agencies' activities in the cloud environment : a European legal perspective / Paolo Balboni and Enrico Pelino
    Information and communications technology law 22(2) 2013: 165-190
  • Law enforcement perceptions of a prescription drug monitoring programme / Sarah E Wixson, Karen Blumenschein, Amie Goodin, George E Higgins, Gennaro F Vito, Jeffery Talbert and Patricia R Freeman
    International journal of police science and management 16(4) 2014: 288-296
  • Protecting victims of cyberstalking, cyberharassment, and online impersonation through prosecutions and effective laws / Cassie Cox
    Jurimetrics journal of law, science and technology 54(Spring) 2014:
  • Sexting without consent / Delanie Woodlock
    DVRCV Advocate no. 2 Spring/Summer 2014: 28-30
  • Terrorist, traitor, or whistleblower? Offences and protections in Australia for disclosing national security information / Keiran Hardy and George Williams
    University of New South Wales law journal 37(2) 2014: 784-819