Sign In / Sign Out
Navigation for Entire University
- ASU Home
- My ASU
- Colleges and Schools
- Map and Locations
Bureau of Justice Statistics. (2014). National Crime Victimization Survey, Identify Theft Supplement. Washington, DC.
CALPIRG (2000). Nowhere to Turn: Victims Speak out on Identity Theft. A CALPIRG/PRC Report—May. Sacramento, Calif.: Privacy Rights Clearinghouse.
Charlton, K., and N. Taylor (2003). “Implementing Business Watch: Problems and Solutions.” Trends and Issues in Criminal Justice, No. 244. Canberra, Australia: Australian Institute of Criminology.
Chermak, S. (1995). Victims in the News: Crime and the American News Media. Boulder, Colo.: Westview Press.
Clarke, R. (2001a). Thefts of and From Cars in Parking Facilities, Problem-Specific Guide No. 10. Problem-Oriented Guides for Police Series. Washington, D.C.: Office of Community Oriented Policing Services, U.S. Department of Justice.
——— (2001b). Shoplifting, Problem-Specific Guide No. 11. Problem-Oriented Guides for Police Series. Washington, D.C.: Office of Community Oriented Policing Services, U.S. Department of Justice.
——— (1997). Situational Crime Prevention: Successful Case Studies. 2nd ed. Guilderland, N.Y.: Harrow and Heston.
Clarke, R., and G. Newman (2002). Modifying Hot Products. London: Home Office.
Delamaire, L., H. Abdou, and J. Pointon (2009). “Credit Card Fraud and Detection Techniques: A Review.” Banks and Bank Systems, 4(2), 57-68.
DiLonardo, R. (1996). “Defining and Measuring the Economic Benefits of Electronic Article Surveillance.” Security Journal 7:3–9.
Duncan, M. (1995). “Partners in Crime Prevention.” Canadian Banker 102(6):25.
Eck, J., and D. Weisburd (eds.) (1995). Crime and Place, Crime Prevention Studies, Vol. 4. Monsey, N.Y.: Criminal Justice Press.
Ekblom, P. (2000). “Future Crime Prevention—A Mindset—A Way of Thinking Systematically About Causes of Crime and Solutions to Crime Problems.”In Foresight (2000) Turning the Corner. London: Department of Trade and Industry, Crime Prevention Panel, DTI/Pub/ 5185/5k/12/00/NP/URN00/136 CD Annex.
Europol. (2012). “Situation Report: Payment Card Fraud in the European Union Perspective of Law Enforcement.” Europol Public Information.
Evansville (Indiana) Police Department (n.d.). “Fraud Awareness.” http://www.evansvillepolice.com/fraud_awareness, https://nextdoor.com/agency-post/nc/stallings/stallings-police-department/fraud-awareness-seminar-for-residents-and-citizens-45767428/. Accessed May 24, 2020.
Finklea, M. (2010). Identify Theft: Trends and Issues. Washington, D.C.: The Federation of American Scientists.
Gara, T. (2014). “An Expensive Hack Attack: Target’s $148 million Breach.” The Wall Street Journal. http://blogs.wsj.com/corporate-intelligence/2014/08/05/an-expensive-hack-attack-targets-148-million-breach/
Geuss, M. (2016). “An ATM Hack and a PIN-pad Hack Show Chip Cards Aren’t Impervious to Fraud.” arsTechnica. https://arstechnica.com/security/2016/08/an-atm-hack-and-a-pin-pad-hack-...
Glenny, M. (2011). DarkMarket: Cyberthieves, Cybercops and You. New York: Knopf Publishing.
Guardian Analytics (2016). “Fraud Update: Mobile RDC Trends.” http://guardiananalytics.com/wp-content/uploads/2016/06/FraudUpdate_MobileRDCTrends_March2016.pdf
Harrington, E. (2015). “OPM Hack Costing Taxpayers $350 Million.” The Washington Free Beacon. http://freebeacon.com/issues/opm-hack-costing-taxpayers-350-million/
Hedayati, A. (2012). “An Analysis of Identity Theft: Motives, Related Frauds, Techniques and Prevention.” Journal of Law and Conflict Resolution, 4(1), 1-12.
Home Office (2000). British Crime Survey. http://www.homeoffice.gov.uk/rds/bcs1.html
Isidore, C. (2013). “8 Charged in $45 million Cybertheft Bank Heist.” CNN. https://money.cnn.com/2013/05/09/technology/security/cyber-bank-heist/index.html
Jackson, J. (1994). “Fraud Masters: Professional Credit Card Offenders and Crime.” Criminal Justice Review 19(1):24–55.
Johnston, C. (2015). “Company Loses $17m in Email Scam.” The Guardian. https://www.theguardian.com/technology/2015/feb/05/company-loses-17m-in-email-scam
Knutsson, J., and E. Kulhorn (1997). “Macromeasures Against Crime: The Example of Check Forgeries.” In R.V. Clarke (ed.), Situational Crime Prevention: Successful Case Studies. 2nd ed. Guilderland, N.Y.: Harrow and Heston.
Krebs, B. (2016). “FBI: $2.3 Billion Lost to CEO Email Scams.” Krebs on Security. https://krebsonsecurity.com/2016/04/fbi-2-3-billion-lost-to-ceo-email-scams/
Lacoste, J., and P. Tremblay (2003). “Crime Innovation: A Script Analysis of Patterns in Check Forgery.” In M. J. Smith and D. B. Cornish (eds.), Theory for Practice in Situational Crime Prevention. Crime Prevention Studies, Vol. 16: 171-198.
Laycock, G., and N. Tilley (1995). Policing and Neighborhood Watch: Strategic Issues. Policy Research Series, Paper 60. London: Home Office.
Levi, M. (2000). “The Prevention of Plastic and Check Fraud: A Briefing Paper.” London: Home Office Research, Development, and Statistics Directorate.
——— (1998). “Organising Plastic Fraud: Enterprise Criminals and the Sidestepping of Fraud Prevention.” The Howard Journal 37(4):423–438.
Levi, M., P. Bissell, and T. Richardson (1991). The Prevention of Check and Credit Card Fraud. Crime Prevention Unit, Paper 26. London: Home Office.
Levi, M., and J. Handley (n.d.). Criminal Justice and the Future of Payment Card Fraud. London: IPPR Criminal Justice Forum.
——— (1998a). The Prevention of Plastic and Check Fraud Revisited. Research Study 182. London: Home Office Research, Development, and Statistics Directorate.
——— (1998b). Prevention of Plastic Card Fraud. Crime Prevention Unit, Paper 71. London: Home Office.
Maremont, M. (1995). “A Magnetic Mug Shot on Your Credit Card?” Business Week, April 24, p. 58.
Masuda, B. (1996). “An Alternative Approach to the Credit Card Fraud Problem.” Security Journal 7(1):15–21.
Mativat, F., and P. Tremblay (1997). “Counterfeiting Credit Cards: Displacement Effects, Suitable Offenders, and Crime Wave Patterns.” British Journal of Criminology 37(2):165–183.
McKinnon, A., and D. Tallam (2002). New Crime Threats from Ecommerce: Theft in the Home Delivery Channel. Foresight Panel Crime Prevention Programme. London: Home Office. www.foresight.gov.uk/index.html.
Musil, S. (2016). “Home Depot Offers $19M to Settle Customers’ Hacking Lawsuit.” CNET Magazine. https://www.cnet.com/news/home-depot-offers-19m-to-settle-customers-hacking-lawsuit/
Pegues, J. (2016). “Authorities Bust International Cyber Theft Ring that Helped Hack Computers.” CBS. http://www.cbsnews.com/news/avalanche-network-international-cyber-theft-ring-busted-by-authorities/
Newman, G., and R. Clarke (2003). Superhighway Robbery: Preventing Ecommerce Crime. London: Willan.
Newton, J. (1994). Police Research Award Scheme: Organized “Plastic” Counterfeiting. London: Home Office.
Painter, K., and N. Tilley (eds.) (1999). Surveillance of Public Space: CCTV, Street Lighting, and Crime Prevention. Crime Prevention Studies, Vol. 10. Monsey, N.Y.: Criminal Justice Press.
Pierce, C. (2003). The Professional’s Guide to CCTF Manual. www.ltctrainingcntr.com/
Santora, M. (2013). “In Hours, Thieves Took $45 Million in ATM Scheme.” The New York Times. http://www.nytimes.com/2013/05/10/nyregion/eight-charged-in-45-million-global-cyber-bank-thefts.html?mcubz=0
Sampson, R. (2002). Acquaintance Rape of College Students, Problem-Specific Guide No. 17. Problem-Oriented Guides for Police Series. Washington, D.C.: Office of Community Oriented Policing Services, U.S. Department of Justice.
Scott, M. (2001). Robbery at Automated Teller Machines, Problem-Specific Guide No. 8. Problem-Oriented Guides for Police Series. Washington, D.C.: Office of Community Oriented Policing Services, U.S. Department of Justice.
Scottsdale Police Department (1995). “A Team Approach to Saving the Check Fraud Bureau from Fiscal Elimination.” Submission for the Herman Goldstein Award for Excellence in Problem-Oriented Policing. Center for Problem-Oriented Policing: http://www.popcenter.org/Library/Goldstein/1995/95-80.pdf.
Sutton, M. (1995). “Supply by Theft: Does the Market for Stolen Goods Play a Role in Keeping Crime Figures High?” British Journal of Criminology 35(3):400–416.
Taylor, N. (2002). “Reporting of Crime Against Small Retail Businesses.” Trends and Issues in Crime and Criminal Justice, No. 242. Canberra, Australia: Australian Institute of Criminology.
Texas Banking (2001). “Thumbprint Signature Program Fights Check Fraud.” Texas Banking 40(1):9.
U.S. Comptroller of the Currency (1999). Check Fraud: A Guide to Avoiding Losses. Washington, D.C.: U.S. Comptroller of the Currency. www.occ.treas.gov/pubs1.htm
U.S. Department of Justice. (2014). “Member of Organized Cybercrime Ring Responsible for $50 Million in Online Identify Theft Sentenced to 115 Months in Prison.” Washington, D.C.: U.S. Department of Justice Office of Public Affairs. https://www.justice.gov/opa/pr/member-organized-cybercrime-ring-responsible-50-million-online-identity-theft-sentenced-115
U.S. General Accounting Office (2002). Identity Theft: Prevalence and Cost Appear to Be Growing. GAO-02-363. March. Washington, D.C.: U.S. General Accounting Office. http://www.consumer.gov/idtheft/reports/gao-d02363.pdf