Australian business assessment of computer user security: a national survey

The Australian Business Assessment of Computer User Security (ABACUS) survey is a nationwide assessment of the prevalence and nature of computer security incidents experienced by Australian businesses. This report presents the findings of the survey which may be used by businesses in Australia to assess the effectiveness of their information technology security measures.

[1]  Kim-Kwang Raymond Choo,et al.  Resource materials on technology-enabled crime , 2008 .

[2]  Russell G. Smith,et al.  Cyber Criminals on Trial: List of figures and tables , 2004 .

[3]  L. Hughes,et al.  Viruses, Worms, and Trojan Horses: Serious Crimes, Nuisance, or Both? , 2007 .

[4]  Susan W. Brenner,et al.  Cybercrime jurisdiction , 2006 .

[5]  K J Spike Quinn Second annual New Zealand computer crime and security survey , 2005 .

[6]  Kim-Kwang Raymond Choo,et al.  Future directions in technology-enabled crime: 2007-09 , 2008 .

[7]  S. Brenner 'At Light Speed' - Attribution and Response to Cybercrime/Terrorism/Warfare , 2007 .

[8]  Rob McCusker,et al.  Transnational organised cyber crime: distinguishing threat from reality , 2007 .

[9]  Benjamin R. Jones,et al.  Comment: Virtual neighborhood watch: Open source software and community policing against cybercrime , 2007 .

[10]  Tony Krone Concepts and terms , 2005 .

[11]  Gregor H Allan Responding to Cybercrime: A Delicate Blend of the Orthodox and the Alternative , 2005 .

[12]  Dennis J. Turner,et al.  Symantec Internet Security Threat Report Trends for July 04-December 04 , 2005 .

[13]  Russell G. Smith Crime Control in the Digital Age: An exploration of Human Rights Implications , 2007 .

[14]  Kiah Rollings,et al.  Counting the costs of crime in Australia: a 2005 update , 2008 .

[15]  Peter Grabosky,et al.  Requirements of prosecution services to deal with cyber crime , 2007 .

[16]  Kim-Kwang Raymond Choo,et al.  The future of technology-enabled crime in Australia , 2007 .

[17]  Darin Walker,et al.  Faceless-Oriented Policing: Traditional Policing Theories are Not Adequate in a Cyber World , 2006 .

[18]  N. Chantler Book Review of Cybercrime – The Reality of the Threat , 2007 .

[19]  Kim-Kwang Raymond Choo Organised crime groups in cyberspace: a typology , 2008 .

[20]  D. Marron,et al.  ‘Alter Reality’ Governing the Risk of Identity Theft , 2007 .

[21]  M. White,et al.  Assessing Our Knowledge of Identity Theft , 2008 .

[22]  M. Yar The Novelty of ‘Cybercrime’ , 2005 .

[23]  D. Wall Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace , 2007 .

[24]  Tom Cross,et al.  Emerging Cyber Threats Report for 2009 , 2008 .