[1]
The European Multidisciplinary Platform Against Criminal Threats (EMPACT), is a structured multidisciplinary co-operation platform of the relevant Member States, EU Institutions and Agencies, as well as third countries and organisations (public and private) to address prioritised threats of serious international and organised crime.
[2]
i.e. crimes which would not exists without the advent of the internet.
[3]
i.e. crimes for which the scope and impact are enhanced by the internet but do not require it to operate
[4]
The percentage of the population that are internet users
[57]
Hosting services that by their nature or geographical location are largely immune to takedown requests by LE and which will knowingly host dubious content.
[61]
SEPA is an EU initiative to harmonise payments in euro the objective of which is to increase security and speed of financial transfers. As of April 2014, SEPA consists of all 28 EU
[258]
Directive 2013/40/EU of the European Parliament and of the Council of 12 August 2013 on attacks against information systems and replacing Council Framework Deciion 2005/222/JHA.
[259]
Communication from the Commission to the European Parliament, the Council, the European Ecomonic and Social Committee and the Committee of the regions – Delivering an area of freedom, security and justice for Euope’s citizens, Action Plan Implementing the Stockholm Programme, COM 2010, 171.
[260]
Cybercrime/e-Crimes Model Legislative Text, developed under the EU co-funded project HIPCAR (Harmonization of ICT Policies, Legislation and Regulatory Procedures in the Caribbean.
[261]
Salvador Declaration on Comprehensive Strategies for Global Challenges: Crime Prevention and Criminal Justice Systems and Their Development in a Changing World.
[262]
UNODC Comprehensive Study on Cybercrime, 2013.
[263]
Directive 2011/92/EU of the European Parliament and of the Council of 13 December 2011 on combating the se
xual abuse and sexual exploitation of children and child pornography, and replacing Council Framework Decision 2004/68/JHA
[264]
Directive C/DIR. 1/08/11 on Fighting Cyber Crime Within ECOWAS.
[270]
Berry, M., & Aiken, M. (2014). In Search of Annie: A Study of Viewers’ Feedback to the Crime Documentaries Highlighting Famous Irish Murder and Missing Persons.
Universal Journal of Psychology, 2
(1), 41–46.
[271]
Belfast 2014: 4th World Cyber Security Technology Research Summit. (2014). In
Centre for Secure Information Technologies, Queens University Belfast , p. 8.
[272]
Suler, J. (2004). The online disinhibition effect.
CyberPsychology& Behavior, 7
(3), 321–326. doi:10.1089/1094931041291295
[284]
Rogers, M. K., Seigfried, K., & Tidke, K. (2006). Self-reported computer criminal behavior: A psychological analysis.
Digital Investigation, 3, 116–120. doi:10.1016/j.diin.2006.06.002, p. S119
[285]
Walther, J. B. (2009). Theories, Boundaries, and All of the Above.
Journal of Computer-Mediated Communication, 14
(3), 748–752. doi:10.1111/j.1083-6101.2009.01466.x
[286]
Slane, A. (2007). Democracy, social space, and the internet.
University of Toronto Law Journal, 57
(1), 81–105. doi:10.1353/tlj.2007.0003, p. 97
[288]
Joinson, A. N. (2001). Self-disclosure in computer-mediated communication : The role of self-awareness and visual anonymity, 192
(May 1999), 177–192.
[289]
Takatalo, J., Nyman, G., & Laaksonen, L. (2008). Components of human experience in virtual environments. Computers in Human Behavior, 24(1), 1–15. doi:10.1016/j.chb.2006.11.003
[290]
Riva, G., Mantovani, F., Capideville, C. S., Preziosa, A., Morganti, F., Villani, D., … Alcañiz, M. (2007). Affective interactions using virtual reality: the link between presence and emotions. Cyberpsychology & Behavior : The Impact of the Internet, Multimedia and Virtual Reality on Behavior and Society, 10(1), 45–56. doi:10.1089/cpb.2006.9993
[291]
Gibbs, J. L., Ellison, N. B., & Heino, R. D. (2006). Self-Presentation in Online Personals: The Role of Anticipated Future Interaction, Self-Disclosure, and Perceived Success in Internet Dating. Communication Research, 33(2), 152–177. doi:10.1177/0093650205285368
[292]
Barnes, S. B. (2006). A privacy paradox: Social networking in the United States.
First Monday, 11
(9), 1–11
[295]
Mottram, A. J., & Fleming, M. J. (2009). Extraversion, impulsivity, and online group membership as predictors of problematic internet use.
Cyberpsychology& Behavior
: The Impact of the Internet, Multimedia and Virtual Reality on Behavior
and Society, 12
(3), 319–21. doi:10.1089/cpb.2007.0170
[296]
Buckels, E. E., Trapnell, P. D., & Paulhus, D. L. (2014). Trolls just want to have fun.
Personality and Individual Differences. doi:10.1016/j.paid.2014.01.016
[297]
American Psychiatric Association (2013). Diagnostic and Statistical Manual of Mental Disorders (Fifth ed.). Arlington, VA: American Psychiatric Publishing. ISBN 978-0-89042-555-8.
[304]
Taylor, P. A. (2003) 'Maestros or misogynists? Gender and the social construction of hacking', in Y. Jewkes (ed.) Dot.cons:
Crime, Deviance and Identity on the Internet. Cullompton, Devon (UK): Willan Publishing.
[305]
Canter,D., & Youngs, D. (2009).
Investigative Psychology: Offender Profiling and the Analysis of Criminal Action
. Chichester: Wiley
[306]
Alison, L., & Kebbell, M. (2006).
Offender profiling: Limits and potential. In M. Kebbell, & G. Davies (Eds.), Practical Psychology for Forensic Investigations and Prosecutions. Chichester: Wiley.
[308]
Coleman, E. G., & Golub, a. (2008). Hacker practice: Moral genres and the cultural articulation of liberalism.
Anthropological Theory, 8
(3), 255–277. doi:10.1177/1463499608093814
[311]
Barak, A., & Suler, J. (2008). Reflections on the psychology and social science ofcyberspace. In A. Barak (Ed.), Psychological aspects of cyberspace: Theory, research, applications, 1–12. Cambridge, UK: Cambridge University Press.
[314]
Berry, M. J., Bainbridge, S., & Aiken, M. P. (2011). Cyber stalking in 18-30 year olds in Manchester. Paper presented at the International Crime, Media & Popular Cultures Conference, Indiana State University, US. 26th - 28th September 2011.
[315]
Maughan, cited in Belfast 2014, ibid., p. 6.
[324]
See Drewer, D. / Ellermann, J., Europol’s data protection framework as an asset in the fight against cybercrime, In: ERA Forum (2012) 13, P. 381-395 for a more comprehensive description.