Phishing in Cyberspace: Issues and Solutions
Date: August 19, 2006Source: Computer Crime Research Center
By:
... way to emerging computer- mediated communication and virtual reality technologies. Here, we refocus the definition back to the envisaged by Gibson, so that cyberspace refers to the conceptual space within ICTs, rather than the technology itself. See W. GIBSON, Neuromancer (New York, Grafton), [1984]; M. DODGE, Mapping Cyberspace (N.Y, Routeldge),
[2001] p. 1.
20 See J. RUSCH, The compleat cyber – angler : A guide to phishing, Computer Fraud and Security (Jan. 2005).
21 See Phishing Scams Reel in Your Identity. Available at:
22 Ibid.
23 See J. RUSCH, The compleat cyber – angler : A guide to phishing, Computer Fraud and Security (Jan. 2005).
24 Ibid.
25 Ibid.
26 Ibid.
27 See J. RUSCH, The compleat cyber – angler : A guide to phishing, Computer Fraud and Security (Jan. 2005).
28 Available at
29 See J. RUSCH, The compleat cyber – angler : A guide to phishing, Computer Fraud and Security (Jan. 2005).
30 Ibid.
31 Ibid.
32 Ibid.
33 See Spear Phishing, available at :
34 Ibid.
35 See J. RUSCH, The compleat cyber – angler : A guide to phishing, Computer Fraud and Security (Jan. 2005).
36 Ibid.
37 See Phishing techniques, available at
38 Available at
39 Ibid.
40 See Botnet, available at
41 Ibid.
42 Ibid.
43 Available at
44 Ibid.
45 Available at
46 See M. CHAWKI and M. WAHAB, op. cit. p. 26.
47 Ibid.
48 Ibid.
49 Ibid
50 Ibid.
51 See Special Report on Phishing. Available at:
52 Available at
53 Ibid.
54 Available at
55 Ibid.
56 See
57 Ibid.
58 Ibid.
59 Ibid.
60 Available at:
61 Available at :
62 Available at:
63 Available at:
64 Available at:
65 Available at
66 Ibid.
67 Directive on Data Retention (2005/0182/COD); V. SQUARCIALUPI, Lutte de l’Europe contre la Criminalité Economique et le Crime Organisé Transnational, Progrès ou Recul ? (Conseil de l’Europe), [6 avril 2001].
68 Directive 2002/58/EC of the European Parliament and of the Council, concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications).
69 Article 1.1
70 Article 1.2
71 Article 1.2
72 Ibid.
73 Article 6.
74 See N. FERQUSON, Practical Cryptography (N.Y., John Wiley), [2003], p. 8.
75 Article 15.
76 See Aldesco, The Demise of Anonymity: A Constitutional Challenge to the Convention of Cybercrime, available at
77 Ibid. See also S. HOPKINS, Cybercrime Convention: A Positive Beginning to a Long Road Ahead (Journal of High Technology Law), [2004], p. 105.
78 See Convention on Cybercrime, available at
79 See status as of 10/08/2006.Available at:
80 See generally Mike Godwin, International Treaty on Cybercrime Poses Burden on High-Tech Companies, IP Worldwide [Apr. 4, 2001], at
81 Council of Europe, Convention on Cybercrime, European Treaty Series (ETS) no. 185, at:
82 Cybercrime Convention, arts. 2 – 6.
83 Cybercrime Convention, arts. 7 – 8.
84 Ibid art. 9.
85 Ibid art. 10.
86 Ibid art. 22.
87 Ibid art. 35.
88 Ibid art. 2.
89 See Explanatory report.
90 Ibid.
91 See Phishing, available at
92 Ibid.
93 Ibid.
94 For more information, see Voice over IP at the following website:
95 See Explanatory report, op. cit.
96 Cybercrime Convention, art. 19.
97 Ibid.
98 See M. WU, Fighting Phishing at the User Interface (Thesis), available at:
99 Ibid.
100 Ibid.
101 Ibid.
102 See Honeypot available at :
103 Ibid.
104 Ibid.
105 Ibid.
106 Ibid.
107 Available at
108 See
109 Ibid.
110 See
111 Ibid.
112 Ibid.
113 Available at
114 Ibid.
115 See J. TULIANI, The Future of Phishing (Computer fraud and security), [2004], p. 11.
116 Ibid.
Add comment Email to a Friend