AusCERT. (2003). 2003 Australian computer crime and security survey. Auscert Report.
Brammer, M. (2000). New South Wales police service response to matters of interest “ CJC inquiry into release of confidential information . [Report]/ Om. Sydney: NSWPS Internal Affairs.
Caelli, W., Longley, D., & Shain, M. (1989). Information security for managers . New York: Stockton Press.
Chantler, A. (1995). Risk: The profile of the computer hacker PhD Thesis. Curtin Business School, Australia.
Coldwell, R. (1994, February 28-March 2). Perceptions of computer crime. In Proceedings of the Australian Institute of Criminology Conference, Crime Against Business, Melbourne. Retrieved from: http://www.aic.gov.au/conferences/business/coldwell.pdf
Coldwell, R. (1995). Australian attitudes toward legal intervention into hacking. Communications of the ACM , 38 (11).
Dreyfus, S. (1997). Underground: Tales of hacking, madness and obsession on the electronic frontier . Melbourne: Random House.
Enders, M., & Enders, L. (2000, November 11-12). Cops, computers, and the right to privacy in the information age: Unauthorised access and inappropriate disclosure of information complaints in New South Wales. In Proceedings of the Second Australian Institute of Computer Ethics Conference, Canberra, Australia. Retrieved from: http://www.businessit.bf.rmit.edu.au/aice/Main/resources/AICE2000/papers/end.pdf
Hughes, G. (1990). Computer crime: The liability of hackers. Australian Computer Journal , 22 (2).
Kamay, V., & Adams, T. (1992). The 1992 profile of computer abuse in Australia . Melbourne: Australian Computer Abuse Research Bureau (ACARB).
Kingsley, P. (2002). Queen v. Boden . ACISP 2002 Forensic Computer Workshop, Melbourne.
Levy, S. (1994). Hackers: Heroes of the computer revolution . Penguin.
Lopez-Fernandez, M., & Warren, M.J. (2002). An overview of Australian hacking . School of IT technical report “ TRC 12.08. Geelong, Vic.: School of Information Systems, Deakin University.
New South Wales Ombudsman. (1992). NSW Ombudsman 1991-92 Annual Report . Sydney: NSW Ombudsman.
New South Wales Ombudsman. (1993). NSW Ombudsman 1992-93 Annual Report . Sydney: NSW Ombudsman.
New South Wales Ombudsman. (2000). NSW Ombudsman 1999-2000 Annual Report . Sydney: NSW Ombudsman.
Sterling, B. (1993). The hacker crackdown: Law and disorder on the electronic frontier . Bantam.
Valli, C. (2001, November). A byte of prevention is worth a terabyte of remedy. 2nd Working with e-Business (We-B) Conference , Scarborough, Western Australia. Retrieved from: http://bizbytes.bpm.ecu.edu.au/mismedia/pdf/0032.pdf
Valli, C. (2002). The non business of the World Wide Web in three Western Australian organisations. Proceedings of International Network Conference (INC) 2002 , Plymouth, UK.