Computer Crime Research Center

staff/mohamed.jpg

Phishing in Cyberspace: Issues and Solutions

Date: August 19, 2006
Source: Computer Crime Research Center
By: Mohamed CHAWKI

... computer- mediated communication and virtual reality technologies. Here, we refocus the definition back to the envisaged by Gibson, so that cyberspace refers to the conceptual space within ICTs, rather than the technology itself. See W. GIBSON, Neuromancer (New York, Grafton), [1984]; M. DODGE, Mapping Cyberspace (N.Y, Routeldge),
[2001] p. 1.
20 See J. RUSCH, The compleat cyber – angler : A guide to phishing, Computer Fraud and Security (Jan. 2005).
21 See Phishing Scams Reel in Your Identity. Available at: ( visited 07/08/2006).
22 Ibid.
23 See J. RUSCH, The compleat cyber – angler : A guide to phishing, Computer Fraud and Security (Jan. 2005).
24 Ibid.
25 Ibid.
26 Ibid.
27 See J. RUSCH, The compleat cyber – angler : A guide to phishing, Computer Fraud and Security (Jan. 2005).
28 Available at ( visited 07/08/2006)
29 See J. RUSCH, The compleat cyber – angler : A guide to phishing, Computer Fraud and Security (Jan. 2005).
30 Ibid.
31 Ibid.
32 Ibid.
33 See Spear Phishing, available at : (visited 07/08/2006).
34 Ibid.
35 See J. RUSCH, The compleat cyber – angler : A guide to phishing, Computer Fraud and Security (Jan. 2005).
36 Ibid.
37 See Phishing techniques, available at ( visited 07/08/2006)
38 Available at ( visited 07/08/2006).
39 Ibid.
40 See Botnet, available at ( visited 07/08/2006).
41 Ibid.
42 Ibid.
43 Available at ( visited 07/08/2006).
44 Ibid.
45 Available at ( visited 07/08/2006).
46 See M. CHAWKI and M. WAHAB, op. cit. p. 26.
47 Ibid.
48 Ibid.
49 Ibid
50 Ibid.
51 See Special Report on Phishing. Available at: ( visited 07/08/2006).
52 Available at ( visited 07/08/2006).
53 Ibid.
54 Available at ( visited 07/08/2006).
55 Ibid.
56 See (visited 07/08/2006).
57 Ibid.
58 Ibid.
59 Ibid.
60 Available at: ( visited 07/08/2006)
61 Available at : ( visited 07/08/2006).
62 Available at: (visited 07/08/2006).
63 Available at: (visited07/08/2006).
64 Available at: ( visited 07/08/2006).
65 Available at ( visited 07/08/2006).
66 Ibid.
67 Directive on Data Retention (2005/0182/COD); V. SQUARCIALUPI, Lutte de l’Europe contre la Criminalité Economique et le Crime Organisé Transnational, Progrès ou Recul ? (Conseil de l’Europe), [6 avril 2001].
68 Directive 2002/58/EC of the European Parliament and of the Council, concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications).
69 Article 1.1
70 Article 1.2
71 Article 1.2
72 Ibid.
73 Article 6.
74 See N. FERQUSON, Practical Cryptography (N.Y., John Wiley), [2003], p. 8.
75 Article 15.
76 See Aldesco, The Demise of Anonymity: A Constitutional Challenge to the Convention of Cybercrime, available at (visited 05/08/2006).
77 Ibid. See also S. HOPKINS, Cybercrime Convention: A Positive Beginning to a Long Road Ahead (Journal of High Technology Law), [2004], p. 105.
78 See Convention on Cybercrime, available at (visited 05/08/2006).
79 See status as of 10/08/2006.Available at: (visited 07/08/2006).
80 See generally Mike Godwin, International Treaty on Cybercrime Poses Burden on High-Tech Companies, IP Worldwide [Apr. 4, 2001], at (explaining that this treaty would permit extradition of computer users in other countries); see also S. BRENNER, Cybercrime Metrics: Old Wine, New Bottles (Virginia, Virginia Journal of Law and Technology), [2004].
81 Council of Europe, Convention on Cybercrime, European Treaty Series (ETS) no. 185, at:
(visited 07/08/2006).
82 Cybercrime Convention, arts. 2 – 6.
83 Cybercrime Convention, arts. 7 – 8.
84 Ibid art. 9.
85 Ibid art. 10.
86 Ibid art. 22.
87 Ibid art. 35.
88 Ibid art. 2.
89 See Explanatory report.
90 Ibid.
91 See Phishing, available at (visited 07/08/2006).
92 Ibid.
93 Ibid.
94 For more information, see Voice over IP at the following website:
(visited 07/08/2006).
95 See Explanatory report, op. cit.
96 Cybercrime Convention, art. 19.
97 Ibid.
98 See M. WU, Fighting Phishing at the User Interface (Thesis), available at:
(visited 06/08/2006).
99 Ibid.
100 Ibid.
101 Ibid.
102 See Honeypot available at :
(visited 07/08/2006).
103 Ibid.
104 Ibid.
105 Ibid.
106 Ibid.
107 Available at ( visited 07/08/2006).
108 See ( visited 07/08/2006).
109 Ibid.
110 See ( visited 07/08/2006).
111 Ibid.
112 Ibid.
113 Available at ( visited 07/08/2006).
114 Ibid.
115 See J. TULIANI, The Future of Phishing (Computer fraud and security), [2004], p. 11.
116 Ibid.


Add comment  Email to a Friend

Copyright © 2001-2013 Computer Crime Research Center
CCRC logo