1. Benner J, Givens B, Mierzwinski E. Nowhere to turn: victims speak out on identity theft. CALPIRG/Privacy Rights Clearinghouse Report; May 2000.
2. Canavan J. The evolution of malicious IRC bots. White paper, symantec security response. Available from: http://securityresponse.symantec.com/avcenter/reference/the.evolution.of.malicious.irc.bots.pdf; 2005.
3. Ceaparu I, Demner D, Hung H, Zhao H. In web we trust: establishing strategic trust among online customers. Available from: http://www.otal.umd.edu/SHORE2001/webTrust/index.html; 2001 [accessed 09.08.06].
4. Security and privacy in a pervasive world, EURESCOM Summit 2005;Clarke,2005
5. Foresight. Cybertrust and crime prevention project executive summary. Available from: http://www.foresight.gov.uk/Previous_Projects/Cyber_Trust_and_Crime_Prevention/Reports_and_Publications/Executive_Summary/Executive_Summary.html; 2005 [accessed 26.08.06].