1. Allison, S., Schuck, A. and Lersch, K. (2005) Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics. Journal of Criminal Justice 33(1): 19–29.
2. Anderson, K. (2006) Who are the victims of identity theft? The effect of demographics. Journal of Public Policy and Marketing 25(2): 106–171.
3. Anonymous. (2015) Ashley Madison hack has exposed an enormous security breach, Sydney Morning Herald, August, http://www.smh.com.au/digital-life/digital-life-news/ashley-madison-hack-has-exposed-an-enormous-security-breach-20150820-gj42ph.html , accessed 24 August 2015.
4. Australasian Centre for Policing Research. (2006) Standardisation of definitions of identity crime terms: A step towards consistency. Report Series 145.3, http://www.aic.gov.au/crime_types/economic/idfraud.html , accessed 9 April 2015.
5. Australian Government. (2013) National identity security strategy. Report, http://www.ag.gov.au/RightsAndProtections/IdentitySecurity/Documents/National%20Identity%20Security%20Strategy%202012.PDF , accessed 9 April 2015.