6. Koontz, Eugene, Jonathan Oliver and Andrew Klein (January 2005). Bayesian Spam Clas-
sification Applied to Phishing Fraud. Proceedings of Spam Conference, Cambridge, MA,
January 21, 2005. Retrieved from http://www.spamconference.org/abstracts.html#Koontz
7. Lebihan, Rachel (26 August 2004). Still Fishing for Answer to Internet Scam. Australian
Financial Review. Retrieved from http://afr.com/articles/2004/08/25/1093246607260.html
8. Litan, Avivah (14 May 2004). Phishing Victims Likely Will Suffer Identity Theft Fraud.
Gartner.
9. Litan, Avivah and John Pescatore (8 June 2004). Catching Phishers Requires More than
Bait. Gartner. Retrieved from http://www.protectingthenet.com/archives/Phishers.pdf
10. mi2g (20 October 2004). Q3 2004: The Rise of Islamist Hacking and Criminal Syndicates.
Retrieved from
http://www.mi2g.com/cgi/mi2g/frameset.php?pageid=http%3A//www.mi2g.
com/cgi/mi2g/press/201004.php
11. Monosson, Rich (14 August 2004). Life Span of a Phishing Site Averages 54 Hours. Net-
craft. Retrieved from http://news.netcraft.com/archives/2004/08/14/life_span_of_a_
phishing_site_averages_54_hours.html
12. Munro, Jay (31 August 2004). Security Watch Alert: Bagle AI Spreads Fast While
Rbot.GR Hijacks Webcams. PC Magazine. Retrieved from
http://www.pcmag.com/article2/
0,1759,1641759,00.asp
13. Ponemon, Larry (24 August 2004). Phishy E-mails and Web Sites: What’s Your Responsi-
bility?” Computerworld. Retrieved from http://www.computerworld.com/
managementtopics/management/story/0,10801,95461,00.html?f=x25>
14. Ramasastry, Anita (16 August 2004). Hooking Phishermen. CNN.com. Retrieved from
http://www.cnn.com/2004/LAW/08/16/ramasastry.phishing/
15. Rusch, Jonathan J. The ‘Social Engineering’ of Internet Fraud. United States Department of
Justice. Retrieved from http://www.isoc.org/isoc/conferences/inet/99/proceedings/3g/
3g_2.htm
16. United States. Cong. Senate. 108th Congress, 1st Session. H.R. 1731, A Bill to Amend
Title 18, United States Code, to Establish Penalties for Aggravated Identity Theft, and for
Other Purposes [introduced in the House of Representatives April 10, 2003]. 108th Con-
gress. Congressional Bills, GPO Access. Retrieved from http://frwebgate.access.gpo.gov/
cgibin/useftp.cgi?IPadress=162.140.64.88&filename=h1731ih.txt&directory=/diskb/wais/
data/108_cong_bills>
17. United States. Cong. Senate. 108th Congress, 2nd Session. S. 2636, A Bill to Criminalize
Internet Scams Involving Fraudulently Obtaining Personal Information, Commonly Known
as Phishing [introduced in the U.S. Senate; July 9, 2004]. 108th Congress. Congressional
Bills, GPO Access. Retrieved from http://frwebgate.access.gpo.gov/cgi-bin/useftp.cgi?
IPaddress=162.140.64.21&filename=s2636is.txt&directory=/diskb/wais/data/108_cong_
bills
18. Van Dyke, James (March 2004).
Online Account Management as the Antidote to Fraud:
Financial Institutions and Billers Must Revamp Their Web Features and Messages
. Javelin
Strategy & Research. Retrieved from http://www.javelinstrategy.com/rp.html
19. Varghese, Sam (10 May 2004). Phishing Spreads in Europe. smh.com.au. Retrieved from
http://www.smh.com.au/articles/2004/05/10/1084041315645.html?oneclick=true
20. Vijayan, Jaikumar (16 August 2004). Antiphishing Tool Adopted by eBay Now Available
to the General Public. Computerworld. Retrieved from http://www.computerworld.com/
securitytopics/security/story/0,10801,95280,00.html
21. Warner, Bernhard (6 May 2004). Billions of “Phishing” E-mails Sent Monthly. Reuters.
Retrieved from http://www.ladlass.com/archives/002196.html
318