Title page
Contents
Abstract 1
Crime script analysis 3
Methods 5
Results 6
Discussion and conclusion 8
References 14
Appendix 19
Table 1. Search terms used 5
Figure 1. Disrupting suburban burglary at the target selection and completion step 3
Figure 2. Crime script of a phishing attack 4
Table A1. Studies using crime script analysis to investigate fraud facilitated by the internet 19