This course was written by Arosha K. Bandara.
Except for third party materials and otherwise stated in the acknowledgements section, this content is made available under a.
The material acknowledged below is Proprietary and used under licence (not subject to Creative Commons Licence). Grateful acknowledgement is made to the following sources for permission to reproduce material in this course:
Figure 1 © Michael Smith (via Getty images)
Figure 2 © bioraven (via Shutterstock)
Figure 3 © Mark Horn (via Getty Images)
Figure 4 © bluebird13 (via iStock Photo)
Figure 5 © olhainsight (via iStock Photo)
Figure 6 © powerofforever (via iStock Photo)
Figure 7 © Bet_Noire (via iStock Photo)
Figure 8 © Scorpions and Centaurs (via Flickr.com)
Figure 9 © no_limit_pictures (via iStock Photo)
Figure 11 © chrisroll (via iStock Photo)
Figure 12 © Pashalgnatov (via iStock Photo)
Figure 13 © Catrina Genovese (via Getty Images)
Figure 14 © John Lund (via Getty Images)
2 extract (including transcript) from Datababy: How easy is it to become a phone hacker? © Channel4/ITN
Every effort has been made to contact copyright owners. If any have been inadvertently overlooked, the publishers will be pleased to make the necessary arrangements at the first opportunity.
Don't miss out:
1. Join over 200,000 students, currently studying with The Open University – http://www.open.ac.uk/ choose/ ou/ open-content
2. Enjoyed this? Find out more about this topic or browse all our free course materials on OpenLearn – http://www.open.edu/ openlearn/
3. Outside the UK? We have students in over a hundred countries studying online qualifications – http://www.openuniversity.edu/ – including an MBA at our triple accredited Business School.