I think you described a regular double spend attack, where is Finney attack involves pre-mined block, and it is not detectable.
Yeah, now that I reflect on it for a long while I believed that Finney attack is a double-spend attack, and that there are just two variations of it, which made things a bit confusing.
sure. but when you're explaining how Bitcoin works to an average Joe, its much simpler to say it it based on math where 2+2 always equals 4.
try explaining it using "cryptography". the discussion all of a sudden gets way more complicated to the point of the listener giving up.
Well, it's not an article aimed at general public, but rather people that know a bit about computer science, or want to know more and are ready to look into some things they have doubts with.
This kinda reminds me of this article:
http://blogs.discovermagazine.com/badastronomy/2011/10/19/scientists-are-from-mars-the-public-is-from-earth/I shall be reading this

Where is the accompanying CD?
The accompanying CD is in my school's archive, and with three other printed copies of the thesis. As I said in the original post, I'll upload its contents eventually (it's mainly a lot of code in Google Go, a bit messy).