Further Reading

Chapter 1

Chapter 2

  • Barbara, J. L. (2009). The case against licensing for digital forensic examiners.
  • Cross, C. (2015). No laughing matter: Blaming the victim of online fraud. International , Review of Victimology 21: 187-204.
  • Cockcroft, T., Shan-A-Khuda, M., Schreuders, Z. C., & Trevorrow, P. (2021). Police cybercrime training: perceptions, pedagogy, and policy. Policing: A Journal of Policy and Practice, 15(1), 15-33.
  • Curtis, J., & Oxburgh, G. (2022). Understanding cybercrime in ‘real world’policing and law enforcement. The Police Journal, 0032258X221107584.
  • Goodman, M. D. (1997). Why the police don’t care about computer crime. Harvard Journal of Law and Technology, 10, 465–494.
  • Hinduja, S. (2007). Computer crime investigations in the United States: Leveraging knowledge from the past to address the future. International Journal of Cyber Criminology, 1, 1–26.
  • Holt, T. J., Burruss, G. W., and Bossler, A. M. (2015). Policing cybercrime and cyberterror. Raleigh, NC: Carolina Academic Press.
  • Horgan, S., Collier, B., Jones, R., & Shepherd, L. (2021). Re-territorialising the policing of cybercrime in the post-COVID-19 era: towards a new vision of local democratic cyber policing. Journal of Criminal Psychology, 11(3), 222-239.
  • Kessler International. (2017). Computer forensics and forensic accounting licensing survey.
  • Marcum, C., Higgins, G. E., Freiburger, T. L., & Ricketts, M. L. (2010). Policing possession of child pornography online: Investigating the training and resources dedicated to the investigation of cyber crime. International Journal of Police Science & Management, 12, 516–525.
  • Stambaugh, H., Beaupre, D. S., Icove, D. J., Baker, R., Cassady, W., & Williams, W. P. (2001). Electronic Crime Needs Assessment for State and Local Law Enforcement. Washington, DC: National Institute of Justice, U. S. Department of Justice.

Chapter 3

  • Holt, T. J. (2007) “Subcultural Evolution? Examining the Influence of On- and Off-line Experiences on Deviant Subcultures”. Deviant Behavior, 28, 171–198.
  • Jordan, T. & Taylor, P. (2004) Hacktivism and Cyber Wars. London: Routledge.
  • Levy, S. (2001). Hackers: Heroes of the Computer Revolution. New York: Penguin.
  • Sarkar, S., Almukaynizi, M., Shakarian, J., & Shakarian, P. (2019). Predicting enterprise cyber incidents using social network analysis on dark web hacker forums. The Cyber Defense Review, 87-102.
  • Schell, B. H. & Dodge, J. L. (2002) The Hacking of America: Who’s Doing it, Why, and How. Westport, CT: Quorum Books.
  • Shimomura, T. & Markoff, J. (1996) Takedown: The Pursuit and Capture of Kevin Mitnick, America’s Most Wanted Computer Outlaw—by the Man Who Did It. New York: Hyperion.
  • Smith, L. A., Chowdhury, M. M., & Latif, S. (2022). Ethical hacking: Skills to fight cybersecurity threats. EPiC Series in Computing, 82, 102-111.
  • Steinmetz, K. F. (2015). "Craft(y)ness: An Ethnographic Study of Hacking". British Journal of Criminology, 55,125–145.
  • Steinmetz, K. F., Holt, T. J., & Holt, K. M. (2020). Decoding the binary: Reconsidering the hacker subculture through a gendered lens. Deviant Behavior, 41(8), 936-948.
  • Taylor, P. (1999). Hackers: Crime in the Digital Sublime. London: Routledge.

Chapter 4

  • Bossler, A. M. & Holt, T. J. (2009) “On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory”. International Journal of Cyber Criminology, 3, 400–420.
  • Cohen, R. (2019). Banking trojans: A reference guide to the malware family tree. F5 Labs.
  • Davis, M. A., Bodmer, S. M., & LeMasters, A. (2009) Hacking exposed: Malware & Rootkits, Secrets & Solutions. Trenton, NJ: McGraw Hill.
  • Elisan, C. C. (2012) A Beginner's Guide to Malware, Rootkits, and Botnets. Trenton, NJ: McGraw Hill.
  • Gordon, S. & Ma, Q. (2003) "Convergence of Virus Writers and Hackers: Factor or Fantasy". Cupertine, CA: Symantec Security White Paper.
  • Holt, T. J., van Wilsem, J., van de Weijer, S., & Leukfeldt, R. (2020). Testing an integrated self-control and routine activities framework to examine malware infection victimization. Social Science Computer Review, 38(2), 187-206.
  • Liska, A. (2023). Ransoware: Understand. Prevent. Recover, 2nd Edition. New York: ActualTech Media.
  • Michael, M. (2017) "State of Cyber Security". Cyber Security Insights, F-Secure, Business Security Insider.
  • Ngo, F. T. & Paternoster, R. (2011) “Cybercrime Victimization: An Examination of Individual- and Situational-Level Factors". International Journal of Cyber Criminology, 5, 773–793.
  • Trivedi, H., & Broadhurst, R. (2020). Malware in spam email: Risks and trends in the Australian Spam Intelligence Database. Trends and Issues in Crime and Criminal Justice [electronic resource], (603), 1-18.

Chapter 6

  • Buil-Gil, D., & Zeng, Y. (2022). Meeting you was a fake: investigating the increase in romance fraud during COVID-19. Journal of Financial Crime, 29(2), 460-475.
  • Button, M., & Cross, C. (2017). Cyber frauds, scams and their victims. London: Taylor & Francis.
  • Cross, C., Dragiewicz, M., & Richards, K. (2018). Understanding romance fraud: Insights from domestic violence research. The British Journal of Criminology, 58(6), 1303-1322.
  • Cross, C., & Gillett, R. (2020). Exploiting trust for financial gain: An overview of business email compromise (BEC) fraud. Journal of Financial Crime, 27(3), 871-884.
  • Harrell, E. (2014). "Victims of Identity Theft, 2014". Bureau of Justice, (NCJ 248991). , www.bjs.gov/index.cfm?ty=pbdetail&iid=5408
  • Holt, T. J., Smirnova, O., & Chua, Y. T. (2016). Data thieves in action: Examining the international market for stolen personal information. Springer.,
  • Kemp, S., Miró-Llinares, F., & Moneva, A. (2020). The dark figure and the cyber fraud rise in Europe: Evidence from Spain. European Journal on Criminal Policy and Research, 26(3), 293-312.,
  • Lavorgna, A. (2015). The online trade in counterfeit pharmaceuticals: new criminal opportunities, trends and challenges. European Journal of Criminology, 12(2), 226-241.
  • Mitnick, K. D. & Simon, W. L. (2002). The Art of Deception: Controlling the Human Element of Security. New York: Wiley Publishing.,
  • Reyns, B. W. (2013) "Online Routines and Identity Theft Victimization: Further Expanding Routine Activity Theory Beyond Direct-Contact Offenses". Journal of Research in Crime and Delinquency, 50, 216–238.

Chapter 7

  • Campbell, R., Sanders, T., Scoular, J., Pitcher, J., & Cunningham, S. (2019). Risking safety and rights: online sex work, crimes and ‘blended safety repertoires’. The British journal of sociology, 70(4), 1539-1560.
  • DeCurtis, C. (2003) “Prostitution, Sex Tourism on the Internet: Whose Voice is Being Heard?” Computers and Society, 33, 3–11.
  • Denney, A. S. & Tewksbury, R. (2013) “Characteristics of Successful Personal Ads in a BDSM Online Community”. Deviant Behavior, 34, 153–168.
  • Deshotels, T. H., & Forsyth, C. J. (2020). Conjuring, expanding, and blurring boundaries of sexual subcultures: The grounding of the fluid. Deviant Behavior, 41(6), 814-823.
  • Edelman, B. (2009) "Red Light States: Who Buys Online Adult Entertainment?" Journal of Economic Perspectives, 23, 209–220.
  • Gunnarsson, L., & Strid, S. (2022). Chemistry or service? Sugar daddies’(re) quest for mutuality within the confines of commercial exchange. The Journal of Sex Research, 59(3), 309-320.
  • Holt, T. J & Blevins, K. R. (2007) “Examining Sex Work From the Client’s Perspective: Assessing Johns Using Online Data”. Deviant Behavior, 28, 333–354.
  • Lane, F. S. (2000) Obscene Profits: The Entrepreneurs of Pornography in the Cyber Age. New York: Routledge.
  • Milrod, C. & Monto, M.A. (2012) "The Hobbyist and the Girlfriend Experience: Behaviors and Preferences of Male Customers of Internet Sexual Service Providers”. Deviant Behaviors, 33, 792–810.
  • Nelson, A. J., Hausbeck Korgan, K., Izzo, A. M., & Bessen, S. Y. (2020). Client desires and the price of seduction: Exploring the relationship between independent escorts’ marketing and rates. The Journal of Sex Research, 57(5), 664-680.
  • Snow, N. M., Radatz, D., & Rhodes, T. (2022). The marketing of female escorts: A gendered perspective of online companionship advertisements. International journal of offender therapy and comparative criminology, 66(10-11), 1134-1155.
  • Weitzer, R. (2014) “The Social Ecology of Red-Light Districts: A Comparison of Antwerp and Brussels”. Urban Affairs Review, 50, 702–730.

Chapter 8

  • Afana, E., Michalski, D., Bright, D., Frank, R., Hole, M., Westlake, B., ... & Brewer, R. (2022). Developing automated methods to detect and match face and voice biometrics in child sexual abuse videos. Trends and Issues in Crime and Criminal Justice [electronic resource], (648), 1-15.
  • Babchishin, K. M., Hanson, R. K., & VanZuylen, H. (2015). "Online Child Pornography Offenders are Different: A Meta-analysis of the Characteristics of Online and Offline Sex Offenders Against Children". Archives of Sexual Behavior, 44, 45–66.
  • Dowling, C., Morgan, A., & Pooley, K. (2021). Reoffending among child sexual offenders. Trends and Issues in Crime and Criminal Justice [electronic resource], (628), 1-16.
  • Durkin, K. F. (1997) "Misuse of the Internet by Pedophiles: Implications for Law Enforcement and Probation Practice". Federal Probation, 14, 14–18.
  • Holt, T. J., Blevins, K. R., & Burkert, N. (2010) "Considering the Pedophile Subculture On-line". Sexual Abuse: Journal of Research and Treatment, 22, 3–24.
  • Jenkins, P. (2001) Beyond Tolerance: Child Pornography on the Internet. New York: New York University Press.
  • Krone, T. (2005) "Does Thinking Make It So? Defining Online Child Pornography Possession Offenses". Trends & Issues in Crime and Criminal Justice, 299.
  • Leclerc, B., Drew, J., Holt, T. J., Cale, J., & Singh, S. (2021). Child sexual abuse material on the darknet: A script analysis of how offenders operate. Trends and issues in crime and criminal justice, (627), 1-14.
  • Moritz, D., & Christensen, L. S. (2020). When sexting conflicts with child sexual abuse material: the legal and social consequences for children. Psychiatry, Psychology and Law, 27(5), 815-830.
  • Seigfried, K., Lovely, R., & Rogers, M. (2008) "Self-Reported Internet Child Pornography Users: A Psychological Analysis". International Journal of Cyber Criminology, 2(1), 286–297.
  • Teunissen, C., Boxall, H., Napier, S., & Brown, R. (2022). The sexual exploitation of Australian children on dating apps and websites. Trends and Issues in Crime and Criminal Justice.

Chapter 9

  • Catalano, S. (2012) "Stalking Victims in the United States - Revised".Washington, DC: US Department of Justice.
  • Chun, J., Lee, J., Kim, J., & Lee, S. (2020). An international systematic review of cyberbullying measurements. Computers in human behavior, 113, 106485.
  • DeVoe, J. F., Bauer, L., & Hill, M. R. (2011) "Student Victimization in U.S. Schools: Results From the 2009 School Crime Supplement to the National Crime Victimization Survey". Washington, DC: National Center for Educational Statistics.
  • Fissel, E. R. (2021). The reporting and help-seeking behaviors of cyberstalking victims. Journal of interpersonal violence, 36(11-12), 5075-5100.
  • Gámez-Guadix, M., & Mateos-Pérez, E. (2019). Longitudinal and reciprocal relationships between sexting, online sexual solicitations, and cyberbullying among minors. Computers in Human Behavior, 94, 70-76.
  • Hinduja, S. & Patchin, J. W. (2012) Cyberbullying Prevention and Response: Expert Perspectives. New York: Routledge. ,
  • Hinduja, S., & Patchin, J. W. (2019). Connecting adolescent suicide to the severity of bullying and cyberbullying. Journal of school violence, 18(3), 333-346.
  • Jones, L. M., Mitchell, K. J., & Finkelhor, D. (2012) “Trends in Youth Internet Victimization: Findings From Three Youth Internet Safety Surveys 2000–2010”. Journal of Adolescent Health, 50, 179–186. ,
  • Patchin, J. W., & Hinduja, S. (2022). Cyberbullying among tweens in the United States: Prevalence, impact, and helping behaviors. The Journal of Early Adolescence, 42(3), 414-430.
  • Priebe, G., Mitchell, K. J., & Finkelhor, D. (2013). "To Tell or Not to Tell? Youth’s Responses to Unwanted Internet Experiences". Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 7, 1–20.
  • Reyns, B. W. (2019). Online pursuit in the twilight zone: Cyberstalking perpetration by college students. Victims & Offenders, 14(2), 183-198.
  • Wilson, C., Sheridan, L., & Garratt-Reed, D. (2022). What is cyberstalking? A review of measurements. Journal of interpersonal violence, 37(11-12), NP9763-NP9783.
  • Wolak, J.,Finkelhor, D., & Mitchell, K. (2012) Trends in Law Enforcement Responses to Technology-Facilitated Child Sexual Exploitation Crimes: The Third National Juvenile Online Victimization Study (NJOV-3). Durham, NH: Crimes Against Children Research Center.

Chapter 10

  • Backhaus, S., Gross, M. L., Waismel-Manor, I., Cohen, H., & Canetti, D. (2020). A cyberterrorism effect? Emotional reactions to lethal attacks on critical infrastructure. Cyberpsychology, Behavior, and Social Networking, 23(9), 595-603.
  • Berger, J. M. & Morgan, J. (2015) The ISIS Twitter Census: Defining and Describing the Population of ISIS Supporters on Twitter. The Brookings Institute.
  • Britz, M. T. (2010) "Terrorism and Technology: Operationalizing Cyberterrorism and Identifying Concepts". In T. J. Holt (Ed.), Crime On-Line: Correlates, Causes, and Context. Raleigh, NC: Carolina Academic Press, 193–220.
  • Costello, M., Barrett-Fox, R., Bernatzky, C., Hawdon, J., & Mendes, K. (2020). Predictors of viewing online extremism among America’s youth. Youth & Society, 52(5), 710-727.
  • Holt, T. J., Stonhouse, M., Freilich, J., & Chermak, S. M. (2021). Examining ideologically motivated cyberattacks performed by far-left groups. Terrorism and Political Violence, 33(3), 527-548.
  • Jarvis, L., & Macdonald, S. (2015). What is cyberterrorism? Findings from a survey of researchers. Terrorism and Political Violence, 27(4), 657-678.
  • Lee, C. S., Choi, K. S., Shandler, R., & Kayser, C. (2021). Mapping global cyberterror networks: an empirical study of al-Qaeda and ISIS cyberterrorism events. Journal of Contemporary Criminal Justice, 37(3), 333-355.
  • Macdonald, S., Jarvis, L., & Lavis, S. M. (2022). Cyberterrorism today? Findings from a follow-on survey of researchers. Studies in Conflict & Terrorism, 45(8), 727-752.
  • Martin, G. (2017). Understanding terrorism: Challenges, perspectives, and issues.
  • Pollitt, M. M. (1998) "Cyberterrorism – Fact or Fancy?" Computer Fraud & Security, 2, 8–10.
  • Schmid, A. P. & Jongman, A. J. (2005) Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories, & Literature. New Brunswick, NJ: Transaction Publishers.
  • Spaaij, R., & Hamm, M. S. (2015). Key issues and research agendas in lone wolf terrorism. Studies in Conflict & Terrorism, 38(3), 167-178.

Chapter 11

Chapter 12

  • Aldridge, J., & Décary-Hétu, D. (2015). A response to Dolliver's “Evaluating drug trafficking on the Tor Network: Silk Road 2, the sequel”. International Journal of Drug Policy, 26(11), 1124-1125.
  • Bergeron, A., Décary-Hétu, D., & Giommoni, L. (2020). Preliminary findings of the impact of COVID-19 on drugs crypto markets. International Journal of Drug Policy, 83, 102870.
  • Décary-Hétu, D., & Giommoni, L. (2017). Do police crackdowns disrupt drug cryptomarkets? A longitudinal analysis of the effects of Operation Onymous. Crime, Law and Social Change, 67, 55-75.
  • Demant, J., Munksgaard, R., Décary-Hétu, D., & Aldridge, J. (2018). Going local on a global platform: A critical analysis of the transformative potential of cryptomarkets for organized illicit drug crime. International Criminal Justice Review, 28(3), 255-274.
  • Goodison, S. E., Woods, D., Barnum, J. D., Kemerer, A. R., & Jackson, B. A. (2019). Identifying law enforcement needs for conducting criminal investigations involving evidence on the dark web. RAND.
  • Jiang, C., Foye, J., Broadhurst, R., & Ball, M. (2021). Illicit firearms and other weapons on darknet markets. Trends and Issues in Crime and Criminal Justice [electronic resource], (622), 1-20.
  • Morselli, C., Décary-Hétu, D., Paquet-Clouston, M., & Aldridge, J. (2017). Conflict management in illicit drug cryptomarkets. International Criminal Justice Review, 27(4), 237-254.
  • Perdue, R. T. (2021). Who Needs the Dark Web? Exploring the Trade in Critically Endangered Plants on eBay. American Journal of Criminal Justice, 46(6), 1006-1017.
  • Roddy, A. L., & Holt, T. J. (2022). An assessment of Hitmen and contracted violence providers operating online. Deviant Behavior, 43(2), 139-151.
  • Tzanetakis, M., Kamphausen, G., Werse, B., & von Laufenberg, R. (2016). The transparency paradox. Building trust, resolving disputes and optimising logistics on conventional and online drugs markets. International Journal of Drug Policy, 35, 58-68.

Chapter 13

  • Back, S., Soor, S., & LaPrade, J. (2018). Juvenile hackers: An empirical test of self-control theory and social bonding theory. International Journal of Cybersecurity Intelligence & Cybercrime, 1(1), 40-55.
  • Bossler, A. M. (2021). Perceived formal and informal sanctions in deterring cybercrime in a college sample. Journal of Contemporary Criminal Justice, 37(3), 452-470.
  • Bossler, A. M. & Holt, T. J. “The Effect of Self Control on Victimization in the Cyberworld”. Journal of Criminal Justice, 38, 227–236.
  • Burruss, G. W., Holt, T. J., & Bossler, A. (2019). Revisiting the suppression relationship between social learning and self-control on software piracy. Social Science Computer Review, 37(2), 178-195.
  • Goldsmith, A. & Brewer, R. (2015) "Digital Drift and the Criminal Interaction Order". Theoretical Criminology, 19, 112–130.
  • Higgins, G. E. (2005) “Can Low Self-Control Help with the Understanding of the Software Piracy Problem?” Deviant Behavior, 26, 1–24.
  • Holt, T. J. & Bossler, A. M. (2009) “Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization”. Deviant Behavior 30, 1–25.
  • Ingram, J. R & Hinduja, S. (2008) “Neutralizing Music Piracy: An Empirical Examination”. Deviant Behavior, 29, 334–366.
  • Kerstens, J. & Jansen, J. (2016). "The Victim-Perpetrator Overlap in Financial Cybercrime: Evidence and Reflection on the Overlap of Youth’s On-line Victimization and Perpetration". Deviant Behavior, 37(5), 585–600.
  • Ngo, F. T. & Paternoster, R. (2011) “Cybercrime Victimization: An Examination of Individual- and Situational-Level Factors”. International Journal of Cyber Criminology, 5, 773–793.
  • Pratt, T. C. , Holtfreter, K., & Reisig, M. D. (2010) “Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory". Journal of Research in Crime and Delinquency, 47, 267–296.
  • Reyns, B. W., Fisher, B. S., Bossler, A. M., & Holt, T. J. (2019). Opportunity and self-control: Do they predict multiple forms of online victimization?. American Journal of Criminal Justice, 44, 63-82.
  • Rogers, M., Smoak, N. D., & Liu, J. (2006) “Self-Reported Deviant Computer Behavior: A Big-5 Moral Choice, and Manipulative Exploitive Behavior Analysis”. Deviant Behavior, 27, 245–268.
  • Skinner, W. F. & Fream, A. F. (1997) “A Social Learning Theory Analysis of Computer Crime Among College Students”. Journal of Research in Crime and Delinquency, 34, 495–518.
  • Wolfe, S. E., Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2016). Routine cell phone activity and exposure to sext messages: Extending the generality of routine activity theory and exploring the etiology of a risky teenage behavior. Crime & Delinquency, 62(5), 614-644.
  • Yar, M. (2005) "The Novelty of Cybercrime”. European Journal of Criminology, 2, 407–427.

Chapter 14

  • Casey, E. (2019). The chequered past and risky future of digital forensics. Australian journal of forensic sciences, 51(6), 649-664.
  • Cowen, D. (2013) Computer Forensics InfoSec Pro Guide. Trenton, NJ: McGraw-Hill.
  • Drobotov, S., Pertsev, R., Hrab, M., Fedytnyk, V., Moroz, S., & Kikalishvili, M. (2023). Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime. Journal of Information Technology Management, 15(1), 135-162.
  • Ferraro, M. & Casey, E. (2005) Investigating Child Exploitation and Pornography: The Internet, the Law, and Forensic Science. New York, NY: Elsevier Academic Press.
  • Gogolin, G. (2021). Digital forensics explained, 2nd Edition. New York: CRC Press.
  • National Institute of Justice. (2008) Electronic Crime Scene Investigation: A Guide for First Responders, 2nd ed., Washington, DC: NCJ 219941.
  • Nelson, B., Phillips, A., & Steuart, C. (2014). Guide to computer forensics and investigations. Cengage Learning.
  • Peyton, A. (2016). "A Litigator’s Guide to the Internet of Things". Richmond Journal of Law and Technology, 22(3), 1–20.
  • Servida, F., & Casey, E. (2019). IoT forensic challenges and opportunities for digital traces. Digital Investigation, 28, S22-S29.

Chapter 15

  • Altheide, C. & Carvey, H. (2012) Digital Forensics with Open Source Tools. Syngress: Sacramento, CA.
  • Carrier, B. (2002) "Open Source Digital Forensic Tools: The Legal Argument".
  • Chang, D., Ghosh, M., Sanadhya, S. K., Singh, M., & White, D. R. (2019). FbHash: A new similarity hashing scheme for digital forensics. Digital Investigation, 29, S113-S123.
  • EC-Council. (2017) Computer Forensics: Investigating Data and Image File.2nd ed. Cengage Learning: United States.
  • Kassin, S. M., Dror, I. E., & Kukucka, J. (2013) "The Forensic Confirmation Bias: Problems, Perspectives, and Proposed Solutions. Journal of Applied Research in Memory and Cognition, 2 (1), 42–52.
  • Sammons, J. (2012) The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics. Syngress: Sacramento, CA.
  • Schmitt, V., & Jordaan, J. (2013). "Establishing the Validity of MD5 and SHA-1 Hashing in Digital Forensic Practice in Light of Recent Research Demonstrating Cryptographic Weaknesses in These Algorithms". International Journal of Computer Applications, 68 (23), 40–43.
  • Tian, Z., Li, M., Qiu, M., Sun, Y., & Su, S. (2019). Block-DEF: A secure digital evidence framework using blockchain. Information Sciences, 491, 151-165.

Chapter 16

  • Casey, E. (2011) Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet, 3rd ed. New York, NY: Elsevier Academic Press.
  • Frieden, J. D. & Murray, L. M. (2007) "The Admissability of Electronic Evidence Under the Federal Rules of Evidence. Richmond Journal of Law and Technology. 5(2), 1–39.
  • Inyang, W. S., & Goodwil, G. F. (2020). Forensic evidence: How does admissibility influence weight in the law of evidence. International Journal of Business, Economics and Law, 21(5), 53-65.
  • Seigfried-Spellar, K. & Leshney, S. (2016) "The Intersection Between Social Media, Crime, and Digital Forensics: #WhoDunIt?" In J. Sammons (ed.) Digital Forensics: Threatscape and Best Practices, 59–67
  • Smith, F. C. & Bace, R. (2002) A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony as an Expert Technical Witness, 1st ed. Boston, MA: Addison-Wesley Professional.
  • Wasserman, R. (2004) Procedural Due Process: A Reference Guide to the United States Constitution. Westport, CT: Praeger Publishers.
  • Watson, D. & Jones, A. (2013) Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements.Waltham, MA: Syngress.
  • Wu, H., & Zheng, G. (2020). Electronic evidence in the blockchain era: New rules on authenticity and integrity. Computer Law & Security Review, 36, 105401.
  • Yeboah-Ofori, A., & Brown, A. D. (2020). Digital forensics investigation jurisprudence: issues of admissibility of digital evidence. Journal of Forensic, Legal & Investigative Sciences, 6(1), 1-8.

Chapter 17

  • Baele, S. J., Brace, L., & Coan, T. G. (2020). Uncovering the far-right online ecosystem: An analytical framework and research agenda. Studies in Conflict & Terrorism, 1-21.
  • Bilazarian, T. (2020). Countering violent extremist narratives online: Lessons from offline countering violent extremism. Policy & Internet, 12(1), 46-65.
  • Cinar, A. C., & Kara, T. B. (2023). The current state and future of mobile security in the light of the recent mobile security threat reports. Multimedia Tools and Applications, 1-13.
  • Kennedy, J., Holt, T., & Cheng, B. (2019). Automotive cybersecurity: Assessing a new platform for cybercrime and malicious hacking. Journal of Crime and Justice, 42(5), 632-645.
  • Montasari, R., Hill, R., Parkinson, S., Peltola, P., Hosseinian-Far, A., & Daneshkhah, A. (2020). Digital forensics: challenges and opportunities for future studies. International Journal of Organizational and Collective Intelligence (IJOCI), 10(2), 37-53.
  • Olsen, P. (2012) We are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. New York: Little, Brown, and Company.
  • Payne, B. K., & Hadzhidimova, L. (2020). Disciplinary and interdisciplinary trends in cybercrime research: An examination. International Journal of Cyber Criminology, 14(1), 81-105.
  • Schjolberg, J. (2012) "Recommendations For Potential New Global Legal Mechanisms Against Global Cyberattacks and Other Global Cybercrimes". EastWest Institute (EWI) Cybercrime Legal Working Group.