Bibliography
Anderson, A. (2017, May 17). Cyber Crime Isn’t About Computers: It’s About Behavior. TEDxGreenville.
Barlow, C. (2016, November). Where is cybercrime really coming from? TED.
Brown, S. (2014, April 9). Rational Choice-Exchange Theory.
Brown, S. (2015, April 12). Social Theories Overview (Part 1).
Carter, D. L. (1995). Computer Crime Categories: How Techno-criminals Operate. FBI
Casanova, M. F., Solursh, D., Solursh, L., Roy, E., & Thigpen, L. (2000). The History of Child Pornography on the Internet. Journal of Sex Education and Therapy, 25(4), 245-251. https://doi.org/10.1080/01614576.2000.11074357
Desai, S. (2019, October 12). Behavioral Theory.
DOJ, U. (2021). Identity Theft. United States Department of Justice. Retrieved 2021 from https://www.justice.gov/criminal-fraud/identity-theft/identity-theft-and-identity-fraud
Gordon, S., & Ford, R. (2006). On the definition and classification of cybercrime. Journal in Computer Virology, 2(1), 13-20. https://doi.org/10.1007/s11416-006-0015-z
Karuppannan, J. (2018). Cyber Criminology: Evolution, Contribution and Impact. https://doi.org/10.13140/RG.2.2.25117.00488
McQuade III, S. C. (2021). Encyclopedia of Cybercrime (First ed.). Libre Library Project.
TED. (2021, July). David Birch: A new way to stop identity theft. https://youtu.be/IZjPnaifVIM
University, A. S. (2021). 25 Techniques of Situational Crime Prevention. In: ASU Center for Problem-Oriented Policing.