Bibliography

Anderson, A. (2017, May 17). Cyber Crime Isn’t About Computers: It’s About Behavior. TEDxGreenville.

Barlow, C. (2016, November). Where is cybercrime really coming from? TED.

Brown, S. (2014, April 9). Rational Choice-Exchange Theory.

Brown, S. (2015, April 12). Social Theories Overview (Part 1).

Carter, D. L. (1995). Computer Crime Categories: How Techno-criminals Operate. FBI

Casanova, M. F., Solursh, D., Solursh, L., Roy, E., & Thigpen, L. (2000). The History of Child Pornography on the Internet. Journal of Sex Education and Therapy, 25(4), 245-251. https://doi.org/10.1080/01614576.2000.11074357

Desai, S. (2019, October 12). Behavioral Theory.

DOJ, U. (2021). Identity Theft. United States Department of Justice. Retrieved 2021 from https://www.justice.gov/criminal-fraud/identity-theft/identity-theft-and-identity-fraud

Gordon, S., & Ford, R. (2006). On the definition and classification of cybercrime. Journal in Computer Virology, 2(1), 13-20. https://doi.org/10.1007/s11416-006-0015-z

Karuppannan, J. (2018). Cyber Criminology: Evolution, Contribution and Impact. https://doi.org/10.13140/RG.2.2.25117.00488

McQuade III, S. C. (2021). Encyclopedia of Cybercrime (First ed.). Libre Library Project.

TED. (2021, July). David Birch: A new way to stop identity theft. https://youtu.be/IZjPnaifVIM

University, A. S. (2021). 25 Techniques of Situational Crime Prevention. In: ASU Center for Problem-Oriented Policing.

License

Icon for the Creative Commons Attribution 4.0 International License

Bibliography Copyright © 2021 by Eric R. Ramirez-Thompson, PhD is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book