References
Allison SFH, Schuck AM, Lersch KM. Exploring the crime of identity theft: prevalence, clearance rates, and victim/offender characteristics. Journal of Criminal Justice. 2005;33:19–29.
Babchisin KM, Hanson RK, Hermann CA. The characteristics of online sex offenders: a meta-analysis. Sexual Abuse: Journal of Research and Treatment. 2011;23:92–123.
Brenner S. Defining cybercrime: A review of federal and state law. In: Clifford RC, ed. Cybercrime: The investigation, prosecution and defense of a computer-related crime. Durham, NC: Carolina Academic Press; 2011:15–104.
Brunty JL, Helenek K. Social media for law enforcement investigation. Anderson: Cincinnati, OH; 2012.
Catalano, S. (2012). Stalking victims in the United States-Revised. Washington, DC: Bureau of Justice Statistics. Retrieved from: http://www.bjs.gov/content/pub/pdf/svus_rev.pdf
Cavezza C, McEwan TE. Cyberstalking versus off-line stalking in a forensic sample. Psychology, Crime & Law. 2014;20(1):955–970.
Clifford RD. Cybercrime: The investigation, prosecution and defense of a computer-related crime. Durham, NC: Carolina Academic Press; 2011: .
Cohen-Almagor R. Online child sex offenders: Challenges and counter-measures. Howard Journal of Criminal Justice. 2013;52(2):190–215.
Coleman G. Hacker politics and publics. Public Culture. 2011;23(3):511–516.
Collins, K. (2015, March). A quick guide to the worst corporate hack attacks. Bloomberg. Retrieved from http://www.bloomberg.com/graphics/2014-data-breaches/.
Copes H, Vieraitis LM. Identity thieves: Motives and methods. Lebanon, NH: Northeastern University Press; 2012.
Dalal AS, Sharma R. Peeping into a hacker’s mind: Can criminological theories explain hacking? The ICFAI Journal of Cyber Law. 2007;11(4):34–47.
D’Ovidio R, Doyle J. A study on cyberstalking: understanding investigative hurdles. FBI Law Enforcement Bulletin. 2003;72(3):10–17.
Federal Trade Commission (FTC). (2015). Consumer Sentinel Network data book: January-December 2014. Retrieved from https://www.ftc.gov/system/files/documents/reports/consumer-sentinel-network-data-book-january-december-2014/sentinel-cy2014-1.pdf
Gardner B. Threat. In: Gardner B, Thomas V, eds. Building an information Security awareness program: Defending against social engineering and technical threats. Waltham, MA: Syngress; 2014:9–13.
Gold S. Get your head around hacker psychology. Engineering & Technology. 2014;9(1):76–80.
Grabosky P, Smith RG, Dempsey G. Electronic theft: Unlawful acquisition in cyberspace. Cambridge: Cambridge University Press; 2001.
GSMA Intelligence. (2015). Global data. Retrieved from https://gsmaintelligence.com/.
Halbert D. Discourses of danger and the computer hacker. The Information Society. 1997;13:361–374.
Hollinger R. Computer hackers follow a Guttman-like progression. Social Sciences Review. 1988;72(3):199–200.
Holt TJ. Cybercrime and criminological theory: Fundamental readings on hacking, piracy, theft, and harassment. San Diego, CA: Cognella; 2010.
Identity Theft Resource Center. (2015). Data breaches. Retrieved from http://www.idtheftcenter.org/id-theft/data-breaches.html.
Internet Crime Complaint Center (IC3). (2014). 2012 Internet crime report. Washington, DC: National White Collar Crime Center, Federal Bureau of Investigation, and Bureau of Justice Assistance. Retrieved from http://www.ic3.gov/media/annualreport/2014_IC3Report.pdf
Karanasiou AP. The changing face of protests in the digital age: On occupying cyberspace and Distributed-Denial-of-Service (DDoS) attacks. International Review of Law, Computers, & Technology. 2014;28(1):98–113.
Lenhart, A., Purcell, K., Smith, A., & Zickuhr, K. (2010). Social media & mobile internet use among teens and young adults. Washington, DC: Pew Internet and American Life Project. Retrieved from http://www.pewinternet.org/files/old-media/Files/Reports/2010/PIP_Social_Media_and_Young_Adults_Report_Final_with_toplines.pdf
Mack, E. (2014, October). There are now more gadgets on earth than people. Retrieved from http://www.cnet.com/news/there-are-now-more-gadgets-on-earth-than-people/.
McAfee. (2013). The economic impact of cybercrime and cyber espionage. Retrieved from http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime.pdf
McCarthy JA. Internet sexual activity: a comparison between contact and non-contract child pornography offenders. Journal of Sexual Aggression. 2010;16(2):181–195.
McNally M. Identity theft in today’s world. Santa Barbara, CA: Praeger/ABC-CLIO; 2012.
National White Collar Crime Center. (2015). Cyberstalking. Retrieved from: http://www.nw3c.org/docs/research/cyberstalking
Real Time Statistics Project. (2015). Internet live statistics. Retrieved from http://www.internetlivestats.com/internet-users/
Rogers MK. The development of a meaningful hacker taxonomy: a two dimensional approach. Digital Investigations. 2006;3:97–102.
Symantec. (2012). 2012 Norton cybercrime report. Retrieved from http://now-static.norton.com/now/en/pu/images/Promotions/2012/cybercrimeReport/2012_Norton_Cybercrime_Report_Master_FINAL_050912.pdf
Turvey BE. Modus operandi, motive, and technology. In: Casey E, ed. Digital evidence and computer crime: Forensic science, computers, and the internet. London: Academic Press/Elsevier; 2004.
Wall DS. Policing cybercrimes: situating the public police in networks of security within cyberspace. Police Practice and Research. 2007;8(2):183–205.
Workman M, Phelps DC, Hare RC. A study of performative hacktivist subcultures and threats to businesses. Information Security Journal: A Global Perspective. 2013;22(4):187–200.
Wortley R, Smallbone S. Child pornography on the Internet. Problem-specific guides series: Problem-oriented guides for police. Washington, DC: Center for Problem-Oriented Policing, U.S. Department of Justice; 2010.