With the rise of social distancing, security of the Internet and online communication become essential issue and cybercrime emerging challenge.
- Bossler, M. A. & Holt J. T. (2012). Patrol officers’ perceived role in responding to cybercrime. Policing: An International Journal of Police Strategies & Management 35 (1), 165-181.
- Broadhurst, R. (2006). Developments in the global law enforcement of cyber-crime. Policing: An International Journal of Police Strategies & Management 29 (3), 408-433.
- Council of Europe (2001, November 23). Convention on Cybercrime, Details of Treaty No.185, Budapest. Accessed on June 23, 2020. https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185
- Council of Europe (2019, June 23). Cybercrime Convention Committee (T-CY), Preparation of the2nd Additional Protocol to the Budapest Convention on Cybercrime. Accessed on June 21, 2020. https://rm.coe.int/t-cy-2019-19-protocol-tor-extension-chair-note-v3/16809577ff
- Cross, C. (2019). Oh we can’t actually do anything about that’: the problematic nature of jurisdiction for online fraud victims. Criminology & Criminal Justice, Online, 1-18. Accessed on June28,2020.https://eprints.qut.edu.au/127517/1/CCJ_Jurisdiction_online_fraud_accepted_CROSS.pdf
- Crowther G. A. (2017). The Cyber Domain. The Cyber Defense Review 2 (3), 63-78.
- Davis, T. J. (2012). Examining perceptions of local law enforcement in the fight against crimes with a cyber component. Policing: An International Journal of Police Strategies & Management, 35 (2), 272-284.
- Finklea, M. K. (2013, January 17). The interplay of borders, turf, cyberspace and jurisdiction: Issues confronting US law enforcement. Congressional Research Service Report for Congress, Washington DC: Congressional Research Service. Accessed on July 3, 2020. https://fas.org/sgp/crs/misc/R41927.pdf
- Furnell, S., Emm, D. & Papadaki, M. (2015). The challenge of measuring cyber-dependent crimes. Computer Fraud and Security 10, 5-12.
- Gordon, S. & Ford, R. (2006). On the definition and classification of cybercrime. Journal in Computer Virology, 2(1), 13-20.
- Graham, A., Kulig, T.C, & Cullen, T. F. (2020). Willingness to report crime to the police. Traditional crime, cybercrime and procedural justice. Policing: An International Journal 43(1), 1-16.
- Graves, T. J., Acquisti, A. & Anderson, R. (2019). Criminology perception versus punishment in cybercrime. Journal of Criminal Law & Criminology, 109 (2), 313-363.
- Holt, J.T., Clevenger, S., & Navarro, J. (2020). Exploring digital evidence
recognition among officers and troopers in a sample of a state police force. Policing: An International Journal, 43 (1), 91-103.
- Holt, T.J. (2018). Regulating cybercrime through lawenforcement and industry mechanisms. The ANNALS of the American Academy of Political and Social Science 679, 140-157.
- Holt, T.J., Lee, J.R., Liggett, R., Holt, K.M. and Bossler, A. (2019). Examining perceptions of online harassment among constables in England and Wales. International Journal of Cybersecurity Intelligence and Cybercrime, 2(1), 24-39.
- Humphrey, A. J., & Schmalleger, F. (2012). Deviant Behavior, 2nd ed., Canada: Jones & Bartlett Learning.
- Internet World Stats (2020, March 3). Internet Usage Statistics. The Internet Big Picture. World Internet Users and 2020 Population Stats. Accessed on June 21, 2020. https://www.internetworldstats.com/stats.htm
- Koziarski, J., & Lee J. R. (2020). Connecting evidence-based
policing and cybercrime. Policing: An International Journal, 43(1), 198-211. DOI 10.1108/PIJPSM-07-2019-0107
- Levi, M. (2017a) Assessing trends, scale and nature of economic cybercrimes: overview and issues. Crime, Law and Social Change 67(1), 3-20. Accessed on July 1, 2020. http://orca.cf.ac.uk/95719/3/Assessing%20trends%20final%20published.pdf
- Levi, M., Doig, A., Gundur, R. et al. (2 more authors) (2017b). Cyberfraud and the implications for effective risk-based responses: themes from UK research. Crime, Law and Social Change, 67 (1), 77-96. Accessed on July 3, 2020. http://eprints.whiterose.ac.uk/144360/8/Levi%2C%20Doig%2C%20Gundur%2C%20Wall%20and%20Williams%20%282017%29%20Cyberfraud%20and%20the%20implications%20for%20effective%20risk-based%20responses%20-%20themes%20from%20UK%20research.pdf
- Losavio, M.M., Pastukov, P., Polyakova, S., et al. (2019). The juridical spheres for digital forensics and electronic evidencein the insecure electronic world, WIREs Forensic Sci. 1:e1337. Accessed on June 15, 2020. https://doi.org/10.1002/wfs2.1337
- Moitra, S. (2005). Developing policies for cybercrime”, European Journal of Crime, Criminal Law and Criminal Justice, 13 (3), 435-464.
- Pradillo, J. C. O. (2011). Fighting against Cybercrime in Europe: The Admissibility of Remote Searches in Spain.European Journal of Crime, Criminal Law & Criminal Justice 19(4), 363-395. DOI: 10.1163/157181711X587800.
- Speer, D. (2000). Redefining borders: The challenges of cybercrime. Crime, Law and Social Change 34, 259-273.
- Williams, K. (2008). Using Tittle’s control balance theory to understand computer crime and
deviance. International Review of Law Computers & Technology, 22(1-2), 145-155.
- Willits, D. & Nowacki, J. (2016). The use of specialized cybercrime policing units: an organization analysis. Criminal Justice Studies, 29 (2), 105-124.