REFERENCES
- Annual Report. (2012). Internet Crime Report. Internet Crime Complaint Center (IC3), p. 4.
- Bednarz, A. (2004). Profiling cybercriminals: A promising but immature science. Networkworld. Retrieved from http://www.networkworld.com/
- Benny, D (2007). The uses of inductive and deductive reasoning in investigations and criminal profiling. BECCA Report, pp. 7–9.
- Broucek, V., and Turner, P. (2006). Winning the battles, losing the war? Rethinking methodology for forensic computing research. Journal in Computer Virology, 3–12.
- Donato, L. (2009). An introduction to how criminal profiling could be used as a support for computer hacking investigations. Journal of Digital Forensic Practice, 2, 183–195.
- Drummond, D. (2010). A new approach to China. Google Blog. Retrieved from www. googleblog.blogspot.com
- Jahankhani, H., and Al-Nemrat, A. (2010). Examination of cyber-criminal behavior. International Journal of Information Science and Management, 41–48.
- Kirwan, G., and Power, A. (2011). The psychology of cyber crime, 1st edition. IGI Global.
- Kwan, L., Ray, P., and Stephens, G. (2008). Towards a methodology for profiling cyber criminals. IEEE Computer Society. Proceedings of the 41st Hawaii International Conference on System Sciences, pp. 3–5.
- Malby, S., Mace, R., Holterhof, A., Brown, C., Kascherus, S., and Ignatuschtschenko, E. (2013). Comprehensive study on cybercrime. United Nations Office on Drugs and Crime, pp. 38–39
- Nachreiner, C. (2013). Profiling modern hacktivists, criminals and cyber spies. Watchguard Security Center. Retrieved from www.watchguardsecuritycenter.com
- Shinder, D. (2010). Profiling and categorizing cybercriminals. TechRepublic. Retrieved from www.techrepublic.com
- Shinder, D., and Tittel, E. (2002.) Scene of the cybercrime – computer forensics handbook, 1st edition. Syngress Publishing.
- Symantec. (n.d.). What is cybercrime? Symantec. Retrieved from www.us.norton.com
- Tennakoon, H (2011). The need for a comprehensive methodology for profiling cyber-criminals. New Security Learning. Retrieved www.newsecuritylearning.com
- Tompsett, B. C., Marshall, A. M., and Semmens, N. C. (2005). Cybrprofiling: Offender profiling and geographic profiling of crime on the Internet. Computer Network Forensics Research Workshop, p. 1.
- Vidalis, S. and Jones, A. (2003). Using vulnerability trees for decision making in threat assessment. School of Computing Technical Report CS-03-2, School of Computing, University of Glamorgan, pp. 5–8.
- Wheelbarger, S (2009). CyberForensics. Criminal justice collaboratory. Colby Community College. Retrieved from www.colbycriminaljustice.wikidot.com/cyberforensics