This module is a resource for lecturers
The following readings are (mostly open source) required readings that should be completed before taking a class based on this Module:
Materials with this icon can be found in the E4J Library of Resources.
- Chang, Weiping and Peifang Chung. (2014). Knowledge Management in Cybercrime Investigation - A Case Study of Identifying Cybercrime Investigation Knowledge in Taiwan . Pacific-Asia Workshop on Intelligence and Security Informatics (PAISI 2014: Intelligence and Security Informatics), pp. 8-17.
- Domain Tools. Best Practices Guide: Getting Started with Domain Tools for Threat Intelligence and Incident Forensics .
- Fafinski, Stefan, William H. Dutton, and Helen Margetts. (2010). Mapping and Measuring Cybercrime . OII Forum Discussion Paper, No 18. Oxford Internet Institute, University of Oxford.
- Finklea, Kristin. (2017). Dark Web . Congressional Research Service.
- GLACY. (2014). Good practice study: Cybercrime reporting mechanisms .
- Harkin, Diarmaid, Chad Whelan, and Lennon Chang (2018). The challenges facing specialist police cyber-crime units: an empirical analysis . Police Practice and Research, Vol. 19(6), 519-536.
- Lin, Herbert. (2017). Attribution of Malicious Cyber Incidents . Aegis Paper Series, No. 1607, Hoover Institution.
- Maras, Marie-Helen. (2014). Computer Forensics: Cybercriminals, Laws, and Evidence . Jones and Bartlett; Chapters, 8-11.
- Pihelgas, Mauno. (2013). Back-tracing and Anonymity in Cyberspace. In Katharina Ziolkowski (ed.). Peacetime Regime for State Activities in Cyberspace International Law, International Relations and Diplomacy (pp. 31-60). NATO Cooperative Cyber Defence Centre of Excellence.
- Wall, David S. (2007). Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace . Police Practice and Research, 8(2), 183-205.
Next: Advanced reading