[
Back, S. (2019). The cybercrime triangle: An empirical assessment of offender, victim, and place. Miami, FL: Florida International University.
]Search in Google Scholar
[
Beeler, A. (2022). Inmate seminaries: How they have positively impacted corrections. Corrections Today, 2022, 34-42.
]Search in Google Scholar
[
Brenner, S. (2009). Cyberthreats: The emerging fault lines of the nation state. New York, NY: Oxford University Press.
]Search in Google Scholar
[
Bryant, R. & Bryant, S. (2014). Policing digital crime. New York, NY: Routledge.
]Search in Google Scholar
[
Bossler, A. M., & Holt, T. J. (2007, November 14). Examining the utility of routine activities theory for cybercrime. Paper presented at the annual meeting of the American Society of Criminology, Atlanta Marriott.
]Search in Google Scholar
[
Choi, K. S. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2, 308-333.
]Search in Google Scholar
[
Collins, S. & McCombie, S. (2012). Stuxnet: The emergence of a new cyber weapon and its implications. Journal of Policing, Intelligence, and Counter Terrorism 7(1), 80-91.
]Search in Google Scholar
[
Computer Fraud and Abuse Act of 1986, 100 Stat. 1213.
]Search in Google Scholar
[
Curtis, J. & Oxburgh, G. (2022). Understanding cybercrime in ‘real world’ policing and law enforcement. The Police Journal: Theory, Practice, and Principles, 0(0). https://doi.org/10.1177/0032258X221107584
]Search in Google Scholar
[
Cveticanin, N. (2023). Hacking statistics to give you nightmares. Retrieved from https://dataprot.net/statistics/hacking-statistics/
]Search in Google Scholar
[
Cybersecurity and Infrastructure Security Agency. (2018). Combating Cyber Crime. Retrieved from https://www.cisa.gov/combating-cyber-crime
]Search in Google Scholar
[
De Cremer, D., Nguyen, B., & Simkin, L. (2017). The integrity challenge of the Internet-of-Things (IoT): On understanding its dark side. Journal of Marketing Management, 33, 1-2.
]Search in Google Scholar
[
De Padirac, B. (2018). International dimensions of cyberspace law. New York, NY: Rout-ledge.
]Search in Google Scholar
[
Department of Justice. (n.d.). Computer crime and intellectual property section (CCIPS). Retrieved from: https://www.justice.gov/criminal-ccips
]Search in Google Scholar
[
Department of Justice. (n.d.). Prosecuting computer crimes. Retrieved from https://www.justice.gov/criminal/file/442156/download
]Search in Google Scholar
[
Dixon, V.K. (2009). Understanding the implications of a global village. Inquiries, 1(11), 1-2.
]Search in Google Scholar
[
Doss, D.A., Etter, G., Rials, W., McElreath, D., Gokaraju, B., & Standish, H. (2022). Examining the effects of the Federal Information Sharing Modernization Act of 2014 and the Cybersecurity Information Sharing Act of 2015: What were the impacts toward reducing cybercrime incidents. Journal of Gang Research, 29(3), 1-23.
]Search in Google Scholar
[
Encyclopedia Britannica. (n.d.) Cybercrime. Retrieved from https://www.britannica.com/topic/cybercrime
]Search in Google Scholar
[
European Union Agency for Law Enforcement Cooperation. (2021). Internet Organised Crime Threat Assessment 2021. Retrieved from https://www.europol.europa.eu/cms/sites/default/files/documents/internet_organised_crime_threat_assessment_iocta_2021.pdf
]Search in Google Scholar
[
Federal Bureau of Investigation. (n.d.). What We Investigate: Cyber. Retrieved from https://www.fbi.gov/investigate/cyber
]Search in Google Scholar
[
Federal Bureau of Investigation. (2022). Internet Crime Report: 2021. Retrieved from https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf
]Search in Google Scholar
[
Felson, M. & Cohen, L. (1980). Human ecology and crime: A routine activity approach. Human Ecology, 8(4), 389-406.
]Search in Google Scholar
[
Henderson, H. (2014). A to Z of computer scientists. New York, NY: Facts on File.
]Search in Google Scholar
[
Hoffman, D.E. (2004). CIA slipped bugs to Soviets. Retrieved from https://www.nbc-news.com/id/wbna4394002
]Search in Google Scholar
[
Holt, T. J. & Bossler, A. M. (2009). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30, 1-25.
]Search in Google Scholar
[
Ilbiz, E. & Kaunert, C. (2023). The sharing economy for tackling cybercrime. New York, NY: Springer.
]Search in Google Scholar
[
International Telecommunications Union (2022). ITU Datahub: Individuals using the Internet. Retrieved from https://datahub.itu.int/data/?e=USA&c=701&i=11624
]Search in Google Scholar
[
Internet World Stats. (2022). Internet Growth Statistics: Today’s road to e-Commerce and Global Trade. Retrieved from https://www.internetworldstats.com/emarketing.htm
]Search in Google Scholar
[
Kennedy, J. (1926, January 30). An Interview with Nikola Tesla. Collier’s Magazine.
]Search in Google Scholar
[
Kigerl, A. (2021). Routine activity theory and malware, fraud, and spam at the national level. Crime Law and Social Change, 76(4).
]Search in Google Scholar
[
Koch, C. (2007). You plan to fight cyber crime. CIO, 2007, 34-40.
]Search in Google Scholar
[
Kritzinger, E. & Von Solms, S. (2010). Cyber security for home users: A new way of protection through awareness enforcement. Computers & Security, 29(8), 840-847.
]Search in Google Scholar
[
Kshetri, N. (2010). The global cybercrime industry. New York, NY: Springer.
]Search in Google Scholar
[
Klosowski, T. (2021). We asked appliance manufacturers how long they’ll keep connected devices secure. Many couldn’t tell us. Retrieved from https://www.nytimes.com/wirecutter/blog/how-long-connected-devices-secure/
]Search in Google Scholar
[
Launiainen, P. (2018). A brief history of everything wireless: How invisible waves have changed the world. Cham, Switzerland: Springer.
]Search in Google Scholar
[
Leider, R. (2021). The modern common law of crime. Journal of Criminal Law and Criminology, 111(2), 407-499.
]Search in Google Scholar
[
Leukfeldt, E. & Yar, M. (2016) Applying Routine Activity Theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263-280.
]Search in Google Scholar
[
Levin, A. (2013). 9 Household Products That May Be Spying on You: Could you coffee machine be spying on you? Retrieved from https://abcnews.go.com/Business/household-products-spying/story?id=19974898
]Search in Google Scholar
[
McElreath, D., DioGuardi, S., & Doss, D. (2022). Pre-crime prediction: Does it have value? Is it inherently racist? International Journal of Service Science, Management, Engineering, and Technology, 13(1), 1-17.
]Search in Google Scholar
[
McElreath, D., Doss, D., Russo, B., Etter, G., Van Slyke, J., Skinner, J., Corey, M., Jensen, C., Wigginton, M., & Nations, R. (2021). Introduction homeland security. (3rd ed.). Boca Raton, FL: CRC Press.
]Search in Google Scholar
[
Naik, K. & Patel, S. (2023). An open source smart home management system based on IOT. Wireless Networks, 29, 989-995.
]Search in Google Scholar
[
Nir, S. (2022). How a cyberattack plunged a long island county into the 1990s. Retrieved from https://www.nytimes.com/2022/11/28/nyregion/suffolk-county-cyber-attack.html
]Search in Google Scholar
[
Office of the Attorney General. (2014). Intake and Charging Policy for Computer Crime Matters. Retrieved from https://www.justice.gov/criminal-ccips/file/904941/download
]Search in Google Scholar
[
Oosterman, N. & Yates D. (2021). Crime and art sociological and criminological perspectives of crimes in the art world. Cham, Switzerland: Springer.
]Search in Google Scholar
[
Pesch-Cronin, K. & Marion, N. (2016). Critical infrastructure protection, risk management, and resilience: A policy perspective. Boca Raton, FL: CRC Press.
]Search in Google Scholar
[
Rawat, D. & Ghafoor, K. (2019). Smart cities cybersecurity and privacy. Cambridge, MA: Elsevier.
]Search in Google Scholar
[
Reed, J. (2032). More school closings coast-to-coast due to ransomware. Retrieved from https://securityintelligence.com/news/schools-closing-due-to-ransomware/
]Search in Google Scholar
[
Sanger, D., Krauss, C., & Perlroth, N. (2021). Cyberattack Forces a Shutdown of a Top U.S. Pipeline. Retrieved from https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html
]Search in Google Scholar
[
United States Census Bureau. (2022a). E-Commerce Sales Surged During the Pandemic. Retrieved from https://www.census.gov/library/stories/2022/04/ecommerce-sales-surged-during-pandemic.html
]Search in Google Scholar
[
United States Census Bureau. (2022b). Quarterly Retail E-Commerce Sales: 3d Quarter 2022. Retrieved from https://www.census.gov/retail/mrts/www/data/pdf/ec_current.pdf
]Search in Google Scholar
[
Waldron, R., Quarles, C., McElreath, D., Walron, M., & Milstein, D. (2009). The criminal justice system. (5th ed.). Tulsa, OK: K&M Publishers.
]Search in Google Scholar
[
Whalley, J., Stocker, V., & Lehr, W. (2023). Beyond the pandemic. Bingley, UK: Emerald Publishing.
]Search in Google Scholar
[
World Bank. (2022). Databank: Population estimates and projections. Retrieved from: https://databank.worldbank.org/source/population-estimates-and-projections
]Search in Google Scholar
[
Visger, M. (2022). The international law sovereignty debate and development of international norms on peacetime cyber operations. Retrieved from https://www.lawfareblog.com/international-law-sovereignty-debate-and-development-international-norms-peacetime-cyber-operations
]Search in Google Scholar
[
Vojinovic, I. (2022). More than 70 cybercrime statistics—A $6 trillion problem. Retrieved from https://dataprot.net/statistics/cybercrime-statistics/
]Search in Google Scholar