[
Anderson, R. C., Barton, R., Böhme, M. J., van Eeten, M., Levi, T. M. & Savage, S. (2013). Measuring the Cost of Cybercrime. In Böhme, R. (Ed.), The Economics of Information Security and Privacy. Springer.
]Search in Google Scholar
[
Al Fahdi, M., Clarke, N. L., & Furnell, S. M. (2013). Challenges to digital forensics: A survey of researchers and practitioners attitudes and opinions. 2013 Information Security for South Africa - Proceedings of the ISSA 2013 Conference, pp. 1–8. http://doi.org/10.1109/ISSA.2013.6641058
]Search in Google Scholar
[
Adams, R. B. (2012). The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice. Journal of Digital Forensics, Security and Law, 8(4), pp. 25–48.
]Search in Google Scholar
[
Adams, R. B. (2013). The Advanced Data Acquisition Model (ADAM): A process model for digital forensic practice. [Doctoral dissertation, Murdoch Unversity]. Retrieved from: http://researchrepository.murdoch.edu.au/14422/2/02Whole.pdf
]Search in Google Scholar
[
Bouveret, A. (2018). Cyber Risk for the Financial Sector: A Framework for Quantitative Assessment. International Monetary Fund (IMF) Working Paper 2018/143, pp. 1-29.
]Search in Google Scholar
[
Casciani, D. (2017, January 19). Cybercrime and fraud scale revealed in annual figures. BBC News. Retrieved from: http://www.bbc.co.uk/news/uk-38675683
]Search in Google Scholar
[
Casey, E. (2007) What Does “Forensically Sound” Really Mean? Digital Investigation, 4(2), pp. 49–50. doi: 10.1016/j.diin.2007.05.001.
]Search in Google Scholar
[
Constantiou, I., & Kallinikos, J. (2015). New Games, New Rules: Big Data and the Changing Context of Strategy. Journal of Information Technology 30(1), pp. 1-32.
]Search in Google Scholar
[
Choo, K. R. (2011). The Cyber Threat Landscape: Challenges and Future Research Directions. Computers & Security 30(8), pp. 719-731.
]Search in Google Scholar
[
Cebula, J. J. & Young, L. R. (2010). A taxonomy of Operational Cyber Security Risks, (CMU/SEI-2010-TN-028). Software Engineering Institute, Carnegie Mellon University.
]Search in Google Scholar
[
Caviglione, L., Wendzel, S., & Mazurczyk, W. (2017). The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Security Privacy, 15(6), pp. 12–17. http://doi.org/10.1109/MSP.2017.4251117
]Search in Google Scholar
[
Dorrell, D. D., & Gadawski, G. A. (2012). Financial forensics body of knowledge. John Wiley & Sons.
]Search in Google Scholar
[
Du, X., Le-Khac, N., & Scanlon, M. (2017). Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service. ArXiv, abs/1708.01730.
]Search in Google Scholar
[
Eling, M. & Wirfs, J. H. (2016). Cyber Risk: Too Big to Insure? Risk Transfer Options for a Mercurial Risk Class. I.VW HSG Schriftenreihe 59(59), University of St.Gallen, Institute of Insurance Economics (I.VW-HSG).
]Search in Google Scholar
[
European Central Bank. (2018, February 23). A Euro Cyber Resilience Board for pan-European Financial Infrastructures. Retrieved from: https://www.ecb.europa.eu/press/key/date/2018/html/ecb.sp180309_1.en.html
]Search in Google Scholar
[
Homem, I. (2018). Advancing Automation in Digital Forensic Investigations [Doctoral Dissertation, Stockholm University, Department of Computer and Systems Sciences].
]Search in Google Scholar
[
Horsman, G. (2018). Framework for Reliable Experimental Design (FRED): A Research Framework To Ensure The Dependable Interpretation Of Digital Data For Digital Forensics. Computers and Security 73, pp. 294–306. http://doi.org/10.1016/j.cose.2017.11.009
]Search in Google Scholar
[
Hewling, M. (2010). Digital Forensics: The UK Legal Framework [Masters dissertation, University of Liverpool].
]Search in Google Scholar
[
Harbawi, M., & Varol, A. (2016). The role of digital forensics in combating cybercrimes. 2016 4th International Symposium on Digital Forensic and Security (ISDFS), pp. 138-142.
]Search in Google Scholar
[
Hassan, A., Lass, F., & Makinde, J. (2012). Cybercrime in Nigeria: Causes, Effects and the way out. ARPNJ Science and Technology 2(7), pp. 626-631.
]Search in Google Scholar
[
United Nations. International Telecommunication Unit (ITU). (2017). Global Cybersecurity Index (GCI) 2017.
]Search in Google Scholar
[
James, J., & Gladyshev, P. (2013). Challenges with Automation in Digital Forensic Investigations. ArXiv, abs/1303.4498.
]Search in Google Scholar
[
Jaleshgari, R. (1999). Document Trading Online. Information Week 755(136).
]Search in Google Scholar
[
Kuchta K. J., (2000). Computer Forensics Today’s Law, Investigations and Ethics Available from: http://www.liv.ac.uk/library/ohecampus/
]Search in Google Scholar
[
Lavorgna, A., & Sergi, A. (2014). Types of organized crime in Italy. The multifaceted spectrum of Italian criminal associations and their different attitudes in the financial crisis and in the use of Internet technologies. International Journal of Law, Crime and Justice 42(1), pp. 16-32.
]Search in Google Scholar
[
Mugisha, D. (2019). Role and Impact of Digital Forensics in Cybercrime Investigations. International Journal of Cyber Criminology 47(3). Retrieved from: https://www.researchgate.net/publication/331991596_role_and_impact_of_digital_forensics_in_cyber_crime_investigations.
]Search in Google Scholar
[
Mimoso, M. (2017). Maersk Shipping Reports $300M Loss Stemming from Not Petya Attack. Threat Post - The Kaspersky Lab Security News Service. Retrieved from: https://threatpost.com/maersk-shipping-reports-300m-lossstemming-from-notpetya-attack/127477/
]Search in Google Scholar
[
Macdermott, Á., Baker, T., & Shi, Q. (2018). IoT Forensics: Challenges For The IoT Era. In 9th IFIP International Conference on New Technologies Mobility and Security (NTMS) (pp. 1–5). Paris, France. http://doi.org/10.1109/NTMS.2018.8328748
]Search in Google Scholar
[
McAfee, A., & Brynjolfsson, E. (2012). Big Data: The Management Revolution. Harvard Business Review 90(10), pp. 1-9.
]Search in Google Scholar
[
McAfee & CSIS (2018). The Economic Impact of Cybercrime - No Slowing Down.
]Search in Google Scholar
[
Mac Dermott, A. M., Baker, T., Buck, P., Iqbal, F., & Shi, Q. (2019). The Internet of Things: Challenges and Considerations For Cybercrime Investigations And Digital Forensics. International Journal of Digital Crime and Forensics (IJDCF) 12(1), pp. 1-13.
]Search in Google Scholar
[
Mocas, S. (2004). Building Theoretical Underpinnings for Digital Forensics Research. Digital Investigation 1(1), pp. 61–68. http://doi.org/10.1016/j.diin.2003.12.004
]Search in Google Scholar
[
Okutan, A., & Cebi, Y. (2019). A framework for Cyber Crime Investigation. Procedia Computer Science 158, pp. 287–294.
]Search in Google Scholar
[
Oruc, E., & Tatar, C. (2017). An investigation of factors that affect internet banking usage based on structural equation modelling. Computational Human Behavior 66, pp. 232–235.
]Search in Google Scholar
[
Reith, M., Carr, C., & Gunsch, G. (2002). An Examination of Digital Forensic Models. International Journal of Digital Evidence 1(3), pp. 1–12.
]Search in Google Scholar
[
Rogers, M. (2006). DCSA: A Practical Approach to Digital Crime Scene Analysis. In Tipton, H. F. & Krause, M. (Eds.), Information Security Management Handbook. Auerbach Publications.
]Search in Google Scholar
[
Schatz, B. (2007). Bodysnatcher: Towards Reliable Volatile Memory Acquisition By Software. Digital Investigation 4, pp. 126-134.
]Search in Google Scholar
[
Selamat, S. R., Yusof, R., & Sahib, S. (2008). Mapping Process of Digital Forensic Investigation Framework. International Journal of Computer Science and Network Security 8(10), pp. 163–169.
]Search in Google Scholar
[
Taylor, M., Haggerty, J., Gresty, D., & Hegarty, R. (2010). Digital evidence in cloud computing systems. Computer Law & Security Review 26(3), pp. 304–308. http://doi.org/10.1016/j.clsr.2010.03.002
]Search in Google Scholar
[
Vrancianu, M., & Popa, L. A. (2010). Considerations Regarding the Security and Protection of E-Banking Services Consumers Interests. The Amfiteatru Economic Journal, 1228: pp. 388-403.
]Search in Google Scholar
[
Wall, D. S. (2007). Cybercrime: The Transformation of Crime in the Information Age. Polity Press.
]Search in Google Scholar