[
1. Zakaras, M. R. International Computer Crimes. – General Report, Vol. 72, 2001, No 3-4, pp. 813-829. Last access 200021/11/14. https://www.cairn.info/revue-internationale-de-droit-penal-2001-3-page-813.htm10.3917/ridp.723.0813
]Search in Google Scholar
[
2. Brdiczka, O., J. Liu, B. Price, J. Shen. Proactive Insider Threat Detection Through Graph Learning & Psychological Context. Palo Alto Research Centre. http://www.ieee-se-curity.org/TC/SPW2012/proceedings/4740a142.pdf10.1109/SPW.2012.29
]Search in Google Scholar
[
3. Anonymous. The Difference Between Hackers and Crackers. Maximum Security, Indiana: Pearson/Que, 2002. http://www.informit.com/articles/article.aspx?p=30048
]Search in Google Scholar
[
4. Jelen, S. Hacker vs. Cracker. TechRepublic, 14 Oct 2021. https://securitytrails.com/blog/hacker-vs-cracker
]Search in Google Scholar
[
5. Passeri, P. Cyber Attack Statistics. Hackmageddon.com, 2014. http://hackmageddon.com/
]Search in Google Scholar
[
6. Chan, S. H. An Empirical Investigation of Hacking Behaviour. – The Review of Business Information Systems, Vol. 9, 2005, No 4, pp. 42-52.10.19030/rbis.v9i4.4443
]Search in Google Scholar
[
7. Weinstein, B. Should You Hire an Ex-Hacker. TechRepublic, 11 June 2002, https://www.techrepublic.com/article/should-you-hire-an-ex-hacker/.
]Search in Google Scholar
[
8. Chan, S. H., L. J. Yao. An Exploratory Study on Systems Security and Hacker Hiring. – The Review of Business Information Systems, Vol. 8, 2004, pp. 17-28.10.19030/rbis.v8i4.4473
]Search in Google Scholar
[
9. Lawati, E. A., S. Basha, G. Bhattacharya, J. Hashmi. Mathematical Model and Unitization for the Behaviour of the Intrinsic Recreation Hackers. – International Journal of Innovative Research in Advanced Engineering (IJIRAE), Vol. 1, (2014), No 8. ISSN: 2349-2163.
]Search in Google Scholar
[
10. Barber, R. Hackers Profiled – Who Are They and What Are Their Motivations? – Computer Fraud Secur, Vol. 2, 2001, pp. 14-17.10.1016/S1361-3723(01)02017-6
]Search in Google Scholar
[
11. Olson, P. We are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. New York, Back Bay Books, 2013.
]Search in Google Scholar
[
12. Bratus, S. What Hackers Learn That the Rest of Us Don’t Notes on Hacker Curriculum? – IEEE Secur. Priv, Vol. 5, 2007, No 4, pp. 72-75.10.1109/MSP.2007.101
]Search in Google Scholar
[
13. Jaquet-Chiffelle, D. O., M. Loi. Ethical and Unethical Hacking, Part of the International Library of Ethics. – Law and Technology Book Series (ELTE), Vol. 21, 2020. https://link.springer.com/chapter/10.1007/978-3-030-29053-5_910.1007/978-3-030-29053-5_9
]Search in Google Scholar
[
14. Australian Government, Australian Institute of Criminology, Australian High-Tech Crime Centre, 2005. https://www.aic.gov.au/sites/default/files/2020-05/htcb005.pdf.
]Search in Google Scholar
[
15. Marshall, A. K. Digital Forensics: Digital Evidence in Criminal Investigations. London, Wiley-Blackwell, 2008. https://www.wiley.com/en-us/Digital+Forensics%3A+Digital+Evidence+in+Criminal+Investigations-p-9780470517741
]Search in Google Scholar
[
16. Mohurle, S., Patil, M. A Brief Study of Wannacry Threat: Ransomware Attack. – International Journal Advance Research Computer Science, Udaipur, Vol. 8, 2017, No 5. https://search.proquest.com/docview/1912631307/abstract/DEF9AE2FF2924E35PQ/
]Search in Google Scholar
[
17. Popchev, I., R. Ketipov, V. Angelovа. Risk Averseness and Emotional Stability in e-Comers. – Cybernetics and Information Technologies, Vol. 21, 2021, No 3, pp. 74-84.10.2478/cait-2021-0030
]Search in Google Scholar
[
18. Popchev, I., I. Radeva. A Decision Support Method for Investment Preference Evaluation. – Cybernetics and Information Technologies, Vol. 6, 2006, No 1, pp. 3-16.
]Search in Google Scholar
[
19. Popchev, I., D. Orozova. Towards a Multistep Method for Assessment in e-Learning for Emerging Technologies. – Cybernetics and Information Technologies, Vol. 20, 2020, No 3, pp. 116-129.10.2478/cait-2020-0032
]Search in Google Scholar
[
20. Popchev, I., D. Orozova. Towards Big Data Analytics in the e-Learning Space. – Cybernetics and Information Technologies, Vol. 19, 2019, No 3, pp. 16-24.10.2478/cait-2019-0023
]Search in Google Scholar
[
21. Beebe, N., J. Clark. A Model for Predicting Hacker Behaviour. – Published in AMCIS 1, Psychology, Computer Science, 2006.
]Search in Google Scholar
[
22. Lahcen, M., R. A. Caulkins, B. Mohapatra et al. Review and Insight on the Behavioural Aspects of Cybersecurity. – Cybersecurity, Vol. 3, 2020, No 10. https://doi.org/10.1186/s42400-020-00050-w10.1186/s42400-020-00050-w
]Search in Google Scholar
[
23. Lee, J. R., T. J. Holt. Assessing the Factors Associated with the Detection of Juvenile Hacking Behaviours. – Front. Psychol, 5 May 2020. https://doi.org/10.3389/fpsyg.2020.0084010.3389/fpsyg.2020.00840721471332431647
]Search in Google Scholar
[
24. Dohren, J. Inside the Mind of a Hacker. 2021. https://www.pwc.ch/en/insights/digital/inside-the-mind-of-a-hacker.html
]Search in Google Scholar
[
25. Mednikarov, B., Y. Tsonev, A. Lazarov. Analysis of Cybersecurity Issues in the Maritime Industry. – Information & Security: An International Journal, Vol. 47, 2020, No 1, pp. 27-43. ISSN 0861-5160. https://doi.org/10.11610/isij.470210.11610/isij.4702
]Search in Google Scholar