[Adopted by the State Duma on May 24, 1. A. (n.d.). The Criminal Code Of The Russian Federation No. 63-Fz Of June 13, 1996. Retrieved January 17, 2021]Search in Google Scholar
[Anonymous. (2003). Maximum Security - Fourth Edition. Indianapolis, USA: Sams Publishing.]Search in Google Scholar
[Aycock, J. (2006). Computer Viruses and Malware. Calgary, Canada: Springer, University of Calgary.]Search in Google Scholar
[Brenner, S. W. (2010). Cybercrime: Criminal Threats from Cyberspace. Santa Barbara, California: Praeger.]Search in Google Scholar
[Clough, J. (2015). Principles of Cybercrime - Second Edition. Cambridge, UK: Cambridge University Press, University Printing House.10.1017/CBO9781139540803]Search in Google Scholar
[Criminal Code of the Republic of North Macedonia. (2002). Retrieved January 15, 2021, from Official Gazette of the Republic of Macedonia "No. 80/99, No. 4/2002, No. 43/2003, No. 19/2004, No. 81/2005, No. 60/06, No. 73/06, No. 7/08, No. 139 / 08, number 114/09, number 51/11, number 135/11, 185/.]Search in Google Scholar
[Europe, C. o. (2003, January 28). Additional Protocol to the Convention on Cybercrime. Retrieved January 18, 2021, from Additional Protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems: www.coe.int/en/web/conventions/full-list/-/conventions/treaty/189]Search in Google Scholar
[Europe, C. o. (2007). Council of Europe Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse. Lanzarote: Council of Europe, Council of Europe Treaty Series-No. 201.]Search in Google Scholar
[Finkelstein, W. A., & Sims, J. R. (2005). The Intellectual Property Handbook: A Practical Guide for Franchise, Business and IP Counsel. Chicago, USA: American Bar Association, ABA Publishing.]Search in Google Scholar
[Gehringer, E. F. (n.d.). Ethics in Computing. Retrieved January 15th, 2021, from Cybersquatting:https://ethics.csc.ncsu.edu/commerce/cybersquatting/study.php]Search in Google Scholar
[German Criminal Code Strafgesetzbuch – StGB. (n.d.). Retrieved from Criminal Code in the version published on 13 November 1998 (Federal Law Gazette I, p. 3322) as last amended by Article 2 of the Act of 19 June 2019 (Federal Law Gazette I, p. 844): https://www.gesetze-im-internet.de/englisch_stgb/englisch_stgb.html]Search in Google Scholar
[Gillespie, A. A. (2015). Cybercrime: Key Issues and Debate. Lancaster, UK: Routledge; 1st edition.10.4324/9781315884202]Search in Google Scholar
[Hayes, D. B., Jeandesboz, D. J., Ragazzi, D. F., Simon, D. S., & Mitsilegas, P. V. (2015). The law enforcement challenges of cybercrime: are we really playing catch-up? Brussels: Directorate-General for internal policies, Policy Department Citizen's rights andconstitutional affairs, European Parliament EU.]Search in Google Scholar
[Knittel, J., & Soto, M. (2003). Everything You Need to Know About the Dangers of Computer Hacking. New York NY, USA: The Rosen Publishing Group, Inc.]Search in Google Scholar
[Kremling, J., & Parker, A. M. (2017). Cyberspace, Cybersecurity, and Cybercrime. Thousand Oaks, California 91320: SAGE Publications, Inc.]Search in Google Scholar
[Miralis, N. G., & Miralis, D. (2020, August 30). The 5 key challenges for law enforcement in fighting cybercrime. Retrieved January 17, 2021, from Lexology: https://www.lexology.com/library/detail.aspx?g=12513d17-cff3-4d8f-b7dccd91826f05d4]Search in Google Scholar
[Reyes, A., Brittson, R., O'Shea, K., Steele, J., & Jean, C. B. (2007). Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors. Rockland, MA, USA: Syngress Publishing, Inc.10.1016/B978-159749133-4/50011-5]Search in Google Scholar
[Ross, J. I., & French, J. L. (2010). Criminal investigations Cybercrime. New York Ny 10001: Chelsea House Publisher.]Search in Google Scholar
[Sausalito, C. (2020, December 21). Cybercrime To Cost The World $10.5 Trillion Annually By 2025. Retrieved December 27, 2020, from Cybercrime Magazine: https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/]Search in Google Scholar
[Schell, B. H., & Martin, C. (2004). Cybercrime: A Reference Handbook. Santa Barbara, California: ABC-CLIO, Inc.]Search in Google Scholar
[Secretariat, M. o.-G. (n.d.). Criminal codes - Criminal Code of the Kingdom of Spain ( 1995 as of 2013). Retrieved January 16th, 2020, from Legislationline: https://www.legislationline.org/documents/section/criminal-codes/country/2/Spain/show.]Search in Google Scholar
[Shinder, D. L., & Cross, M. (2008). Scene of the Cybercrime - Second Edition. Burlington, MA 01803: Syngress Publishing, Inc.]Search in Google Scholar
[Shipley, T. G., & Bowker, A. (2014). Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace. Waltham, USa : Syngress.10.1016/B978-0-12-407817-8.00001-1]Search in Google Scholar
[Siegel, L. J. (2016). Criminology: Theories, Patterns and Typologies 13th Edition. Boston, USA: CENGAGE Learning, University of Massachusetts, Lowell.]Search in Google Scholar
[Singapore, G. o. (1993). COMPUTER MISUSE ACT Chapter 50A Original Enactment: Act 19 Of 1993 Revised Edition 31st July 2007. Retrieved January 16th, 2020, from COMPUTER MISUSE ACT: https://sso.agc.gov.sg/ACT/CMA1993#pr8-]Search in Google Scholar
[Staf, T. N. (2019). Cyberbullying: A Deadly Trend. New York NY, USA: Rosen Publishing.]Search in Google Scholar
[Steinmetz, K. F., & Yar, M. (2019). Cybercrime and Society - Third Edition. London, UK: Sage Publications, Inc.]Search in Google Scholar
[UNCTAD. (2020, April 02). UNCTAD. Retrieved January 17, 2021, from Cybercrime Legislation Worldwide: https://unctad.org/page/cybercrime-legislation-worldwide]Search in Google Scholar
[Vagias, M., & Dugard, J. (2014). The Territorial Jurisdiction of the International Criminal Court. Cambridge, UK: Cambridge University Press, University of Cambridge.10.1017/CBO9781139525374]Search in Google Scholar
[Wall, D. S. (2007). Cybercrime: The Transformation of Crime in the Information Age. Cambridge, UK: Polity Press.]Search in Google Scholar