Este módulo é um recurso para professores
Referências
- American Marketing Association. (2018). The Murky Ethics of Data Gathering in a Post-Cambridge Analytica World. The Medium, 31 May 2018.
- Asia-Pacific Network Information Center (APNIC). (2018). WDNS01: DNS Concepts. Workshop.
- Bilge, Leyla and Tudor Dumitras. (2012). Before We Knew It: An Empirical Study of Zero-Day Attacks in The Real World. Proceedings of the 2012 ACM conference on Computer and communications security.
- China Internet Network Information Center. (2018). The 41st Statistical Report on Internet Development in China (January 2018).
- Cisco. (2016). IP Addressing and Subnetting for New Users.
- Council of Europe. (2001). Convention on Cybercrime. Budapest.
- Cybercrime Convention Committee (2012). T-CY Guidance Note # 1. On the notion of computer system. Article 1(a) Budapest Convention on Cybercrime. Adopted by the T-CY at its 8th Plenary (December 2012).
- Directorate General For Internal Policies Policy Department C: Citizens' Rights and Constitutional Affairs (2015). The Law Enforcement Challenges of Cybercrime: Are we really catching up?
- Europol. (2017). Internet Organised Crime Threat Assessment 2017.
- Europol. (2018). Internet Organised Crime Threat Assessment 2018.
- Europol. (2018). Public Awareness and Prevention Guides.
- Europol. (2011). Cybercrime Presents a Major Challenge for Law Enforcements.
- Fisher, Tim. (2018). Free and Public DNS Servers. Lifewire.
- Garcia, Michael John and Doyle, Charles. (2010). Extradition to and from the United States: Overview of the Law and Recent Treaties. Congressional Research Service 7-5700.
- Goodman, Marc D. and Brenner, Susan W. (2002). The Emerging Consensus on Criminal Conduct in Cyberspace. International Journal of Law and Information Technology, Vol. 10, No. 2, 139-223.
- Hern, Alex. (2017). WannaCry, Petya, NotPetya: how ransomware hit the big time in 2017. The Guardian, 30 December 2017.
- Holt, Thomas, J., Adam M. Bossler, and Kathryn C. Seigfried-Spellar. (2018). Cybercrime and Digital Forensics, 2nd edition. Routledge.
- IGI Global. (n.d.) What is the penetration rate.
- International Telecommunication Union (ITU). (2012). Understanding cybercrime: Phenomena, challenges and legal response.
- Jaishankar, K. (Ed.). Cyber criminology: Exploring Internet crimes and criminal behavior. CRC Press.
- Kessel, J. M. and Mozur, P. (2016). How China Is Changing Your Internet. New York Times.
- Krocker, Rachel. (2013). An Internet Connection does not equal Internet access. ICT Works.
- Lee, Seung-ho. (2013). Cybercrime sleuths have highly intricate challenges.
- Maras, Marie-Helen. (2014). Computer Forensics: Cybercriminals, Laws and Evidence,second edition. Jones and Bartlett.
- Maras, Marie-Helen. (2016). Cybercriminology. Oxford University Press.
- Maras, Marie-Helen. (2015). The Internet of Things: Security and Privacy Implications. International Data Privacy Law, Vol. 5(2), 99-104.
- McGuire, Mike and Dowling, Samantha. (2013). Cyber crime: A review of the evidence. Research Report 75, Chapter 1: Cyber-dependent crimes.
- OECD. (2018). Data: Internet access.
- Reuters. (2017). Cyber attack hits 200,000 in at least 150 countries: Europol. Reuters, 14 May 2017.
- Rouse, Margaret. (2014). Confidentiality, integrity and availability (CIA Triad). TechTarget.
- Securelist. (2018). Software vulnerabilities. Kaspersky Lab.
- Statcounter. (2016). Mobile and tablet internet usage exceeds desktop for first time worldwide. GlobalStats.
- Statista. (2018). Global internet penetration rate as of September 2017, by region.
- Timberg, Craig, Elizabeth Dowskin, Brian Fung. (2017). Data of 143 million Americans exposed in hack of credit reporting agency Equifax. The Washington Post.
- UNODC. (2013). (Draft) Comprehensive Study on Cybercrime.
- Wall, David. (2007). Cybercrime: The Transformation of Crime in the Information Age. Polity.
- Wall, Matthew. (2016). How long will you wait for a shopping website to load? BBC News, 19 August 2017.
- Wilson, Clay. (2008). Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress.
- Zetter, Kim. (2014). Hacker Lexicon: What Is A Zero Day? Wired, 11 November 2014.
Seguinte: Exercícios
Regressar ao início