Este módulo é um recurso para professores
Leitura essencial
Os seguintes textos, a maioria em fontes abertas, são de leitura obrigatória e devem ser concluídas antes da aula com base neste módulo:
Materiais com este ícone podem ser encontrados na Biblioteca de Recursos do E4J.
- Chang, Weiping and Peifang Chung. (2014). Knowledge Management in Cybercrime Investigation - A Case Study of Identifying Cybercrime Investigation Knowledge in Taiwan . Pacific-Asia Workshop on Intelligence and Security Informatics (PAISI 2014: Intelligence and Security Informatics), pp. 8-17.
- Domain Tools. Best Practices Guide: Getting Started with Domain Tools for Threat Intelligence and Incident Forensics .
- Fafinski, Stefan, William H. Dutton, and Helen Margetts. (2010). Mapping and Measuring Cybercrime . OII Forum Discussion Paper, No 18. Oxford Internet Institute, University of Oxford.
- Finklea, Kristin. (2017). Dark Web . Congressional Research Service.
- GLACY. (2014). Good practice study: Cybercrime reporting mechanisms .
- Harkin, Diarmaid, Chad Whelan, and Lennon Chang (2018). The challenges facing specialist police cyber-crime units: an empirical analysis . Police Practice and Research, Vol. 19(6), 519-536.
- Lin, Herbert. (2017). Attribution of Malicious Cyber Incidents . Aegis Paper Series, No. 1607, Hoover Institution.
- Maras, Marie-Helen. (2014). Computer Forensics: Cybercriminals, Laws, and Evidence . Jones and Bartlett; Chapters, 8-11.
- Pihelgas, Mauno. (2013). Back-tracing and Anonymity in Cyberspace. In Katharina Ziolkowski (ed.). Peacetime Regime for State Activities in Cyberspace International Law, International Relations and Diplomacy (pp. 31-60). NATO Cooperative Cyber Defence Centre of Excellence.
- Wall, David S. (2007). Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace . Police Practice and Research, 8(2), 183-205.
Seguinte: Leitura avançada
Regressar ao início