This module is a resource for lecturers
Core reading
The following readings are (mostly open source) required readings that should be completed before taking a class based on this Module:
Materials with this icon can be found in the E4J Library of Resources.
- Chang, Weiping and Peifang Chung. (2014).
Knowledge Management in Cybercrime Investigation - A Case Study of Identifying Cybercrime Investigation Knowledge in Taiwan .
Pacific-Asia Workshop on Intelligence and Security Informatics (PAISI 2014: Intelligence and Security Informatics), pp. 8-17.
- Domain Tools.
Best Practices Guide: Getting Started with Domain Tools for Threat Intelligence and Incident Forensics .
- Fafinski, Stefan, William H. Dutton, and Helen Margetts. (2010).
Mapping and Measuring Cybercrime .
OII Forum Discussion Paper, No 18. Oxford Internet Institute, University of Oxford.
- Finklea, Kristin. (2017).
Dark Web . Congressional Research Service.
- GLACY. (2014).
Good practice study: Cybercrime reporting mechanisms .
- Harkin, Diarmaid, Chad Whelan, and Lennon Chang (2018).
The challenges facing specialist police cyber-crime units: an empirical analysis .
Police Practice and Research, Vol. 19(6), 519-536.
- Lin, Herbert. (2017).
Attribution of Malicious Cyber Incidents .
Aegis Paper Series, No. 1607, Hoover Institution.
- Maras, Marie-Helen. (2014).
Computer Forensics: Cybercriminals, Laws, and Evidence . Jones and Bartlett; Chapters, 8-11.
- Pihelgas, Mauno. (2013). Back-tracing and Anonymity in Cyberspace. In Katharina Ziolkowski (ed.). Peacetime Regime for State Activities in Cyberspace International Law, International Relations and Diplomacy (pp. 31-60). NATO Cooperative Cyber Defence Centre of Excellence.
- Wall, David S. (2007).
Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace .
Police Practice and Research, 8(2), 183-205.
Next:
Advanced reading
Back to top