These are the sources and citations used to research cybercrime. This bibliography was generated on Cite This For Me on
In-text: (Amanda Todd Legacy (Official website), 2014)
Your Bibliography: Amanda Todd Legacy (Official website). 2014. Amanda Todd Legacy (Official website). [online] Available at: <http://amandatoddlegacy.org/> [Accessed 11 January 2015].
In-text: (Anonymous, 2008)
Your Bibliography: Anonymous, 2008. Anonymous Youtube channel. [image] Available at: <https://www.youtube.com/user/NEO2012anonymous> [Accessed 11 December 2014].
In-text: (The Fappening creator does AMA on Reddit's shutdown, 2015)
Your Bibliography: BBC Newsbeat. 2015. The Fappening creator does AMA on Reddit's shutdown. [online] Available at: <http://www.bbc.co.uk/newsbeat/29105802> [Accessed 11 January 2015].
In-text: (Christakis, 2010)
Your Bibliography: Christakis, D., 2010. Internet addiction: a 21st century epidemic?. BMC Medicine, 8(1), p.61.
In-text: (LSE MPP Policy Brief 9 Copyright and Creation, 2015)
Your Bibliography: Es.scribd.com. 2015. LSE MPP Policy Brief 9 Copyright and Creation. [online] Available at: <http://es.scribd.com/doc/172985274/LSE-MPP-Policy-Brief-9-Copyright-and-Creation> [Accessed 11 January 2015].
In-text: (Operator of Silk Road 2.0 Website Charged in Manhattan Federal Court, 2014)
Your Bibliography: FBI. 2014. Operator of Silk Road 2.0 Website Charged in Manhattan Federal Court. [online] Available at: <http://www.fbi.gov/newyork/press-releases/2014/operator-of-silk-road-2.0-website-charged-in-manhattan-federal-court> [Accessed 11 January 2015].
In-text: (Cyber Crime, 2015)
Your Bibliography: FBI. 2015. Cyber Crime. [online] Available at: <http://www.fbi.gov/about-us/investigate/cyber> [Accessed 11 January 2015].
In-text: (Justice Department Charges Leaders of Megaupload with Widespread Online Copyright Infringement, 2015)
Your Bibliography: FBI. 2015. Justice Department Charges Leaders of Megaupload with Widespread Online Copyright Infringement. [online] Available at: <http://www.fbi.gov/news/pressrel/press-releases/justice-department-charges-leaders-of-megaupload-with-widespread-online-copyright-infringement> [Accessed 11 January 2015].
In-text: (Justice Department Charges Leaders of Megaupload with Widespread Online Copyright Infringement, 2015)
Your Bibliography: FBI. 2015. Justice Department Charges Leaders of Megaupload with Widespread Online Copyright Infringement. [online] Available at: <http://www.fbi.gov/news/pressrel/press-releases/justice-department-charges-leaders-of-megaupload-with-widespread-online-copyright-infringement> [Accessed 11 January 2015].
In-text: (Gibson, n.d.)
Your Bibliography: Gibson, W., n.d. Neuromancer.
In-text: (New education programme launched to combat online piracy - Press releases - GOV.UK, 2014)
Your Bibliography: Gov.uk. 2014. New education programme launched to combat online piracy - Press releases - GOV.UK. [online] Available at: <https://www.gov.uk/government/news/new-education-programme-launched-to-combat-online-piracy> [Accessed 11 January 2015].
In-text: (Security Response & Bug Bounty Platform - HackerOne, 2015)
Your Bibliography: Hackerone.com. 2015. Security Response & Bug Bounty Platform - HackerOne. [online] Available at: <https://hackerone.com/> [Accessed 11 January 2015].
In-text: (Hamid, 2015)
Your Bibliography: Hamid, T., 2015. Playing with Firewalls. [online] WSJ. Available at: <http://www.wsj.com/articles/SB10001424052748703453804575479632855718318> [Accessed 11 January 2015].
In-text: (Holt, 2013)
Your Bibliography: Holt, T., 2013. Cybercrime and criminological theory. San Diego, CA: Cognella.
In-text: (2013 - The Impact of Cybercrime - InfoSec Institute, 2013)
Your Bibliography: InfoSec Institute. 2013. 2013 - The Impact of Cybercrime - InfoSec Institute. [online] Available at: <http://resources.infosecinstitute.com/2013-impact-cybercrime/> [Accessed 11 January 2015].
In-text: (Google Responds to The Fappening Celebrity Victims’ $100M Lawsuit Threat, 2014)
Your Bibliography: International Business Times. 2014. Google Responds to The Fappening Celebrity Victims’ $100M Lawsuit Threat. [online] Available at: <http://au.ibtimes.com/articles/568526/20141003/google-fappening-jennifer-lawrence-nude-photos-victims.htm#.VLHk7tKG91Y> [Accessed 11 January 2015].
In-text: (Kumar, 2012)
Your Bibliography: Kumar, M., 2012. Hacktivism. 1st ed. [ebook] The Hacker news. Available at: <http://news.thehackernews.com/THN-May2012.pdf> [Accessed 12 December 2014].
In-text: (Levy, 2010)
Your Bibliography: Levy, S., 2010. Hackers. Sebastopol, CA: O'Reilly Media.
In-text: (Detenida en Murcia una persona por alabar en Twitter el asesinato de la policía en Vigo – España – Noticias, última hora, vídeos y fotos de España en lainformacion.com, 2015)
Your Bibliography: Noticias.lainformacion.com. 2015. Detenida en Murcia una persona por alabar en Twitter el asesinato de la policía en Vigo – España – Noticias, última hora, vídeos y fotos de España en lainformacion.com. [online] Available at: <http://noticias.lainformacion.com/espana/detenida-en-murcia-una-persona-por-alabar-en-twitter-el-asesinato-de-la-policia-en-vigo_KMvznUbw4FFVQuFwZ8SHT2/> [Accessed 11 January 2015].
In-text: (Internet Access - Households and Individuals, 2013 - ONS, 2015)
Your Bibliography: Ons.gov.uk. 2015. Internet Access - Households and Individuals, 2013 - ONS. [online] Available at: <http://www.ons.gov.uk/ons/rel/rdit2/internet-access---households-and-individuals/2013/stb-ia-2013.html> [Accessed 10 January 2015].
In-text: (Ponemon Institute LLC, 2014)
Your Bibliography: Ponemon Institute LLC, 2014. The Challenges of Cloud Information Governance: A Global Data Security Study. [online] Ponemon Institute LLC. Available at: <http://www2.safenet-inc.com/cloud-security-research/SafeNet-Cloud-Governance.pdf?utm_source=102714-pr&utm_medium=pr&utm_campaign=cloud-security-study> [Accessed 11 December 2014].
In-text: (Sandoval and googleplus, 2012)
Your Bibliography: Sandoval, G. and googleplus, 2012. FBI charges MegaUpload operators with piracy crimes - CNET. [online] CNET. Available at: <http://www.cnet.com/news/fbi-charges-megaupload-operators-with-piracy-crimes/> [Accessed 11 January 2015].
In-text: (SiweK, 2007)
Your Bibliography: SiweK, S., 2007. The truth of sound recording piracy to the U.S. Economy. 1st ed. Institute for Public Inovation.
In-text: (Stoll, 1989)
Your Bibliography: Stoll, C., 1989. The cuckoo's egg. New York: Doubleday.
In-text: (Two Anonymous hackers arrested over attacks targeting government sites, 2014)
Your Bibliography: the Guardian. 2014. Two Anonymous hackers arrested over attacks targeting government sites. [online] Available at: <http://www.theguardian.com/technology/2014/may/22/two-anonymous-hackers-arrested-over-attacks-targeting-government-sites> [Accessed 11 January 2015].
In-text: (The Tor Project, 2015)
Your Bibliography: The Tor Project, I., 2015. Tor Project: Anonymity Online. [online] Torproject.org. Available at: <https://www.torproject.org/> [Accessed 11 January 2015].
In-text: (Police pore over Dotcom mansion as accused denied bail, 2015)
Your Bibliography: TVNZ. 2015. Police pore over Dotcom mansion as accused denied bail. [online] Available at: <http://tvnz.co.nz/national-news/police-pore-over-dotcom-mansion-accused-denied-bail-4694527> [Accessed 11 January 2015].
In-text: (U.S. Copyright Office Summary, 1998)
Your Bibliography: U.S. Copyright Office Summary, 1998. THE DIGITAL MILLENNIUM COPYRIGHT ACT OF 1998.
In-text: (WikiLeaks, 2015)
Your Bibliography: Wikileaks.org. 2015. WikiLeaks. [online] Available at: <https://wikileaks.org/> [Accessed 11 January 2015].
10,587 students joined last month!