These are the sources and citations used to research sources. This bibliography was generated on Cite This For Me on

  • Presentation or lecture

    2014 US State of Cybercrime Survey

    2014 - Carnegie Mellon University

    In-text: (2014 US State of Cybercrime Survey, 2014)

    Your Bibliography: 2014. 2014 US State of Cybercrime Survey.

  • Newspaper

    Aamoth, D.

    Operation Payback: Who Are the WikiLeaks ‘Hactivists’?

    2010 - Time

    In-text: (Aamoth, 2010)

    Your Bibliography: Aamoth, D., 2010. Operation Payback: Who Are the WikiLeaks ‘Hactivists’?. Time, [online] Available at: <http://techland.time.com/2010/12/09/operation-payback-who-are-the-wikileaks-hactivists/> [Accessed 21 March 2015].

  • Website

    Clickjacking - OWASP

    2014

    In-text: (Clickjacking - OWASP, 2014)

    Your Bibliography: About The Open Web Application Security Project. 2014. Clickjacking - OWASP. [online] Available at: <https://www.owasp.org/index.php/Clickjacking> [Accessed 12 March 2015].

  • Website

    Activism Ethics

    In-text: (Activism Ethics, n.d.)

    Your Bibliography: Activism101.org. n.d. Activism Ethics. [online] Available at: <http://www.activism101.org/dwguide/ethics.html> [Accessed 30 April 2015].

  • Website

    Aguila, N.

    Kevin Mitnick Enters The Pentagon - The Fifteen Greatest Hacking Exploits

    2008

    In-text: (Aguila, 2008)

    Your Bibliography: Aguila, N., 2008. Kevin Mitnick Enters The Pentagon - The Fifteen Greatest Hacking Exploits. [online] Tom's Hardware. Available at: <http://www.tomshardware.com/reviews/fifteen-greatest-hacking-exploits,1790-6.html> [Accessed 18 March 2015].

  • Newspaper

    Albanesius, C.

    What Was Silk Road and How Did It Work?

    2013 - PCMAG

    In-text: (Albanesius, 2013)

    Your Bibliography: Albanesius, C., 2013. What Was Silk Road and How Did It Work?. PCMAG, [online] Available at: <http://www.pcmag.com/article2/0,2817,2425184,00.asp> [Accessed 28 April 2015].

  • Website

    Armstrong, G.

    Opposing Viewpoints in Context

    2014

    In-text: (Armstrong, 2014)

    Your Bibliography: Armstrong, G., 2014. Opposing Viewpoints in Context. [online] Ic.galegroup.com. Available at: <http://ic.galegroup.com/ic/ovic/ViewpointsDetailsPage/ViewpointsDetailsWindow?failOverType=&query=&prodId=OVIC&windowstate=normal&contentModules=&display-query=&mode=view&displayGroupName=Viewpoints&limiter=&currPage=&disableHighlighting=true&displayGroups=&sortBy=&search_within_results=&p=OVIC&action=e&catId=&activityType=&scanId=&documentId=GALE|EJ3010883213&source=Bookmark&u=tacs&jsid=a7632d55a7231a0d171758ae70971694> [Accessed 29 April 2015].

  • Website

    Armstrong, G.

    Is Hacktivism a Genuine Form of Protest?

    In-text: (Armstrong, n.d.)

    Your Bibliography: Armstrong, G., n.d. Is Hacktivism a Genuine Form of Protest?. [online] ORG Zine. Available at: <http://zine.openrightsgroup.org/features/2012/is-hacktivism-a-genuine-form-of-protest> [Accessed 29 April 2015].

  • Newspaper

    Arnold, B., Kelly, M. B. and Weisman, A.

    Sony Just Canceled The Dec. 25 Release Of 'The Interview'

    2014 - Businessinsider

    In-text: (Arnold, Kelly and Weisman, 2014)

    Your Bibliography: Arnold, B., Kelly, M. and Weisman, A., 2014. Sony Just Canceled The Dec. 25 Release Of 'The Interview'. Businessinsider, [online] Available at: <http://uk.businessinsider.com/reports-top-movie-theater-chains-just-caved-to-sony-hackers-2014-12?r=US#ixzz3VmmNphn9> [Accessed 21 March 2015].

  • Journal

    Bergman, M. K.

    White Paper: The Deep Web: Surfacing Hidden Value

    2001 - The Journal of Electronic Publishing

    In-text: (Bergman, 2001)

    Your Bibliography: Bergman, M., 2001. White Paper: The Deep Web: Surfacing Hidden Value. The Journal of Electronic Publishing, 7(1).

  • Newspaper

    Bernstein, L.

    PlayStation and Xbox gamers face Christmas outages

    2014 - The Washington Post

    In-text: (Bernstein, 2014)

    Your Bibliography: Bernstein, L., 2014. PlayStation and Xbox gamers face Christmas outages. The Washington Post, [online] Available at: <http://www.washingtonpost.com/local/playstation-and-xbox-gamers-face-christmas-outages/2014/12/25/55ad7d26-8c87-11e4-a085-34e9b9f09a58_story.html> [Accessed 24 March 2015].

  • Newspaper

    Bertrand, N.

    The FBI Staged A Lovers' Fight To Catch The Alleged Kingpin Of The Web's Biggest Illegal Drug Marketplace Read more: http://uk.businessinsider.com/the-arrest-of-silk-road-mastermind-ross-ulbricht-2015-1?r=US#ixzz3Z84GMZyA

    2015 - Businessinsider

    In-text: (Bertrand, 2015)

    Your Bibliography: Bertrand, N., 2015. The FBI Staged A Lovers' Fight To Catch The Alleged Kingpin Of The Web's Biggest Illegal Drug Marketplace Read more: http://uk.businessinsider.com/the-arrest-of-silk-road-mastermind-ross-ulbricht-2015-1?r=US#ixzz3Z84GMZyA. Businessinsider, [online] Available at: <http://uk.businessinsider.com/the-arrest-of-silk-road-mastermind-ross-ulbricht-2015-1?r=US> [Accessed 28 April 2015].

  • Website

    Blankenship, L.

    The Hacker's Manifesto

    1986

    In-text: (Blankenship, 1986)

    Your Bibliography: Blankenship, L., 1986. The Hacker's Manifesto. [online] Usc.edu. Available at: <http://www.usc.edu/~douglast/202/lecture23/manifesto.html> [Accessed 11 March 2015].

  • Website

    Boulet, G.

    Cyber Operations by Private Actors in the Ukraine-Russia Conflict: From Cyber War to Cyber Security | ASIL

    2015

    In-text: (Boulet, 2015)

    Your Bibliography: Boulet, G., 2015. Cyber Operations by Private Actors in the Ukraine-Russia Conflict: From Cyber War to Cyber Security | ASIL. [online] Asil.org. Available at: <http://www.asil.org/insights/volume/19/issue/1/cyber-operations-private-actors-ukraine-russia-conflict-cyber-war-cyber> [Accessed 2 May 2015].

  • Book

    Brenner, S. W.

    Cybercrime

    2010 - Praeger - Santa Barbara, Calif.

    In-text: (Brenner, 2010)

    Your Bibliography: Brenner, S., 2010. Cybercrime. Santa Barbara, Calif.: Praeger.

  • Book

    Breton, A.

    Multijuralism

    2009 - Ashgate - Farnham

    In-text: (Breton, 2009)

    Your Bibliography: Breton, A., 2009. Multijuralism. Farnham: Ashgate.

  • Newspaper

    Brewster, T. F.

    Silk Road 2.0 targeted in 'Operation Onymous' dark-web takedown

    2014 - The Guardian

    In-text: (Brewster, 2014)

    Your Bibliography: Brewster, T., 2014. Silk Road 2.0 targeted in 'Operation Onymous' dark-web takedown. The Guardian, [online] Available at: <http://www.theguardian.com/technology/2014/nov/07/silk-road-20-operation-onymous-dark-web-drugs-takedown> [Accessed 27 April 2015].

  • Newspaper

    Brewster, T.

    There are real and present dangers around the Internet of Things

    2014 - The Guardian

    In-text: (Brewster, 2014)

    Your Bibliography: Brewster, T., 2014. There are real and present dangers around the Internet of Things. The Guardian, [online] Available at: <http://www.theguardian.com/technology/2014/mar/20/internet-of-things-security-dangers> [Accessed 21 April 2015].

  • E-book or PDF

    Broadhurst, R.

    Developments in the global law enforcement of cyber-crime

    2006 - QUT Eprints

    In-text: (Broadhurst, 2006)

    Your Bibliography: Broadhurst, R., 2006. Developments in the global law enforcement of cyber-crime. 1st ed. [ebook] QUT Eprints, p.21. Available at: <http://eprints.qut.edu.au/3769/1/3769_1.pdf> [Accessed 30 April 2015].

  • Newspaper

    Burton, G.

    McAfee: '$1 trillion global cyber crime cost was over the top'

    2013 - Computing

    In-text: (Burton, 2013)

    Your Bibliography: Burton, G., 2013. McAfee: '$1 trillion global cyber crime cost was over the top'. Computing, [online] Available at: <http://www.computing.co.uk/ctg/news/2289953/mcafee-usd1-trillion-global-cyber-crime-cost-was-over-the-top> [Accessed 20 March 2015].

  • Website

    Hacker Hunters

    2005

    In-text: (Hacker Hunters, 2005)

    Your Bibliography: Businessweek.com. 2005. Hacker Hunters. [online] Available at: <http://www.bloomberg.com/bw/stories/2005-05-29/hacker-hunters> [Accessed 28 April 2015].

  • Website

    CCC | Home

    In-text: (CCC | Home, n.d.)

    Your Bibliography: Ccc.de. n.d. CCC | Home. [online] Available at: <http://www.ccc.de/en> [Accessed 4 April 2015].

  • Report

    Chakravarty, S., Barbera, M. V., Portokalidis, G., Polychronakis, M. and Keromytis, A. D.

    On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow Records

    2014 - Columbia University, New York, NY, USA

    In-text: (Chakravarty et al., 2014)

    Your Bibliography: Chakravarty, S., Barbera, M., Portokalidis, G., Polychronakis, M. and Keromytis, A., 2014. On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow Records. [online] Columbia University, New York, NY, USA. Available at: <https://mice.cs.columbia.edu/getTechreport.php?techreportID=1545&format=pdf> [Accessed 30 April 2015].

  • Website

    Chappelle, J., Shimomura, T., Markoff, J., Ulrich, S., Wong, R. and Featherstone, A.

    Takedown (2000)

    2000

    In-text: (Chappelle et al., 2000)

    Your Bibliography: Chappelle, J., Shimomura, T., Markoff, J., Ulrich, S., Wong, R. and Featherstone, A., 2000. Takedown (2000). [online] IMDb. Available at: <http://www.imdb.com/title/tt0159784/> [Accessed 18 March 2015].

  • Website

    The Hacker Wars

    In-text: (The Hacker Wars, n.d.)

    Your Bibliography: Charles Sturt University. n.d. The Hacker Wars. [online] Available at: <http://csusap.csu.edu.au/~jfletc13/> [Accessed 14 March 2015].

  • Newspaper

    Cho, M.

    South Korea nuclear plant operator says hacked, raising alarm

    2015 - Reuters

    In-text: (Cho, 2015)

    Your Bibliography: Cho, M., 2015. South Korea nuclear plant operator says hacked, raising alarm. Reuters, [online] Available at: <http://www.reuters.com/article/2014/12/22/us-southkorea-nuclear-idUSKBN0K008E20141222> [Accessed 16 March 2015].

  • E-book or PDF

    Christin, N.

    Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace

    2012

    In-text: (Christin, 2012)

    Your Bibliography: Christin, N., 2012. Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. 1st ed. [ebook] p.4. Available at: <http://arxiv.org/pdf/1207.7139.pdf> [Accessed 28 April 2015].

  • Newspaper

    Circa News

    Grams search engine indexes Deep Web drug listings

    2015 - Circa News

    In-text: (Circa News, 2015)

    Your Bibliography: Circa News, 2015. Grams search engine indexes Deep Web drug listings. [online] Available at: <http://circanews.com/news/the-dark-web-in-the-spotlight> [Accessed 25 April 2015].

  • Website

    Grams search engine indexes Deep Web drug listings

    2015

    In-text: (Grams search engine indexes Deep Web drug listings, 2015)

    Your Bibliography: Circa News. 2015. Grams search engine indexes Deep Web drug listings. [online] Available at: <http://circanews.com/news/the-dark-web-in-the-spotlight> [Accessed 25 April 2015].

  • Website

    Convention on Cybercrime

    In-text: (Convention on Cybercrime, n.d.)

    Your Bibliography: Council Of Europe. n.d. Convention on Cybercrime. [online] Available at: <http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=&DF=&CL=ENG> [Accessed 21 March 2015].

  • Report

    Crimmins, Falk, Fowler, Gravel, Kouremetis, Poremski, Sitarz, Sturgeon and Zhang

    U.S. Bank of Cyber: An analysis of Cyber Attacks on the U.S. Financial System

    2014 - Purdue University

    In-text: (Crimmins et al., 2014)

    Your Bibliography: Crimmins, Falk, Fowler, Gravel, Kouremetis, Poremski, Sitarz, Sturgeon and Zhang, 2014. U.S. Bank of Cyber: An analysis of Cyber Attacks on the U.S. Financial System. [online] Purdue University. Available at: <https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/2014-3.pdf> [Accessed 16 March 2015].

  • Website

    How Does it Work? | cyberterrorism-project.org

    In-text: (How Does it Work? | cyberterrorism-project.org, n.d.)

    Your Bibliography: Cyberterrorism-project.org. n.d. How Does it Work? | cyberterrorism-project.org. [online] Available at: <http://www.cyberterrorism-project.org/how-does-it-work/> [Accessed 26 April 2015].

  • Website

    DARPA - Open Catalog

    2015

    In-text: (DARPA - Open Catalog, 2015)

    Your Bibliography: Darpa.mil. 2015. DARPA - Open Catalog. [online] Available at: <http://www.darpa.mil/opencatalog/MEMEX.html> [Accessed 28 April 2015].

  • Website

    Memex (Domain-Specific Web Search)

    2015

    In-text: (Memex (Domain-Specific Web Search), 2015)

    Your Bibliography: Darpa.mil. 2015. Memex (Domain-Specific Web Search). [online] Available at: <http://www.darpa.mil/Our_Work/I2O/Programs/Memex.aspx> [Accessed 30 April 2015].

  • Website

    Defense.gov Special Report: Cyber Strategy

    In-text: (Defense.gov Special Report: Cyber Strategy, n.d.)

    Your Bibliography: Defense.gov. n.d. Defense.gov Special Report: Cyber Strategy. [online] Available at: <http://www.defense.gov/home/features/2015/0415_cyber-strategy/> [Accessed 30 April 2015].

  • Report

    DETICA, BRITISH OFFICE OF CYBER SECURITY AND INFORMATION ASSURANCE IN THE CABINET OFFICE

    The cost of Cyber Crime

    2011 - Detica

    In-text: (DETICA, BRITISH OFFICE OF CYBER SECURITY AND INFORMATION ASSURANCE IN THE CABINET OFFICE, 2011)

    Your Bibliography: DETICA, BRITISH OFFICE OF CYBER SECURITY AND INFORMATION ASSURANCE IN THE CABINET OFFICE, 2011. The cost of Cyber Crime. [online] Detica. Available at: <https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60943/the-cost-of-cyber-crime-full-report.pdf> [Accessed 23 March 2015].

  • Website

    hacktivism - definition in the Business English Dictionary - Cambridge Dictionaries Online

    In-text: (hacktivism - definition in the Business English Dictionary - Cambridge Dictionaries Online, n.d.)

    Your Bibliography: Dictionary.cambridge.org. n.d. hacktivism - definition in the Business English Dictionary - Cambridge Dictionaries Online. [online] Available at: <http://dictionary.cambridge.org/dictionary/business-english/hacktivism> [Accessed 28 April 2015].

  • Website

    Draper, J.

    Who is John Draper AKA Captain Crunch | Webcrunchers

    In-text: (Draper, n.d.)

    Your Bibliography: Draper, J., n.d. Who is John Draper AKA Captain Crunch | Webcrunchers. [online] Webcrunchers.com. Available at: <http://www.webcrunchers.com/who-is-john-draper-aka-captain-crunch/> [Accessed 26 April 2015].

  • E-book or PDF

    Dwivedi, R.

    Cyber Crime: Brief Histoy Of Cyber Crime

    2015

    In-text: (Dwivedi, 2015)

    Your Bibliography: Dwivedi, R., 2015. Cyber Crime: Brief Histoy Of Cyber Crime. 1st ed. [ebook] Available at: <https://books.google.de/books?id=QsI7BgAAQBAJ&pg=PP2&lpg=PP2&dq=Cyber+Crime:+Brief+Histoy+Of+Cyber+CrimeBy+Rahul+Dwivedi&source=bl&ots=qHd6peXqJO&sig=EU7z3GY_J_KaKJjxHrh8TI6Lg3I&hl=en&sa=X&ei=vQIYVb2wHdLXaqWsgMgO&ved=0CCQQ6AEwAA#v=onepage&q=Cyber%20Crime%3A%20Brief%20Histoy%20Of%20Cyber%20CrimeBy%20Rahul%20Dwivedi&f=false> [Accessed 18 March 2015].

  • Website

    Relationship between e-Government, ICT and e-Governance

    In-text: (Relationship between e-Government, ICT and e-Governance, n.d.)

    Your Bibliography: Egov.comesa.int. n.d. Relationship between e-Government, ICT and e-Governance. [online] Available at: <http://egov.comesa.int/index.php/e-government-resouces/31-relationship-between-e-government-ict-and-e-governance> [Accessed 12 March 2015].

  • Website

    Anon

    In-text: (n.d.)

    Your Bibliography: Egov-estonia.eu. n.d. [online] Available at: <http://www.egov-estonia.eu> [Accessed 11 March 2015].

  • Website

    A "Grey Hat" Guide

    2008

    In-text: (A "Grey Hat" Guide, 2008)

    Your Bibliography: Electronic Frontier Foundation. 2008. A "Grey Hat" Guide. [online] Available at: <https://www.eff.org/pages/grey-hat-guide> [Accessed 13 March 2015].

  • Newspaper

    Elias, P. and Sterling, T.

    Silk Road 3.0 and the million-dollar drug trade hiding in the deep web

    2014 - News Corp Australia Network

    In-text: (Elias and Sterling, 2014)

    Your Bibliography: Elias, P. and Sterling, T., 2014. Silk Road 3.0 and the million-dollar drug trade hiding in the deep web. News Corp Australia Network, [online] Available at: <http://www.news.com.au/technology/online/silk-road-30-and-the-milliondollar-drug-trade-hiding-in-the-deep-web/story-fnjwmwrh-1227117400842> [Accessed 28 April 2015].

  • Report

    EMC Corporation

    CYBERCRIME AND THE HEALTHCARE INDUSTRY

    2013 - EMC Corporation

    In-text: (EMC Corporation, 2013)

    Your Bibliography: EMC Corporation, 2013. CYBERCRIME AND THE HEALTHCARE INDUSTRY. [online] EMC Corporation, p.3. Available at: <http://www.emc.com/collateral/white-papers/h12105-cybercrime-healthcare-industry-rsa-wp.pdf> [Accessed 26 April 2015].

  • Website

    phreaking | communications

    2014

    In-text: (phreaking | communications, 2014)

    Your Bibliography: Encyclopedia Britannica. 2014. phreaking | communications. [online] Available at: <http://www.britannica.com/EBchecked/topic/1055446/phreaking> [Accessed 13 March 2015].

  • Website

    e-Estonia - estonia.eu

    In-text: (e-Estonia - estonia.eu, n.d.)

    Your Bibliography: Estonia.eu. n.d. e-Estonia - estonia.eu. [online] Available at: <http://estonia.eu/about-estonia/economy-a-it/e-estonia.html> [Accessed 11 March 2015].

  • Website

    Report cybercrime online | Europol

    In-text: (Report cybercrime online | Europol, n.d.)

    Your Bibliography: Europol.europa.eu. n.d. Report cybercrime online | Europol. [online] Available at: <https://www.europol.europa.eu/content/report-cybercrime-online> [Accessed 26 March 2015].

  • Website

    Anon

    In-text: (n.d.)

    Your Bibliography: Facebook. n.d. [online] Available at: <https://www.facebook.com/whitehat> [Accessed 12 March 2015].

  • Website

    DARPA-BAA-14-21: Memex - Federal Business Opportunities: Opportunities

    2014

    In-text: (DARPA-BAA-14-21: Memex - Federal Business Opportunities: Opportunities, 2014)

    Your Bibliography: Fbo.gov. 2014. DARPA-BAA-14-21: Memex - Federal Business Opportunities: Opportunities. [online] Available at: <https://www.fbo.gov/?s=opportunity&mode=form&id=426485bc9531aaccba1b01ea6d4316ee&tab=core&_cview=0> [Accessed 29 April 2015].

  • Govt. publication

    Federal Bureau of Investigation

    The Cyber Threat: Who's Doing What to Whom?

    2010 - Federal Bureau of Investigation

    In-text: (Federal Bureau of Investigation, 2010)

    Your Bibliography: Federal Bureau of Investigation, 2010. The Cyber Threat: Who's Doing What to Whom?. Federal Bureau of Investigation.

  • Press release

    Federal Bureau of Investigation

    Manhattan U.S. Attorney Announces Seizure of Additional $28 Million Worth of Bitcoins Belonging to Ross William Ulbricht, Alleged Owner and Operator of “Silk Road” Website

    2013

    In-text: (Federal Bureau of Investigation, 2013)

    Your Bibliography: Federal Bureau of Investigation, 2013. Manhattan U.S. Attorney Announces Seizure of Additional $28 Million Worth of Bitcoins Belonging to Ross William Ulbricht, Alleged Owner and Operator of “Silk Road” Website. [online] Available at: <http://www.fbi.gov/newyork/press-releases/2013/manhattan-u.s.-attorney-announces-seizure-of-additional-28-million-worth-of-bitcoins-belonging-to-ross-william-ulbricht-alleged-owner-and-operator-of-silk-road-website> [Accessed 28 April 2015].

  • Newspaper

    Forbes

    Take a Walk Down Silk Road

    2013 - Forbes

    In-text: (Forbes, 2013)

    Your Bibliography: Forbes, 2013. Take a Walk Down Silk Road. [online] Available at: <http://www.forbes.com/special-report/2013/silk-road/> [Accessed 28 April 2015].

  • Journal

    Freeman, E. H.

    The Legend and Legacy of Kevin Mitnick

    2001 - Information Systems Security

    In-text: (Freeman, 2001)

    Your Bibliography: Freeman, E., 2001. The Legend and Legacy of Kevin Mitnick. Information Systems Security, 10(2), pp.1-6.

  • Newspaper

    Fuchs, E.

    Alleged Founder Of Silk Road Accused Of Trying To Take A Hit Out On A User On The Site

    2013 - Businessinsider

    In-text: (Fuchs, 2013)

    Your Bibliography: Fuchs, E., 2013. Alleged Founder Of Silk Road Accused Of Trying To Take A Hit Out On A User On The Site. Businessinsider, [online] Available at: <http://www.businessinsider.com/silk-road-ross-ulbricht-alleged-murder-for-hire-2013-10?IR=T> [Accessed 29 April 2015].

  • E-book or PDF

    Garfinkel, S.

    The FBI's Cybercrime Crackdown

    2002 - Technology Review

    In-text: (Garfinkel, 2002)

    Your Bibliography: Garfinkel, S., 2002. The FBI's Cybercrime Crackdown. 1st ed. [ebook] Technology Review. Available at: <http://www.jrichardstevens.com/articles/garfinkle-FBI.pdf> [Accessed 16 March 2015].

  • Website

    Georgetown Security Studies Review – A Theory of Cyberwarfare: Political and Military Objectives, Lines of Communication, and Targets

    2014

    In-text: (Georgetown Security Studies Review – A Theory of Cyberwarfare: Political and Military Objectives, Lines of Communication, and Targets, 2014)

    Your Bibliography: Georgetownsecuritystudiesreview.org. 2014. Georgetown Security Studies Review – A Theory of Cyberwarfare: Political and Military Objectives, Lines of Communication, and Targets. [online] Available at: <http://georgetownsecuritystudiesreview.org/2014/06/10/a-theory-of-cyberwarfare-political-and-military-objectives-lines-of-communication-and-targets/> [Accessed 28 April 2015].

  • Website

    Gil, P.

    The Invisible or "Cloaked" Web

    2013

    In-text: (Gil, 2013)

    Your Bibliography: Gil, P., 2013. The Invisible or "Cloaked" Web. [online] About.com Tech. Available at: <http://netforbeginners.about.com/cs/secondaryweb1/a/secondaryweb_2.htm> [Accessed 23 April 2015].

  • Newspaper

    Gillespie, N.

    The Most Important Trial in America

    2015 - The Daily Beast

    In-text: (Gillespie, 2015)

    Your Bibliography: Gillespie, N., 2015. The Most Important Trial in America. The Daily Beast, [online] Available at: <http://www.thedailybeast.com/articles/2015/01/14/the-most-important-trial-in-america.html> [Accessed 30 April 2015].

  • Book

    Godwin, G. M.

    Criminal psychology and forensic technology

    2001 - CRC Press - Boca Raton, Fla.

    In-text: (Godwin, 2001)

    Your Bibliography: Godwin, G., 2001. Criminal psychology and forensic technology. Boca Raton, Fla.: CRC Press.

  • Website

    Google Trends - Web Search interest - Worldwide, 2004 - present

    2015

    In-text: (Google Trends - Web Search interest - Worldwide, 2004 - present, 2015)

    Your Bibliography: Google.com. 2015. Google Trends - Web Search interest - Worldwide, 2004 - present. [online] Available at: <https://www.google.com/trends/explore#q=Dark%20Net%2C%20Deep%20Web%2C%20Hidden%20Internet&cmpt=q&tz=> [Accessed 4 May 2015].

  • Website

    Anon

    In-text: (n.d.)

    Your Bibliography: Google. n.d. [online] Available at: <https://www.google.com/about/appsecurity/reward-program/index.html, Google Reward Program> [Accessed 11 March 2015].

  • Website

    Gossett, E.

    Hacking as Politically Motivated Civil Disobedience: Is Hacktivism Morally Justified? | The Research Center on Computing and Society

    2014

    In-text: (Gossett, 2014)

    Your Bibliography: Gossett, E., 2014. Hacking as Politically Motivated Civil Disobedience: Is Hacktivism Morally Justified? | The Research Center on Computing and Society. [online] Rccs.southernct.edu. Available at: <http://rccs.southernct.edu/hacking-as-politically-motivated-civil-disobedience-is-hacktivism-morally-justified/> [Accessed 1 May 2015].

  • Website

    Gots, J.

    Hacker for the Hell of It: The Adventures of Kevin Mitnick | Big Think

    2011

    In-text: (Gots, 2011)

    Your Bibliography: Gots, J., 2011. Hacker for the Hell of It: The Adventures of Kevin Mitnick | Big Think. [online] Big Think. Available at: <http://bigthink.com/think-tank/hacker-for-the-hell-of-it-the-adventures-of-kevin-mitnick> [Accessed 18 March 2015].

  • Newspaper

    Greenberg, A.

    Alleged Silk Road Boss Ross Ulbricht Now Accused Of Six Murders-For-Hire, Denied Bail

    2013 - Forbes

    In-text: (Greenberg, 2013)

    Your Bibliography: Greenberg, A., 2013. Alleged Silk Road Boss Ross Ulbricht Now Accused Of Six Murders-For-Hire, Denied Bail. Forbes, [online] Available at: <http://www.forbes.com/sites/andygreenberg/2013/11/21/alleged-silk-road-ross-ulbricht-creator-now-accused-of-six-murder-for-hires-denied-bail/> [Accessed 29 April 2015].

  • Newspaper

    Greenberg, A.

    End Of The Silk Road: FBI Says It's Busted The Web's Biggest Anonymous Drug Black Market

    2013 - Forbes

    In-text: (Greenberg, 2013)

    Your Bibliography: Greenberg, A., 2013. End Of The Silk Road: FBI Says It's Busted The Web's Biggest Anonymous Drug Black Market. Forbes, [online] Available at: <http://www.forbes.com/sites/andygreenberg/2013/10/02/end-of-the-silk-road-fbi-busts-the-webs-biggest-anonymous-drug-black-market/> [Accessed 28 April 2015].

  • Newspaper

    Greenberg, A.

    Feds Allege Silk Road's Boss Paid For Murders Of Both A Witness And A Blackmailer

    2013 - Forbes

    In-text: (Greenberg, 2013)

    Your Bibliography: Greenberg, A., 2013. Feds Allege Silk Road's Boss Paid For Murders Of Both A Witness And A Blackmailer. Forbes, [online] Available at: <http://www.forbes.com/sites/andygreenberg/2013/10/02/feds-allege-silk-roads-boss-paid-for-murders-of-both-a-witness-and-a-blackmailer/> [Accessed 28 April 2015].

  • Newspaper

    Greenberg, A.

    How Hackable Is Your Car? Consult This Handy Chart

    2014 - Wired

    In-text: (Greenberg, 2014)

    Your Bibliography: Greenberg, A., 2014. How Hackable Is Your Car? Consult This Handy Chart. Wired, [online] Available at: <http://www.wired.com/2014/08/car-hacking-chart/> [Accessed 25 April 2015].

  • Newspaper

    Greenhalgh, S.

    £12bn Worth Of Cyber Crime Goes Unreported

    2015 - Misco

    In-text: (Greenhalgh, 2015)

    Your Bibliography: Greenhalgh, S., 2015. £12bn Worth Of Cyber Crime Goes Unreported. Misco, [online] Available at: <http://www.misco.co.uk/blog/news/02821/12-billion-worth-of-cyber-crime-goes-unreported> [Accessed 26 March 2015].

  • Newspaper

    Hayden, E. and Hilday, G.

    Sony Announces Limited Release for 'The Interview'

    2014 - The Hollywood Reporter

    In-text: (Hayden and Hilday, 2014)

    Your Bibliography: Hayden, E. and Hilday, G., 2014. Sony Announces Limited Release for 'The Interview'. The Hollywood Reporter, [online] Available at: <http://www.hollywoodreporter.com/news/sony-announces-limited-release-interview-760044> [Accessed 22 March 2015].

  • Newspaper

    Hern, A.

    US government prepares to auction $17m of seized Silk Road bitcoins

    2014 - The Guardian

    In-text: (Hern, 2014)

    Your Bibliography: Hern, A., 2014. US government prepares to auction $17m of seized Silk Road bitcoins. The Guardian, [online] Available at: <http://www.theguardian.com/technology/2014/jun/24/us-auction-seized-silk-road-bitcoins> [Accessed 30 April 2015].

  • Newspaper

    Hern, A.

    FBI doubles down on North Korea accusation for Sony Pictures hack

    2015 - The Guardian

    In-text: (Hern, 2015)

    Your Bibliography: Hern, A., 2015. FBI doubles down on North Korea accusation for Sony Pictures hack. The Guardian, [online] Available at: <http://www.theguardian.com/technology/2015/jan/08/fbi-north-korea-accusation-sony-pictures-hack> [Accessed 19 March 2015].

  • Website

    Hess, K. and Hess, K.

    What is a hacker? | ZDNet

    2011

    In-text: (Hess and Hess, 2011)

    Your Bibliography: Hess, K. and Hess, K., 2011. What is a hacker? | ZDNet. [online] ZDNet. Available at: <http://www.zdnet.com/article/what-is-a-hacker/> [Accessed 26 April 2015].

  • Newspaper

    Hopkins, N.

    US and China engage in cyber war games

    2015 - The Guardian

    In-text: (Hopkins, 2015)

    Your Bibliography: Hopkins, N., 2015. US and China engage in cyber war games. The Guardian, [online] Available at: <http://www.theguardian.com/technology/2012/apr/16/us-china-cyber-war-games> [Accessed 30 April 2015].

  • Website

    Hacker Hat Colors Explained: Black Hats, White Hats, and Gray Hats

    In-text: (Hacker Hat Colors Explained: Black Hats, White Hats, and Gray Hats, n.d.)

    Your Bibliography: Howtogeek.com. n.d. Hacker Hat Colors Explained: Black Hats, White Hats, and Gray Hats. [online] Available at: <http://www.howtogeek.com/157460/hacker-hat-colors-explained-black-hats-white-hats-and-gray-hats/> [Accessed 26 April 2015].

  • Website

    Cyber war | Technoprogressive Wiki

    2015

    In-text: (Cyber war | Technoprogressive Wiki, 2015)

    Your Bibliography: Ieet.org. 2015. Cyber war | Technoprogressive Wiki. [online] Available at: <http://ieet.org/index.php/tpwiki/Cyber_war> [Accessed 30 April 2015].

  • Website

    Hacktivism: Means and Motivations … What Else? - InfoSec Institute

    2013

    In-text: (Hacktivism: Means and Motivations … What Else? - InfoSec Institute, 2013)

    Your Bibliography: InfoSec Institute. 2013. Hacktivism: Means and Motivations … What Else? - InfoSec Institute. [online] Available at: <http://resources.infosecinstitute.com/hacktivism-means-and-motivations-what-else/> [Accessed 4 April 2015].

  • Website

    Cybercrime: Top 20 Countries | Intellectual Takeout (ITO)

    2010

    In-text: (Cybercrime: Top 20 Countries | Intellectual Takeout (ITO), 2010)

    Your Bibliography: Intellectualtakeout.org. 2010. Cybercrime: Top 20 Countries | Intellectual Takeout (ITO). [online] Available at: <http://www.intellectualtakeout.org/library/chart-graph/cybercrime-top-20-countries> [Accessed 1 May 2015].

  • Website

    PR039 / 2013 / News / News and media / Internet / Home - INTERPOL

    2013

    In-text: (PR039 / 2013 / News / News and media / Internet / Home - INTERPOL, 2013)

    Your Bibliography: Interpol.int. 2013. PR039 / 2013 / News / News and media / Internet / Home - INTERPOL. [online] Available at: <http://www.interpol.int/en/News-and-media/News/2013/PR039/> [Accessed 23 March 2015].

  • Journal

    Jarvis, L., Macdonald, S. and Whiting, A.

    Constructing Cyberterrorism as a Security Threat: a Study of International News Media Coverage

    2015 - Perspectives on Terrorism

    In-text: (Jarvis, Macdonald and Whiting, 2015)

    Your Bibliography: Jarvis, L., Macdonald, S. and Whiting, A., 2015. Constructing Cyberterrorism as a Security Threat: a Study of International News Media Coverage. Perspectives on Terrorism, [online] 9(1). Available at: <http://www.terrorismanalysts.com/pt/index.php/pot/article/view/402/html> [Accessed 16 March 2015].

  • Newspaper

    Johnson, J.

    What Is LOIC?

    2010 - Gizmodo

    In-text: (Johnson, 2010)

    Your Bibliography: Johnson, J., 2010. What Is LOIC?. Gizmodo, [online] Available at: <http://gizmodo.com/5709630/what-is-loic> [Accessed 25 April 2015].

  • Newspaper

    Keizer, G.

    Pro-WikiLeaks cyber army gains strength; thousands join DDoS attacks

    2010 - Computerworld

    In-text: (Keizer, 2010)

    Your Bibliography: Keizer, G., 2010. Pro-WikiLeaks cyber army gains strength; thousands join DDoS attacks. Computerworld, [online] Available at: <http://www.computerworld.com/article/2511728/cybercrime-hacking/pro-wikileaks-cyber-army-gains-strength--thousands-join-ddos-attacks.html> [Accessed 29 April 2015].

  • Website

    King, R.

    Countries with the Most Cybercrime: Malware Run Amok - BusinessWeek

    2009

    In-text: (King, 2009)

    Your Bibliography: King, R., 2009. Countries with the Most Cybercrime: Malware Run Amok - BusinessWeek. [online] Businessweek.com. Available at: <http://www.bloomberg.com/ss/09/07/0707_ceo_guide_security/1.htm> [Accessed 17 March 2015].

  • Newspaper

    Kopan, T.

    U.S.: No alternate leads in Sony hack

    2014 - Politico

    In-text: (Kopan, 2014)

    Your Bibliography: Kopan, T., 2014. U.S.: No alternate leads in Sony hack. Politico, [online] Available at: <http://www.politico.com/story/2014/12/fbi-briefed-on-alternate-sony-hack-theory-113866.html> [Accessed 20 March 2015].

  • Website

    Data breach incidents - KoreanLII

    In-text: (Data breach incidents - KoreanLII, n.d.)

    Your Bibliography: Koreanlii.or.kr. n.d. Data breach incidents - KoreanLII. [online] Available at: <http://koreanlii.or.kr/w/index.php/Data_breach_incidents> [Accessed 30 April 2015].

  • Website

    Cybersquatting | Wex Legal Dictionary / Encyclopedia | LII / Legal Information Institute

    In-text: (Cybersquatting | Wex Legal Dictionary / Encyclopedia | LII / Legal Information Institute, n.d.)

    Your Bibliography: Law.cornell.edu. n.d. Cybersquatting | Wex Legal Dictionary / Encyclopedia | LII / Legal Information Institute. [online] Available at: <https://www.law.cornell.edu/wex/cybersquatting> [Accessed 1 May 2015].

  • Newspaper

    Leyden, J.

    Shadowcrew six plead guilty to credit card fraud

    2005 - The Register

    In-text: (Leyden, 2005)

    Your Bibliography: Leyden, J., 2005. Shadowcrew six plead guilty to credit card fraud. The Register, [online] Available at: <http://Shadowcrew six plead guilty to credit card fraud> [Accessed 1 May 2015].

  • Newspaper

    Leyden, J.

    PayPal 13 plead guilty to launching DDoS attacks

    2013 - The Register

    In-text: (Leyden, 2013)

    Your Bibliography: Leyden, J., 2013. PayPal 13 plead guilty to launching DDoS attacks. The Register, [online] Available at: <http://www.theregister.co.uk/2013/12/09/paypal_13_guilty_pleas/> [Accessed 24 March 2015].

  • Newspaper

    Love, D.

    Why Microsoft And Sony Couldn’t Stop Lizard Squad Attack Despite Warnings

    2014 - International Business TimeS

    In-text: (Love, 2014)

    Your Bibliography: Love, D., 2014. Why Microsoft And Sony Couldn’t Stop Lizard Squad Attack Despite Warnings. International Business TimeS, [online] Available at: <http://www.ibtimes.com/why-microsoft-sony-couldnt-stop-lizard-squad-attack-despite-warnings-1769174> [Accessed 16 March 2015].

  • Newspaper

    Mac, R.

    Living With Ross Ulbricht: Housemates Say They Saw No Clues Of Silk Road Or The Dread Pirate Roberts

    2013 - Forbes

    In-text: (Mac, 2013)

    Your Bibliography: Mac, R., 2013. Living With Ross Ulbricht: Housemates Say They Saw No Clues Of Silk Road Or The Dread Pirate Roberts. Forbes, [online] Available at: <http://Living With Ross Ulbricht: Housemates Say They Saw No Clues Of Silk Road Or The Dread Pirate Roberts> [Accessed 29 April 2015].

  • Newspaper

    Mac, R.

    Meet The Silk Road Employee That The Dread Pirate Roberts Allegedly Tried To Murder

    2013 - Forbes

    In-text: (Mac, 2013)

    Your Bibliography: Mac, R., 2013. Meet The Silk Road Employee That The Dread Pirate Roberts Allegedly Tried To Murder. Forbes, [online] Available at: <http://www.forbes.com/sites/ryanmac/2013/11/08/meet-the-silk-road-employee-that-the-dread-pirate-roberts-allegedly-tried-to-murder/> [Accessed 28 April 2015].

  • Newspaper

    Mac, R.

    Who Is Ross Ulbricht? Piecing Together The Life Of The Alleged Libertarian Mastermind Behind Silk Road

    2013 - Forbes

    In-text: (Mac, 2013)

    Your Bibliography: Mac, R., 2013. Who Is Ross Ulbricht? Piecing Together The Life Of The Alleged Libertarian Mastermind Behind Silk Road. Forbes, [online] Available at: <http://www.forbes.com/sites/ryanmac/2013/10/02/who-is-ross-ulbricht-piecing-together-the-life-of-the-alleged-libertarian-mastermind-behind-silk-road/> [Accessed 28 April 2015].

  • Book

    Maggio, E. J.

    Private security in the 21st century

    2009 - Jones and Bartlett Publishers - Sudbury, Mass.

    In-text: (Maggio, 2009)

    Your Bibliography: Maggio, E., 2009. Private security in the 21st century. Sudbury, Mass.: Jones and Bartlett Publishers.

  • Website

    Mark, J., Mark, J., Cartwright, M. and Cartwright, M.

    Silk Road

    2015

    In-text: (Mark, Mark, Cartwright and Cartwright, 2015)

    Your Bibliography: Mark, J., Mark, J., Cartwright, M. and Cartwright, M., 2015. Silk Road. [online] Ancient History Encyclopedia. Available at: <http://www.ancient.eu/Silk_Road/> [Accessed 1 May 2015].

  • Newspaper

    Martin, D.

    Joybubbles, 58, Peter Pan of Phone Hackers, Dies

    2015 - New York Times

    In-text: (Martin, 2015)

    Your Bibliography: Martin, D., 2015. Joybubbles, 58, Peter Pan of Phone Hackers, Dies. New York Times, [online] Available at: <http://www.nytimes.com/2007/08/20/us/20engressia.htm> [Accessed 11 March 2015].

  • Newspaper

    Matthews, S.

    Q&A With A Deep Web Arms Dealer

    2014 - Vocativ

    In-text: (Matthews, 2014)

    Your Bibliography: Matthews, S., 2014. Q&A With A Deep Web Arms Dealer. Vocativ, [online] Available at: <http://www.vocativ.com/tech/bitcoin/q-deep-web-arms-dealer/> [Accessed 30 April 2015].

  • Report

    McAfee

    Net Losses: Estimating the Global Cost of Cybercrime

    2014 - McAfee

    In-text: (McAfee, 2014)

    Your Bibliography: McAfee, 2014. Net Losses: Estimating the Global Cost of Cybercrime. Economic impact of cybercrime II. [online] McAfee, p.7. Available at: <http://www.mcafee.com/ca/resources/reports/rp-economic-impact-cybercrime2.pdf> [Accessed 19 March 2015].

  • Website

    McConnell, B. W. and Austin, G.

    A Measure of Restraint in Cyberspace

    2014

    In-text: (McConnell and Austin, 2014)

    Your Bibliography: McConnell, B. and Austin, G., 2014. A Measure of Restraint in Cyberspace. [online] Ewi.info. Available at: <http://www.ewi.info/idea/measure-restraint-cyberspace> [Accessed 30 April 2015].

  • Newspaper

    Mccormick, T.

    Hacktivism: A Short History

    2013 - Foreign Policy

    In-text: (Mccormick, 2013)

    Your Bibliography: Mccormick, T., 2013. Hacktivism: A Short History. Foreign Policy, [online] Available at: <http://foreignpolicy.com/2013/04/29/hacktivism-a-short-history/> [Accessed 3 April 2015].

  • Newspaper

    McMillan, R.

    With botnets everywhere, DDoS attacks get cheaper

    2009 - Computerworld

    In-text: (McMillan, 2009)

    Your Bibliography: McMillan, R., 2009. With botnets everywhere, DDoS attacks get cheaper. Computerworld, [online] Available at: <http://www.computerworld.com/article/2529204/network-security/with-botnets-everywhere--ddos-attacks-get-cheaper.html> [Accessed 28 April 2015].

  • Magazine

    Meister, D.

    Rethinking Banking Rules

    2013 - Businessworld

    In-text: (Meister, 2013)

    Your Bibliography: Meister, D., 2013. Rethinking Banking Rules. Businessworld, [online] Available at: <http://www.businessworld.in/news/finance/rethinking-banking-rules/976830/page-1.html> [Accessed 18 March 2015].

  • Website

    Computer Virus: What It Is and What It Does

    In-text: (Computer Virus: What It Is and What It Does, n.d.)

    Your Bibliography: Microsoft.com. n.d. Computer Virus: What It Is and What It Does. [online] Available at: <http://www.microsoft.com/security/pc-security/virus-whatis.aspx> [Accessed 23 April 2015].

  • Website

    Miller, J.

    Hacked Medical Devices? Yes. It Could Happen.

    2015

    In-text: (Miller, 2015)

    Your Bibliography: Miller, J., 2015. Hacked Medical Devices? Yes. It Could Happen.. [online] MobCon. Available at: <http://mobcon.com/hacked-medical-devices-yes-happen/> [Accessed 1 May 2015].

  • Website

    Mitnick, K.

    Absolute Zero-Day™ Exploit Exchange | Premium Marketplace

    In-text: (Mitnick, n.d.)

    Your Bibliography: Mitnick, K., n.d. Absolute Zero-Day™ Exploit Exchange | Premium Marketplace. [online] Mitnicksecurity.com. Available at: <https://www.mitnicksecurity.com/shopping/absolute-zero-day-exploit-exchange> [Accessed 14 March 2015].

  • Newspaper

    Mullin, J.

    Target of Silk Road murder-for-hire plot tells his story

    2013 - arstechnica

    In-text: (Mullin, 2013)

    Your Bibliography: Mullin, J., 2013. Target of Silk Road murder-for-hire plot tells his story. arstechnica, [online] Available at: <http://arstechnica.com/tech-policy/2013/11/08/target-of-silk-road-murder-for-hire-plot-tells-his-story/> [Accessed 28 April 2015].

  • Newspaper

    Nakashima, E.

    Warriors in the battle for cyberspace

    2010 - The Washington Post

    In-text: (Nakashima, 2010)

    Your Bibliography: Nakashima, E., 2010. Warriors in the battle for cyberspace. The Washington Post, [online] Available at: <http://www.washingtonpost.com/wp-dyn/content/article/2010/09/23/AR2010092306812.html> [Accessed 1 May 2015].

  • Newspaper

    New York Post

    New evidence Sony hack was ‘inside’ job, not North Korea

    2014 - New York Post

    In-text: (New York Post, 2014)

    Your Bibliography: New York Post, 2014. New evidence Sony hack was ‘inside’ job, not North Korea. [online] Available at: <http://nypost.com/2014/12/30/new-evidence-sony-hack-was-inside-job-cyber-experts/> [Accessed 19 March 2015].

  • Website

    Julia Butterfly Hill defends California redwoods, 1999 | Global Nonviolent Action Database

    In-text: (Julia Butterfly Hill defends California redwoods, 1999 | Global Nonviolent Action Database, n.d.)

    Your Bibliography: Nvdatabase.swarthmore.edu. n.d. Julia Butterfly Hill defends California redwoods, 1999 | Global Nonviolent Action Database. [online] Available at: <http://nvdatabase.swarthmore.edu/content/julia-butterfly-hill-defends-california-redwoods-1999> [Accessed 30 April 2015].

  • Newspaper

    O'Neill, P. H.

    Tor and the rise of anonymity networks

    2013 - The Daily Dot

    In-text: (O'Neill, 2013)

    Your Bibliography: O'Neill, P., 2013. Tor and the rise of anonymity networks. The Daily Dot, [online] Available at: <http://www.dailydot.com/technology/tor-freenet-i2p-anonymous-network/> [Accessed 1 May 2015].

  • Website

    hacktivist - definition of hacktivist in English from the Oxford dictionary

    In-text: (hacktivist - definition of hacktivist in English from the Oxford dictionary, n.d.)

    Your Bibliography: Oxforddictionaries.com. n.d. hacktivist - definition of hacktivist in English from the Oxford dictionary. [online] Available at: <http://www.oxforddictionaries.com/definition/english/hacktivist> [Accessed 1 April 2015].

  • Website

    Paganini, P.

    The hacktivism phenomenon

    2012

    In-text: (Paganini, 2012)

    Your Bibliography: Paganini, P., 2012. The hacktivism phenomenon. [online] Security Affairs. Available at: <http://securityaffairs.co/wordpress/6086/cyber-crime/the-hacktivism-phenomenon.html> [Accessed 29 April 2015].

  • Newspaper

    Paganini, P.

    Experts at Dell Secure Works Counter Threat Unit (CTU) published a new report on the evolution of the hacking underground marketplaces.

    2014 - Securityaffairs

    In-text: (Paganini, 2014)

    Your Bibliography: Paganini, P., 2014. Experts at Dell Secure Works Counter Threat Unit (CTU) published a new report on the evolution of the hacking underground marketplaces. Securityaffairs, [online] Available at: <http://securityaffairs.co/wordpress/31301/cyber-crime/underground-hacking-markets.html> [Accessed 26 April 2015].

  • Newspaper

    Paganini, P.

    Pierluigi Paganini

    2015 - Securityaffairs

    In-text: (Paganini, 2015)

    Your Bibliography: Paganini, P., 2015. Pierluigi Paganini. Securityaffairs, [online] Available at: <http://securityaffairs.co/wordpress/33900/cyber-crime/onion-city-search-engine-deep-web.html> [Accessed 26 April 2015].

  • Website

    How Dynamic CVV Is Impacting the Rising Tide of Credit Card Fraud

    In-text: (How Dynamic CVV Is Impacting the Rising Tide of Credit Card Fraud, n.d.)

    Your Bibliography: Paymentsleader.com. n.d. How Dynamic CVV Is Impacting the Rising Tide of Credit Card Fraud. [online] Available at: <http://www.paymentsleader.com/how-dynamic-cvv-is-impacting-the-rising-tide-of-credit-card-fraud/> [Accessed 18 April 2015].

  • Website

    .:: Phrack Magazine ::.

    In-text: (.:: Phrack Magazine ::., n.d.)

    Your Bibliography: Phrack.org. n.d. .:: Phrack Magazine ::.. [online] Available at: <http://phrack.org/issues/31/5.html> [Accessed 27 April 2015].

  • Website

    Powers, J.

    July 22, 1988: Arrests of Atlanta Three, Legion of Doom, Fry Guy

    2014

    In-text: (Powers, 2014)

    Your Bibliography: Powers, J., 2014. July 22, 1988: Arrests of Atlanta Three, Legion of Doom, Fry Guy. [online] Day in Tech History - Daily Tech History Podcast & Blog 365 Days a Year. Available at: <http://www.dayintechhistory.com/dith/july-22-1988-arrests-atlanta-three-legion-doom-fry-guy/> [Accessed 14 March 2015].

  • Newspaper

    Print Edition: Leaders, T. E.

    The meaning of Stuxnet

    2010 - The Economist

    In-text: (Print Edition: Leaders, 2010)

    Your Bibliography: Print Edition: Leaders, T., 2010. The meaning of Stuxnet. The Economist, [online] Available at: <http://www.economist.com/node/17147862> [Accessed 26 April 2015].

  • Website

    Phreaking

    In-text: (Phreaking, n.d.)

    Your Bibliography: Project Gutenberg. n.d. Phreaking. [online] Available at: <http://self.gutenberg.org/articles/Phreaking> [Accessed 13 March 2015].

  • Report

    PWC, United States Secret Service

    2014 US State of Cybercrime Survey

    2014 - PWC

    In-text: (PWC, United States Secret Service, 2014)

    Your Bibliography: PWC, United States Secret Service, 2014. 2014 US State of Cybercrime Survey. [online] PWC, p.7. Available at: <http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf> [Accessed 20 March 2015].

  • Newspaper

    Raymond, N.

    Accused Silk Road operator convicted on U.S. drug charges

    2015 - Reuters

    In-text: (Raymond, 2015)

    Your Bibliography: Raymond, N., 2015. Accused Silk Road operator convicted on U.S. drug charges. Reuters, [online] Available at: <http://www.reuters.com/article/2015/02/04/us-usa-bitcoin-trial-idUSKBN0L82H920150204> [Accessed 30 April 2015].

  • Newspaper

    Richmond, R.

    Firms Join Forces Against Hackers

    2005 - The Wall Street Journal

    In-text: (Richmond, 2005)

    Your Bibliography: Richmond, R., 2005. Firms Join Forces Against Hackers. The Wall Street Journal, [online] Available at: <http://www.wsj.com/articles/SB111196539614190462> [Accessed 15 March 2015].

  • Book

    Roebuck, K.

    Cybersecurity

    2012 - Emereo Pub. - Dayboro

    In-text: (Roebuck, 2012)

    Your Bibliography: Roebuck, K., 2012. Cybersecurity. Dayboro: Emereo Pub.

  • E-book or PDF

    Rosenbaum, R.

    Secrets of The Little Blue Box

    1971 - Esquire

    In-text: (Rosenbaum, 1971)

    Your Bibliography: Rosenbaum, R., 1971. Secrets of The Little Blue Box. 1st ed. [ebook] Esquire. Available at: <http://www.historyofphonephreaking.org/docs/rosenbaum1971_phil.pdf> [Accessed 15 March 2015].

  • Newspaper

    Rothman, L.

    What Was Silk Road? Refresh Your Memory as Ross Ulbricht Goes to Trial

    2015 - Forbes

    In-text: (Rothman, 2015)

    Your Bibliography: Rothman, L., 2015. What Was Silk Road? Refresh Your Memory as Ross Ulbricht Goes to Trial. Forbes, [online] Available at: <http://time.com/3649919/ross-ulbricht-silk-road/> [Accessed 29 April 2015].

  • Website

    Saarinen, J.

    ShadowCrew forum member handed over to the US

    2013

    In-text: (Saarinen, 2013)

    Your Bibliography: Saarinen, J., 2013. ShadowCrew forum member handed over to the US. [online] iTnews. Available at: <http://www.itnews.com.au/News/348605,shadowcrew-forum-member-handed-over-to-the-us.aspx> [Accessed 29 May 2015].

  • Dissertation

    Samuel, A. W.

    Hacktivism and the Future of Political Participation

    2004

    In-text: (Samuel, 2004)

    Your Bibliography: Samuel, A., 2004. Hacktivism and the Future of Political Participation. PhD. Harvard University.

  • Website

    What is gray hat (or grey hat)? - Definition from WhatIs.com

    In-text: (What is gray hat (or grey hat)? - Definition from WhatIs.com, n.d.)

    Your Bibliography: SearchSecurity. n.d. What is gray hat (or grey hat)? - Definition from WhatIs.com. [online] Available at: <http://searchsecurity.techtarget.com/definition/gray-hat> [Accessed 26 April 2015].

  • Website

    What is phishing? - Definition from WhatIs.com

    In-text: (What is phishing? - Definition from WhatIs.com, n.d.)

    Your Bibliography: SearchSecurity. n.d. What is phishing? - Definition from WhatIs.com. [online] Available at: <http://searchsecurity.techtarget.com/definition/phishing> [Accessed 30 April 2015].

  • Website

    What is white hat? - Definition from WhatIs.com

    In-text: (What is white hat? - Definition from WhatIs.com, n.d.)

    Your Bibliography: SearchSecurity. n.d. What is white hat? - Definition from WhatIs.com. [online] Available at: <http://searchsecurity.techtarget.com/definition/white-hat> [Accessed 26 April 2015].

  • Website

    Silkroad – Everything there is to know | Silk Road Drugs

    In-text: (Silkroad – Everything there is to know | Silk Road Drugs, n.d.)

    Your Bibliography: Silkroaddrugs.org. n.d. Silkroad – Everything there is to know | Silk Road Drugs. [online] Available at: <http://silkroaddrugs.org/silkroad/> [Accessed 29 April 2015].

  • Newspaper

    Statt, N.

    Ross Ulbricht convicted of running drug marketplace Silk Road

    2015 - Cnet

    In-text: (Statt, 2015)

    Your Bibliography: Statt, N., 2015. Ross Ulbricht convicted of running drug marketplace Silk Road. Cnet, [online] Available at: <http://www.cnet.com/news/ross-ulbricht-convicted-of-running-drug-marketplace-silk-road/> [Accessed 28 April 2015].

  • Website

    Stolzenbach, F.

    Understanding DDoS Attacks | ServInt

    2014

    In-text: (Stolzenbach, 2014)

    Your Bibliography: Stolzenbach, F., 2014. Understanding DDoS Attacks | ServInt. [online] Servint.net. Available at: <https://www.servint.net/university/article/targets-victims-collateral-damage-dark-world-ddos-attacks/> [Accessed 1 May 2015].

  • Website

    Suddath, C.

    Master Hacker Albert Gonzalez

    2009

    In-text: (Suddath, 2009)

    Your Bibliography: Suddath, C., 2009. Master Hacker Albert Gonzalez. [online] TIME.com. Available at: <http://content.time.com/time/business/article/0,8599,1917345,00.html> [Accessed 28 April 2015].

  • Website

    W32.Stuxnet | Symantec

    2010

    In-text: (W32.Stuxnet | Symantec, 2010)

    Your Bibliography: Symantec.com. 2010. W32.Stuxnet | Symantec. [online] Available at: <http://www.symantec.com/security_response/writeup.jsp?docid=2010-071400-3123-99> [Accessed 30 April 2015].

  • Newspaper

    TABOR et al., M. B. W.

    Computer Savvy, With an Attitude; Young Working-Class Hackers Accused of High-Tech Crime

    1992 - New York Times

    In-text: (TABOR et al., 1992)

    Your Bibliography: TABOR et al., M., 1992. Computer Savvy, With an Attitude; Young Working-Class Hackers Accused of High-Tech Crime. New York Times, [online] Available at: <http://www.nytimes.com/1992/07/23/nyregion/computer-savvy-with-attitude-young-working-class-hackers-accused-high-tech-crime.htmlm/shopping/absolute-zero-day-exploit-exchange> [Accessed 14 March 2015].

  • Website

    Kevin Mitnick

    In-text: (Kevin Mitnick, n.d.)

    Your Bibliography: Takedown.com. n.d. Kevin Mitnick. [online] Available at: <http://www.takedown.com/bio/mitnick.html> [Accessed 15 March 2015].

  • Website

    Defining Malware: FAQ

    2003

    In-text: (Defining Malware: FAQ, 2003)

    Your Bibliography: Technet.microsoft.com. 2003. Defining Malware: FAQ. [online] Available at: <https://technet.microsoft.com/en-us/library/dd632948.aspx> [Accessed 27 April 2015].

  • Website

    What is a White Hat Hacker? - Definition from Techopedia

    In-text: (What is a White Hat Hacker? - Definition from Techopedia, n.d.)

    Your Bibliography: Techopedia.com. n.d. What is a White Hat Hacker? - Definition from Techopedia. [online] Available at: <http://www.techopedia.com/definition/10349/white-hat-hacker> [Accessed 26 April 2015].

  • Website

    Phreaking Definition

    In-text: (Phreaking Definition, n.d.)

    Your Bibliography: Techterms.com. n.d. Phreaking Definition. [online] Available at: <http://techterms.com/definition/phreaking> [Accessed 17 March 2015].

  • Website

    Worm Definition

    In-text: (Worm Definition, n.d.)

    Your Bibliography: Techterms.com. n.d. Worm Definition. [online] Available at: <http://techterms.com/definition/worm> [Accessed 30 April 2015].

  • Govt. publication

    The Department for Business, Innovation and Skills (BIS)

    2013 INFORMATION SECURITY BREACHES SURVEY

    2013

    In-text: (The Department for Business, Innovation and Skills (BIS), 2013)

    Your Bibliography: The Department for Business, Innovation and Skills (BIS), 2013. 2013 INFORMATION SECURITY BREACHES SURVEY.

  • Newspaper

    The Express Tribune

    36 government sites hacked by 'Indian Cyber Army'

    2010 - The Express Tribune

    In-text: (The Express Tribune, 2010)

    Your Bibliography: The Express Tribune, 2010. 36 government sites hacked by 'Indian Cyber Army'. [online] Available at: <http://tribune.com.pk/story/83967/36-government-websites-hacked-by-indian-cyber-army/> [Accessed 29 April 2015].

  • Newspaper

    The Guardian

    'Tor Stinks' presentation – read the full document

    2013 - The Guardian

    In-text: (The Guardian, 2013)

    Your Bibliography: The Guardian, 2013. 'Tor Stinks' presentation – read the full document. [online] Available at: <http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document> [Accessed 30 April 2015].

  • Newspaper

    The New York Times

    Spring Awakening - How an Egyptian Revolution Began on Facebook

    2012 - The New York Times

    In-text: (The New York Times, 2012)

    Your Bibliography: The New York Times, 2012. Spring Awakening - How an Egyptian Revolution Began on Facebook. [online] Available at: <http://www.nytimes.com/2012/02/19/books/review/how-an-egyptian-revolution-began-on-facebook.html?_r=0> [Accessed 28 April 2015].

  • Magazine

    Global Card Fraud Losses Reach 11.27$ Billion

    2013 - The Nilsonreport

    In-text: (Global Card Fraud Losses Reach 11.27$ Billion, 2013)

    Your Bibliography: The Nilsonreport, 2013. Global Card Fraud Losses Reach 11.27$ Billion. [online] (Issue 1023). Available at: <http://www.nilsonreport.com/publication_newsletter_archive_issue.php?issue=1023> [Accessed 26 April 2015].

  • Website

    The Tor Project, ..

    Who uses Tor?

    2015

    In-text: (The Tor Project, 2015)

    Your Bibliography: The Tor Project, .., 2015. Who uses Tor?. [online] Torproject.org. Available at: <https://www.torproject.org/about/torusers.html.en> [Accessed 1 May 2015].

  • Govt. publication

    The United States Department of Justice

    Kolarov, Aleksi Indictment

    In-text: (The United States Department of Justice, n.d.)

    Your Bibliography: The United States Department of Justice, n.d. Kolarov, Aleksi Indictment. p.3.

  • Book

    Thorne, S. and Seracini, F.

    Diplomatic bag

    2013 - EDUCatt - Milano

    In-text: (Thorne and Seracini, 2013)

    Your Bibliography: Thorne, S. and Seracini, F., 2013. Diplomatic bag. Milano: EDUCatt.

  • Website

    Tor Project: Overview

    In-text: (Tor Project: Overview, n.d.)

    Your Bibliography: Torproject.org. n.d. Tor Project: Overview. [online] Available at: <https://www.torproject.org/about/overview> [Accessed 1 May 2015].

  • Website

    Norton Cybercrime Report 2012 | Norton United Kingdom

    2012

    In-text: (Norton Cybercrime Report 2012 | Norton United Kingdom, 2012)

    Your Bibliography: Uk.norton.com. 2012. Norton Cybercrime Report 2012 | Norton United Kingdom. [online] Available at: <http://uk.norton.com/cybercrimereport/promo> [Accessed 22 March 2015].

  • Newspaper

    Ulbricht, R.

    Silk Road Accused: Dread Pirate Roberts Set Me Up

    2015 - Sky News

    In-text: (Ulbricht, 2015)

    Your Bibliography: Ulbricht, R., 2015. Silk Road Accused: Dread Pirate Roberts Set Me Up. Sky News, [online] Available at: <http://Silk Road Accused: Dread Pirate Roberts Set Me Up> [Accessed 28 April 2015].

  • Press release

    United States Department of Justice

    Manhattan U.S. Attorney Announces The Indictment Of Ross Ulbricht, The Creator And Owner Of The “Silk Road” Website

    2014

    In-text: (United States Department of Justice, 2014)

    Your Bibliography: United States Department of Justice, 2014. Manhattan U.S. Attorney Announces The Indictment Of Ross Ulbricht, The Creator And Owner Of The “Silk Road” Website. [online] Available at: <http://www.justice.gov/usao/nys/pressreleases/February14/RossUlbrichtIndictmentPR.php> [Accessed 28 April 2015].

  • Court case

    United States of America v. Ross William Ulbricht

    2013 - District Court of Maryland

    In-text: (United States of America v. Ross William Ulbricht, [2013])

    Your Bibliography: United States of America v. Ross William Ulbricht [2013] 1:13-cr-00222-CCB (District Court of Maryland).

  • E-book or PDF

    Verdelho, P.

    The effectiveness of international co-operation against cybercrime: examples of good practice

    2008 - Council Of Europe

    In-text: (Verdelho, 2008)

    Your Bibliography: Verdelho, P., 2008. The effectiveness of international co-operation against cybercrime: examples of good practice. 1st ed. [ebook] Council Of Europe, pp.20-24. Available at: <http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/T-CY/DOC-567study4-Version7_en.PDF> [Accessed 25 March 2015].

  • Website

    Voigt, K.

    Analysis: The hidden cost of cybercrime

    2011

    In-text: (Voigt, 2011)

    Your Bibliography: Voigt, K., 2011. Analysis: The hidden cost of cybercrime. [online] Edition.cnn.com. Available at: <http://edition.cnn.com/2011/BUSINESS/06/06/cybercrime.cost/> [Accessed 20 March 2015].

  • Website

    Wigmore, I.

    What is the Internet of Things (IoT)? - Definition from Techopedia

    2014

    In-text: (Wigmore, 2014)

    Your Bibliography: Wigmore, I., 2014. What is the Internet of Things (IoT)? - Definition from Techopedia. [online] Techopedia.com. Available at: <http://www.techopedia.com/definition/28247/internet-of-things-iot> [Accessed 26 April 2015].

  • Website

    WikiLeaks

    In-text: (WikiLeaks, n.d.)

    Your Bibliography: Wikileaks.org. n.d. WikiLeaks. [online] Available at: <https://wikileaks.org/index.de.html> [Accessed 25 April 2015].

  • Newspaper

    Zetter, K.

    Headline: Exclusive: Comedy of Errors Led to False ‘Water-Pump Hack’ Report

    2011 - Wired

    In-text: (Zetter, 2011)

    Your Bibliography: Zetter, K., 2011. Headline: Exclusive: Comedy of Errors Led to False ‘Water-Pump Hack’ Report. Wired, [online] Available at: <http://www.wired.com/2011/11/water-pump-hack-mystery-solved/> [Accessed 28 April 2015].

  • Website

    Zetter, K.

    Hacker Lexicon: What Is an Air Gap? | WIRED

    2014

    In-text: (Zetter, 2014)

    Your Bibliography: Zetter, K., 2014. Hacker Lexicon: What Is an Air Gap? | WIRED. [online] WIRED. Available at: <http://www.wired.com/2014/12/hacker-lexicon-air-gap/> [Accessed 18 March 2015].

  • Newspaper

    Zetter, K.

    The Evidence That North Korea Hacked Sony Is Flimsy

    2014 - Wired

    In-text: (Zetter, 2014)

    Your Bibliography: Zetter, K., 2014. The Evidence That North Korea Hacked Sony Is Flimsy. Wired, [online] Available at: <http://www.wired.com/2014/12/evidence-of-north-korea-hack-is-thin/> [Accessed 19 March 2015].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join