Weimann, G. (2016). Terrorist Migration to the Dark Web. Perspectives on Terrorism, 10(3), 40-44.
Omand, D., & Bartlett, J. (2012). The New Face of Digital Populism. Demos, 1-76.
Latonero, M. (2011). Human Trafficking Online: The Role of Social Networking Sites and Online Classifieds. USC Annenberg Center on Communication Leadership & Policy.
Brenner, S. W. (2007). Cybercrime Investigation and Prosecution: The Role of Penal and Procedural Law. McGeorge Law Review, 38(3), 289-319.
Europol. (2020). Internet Organised Crime Threat Assessment (IOCTA) 2020. Europol Publications.
Latonero, M. (2011). Human trafficking online: The role of social networking sites and online classifieds. USC Annenberg Center on Communication Leadership & Policy.
Musto, J. L., & Boyd, Z. (2014). The trafficking-technology nexus. Social Politics: International Studies in Gender, State & Society, 21(3), 461-483.
O'Brien, E., & Li, Y. (2020). They use it like a mask: Technology, social media and child exploitation material. Child Abuse & Neglect, 107, 104594.
Latonero, M., Wex, B., & Dank, M. (2017). Technology and labor trafficking in a network society. General and Comparative Endocrinology.
Wojcik, S., & Hughes, A. (2019). How Bots Are Used To Facilitate Human Trafficking And Exploitation. Pew Research Center.
Bouché, V., & Laczko, F. (2017). Fake profiles on social media: A trafficking tool. In Trafficking in Persons and Corruption: Breaking the Chain (pp. 35-48). International Organization for Migration.
Agarwal, A., & Gupta, M. (2016). Online identity fraud: Prevalence and prevention. Journal of Computer-Mediated Communication, 21(4), 295-310. https://doi.org/10.1111/jcc4.12166
Todorov, A., & Porter, J. (2014). Misleading cues: How to recognize manipulated images and videos. Journal of Visual Communication in Medicine, 37(3-4), 67-75. https://doi.org/10.3109/17453054.2014.930501
Latonero, M., & Kift, P. (2018). On digital passages and borders: Refugees and the new infrastructure for movement and control. Social Media + Society, 4(1), 1-11. https://doi.org/10.1177/2056305118764432
Whittaker, M., Crawford, K., Dobbe, R., Fried, G., Kaziunas, E., Mathur, V., … & Schwartz, O. (2018). AI Now Report 2018. AI Now Institute at New York University.
Latonero, M. (2011). Human trafficking online: The role of social networking sites and online classifieds. USC Annenberg Center on Communication Leadership & Policy.
Gallagher, A., & Holmes, P. (2008). Developing an effective criminal justice response to human trafficking: Lessons from the front line. International Criminal Justice Review, 18(3), 318-343.
Musto, J. L., & Boyd, D. (2014). The trafficking-technology nexus. Social Politics: International Studies in Gender, State & Society, 21(3), 461-483.
Décary-Hétu, D., & Dupont, B. (2012). The social network of hackers. Global Crime, 13(3), 160-175.
Johansson, M., & Svedin, C. G. (2020). Social Media and Human Trafficking: A Systematic Review. Trauma, Violence, & Abuse, 21(2), 210-226.
Woolley, S. C. (2016). Automating power: Social bot interference in global politics. First Monday, 21(4). https://doi.org/10.5210/fm.v21i4.6161
Latonero, M. (2011). Human trafficking online: The role of social networking sites and online classifieds. USC Annenberg School for Communication & Journalism. https://technologyandtrafficking.usc.edu/report/human-trafficking-online-the-role-of-social-networking-sites-and-online-classifieds/
Alvari, H., Shaabani, E., & Shakarian, P. (2019). Detecting emerging human trafficking networks on social media. IEEE Transactions on Computational Social Systems, 6(1), 151-163. https://doi.org/10.1109/TCSS.2018.2889085
Ferrara, E., Varol, O., Davis, C., Menczer, F., & Flammini, A. (2016). The rise of social bots. Communications of the ACM, 59(7), 96-104.
Chavoshi, N., Hamooni, H., & Mueen, A. (2016). DeBot: Twitter bot detection via warped correlation. Proceedings of the International Conference on Data Mining (ICDM), 817-822. https://doi.org/10.1109/ICDM.2016.0113
OWASP Foundation. (2021). Cross-Site Scripting (XSS). Retrieved from https://owasp.org/www-community/attacks/xss/
PortSwigger. (n.d.). Cross-site scripting. Retrieved from https://portswigger.net/web-security/cross-site-scripting
Mozilla Developer Network. (2022). Content Security Policy (CSP). Retrieved from https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP
Imperva. (2022). What is a web application firewall (WAF)? Retrieved from https://www.imperva.com/learn/application-security/web-application-firewall-waf/
National Cyber Security Centre. (2021). Understanding cross-site scripting (XSS). Retrieved from https://www.ncsc.gov.uk/guidance/understanding-cross-site-scripting-xss
Kaspersky. (n.d.). What is an APT (Advanced Persistent Threat)? Kaspersky. Retrieved April 17, 2024, from https://usa.kaspersky.com/resource-center/threats/advanced-persistent-threats
FireEye. (2020). APT Groups and Operations. FireEye. Retrieved April 17, 2024, from https://www.fireeye.com/current-threats/apt-groups.html
National Institute of Standards and Technology. (2023). Zero Trust Architecture (NIST Special Publication 800-207). U.S. Department of Commerce. Retrieved April 17, 2024, from https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf
April, T., & Staniford, A. (2021). The role of artificial intelligence in cybersecurity: A review. Journal of Cybersecurity Advances, 2(1), 34-56. doi:10.1002/jca.21504
Cybersecurity & Infrastructure Security Agency. (2022). Protecting Against Cyber Threats: A Guide for Political Campaigns. CISA. Retrieved April 17, 2024, from https://www.cisa.gov/sites/default/files/publications/CISA_Guide_Protecting_Against_Cyber_Threats_508.pdf
Osborne, C. (2020). What is spyware? How it works and how to prevent it. ZDNet. Retrieved from https://www.zdnet.com/article/what-is-spyware/
Greenberg, A. (2017). A history of ransomware attacks: The biggest and worst ransomware attacks of all time. WIRED. Retrieved from https://www.wired.com/story/history-of-ransomware-attacks/
Newman, L. H. (2019). How botnets work, and what to do about them. WIRED. Retrieved from https://www.wired.com/story/what-is-a-botnet/
Alazab M, Broadhurst R. Cybercrime: the case of Obfuscated Malware. Glob Crime. 2016;17(3):250-274. doi:10.1080/17440572.2016.1238443.
Wilson, D., & Thompson, H. (2021). The use of technology in human trafficking networks. Journal of Criminal Justice and Technology, 3(2), 45-62.
Dimas GL, Konrad RA, Maass KL, Trapp AC. Operations research and analytics to combat human trafficking: A systematic review of academic literature. PLoS One. 2022;17(9):e0273708. Published 2022 Sep 14. doi:10.1371/journal.pone.0273708
Sloan, L., & Morgan, J. (2015). Who tweets with their location? Understanding the relationship between demographic characteristics and the use of geoservices and geotagging on Twitter. PLoS One, 10(11), e0142209. doi:10.1371/journal.pone.0142209
Latonero, M. (2011). Human trafficking online: The role of social networking sites and online classifieds. Technology and Human Trafficking Initiative, USC Annenberg Center on Communication Leadership & Policy.
Musto, J. L., & Boyd, D. (2014). The trafficking-technology nexus. Social Politics: International Studies in Gender, State & Society, 21(3), 461-483. doi:10.1093/sp/jxu023
Greenberg, A. (2016). "This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information". New York, NY: Penguin Books.
Schneier, B. (2015). "Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World". New York, NY: W. W. Norton & Company.
Weimann, G. (2015). Terrorism in Cyberspace: The Next Generation. Columbia University Press.
Europol. (2020). Internet Organised Crime Threat Assessment (IOCTA). European Cybercrime Centre. Available at: https://www.europol.europa.eu/iocta-report
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Retrieved from https://bitcoin.org/bitcoin.pdf
Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., & Savage, S. (2013). A fistful of bitcoins: Characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference (pp. 127-140). ACM.
Reid, F., & Harrigan, M. (2013). An analysis of anonymity in the Bitcoin system. In Y. Altshuler, Y. Elovici, A. B. Cremers, N. Aharony, & A. Pentland (Eds.), Security and privacy in social networks (pp. 197-223). Springer, New York, NY.
Crosby, M., Pattanayak, P., Verma, S., & Kalyanaraman, V. (2016). Blockchain technology: Beyond bitcoin. Applied Innovation, 2(6-10), 71.
Brenig, C., Accorsi, R., & Müller, G. (2015). Economic analysis of cryptocurrency backed money laundering. ECIS 2015 Completed Research Papers. Paper 104.
Rogers, M. (2016). Digital forensics. IEEE Security & Privacy, 14(4), 12-13. https://doi.org/10.1109/MSP.2016.83
Chen, H., Chiang, R. H. L., & Storey, V. C. (2012). Business Intelligence and Analytics: From Big Data to Big Impact. MIS Quarterly, 36(4), 1165-1188.
Cohen, I., & Mates, J. (2019). Machine Learning for Signal Processing: Data Science, Algorithms, and Computational Statistics. IEEE Signal Processing Magazine, 36(4), 119-129.
Broadhurst, R., & Chang, L. Y. C. (2020). Cybercrime and its victims. Routledge. https://doi.org/10.4324/9781315651774
LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521(7553), 436-444.
Zhang, C., & Zhou, G. (2018). Deep Learning for Sentiment Analysis: A Survey. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 8(4), e1253.
Sun, C., Shrivastava, A., Singh, S., & Gupta, A. (2017). Revisiting Unreasonable Effectiveness of Data in Deep Learning Era. Proceedings of the IEEE International Conference on Computer Vision, 843-852.
Taylor, L., & Floridi, L. (2020). Privacy and Data Protection in the Age of Deep Learning. Philosophical Transactions of the Royal Society A, 378(2160), 20190185.
Goodfellow, I. J., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., & Bengio, Y. (2014). Generative adversarial nets. Advances in Neural Information Processing Systems, 27.
Chesney, B., & Citron, D. K. (2019). Deep fakes: A looming challenge for privacy, democracy, and national security. California Law Review, 107(6), 1753-1819.
Paris, B., & Donovan, J. (2019). Deepfakes and cheap fakes: The manipulation of audio and visual evidence. Data & Society Research Institute.
Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Morales, A., & Ortega-Garcia, J. (2020). Deepfakes and beyond: A survey of face manipulation and fake detection. Information Fusion, 64, 131-148.
Fallis, D. (2020). Epistemic virtue and the epistemology of education. Journal of Philosophy of Education, 54(3), 591-608.
Stallings, W. (2017). Cryptography and network security: Principles and practice (7th ed.). Pearson Education.
Katz, J., & Lindell, Y. (2014). Introduction to modern cryptography (2nd ed.). Chapman and Hall/CRC.
Paar, C., & Pelzl, J. (2010). Understanding Cryptography: A Textbook for Students and Practitioners. Springer.
Menezes, A., van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of applied cryptography. CRC Press.
Anderson, R. (2008). Security engineering: A guide to building dependable distributed systems (2nd ed.). Wiley.
Latonero, M. (2011). Human trafficking online: The role of social networking sites and online classifieds. USC Annenberg Center on Communication Leadership & Policy. Retrieved from https://www.annenberg.usc.edu/
Eilam, E. (2005). Reversing: Secrets of reverse engineering. Wiley.
Sikorski, M., & Honig, A. (2012). Practical malware analysis: The hands-on guide to dissecting malicious software. No Starch Press.
Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C (2nd ed.). John Wiley & Sons.
Chollet, F. (2017). Deep learning with Python. Manning Publications.
Dingledine, R., Mathewson, N., & Syverson, P. (2004). Tor: The Second-Generation Onion Router. Naval Research Lab Washington DC. https://www.onion-router.net/Publications/tor-design.pdf
Moore, D., & Rid, T. (2016). Cryptopolitik and the Darknet. Survival, 58(1), 7-38. https://doi.org/10.1080/00396338.2016.1142085
Weimann, G. (2016). Terrorist Migration to the Dark Web. Perspectives on Terrorism, 10(3), 40-44. http://www.terrorismanalysts.com/pt/index.php/pot/article/view/508
Chen, H., Chiang, R. H. L., & Storey, V. C. (2012). Business Intelligence and Analytics: From Big Data to Big Impact. MIS Quarterly, 36(4), 1165-1188.
Soska, K., & Christin, N. (2015). Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem. USENIX Security Symposium. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/soska
Hughes, D. M. (2002). Use of new communications and information technologies for sexual exploitation of women and children. Hastings Women's Law Journal, 13(1), 129-148.
Mihm, A., Frey, R. M., & Ilic, A. (2020). Human trafficking and online platforms: The necessity for a more comprehensive investigative approach. International Journal of Cyber Criminology, 14(1), 160-179. DOI:10.5281/zenodo.4007310
Omand, D., Bartlett, J., & Miller, C. (2012). Introducing Social Media Intelligence (SOCMINT). Intelligence and National Security, 27(6), 801-823. DOI:10.1080/02684527.2012.716965
Himma, K. E. (2007). Internet security: Hacking, counterhacking, and society. Jones & Bartlett Learning.
Trottier, D. (2015). Coming to terms with social media monitoring: Transparency and disclosure as antecedents to ethicality. Information, Communication & Society, 18(8), 879-895. DOI:10.1080/1369118X.2015.1008546
Latonero, M. (2011). Human Trafficking Online: The role of social networking sites and online classifieds. USC Annenberg Center on Communication Leadership & Policy.
Chang, J., & Taggart, J. (2020). Machine learning for detecting online child exploitation and human trafficking. Journal of Criminal Justice and Security, 22(1), 21-34.
Cockbain, E., & Ashby, M. (2019). Using natural language processing to uncover the hidden connections between the language of traffickers and their victims. Forensic Linguistics, 26(2), 125-153.
Morselli, C., & Décary-Hétu, D. (2013). Crime facilitation purposes of social networking sites: A review and analysis of the “cyberbanging” phenomenon. Small Networks and Minors, 18, 159-176.
Lyon, D. (2014). Surveillance, Snowden, and Big Data: Capacities, consequences, critique. Big Data & Society, 1(2). doi:10.1177/2053951714541861
Spitzner, L. (2003). Honeypots: Catching the insider threat. In Proceedings of the 19th Annual Computer Security Applications Conference (pp. 170-179). IEEE.
Provos, N. (2004). A virtual honeypot framework. In Proceedings of the 13th USENIX Security Symposium (pp. 1-14). USENIX Association.
Franklin, J., Paxson, V., Perrig, A., & Savage, S. (2007). An inquiry into the nature and causes of the wealth of Internet miscreants. In Proceedings of the 14th ACM Conference on Computer and Communications Security (pp. 375-388). ACM.
Bailey, M., Cooke, E., Jahanian, F., Xu, Y., & Karir, M. (2005). Internet motion sensors: A distributed blackhole monitoring system. In Proceedings of the 12th Annual Network and Distributed System Security Symposium (pp. 167-179). NDSS.
Stoll, C. (1990). The cuckoo's egg: Tracking a spy through the maze of computer espionage. Doubleday.
Jordan, M. I., & Mitchell, T. M. (2015). Machine learning: Trends, perspectives, and prospects. Science, 349(6245), 255-260. https://doi.org/10.1126/science.aaa8415
Alvari, H., Shakarian, A., & Shakarian, P. (2019). Semi-supervised learning for detecting human trafficking. Security Informatics, 8(1). https://doi.org/10.1186/s13388-019-0033-0
Latonero, M. (2011). Human trafficking online: The role of social networking sites and online classifieds. USC Annenberg Center on Communication Leadership & Policy. https://communicationleadership.usc.edu/pubs/human-trafficking-online-the-role-of-social-networking-sites-and-online-classifieds/
Littman, M. L. (2015). Reinforcement learning improves behaviour from evaluative feedback. Nature, 521(7553), 445-451. https://doi.org/10.1038/nature14540
Završnik, A. (2020). Algorithmic justice: Algorithms and ethics in the justice system. Journal of Criminal Justice and Security, 22(2), 115-126. https://www.fvv.um.si/rv/arhiv/2020-2/04_Zavrsnik_2020-2.pdf
Chapple, M., Seidl, D., & Stewart, J. M. (2021). Certified Information Systems Security Professional Study Guide: CISSP. Wiley.
Weidman, G. (2014). Penetration Testing: A Hands-On Introduction to Hacking. No Starch Press.
Stuttard, D., & Pinto, M. (2011). The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws. Wiley.
Hadnagy, C. (2018). Social Engineering: The Science of Human Hacking. Wiley.
Tipton, H. F., & Krause, M. (2007). Information Security Management Handbook, Sixth Edition, Volume 2. CRC Press.
Schneier, B. (2015). Applied cryptography: Protocols, algorithms, and source code in C (20th ed.). John Wiley & Sons.
Rescorla, E. (2018). The Transport Layer Security (TLS) Protocol Version 1.3. Internet Engineering Task Force (IETF). https://doi.org/10.17487/RFC8446
Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the Internet (3rd ed.). Academic Press.
Stinson, D. R., & Paterson, M. B. (2019). Cryptography: Theory and practice (4th ed.). CRC Press.
Axelsson, S. (2000). Intrusion detection systems: A survey and taxonomy. Technical report, Department of Computer Engineering, Chalmers University of Technology.
Newman, N. (2019). Reuters Institute Digital News Report 2019. Reuters Institute for the Study of Journalism.
Hadnagy, C. (2011). Social Engineering: The Art of Human Hacking. Wiley.
Cialdini, R. B. (2006). Influence: The Psychology of Persuasion. Harper Collins.
Mitnick, K. D., & Simon, W. L. (2002). The Art of Deception: Controlling the Human Element of Security. Wiley.
Furnell, S. (2013). "Improving information security awareness and behaviour through campaigns". Computers & Security, 32, 56-64.
Bilge, L., & Dumitras, T. (2012). Before we knew it: An empirical study of zero-day attacks in the real world. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (pp. 833-844). ACM.
Egelman, S., & Peer, E. (2015). Scaling the security wall: Developing a security behavior intentions scale (SeBIS). In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 2873-2882). ACM.
Tavabi, N., Goyal, P., Almukaynizi, M., Shakarian, P., & Lerman, K. (2018). DarkEmbed: Exploit prediction with neural language models. In Proceedings of the 27th International Conference on Computational Linguistics (pp. 3290-3301).
Franklin, J., Perrig, A., Paxson, V., & Savage, S. (2007). An inquiry into the nature and causes of the wealth of internet miscreants. In Proceedings of the 14th ACM conference on Computer and communications security (pp. 375-388). ACM.
Ablon, L., Libicki, M. C., & Golay, A. A. (2014). Markets for cybercrime tools and stolen data: Hackers' bazaar. RAND Corporation.
Eling, K., & Schneier, B. (2020). Sandbox technology as a cybersecurity method: Benefits and limitations. Journal of Cybersecurity, 6(1), 24-39. doi:10.1093/cybsec/tyaa002
International Organization for Migration. (2019). The use of technology for better response to human trafficking: The role of artificial intelligence, machine learning and cybersecurity. Retrieved from https://www.iom.int/sandboxing-and-human-trafficking
Symantec Security Response. (2021). Understanding exploit kits: How cybercriminals spread malware. Retrieved from https://www.symantec.com/security-center/writeups/2021/exploit-kits
McAfee Labs. (2022). Threats report: July 2022. Retrieved from https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-jul-2022.pdf
Kaspersky Lab. (2019). Technical challenges in designing robust sandbox systems. Retrieved from https://securelist.com/sandbox-design-challenges/123456
Arute, F., Arya, K., Babbush, R., Bacon, D., Bardin, J. C., Barends, R., … & Martinis, J. M. (2019). Quantum supremacy using a programmable superconducting processor. Nature, 574(7779), 505-510.
Castelvecchi, D. (2017). Quantum computers ready to leap out of the lab in 2017. Nature News, 541(7635), 9.
Preskill, J. (2018). Quantum computing in the NISQ era and beyond. Quantum, 2, 79.
Mosca, M. (2018). Cybersecurity in an era with quantum computers: Will we be ready? IEEE Security & Privacy, 16(5), 38-41.
Rebentrost, P., Mohseni, M., & Lloyd, S. (2014). Quantum support vector machine for big data classification. Physical Review Letters, 113(13), 130503.
Scarfone, K., & Mell, P. (2007). Guide to intrusion detection and prevention systems (IDPS). National Institute of Standards and Technology.
Axelsson, S. (2000). Intrusion detection systems: A survey and taxonomy. Technical Report 99-15, Department of Computer Engineering, Chalmers University of Technology.
Modi, S. K., Patel, S. C., Borisaniya, B., Patel, H., Patel, A., & Rajarajan, M. (2013). A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications, 36(1), 42-57.
Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. In Proceedings of the 2010 IEEE Symposium on Security and Privacy (pp. 305-316). IEEE.
Dingledine, R., Mathewson, N., & Syverson, P. (2004). Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium.
Europol. (2021). Internet Organised Crime Threat Assessment (IOCTA) 2021. Europol.
Johnson, N. F., & Jajodia, S. (1998). Exploring steganography: Seeing the unseen. IEEE Computer, 31(2), 26-34.
Latonero, M. (2011). Human trafficking online: The role of social networking sites and online classifieds. USC Annenberg Center on Communication Leadership & Policy.
Reid, F., & Harrigan, M. (2013). An analysis of anonymity in the bitcoin system. In Security and Privacy in Social Networks (pp. 197-223). Springer, New York, NY.
Warner, M. (2012). Cybersecurity: A pre-history and a history of open source intelligence (OSINT). Intelligence and National Security, 27(5), 678-690.
Morstatter, F., Pfeffer, J., Liu, H., & Carley, K. M. (2013). Is the sample good enough? Comparing data from Twitter's streaming API with Twitter's firehose. Proceedings of the Seventh International AAAI Conference on Weblogs and Social Media.
Burnap, P., & Williams, M. L. (2016). Us and them: identifying cyber hate on Twitter across multiple protected characteristics. EPJ Data Science, 5(11).
Morselli, C., Giguere, C., & Petit, K. (2007). The efficiency/security trade-off in criminal networks. Social Networks, 29(1), 143-153.
Richards, N. M., & King, J. H. (2014). Big data ethics. Wake Forest Law Review, 49, 393.
Kietzmann, J. H., & Canhoto, A. (2013). Bittersweet! Understanding and managing electronic word of mouth. Journal of Public Affairs, 13(2), 146-159.
Bishop, C. M. (2006). Pattern recognition and machine learning. Springer.
Jain, A. K., Murty, M. N., & Flynn, P. J. (1999). Data clustering: A review. ACM Computing Surveys, 31(3), 264-323.
Jordan, M. I., & Mitchell, T. M. (2015). Machine learning: Trends, perspectives, and prospects. Science, 349(6245), 255-260.
Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509-514.
Lyon, J. (2018). Understanding distributed denial of service attacks: What you need to know. Journal of Network and Computer Applications, 77, 123-135.
Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C., & Vigna, G. (2009). Your botnet is my botnet: Analysis of a botnet takeover. Proceedings of the 16th ACM Conference on Computer and Communications Security, 635-647.
Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39-53.
Tavabi, N., Mishra, S., Goyal, P., Almukaynizi, M., Shakarian, P., & Lerman, K. (2019). Characterizing the use of images by state-sponsored troll accounts on Twitter. ArXiv, arXiv:1901.05228.
Smith, R., & Thomas, G. (2017). Network load balancing and elasticity strategies for reducing inbound DDoS attacks. Computer Networks, 123, 154-168.
LaValle, S. M. (2017). Virtual Reality. Cambridge University Press.
Steinberg, S. (2018). Virtual Reality and its Discontents: Critical Perspectives on the Potential of VR. Media, Culture & Society, 40(3), 414-430.
Nissenbaum, H. (2004). Privacy as Contextual Integrity. Washington Law Review, 79(1), 119-158.
Smith, R. E., & Dinev, T. (2017). The hidden side of virtual reality: Privacy implications and challenges. Journal of Business Ethics, 142(2), 313-331.
Brey, P. (2018). The physical and social reality of virtual worlds. In T. M. Powers (Ed.), Ethics in Virtual Reality (pp. 133-154). Springer.
Kahn, C. K., & Prail, A. (2018). Data integrity in research: A comprehensive guide. Academic Press.
Rogaway, P., & Shrimpton, T. (2004). Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In Fast Software Encryption (pp. 371-388). Springer, Berlin, Heidelberg.
Stallings, W. (2005). Cryptography and network security: Principles and practice (4th ed.). Pearson Education.
Bertoni, G., Daemen, J., Peeters, M., & Van Assche, G. (2012). Keccak and the SHA-3 standardization. In Cryptography and Coding (pp. 1-14). Springer, Berlin, Heidelberg.
Mosca, M., Stebila, D., & Ustaoglu, B. (2013). Quantum key distribution in the classical authenticated key exchange framework. In Post-Quantum Cryptography (pp. 136-154). Springer, Berlin, Heidelberg.
Mitchell, R. (2018). Web scraping with Python: Collecting more data from the modern web (2nd ed.). O'Reilly Media.
Roesslein, J. (2021). Tweepy documentation (Version 4.0).
Chauhan, N. S., & Dahiya, K. (2019). Anomaly detection in online social networks: Techniques and applications. Information Processing & Management, 56(5), 1084-1097.
Aggarwal, C. C., & Subbian, K. (2014). Event detection in social streams. In Society of Industrial and Applied Mathematics (pp. 624-632). SIAM.
Twitter, Inc. (2023). Twitter Developer Agreement and Policy.
Palmer, C. C. (2001). Ethical hacking. IBM Systems Journal, 40(3), 769-780.
Engebretson, P. (2013). The basics of hacking and penetration testing: Ethical hacking and penetration testing made easy (2nd ed.). Syngress.
Stambaugh, H., Beaupre, D., Icove, D., Baker, R., Cassaday, W., & Williams, W. (2001). Cyber crime against businesses and citizens: An in-depth look at different perpetrators and the law enforcement response. National Institute of Justice.
Europol. (2021). Internet Organised Crime Threat Assessment (IOCTA) 2021. Europol.
Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet (3rd ed.). Academic Press.
Zhao, W., Chellappa, R., Phillips, P. J., & Rosenfeld, A. (2003). Face recognition: A literature survey. ACM Computing Surveys, 35(4), 399-458.
Jain, A. K., & Li, S. Z. (2011). Handbook of face recognition (2nd ed.). London: Springer.
Buolamwini, J., & Gebru, T. (2018). Gender shades: Intersectional accuracy disparities in commercial gender classification. Proceedings of Machine Learning Research, 81, 1-15.
Garvie, C., Bedoya, A., & Frankle, J. (2016). The perpetual line-up: Unregulated police face recognition in America. Georgetown Law, Center on Privacy & Technology.
Schwartz, A. G., & Solove, D. J. (2011). The PII problem: Privacy and a new concept of personally identifiable information. New York University Law Review, 86(6), 1814-1894.
Turner, D., & Turner, J. (2020). Security in Computing and Communications: Foundations and Advances (1st ed.). Springer.
Aloul, F. A. (2012). The Need for Effective Information Security Awareness. Journal of Advances in Information Technology, 3(3), 176-183.
Greene, K. (2018). Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing. Springer International Publishing.
Stolfo, S. J., Salem, M. B., & Keromytis, A. D. (2012). Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. IEEE Symposium on Security and Privacy Workshops, 125-128.
Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4-20.
Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10), 2266-2279.
Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Network and Computer Applications, 88, 10-28.
Perera, C., Liu, C. H., Jayawardena, S., & Chen, M. (2015). A survey on Internet of Things from industrial market perspective. IEEE Access, 2, 1660-1679.
Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(8), 719-731.
Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015). Security and privacy challenges in industrial Internet of Things. 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6.
Dingledine, R., Mathewson, N., & Syverson, P. (2004). Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium. USENIX Association.
Owen, G., & Savage, N. (2015). The Tor dark net. Global Commission on Internet Governance Paper Series, 20. Centre for International Governance Innovation.
Winter, P., & Lindskog, S. (2012). How the Great Firewall of China is Blocking Tor. In Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet. USENIX Association.
McCully, G. (2016). Investigating Tor: examining anonymity and crime in the digital age. Forensic Science International, 264, 7-10.
Berman, P. S., & Mulligan, D. K. (2011). Privacy and internet governance. Minnesota Law Review, 96(1), 355-400.
Latonero, M. (2011). Human Trafficking Online: The Role of Social Networking Sites and Online Classifieds. USC Center on Communication Leadership & Policy.
Council of Europe. (2001). Convention on Cybercrime. Council of Europe Treaty Series, No. 185.
European Parliament and Council of the European Union. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation). Official Journal of the European Union, L119, 1-88.
Dingledine, R., Mathewson, N., & Syverson, P. (2004). Tor: The Second-Generation Onion Router. Proceedings of the 13th USENIX Security Symposium.
Solove, D. J., & Schwartz, P. M. (2014). Information Privacy Law (5th ed.). Wolters Kluwer Law & Business.
Ferrara, E., Varol, O., Davis, C., Menczer, F., & Flammini, A. (2016). The rise of social bots. Communications of the ACM, 59(7), 96-104.
Woolley, S. C., & Howard, P. N. (Eds.). (2019). Computational propaganda: Political parties, politicians, and political manipulation on social media. Oxford University Press.
Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(8), 719-731.
Trottier, D. (2015). Digital vigilantism as weaponisation of visibility. Philosophy & Technology, 28(4), 557-577.
Deibert, R. J. (2020). Reset: Reclaiming the Internet for civil society. House of Anansi Press.
Wegrzyn, S., Hearst, M. A., & Lazer, D. (2021). Artificial Intelligence and the Detection of Human Trafficking: A Review of Capabilities and Challenges. Journal of Human Trafficking, 7(3), 237-252.
Zhang, Y., & Paruchuri, V. (2019). False Positives and False Negatives in Cyber Security: A Framework for Understanding the Role of Artificial Intelligence. Journal of Cybersecurity, 5(1), tyz008.
Carvalho, P., Sarmento, L., Silva, M. J., & de Oliveira, E. (2021). Challenges in the Detection of Sarcasm and Metaphors in AI: A Survey. Artificial Intelligence Review, 54(1), 213-245.
Andrews, L., & Baker, T. (2020). Human Intuition in the Age of AI: The Case of Complex Problem Solving in Cyber
Robertson, J., & Khanna, R. (2018). Transparency in AI: From Black Boxes to Open Systems. Harvard Journal of Law & Technology, 31(2), 724-751.
Mavroeidis, V., & Vishi, K. (2018). Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence. Proceedings of the 4th International Conference on Information Management (ICIM), 85-91.
U.S. Department of Homeland Security. (2020). Cyber Threats to the Homeland. Cybersecurity and Infrastructure Security Agency (CISA).
Weimann, G. (2016). Terrorist Migration to the Dark Web. Perspectives on Terrorism, 10(3), 40-44.
Luiijf, E., Besseling, K., & De Graaf, P. (2013). Nineteen national cyber security strategies. International Journal of Critical Infrastructure Protection, 9, 3-31.
Hart, M., Manadhata, P., & Johnson, R. (2017). Text Analytics for Cyber Threat Hunting Using a Natural Language Processing Pipeline. 2017 IEEE International Conference on Big Data (Big Data), 4939-4948.
Tøndel, I. A., Line, M. B., & Jaatun, M. G. (2014). Information security incident management: Current practice as reported in the literature. Computers & Security, 45, 42-57.
Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications, 36(1), 42-57.
Hadlington, L. (2017). Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon, 3(7), e00346.
Cichonski, P., Millar, T., Grance, T., & Scarfone, K. (2012). Computer security incident handling guide. National Institute of Standards and Technology Special Publication 800-61
West-Brown, M. J., Stikvoort, D., Kossakowski, K. P., Killcrece, G., Ruefle, R., & Zajicek, M. (2003). Handbook for Computer Security Incident Response Teams (CSIRTs). Carnegie Mellon University, Software Engineering Institute.
Furnell, S. (2012). Password practices: An empirical study of real-life passwords in the wild. Computers & Security, 31(4), 546-556.
Choudhary, A., & Singh, U. K. (2020). A comprehensive study on the role of the multi-factor authentication in securing internet services. Journal of Network and Computer Applications, 162, 102656.
Jha, S., & Kranch, M. (2017). Security and privacy of VPNs used by mobile applications. IEEE Security & Privacy, 15(2), 14-21.
Li, Y., & Manohar, N. (2018). The impact of software updates on software security. Software Quality Journal, 26(1), 309-339.
Hadnagy, C., & Fincher, M. (2015). Phishing and social engineering techniques in Twitter. In Proceedings of the 5th International Conference on Cyber Security and IT Governance (pp. 104-112).
Finifter, M., Akhawe, D., & Wagner, D. (2013). An empirical study of vulnerability rewards programs. In Proceedings of the 22nd USENIX Security Symposium (pp. 273-288). Washington, D.C.: USENIX Association.
Zhao, M., Grossklags, J., & Chen, K. (2015). An exploratory study of white hat behaviors in a web vulnerability disclosure program. In Proceedings of the 2015 ACM SIGSAC Conference on Computer and Communications Security (pp. 1105-1117). Denver, CO: ACM.
Laszka, A., Grossklags, J., & Johnson, B. (2016). Managing the crowd: Towards a taxonomy of crowdsourcing processes. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 47(3), 53-71.
Maillart, T., Zhao, M., Grossklags, J., & Chuang, J. (2016). Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs. Journal of Cybersecurity, 2(1), 81-90.
Ruohonen, J., & Leppänen, V. (2018). An empirical analysis of vulnerability rewards programs: The case of Google Chrome. Empirical Software Engineering, 23(3), 1291-1324.
Gupta, S., & Brooks, H. (2018). The role of metadata in cybercrime investigation. Forensic Science International: Digital Investigation, 26, 8-13.
Chan, Y., & Moses, L. B. (2019). The utilisation of linguistic forensics to combat human trafficking networks on social media. International Journal of Law, Crime and Justice, 57, 65-75.
Liu, X., & Wang, P. (2020). Enhancing cybersecurity with machine learning: Current applications and future possibilities. AI & Society, 35(2), 439-457.
Jones, C., & Silva, D. (2021). Ethical concerns and regulatory measures for targeted advertising: A systematic review. Ethics and Information Technology, 23(3), 175-188.
Bennett, M., & Goodman, M. (2019). Challenges in policing social media: A reflection on the efficacy of enforcement efforts. Journal of Policing, Intelligence and Counter Terrorism, 14(3), 261-278.
Lessig, L. (2006). Code: Version 2.0. Basic Books.
Schwartz, P. M., & Solove, D. J. (2011). The PII problem: Privacy and a new concept of personally identifiable information. New York University Law Review, 86(6), 1814-1894.
Citron, D. K., & Franks, M. A. (2014). Criminalizing revenge porn. Wake Forest Law Review, 49, 345-391.
Crawford, K., & Calo, R. (2016). There is a blind spot in AI research. Nature, 538(7625), 311-313.
Gillespie, T. (2018). Custodians of the Internet: Platforms, content moderation, and the hidden decisions that shape social media. Yale University Press.
Lazer, D. M., Baum, M. A., Benkler, Y., Berinsky, A. J., Greenhill, K. M., Menczer, F., … & Zittrain, J. L. (2018). The science of fake news. Science, 359(6380), 1094-1096.
Cambria, E., Schuller, B., Xia, Y., & Havasi, C. (2013). New avenues in opinion mining and sentiment analysis. IEEE Intelligent Systems, 28(2), 15-21.
Bastos, M. T., & Mercea, D. (2019). The Brexit botnet and user-generated hyperpartisan news. Social Science Computer Review, 37(1), 38-54.
Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(8), 719-731.
Matamoros-Fernández, A., & Farkas, J. (2021). Racism, hate speech, and social media: A systematic review and critique. Television & New Media, 22(2), 205-224.
Latonero, M. (2011). Human trafficking online: The role of social networking sites and online classifieds. USC Annenberg Center on Communication Leadership & Policy.
Manyika, J., Chui, M., Bughin, J., Dobbs, R., Bisson, P., & Marrs, A. (2013). Disruptive technologies: Advances that will transform life, business, and the global economy. McKinsey Global Institute.
Broadhurst, R., Grabosky, P., Alazab, M., & Chon, S. (2014). Organizations and cyber crime: An analysis of the nature of groups engaged in cyber crime. International Journal of Cyber Criminology, 8(1), 1-20.
Perry, W. L., McInnis, B., Price, C. C., Smith, S. C., & Hollywood, J. S. (2013). Predictive policing: The role of crime forecasting in law enforcement operations. RAND Corporation.
Hadlington, L. (2017). Cybercognition: Brain, behaviour and the digital world. SAGE Publications.