Nelson, C. A. (2017). Early adversity and critical periods: Neurodevelopmental consequences of violating the expectable environment. Trends in Neurosciences, 40(4), 211-223.
Gunnar, M. R., & Quevedo, K. (2007). The neurobiology of stress and development. Annual Review of Psychology, 58, 145-173.
Masten, A. S. (2001). Ordinary magic: Resilience processes in development. American Psychologist, 56(3), 227-238.
Simonton, D. K. (2000). Creativity: Cognitive, personal, developmental, and social aspects. American Psychologist, 55(1), 151-158.
Vaillant, G. E. (1977). Adaptation to life. Boston: Little, Brown and Company. (Chapter on defense mechanisms, specifically sublimation.)
Luby, J. L. (2019). Early childhood adversity, toxic stress, and the role of the pediatrician: Translating developmental science into lifelong health. Pediatrics, 139(1), e20163023.
van der Kolk, B. A. (2014). The body keeps the score: Brain, mind, and body in the healing of trauma. Viking.
Sroufe, L. A., Egeland, B., Carlson, E. A., & Collins, W. A. (2005). The development of the person: The Minnesota study of risk and adaptation from birth to adulthood. The Guilford Press.
Turkle, S. (2011). Alone together: Why we expect more from technology and less from each other. Basic Books.
Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age. Polity.
Luthar, S. S., Cicchetti, D., & Becker, B. (2000). The construct of resilience: A critical evaluation and guidelines for future work. Child Development, 71(3), 543-562.
Ozer, E. J., Best, S. R., Lipsey, T. L., & Weiss, D. S. (2003). Predictors of posttraumatic stress disorder and symptoms in adults: A meta-analysis. Psychological Bulletin, 129(1), 52-73.
Jordan, T., & Taylor, P. A. (1998). A sociology of hackers. The Sociological Review, 46(4), 757-780.
Merton, R. K. (1938). Social structure and anomie. American Sociological Review, 3(5), 672-682.
Koenen, K. C., Moffitt, T. E., Poulton, R., Martin, J., & Caspi, A. (2007). Early childhood factors associated with the development of post-traumatic stress disorder: Results from a longitudinal birth cohort. Psychological Medicine, 37(2), 181-192.
Teicher, M. H., Samson, J. A., Anderson, C. M., & Ohashi, K. (2016). The effects of childhood maltreatment on brain structure, function and connectivity. Nature Reviews Neuroscience, 17(10), 652-666.
Farrington, D. P., Loeber, R., & Yin, Y. (2010). Risk factors for delinquency over the life course. Journal of Developmental and Life-Course Criminology, 1(2), 150-179.
Koenigs, M., & Grafman, J. (2009). The functional neuroanatomy of depression: Distinct roles for ventromedial and dorsolateral prefrontal cortex. Behavioural Brain Research, 201(2), 239-243.
Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress: Theory and prevention of technology-enabled offenses. Crime Science Series. Routledge.
Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age. Polity.
Turkle, S. (2011). Alone Together: Why We Expect More from Technology and Less from Each Other. New York, NY: Basic Books.
Widom, C. S. (1989). The cycle of violence. Science, 244(4901), 160-166.
Varela, F. J., Thompson, E., & Rosch, E. (1991). The Embodied Mind: Cognitive Science and Human Experience. Cambridge, MA: MIT Press.
Pager, D., & Quillian, L. (2005). Walking the talk? What employers say versus what they do. American Sociological Review, 70(3), 355-380.
Suler, J. (2004). The online disinhibition effect. CyberPsychology & Behavior, 7(3), 321-326.
Cicchetti, D., & Toth, S. L. (2005). Child maltreatment. Annual Review of Clinical Psychology, 1, 409-438.
Turkle, S. (1995). Life on the screen: Identity in the age of the Internet. Simon & Schuster.
Castells, M. (2001). The Internet galaxy: Reflections on the Internet, business, and society. Oxford University Press.
Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2015). Cybercrime and digital forensics: An introduction. Routledge.
Bandura, A., Caprara, G. V., & Zsolnai, L. (Eds.). (2000). Corporate social responsibility and business ethics. Ashgate.
Cicchetti, D., & Toth, S. L. (2005). Child maltreatment. Annual Review of Clinical Psychology, 1, 409-438.
Suler, J. (2004). The online disinhibition effect. Cyberpsychology & Behavior, 7(3), 321-326.
Aiken, M., & Shonkoff, J. P. (2010). The cybernetic brain: Sketches of another future. Journal of Child Psychology and Psychiatry, 51(6), 728-748.
Wilkinson, R., & Pickett, K. (2009). The spirit level: Why more equal societies almost always do better. London: Allen Lane.
Healy, D. (2004). The new police science: The police power in domestic and international governance. Stanford, CA: Stanford University Press.
Van der Kolk, B. A. (2014). The body keeps the score: Brain, mind, and body in the healing of trauma. Viking.
Goleman, D. (1995). Emotional intelligence: Why it can matter more than IQ. Bantam Books.
Turkle, S. (2011). Alone together: Why we expect more from technology and less from each other. Basic Books.
Lessig, L. (2006). Code: Version 2.0. Basic Books.
Castells, M. (2001). The Internet galaxy: Reflections on the Internet, business, and society. Oxford University Press.
Teicher, M. H., Samson, J. A., Anderson, C. M., & Ohashi, K. (2016). The effects of childhood maltreatment on brain structure, function and connectivity. Nature Reviews Neuroscience, 17(10), 652-666.
DeBellis, M. D., & Zisk, A. (2014). The biological effects of childhood trauma. Child and Adolescent Psychiatric Clinics of North America, 23(2), 185-222.
Nobles, M. R., & Cramer, R. J. (2014). Digital retribution: Examining the relationship between online and offline antisocial behavior. Criminal Justice and Behavior, 41(1), 138-154.
Huesmann, L. R. (1998). The role of social information processing and cognitive schema in the acquisition and maintenance of habitual aggressive behavior. In R. G. Geen & E. Donnerstein (Eds.), Human aggression: Theories, research, and implications for social policy (pp. 73-109). Academic Press.
Perry, B. D. (2006). Applying principles of neurodevelopment to clinical work with maltreated and traumatized children: The neurosequential model of therapeutics. In N. B. Webb (Ed.), Working with traumatized youth in child welfare (pp. 27-52). The Guilford Press.
Turkle, S. (2011). Alone Together: Why We Expect More from Technology and Less from Each Other. Basic Books.
Carr, N. (2010). The Shallows: What the Internet is Doing to Our Brains. W.W. Norton & Company.
Papert, S. (1980). Mindstorms: Children, Computers, and Powerful Ideas. Basic Books.
Ito, M., & Bittanti, M. (Eds.). (2009). Hanging Out, Messing Around, and Geeking Out: Kids Living and Learning with New Media. The MIT Press.
Gergen, K. J. (2000). The Saturated Self: Dilemmas of Identity in Contemporary Life. Basic Books.
Herman, J. L. (2015). Trauma and recovery: The aftermath of violence—from domestic abuse to political terror. Basic Books.
Blackwell, A. F., & Green, T. R. G. (2003). Notational systems—the cognitive dimensions of notations framework. In J. M. Carroll (Ed.), HCI Models, Theories, and Frameworks: Toward a Multidisciplinary Science (pp. 103-134). Morgan Kaufmann.
Turkle, S. (1984). The second self: Computers and the human spirit. MIT Press.
Van der Kolk, B. A. (2014). The body keeps the score: Brain, mind, and body in the healing of trauma. Viking.
Csikszentmihalyi, M. (1996). Creativity: Flow and the psychology of discovery and invention. HarperCollins.
Bowlby, J. (1988). A secure base: Parent-child attachment and healthy human development. New York: Basic Books.
Gottman, J., & DeClaire, J. (1997). The heart of parenting: How to raise an emotionally intelligent child. New York: Simon & Schuster.
Perry, B. D., & Szalavitz, M. (2006). The boy who was raised as a dog: And other stories from a child psychiatrist's notebook—What traumatized children can teach us about loss, love, and healing. New York: Basic Books.
Turkle, S. (1995). Life on the screen: Identity in the age of the Internet. New York: Simon & Schuster.
Hinduja, S., & Patchin, J. W. (2013). Bullying beyond the schoolyard: Preventing and responding to cyberbullying. Thousand Oaks, CA: Corwin Press.
Schimmenti, A., & Caretti, V. (2016). Linking the overwhelming with the unbearable: Developmental trauma, dissociation, and the disconnected self. Psychoanalytic Psychology, 33(1), 106-128.
Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age. Polity.
Rogers, M. K. (2006). A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital Investigation, 3(2), 97-102.
Suler, J. (2004). The Online Disinhibition Effect. Cyberpsychology & Behavior, 7(3), 321-326.
Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress: Theory and prevention of technology-enabled offenses. Routledge.
Brenner, S. W. (2010). Cybercrime: Criminal threats from cyberspace. Praeger.
Prensky, M. (2001). Digital natives, digital immigrants part 1. On the Horizon, 9(5), 1-6.
Herman, J. L. (1997). Trauma and recovery: The aftermath of violence—from domestic abuse to political terror. New York, NY: Basic Books.
Garbarino, J., & Bradshaw, C. P. (2002). What children can tell us about living in danger. American Psychologist, 57(6-7), 457-466.
Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age. Cambridge, UK: Polity.
Lessig, L. (2006). Code: Version 2.0. Basic Books.
Masten, A. S. (2001). Ordinary magic: Resilience processes in development. American Psychologist, 56(3), 227-238.
Johnson, D. R., & Post, D. (1996). Law and Borders – The Rise of Law in Cyberspace. Stanford Law Review, 48(5), 1367-1402.
Turkle, S. (2011). Alone Together: Why We Expect More from Technology and Less from Each Other. Basic Books.
Lanier, J. (2010). You Are Not a Gadget: A Manifesto. Knopf.
Foucault, M. (1978). *The History of Sexuality: Volume 1: An Introduction
Kallberg, J., & Thuraisingham, B. (2016). Towards cyber operations - the new role of academic cyber security research and education. Journal of Strategic Studies, 39(5-6), 778-790.
Libicki, M. C. (2016). Cyberspace in Peace and War. Naval Institute Press.
Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress: Theory and prevention of technology-enabled offenses. Routledge.
Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age. Polity.
Weimann, G. (2005). Cyberterrorism: How real is the threat? United States Institute of Peace Special Report, 119, 1-12.
van der Kolk, B. A. (2014). The Body Keeps the Score: Brain, Mind, and Body in the Healing of Trauma. New York, NY: Viking.
Suler, J. (2004). The Online Disinhibition Effect. Cyberpsychology & Behavior, 7(3), 321-326.
Mann, I., & Sutton, M. (1998). NetCrime: More change in the organization of thieving. British Journal of Criminology, 38(2), 201-229.
Lessig, L. (2006). Code: Version 2.0. New York, NY: Basic Books.
Herman, J. L. (1992). Trauma and Recovery: The Aftermath of Violence - from Domestic Abuse to Political Terror. New York, NY: Basic Books.
Dalenberg, C. J., Brand, B. L., Gleaves, D. H., Dorahy, M. J., Loewenstein, R. J., Cardeña, E., … & Spiegel, D. (2012). Evaluation of the evidence for the trauma and fantasy models of dissociation. Psychological Bulletin, 138(3), 550.
Suler, J. (2004). The online disinhibition effect. Cyberpsychology & Behavior, 7(3), 321-326.
Coleman, G. (2014). Hacker, hoaxer, whistleblower, spy: The many faces of Anonymous. Verso Books.
Turkle, S. (2011). Alone Together: Why We Expect More from Technology and Less from Each Other. Basic Books.
Young, K. S. (1998). Internet addiction: The emergence of a new clinical disorder. Cyberpsychology & Behavior, 1(3), 237-244.
Yee, N., & Bailenson, J. N. (2007). The Proteus effect: The effect of transformed self-representation on behavior. Human Communication Research, 33(3), 271-290. doi:10.1111/j.1468-2958.2007.00299.x
Banks, J., & Bowman, N. D. (2016). Avatars are (sometimes) people too: Linguistic indicators of parasocial and social ties in player–avatar relationships. New Media & Society, 18(7), 1257-1276. doi:10.1177/1461444814554898
Castronova, E. (2003). Theory of the Avatar. CESifo Working Paper Series No. 863. Munich: CESifo Group Munich. Retrieved from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=385103
Van der Kolk, B. (2014). The body keeps the score: Brain, mind, and body in the healing of trauma. New York, NY: Viking. ISBN 978-0670785933
Turkle, S. (1995). Life on the screen: Identity in the age of the Internet. New York, NY: Simon & Schuster. ISBN 978-07432460
Halder, D., & Jaishankar, K. (2011). Cyber crime and the victimization of women: Laws, rights and regulations. Hershey, PA: IGI Global.
Jordan, T., & Taylor, P. A. (2004). Hacktivism and cyberwars: Rebels with a cause? New York, NY: Routledge.
Solove, D. J. (2004). The digital person: Technology and privacy in the information age. New York, NY: NYU Press.
Lessig, L. (2004). Free culture: How big media uses technology and the law to lock down culture and control creativity. New York, NY: Penguin Press.
Sporns, O. (2011). Networks of the brain. MIT Press.
Fink, D., & Penton-Voak, I. S. (2020). Cyberpsychology as everyday digital experience across the lifespan. Palgrave Macmillan.
Kozlowska, K., Walker, P., McLean, L., & Carrive, P. (2015). Fear and the Defense Cascade: Clinical Implications and Management. Harvard Review of Psychiatry, 23(4), 263-287.
Cicchetti, D., & Toth, S. L. (2005). Child maltreatment. Annual Review of Clinical Psychology, 1, 409-438. https://doi.org/10.1146/annurev.clinpsy.1.102803.144029
Freud, A. (1936). The ego and the mechanisms of defence. London: Hogarth Press and Institute of Psycho-Analysis.
Stein, M. L., & Turkle, S. (1995). Psychoanalytic psychiatry and psychology: Clinical and theoretical papers. New York, NY: International Universities Press.
Briere, J., & Scott, C. (2015). Principles of trauma therapy: A guide to symptoms, evaluation, and treatment (DSM-5 update). SAGE Publications.
Van der Kolk, B. (2015). The body keeps the score: Brain, mind, and body in the healing of trauma. Penguin Books.
Yen, J., & Gansner, M. (2020). The role of technology in clinical neuropsychology. Oxford University Press.
Cook, A., Blaustein, M., Spinazzola, J., & van der Kolk, B. (2003). Complex trauma in children and adolescents. Psychiatric Annals, 33(5), 390-398. DOI:10.3928/0048-5713-20030501-05
Felitti, V. J., Anda, R. F., Nordenberg, D., Williamson, D. F., Spitz, A. M., Edwards, V., Koss, M. P., & Marks, J. S. (1998). Relationship of childhood abuse and household dysfunction to many of the leading causes of death
Maras, M. H., & Shapiro, L. R. (2017). Child exploitation and trafficking: Examining global enforcement and supply chain challenges and U.S. responses. Rowman & Littlefield Publishers.
Perry, B. D., & Szalavitz, M. (2006). The boy who was raised as a dog: And other stories from a child psychiatrist's notebook--what traumatized children can teach us about loss, love, and healing. Basic Books.
Southwick, S. M., Bonanno, G. A., Masten, A. S., Panter-Brick, C., & Yehuda, R. (2014). Resilience definitions, theory, and challenges: Interdisciplinary perspectives. European Journal of Psychotraumatology, 5(1), 25338.
Valkenburg, P. M., & Peter, J. (2011). Online communication among adolescents: An integrated model of its attraction, opportunities, and risks. Journal of Adolescent Health, 48(2), 121-127.
Betancourt, T. S., Brennan, R. T., Rubin-Smith, J., Fitzmaurice, G. M., & Gilman, S. E. (2010). Sierra Leone's former child soldiers: A longitudinal study of risk, protective factors, and mental health. Journal of the American Academy of Child & Adolescent Psychiatry, 49(6), 606-615.
Fonagy, P., & Target, M. (1997). Attachment and reflective function: Their role in self-organization. Development and Psychopathology, 9(4), 679-700.
Luthar, S. S., Cicchetti, D., & Becker, B. (2000). The construct of resilience: A critical evaluation and guidelines for future work. Child Development, 71(3), 543-562.
Dolev-Cohen, M., & Barak, A. (2013). Adolescents' use of Instant Messaging as a means of emotional relief. Computers in Human Behavior, 29(1), 58-63.
Southwick, S. M., Bonanno, G. A., Masten, A. S., Panter-Brick, C., & Yehuda, R. (2014). Resilience definitions, theory, and challenges: Interdisciplinary perspectives. European Journal of Psychotraumatology, 5(1), 25338.
Decety, J., & Ickes, W. (Eds.). (2009). The Social Neuroscience of Empathy. MIT Press.
Terr, L. C. (1990). Too scared to cry: Psychic trauma in childhood. New York, NY: Harper & Row.
Shinder, D. (2002). Scene of the cybercrime: Computer forensics handbook. Rockland, MA: Syngress Publishing.
Anda, R. F., Felitti, V. J., Bremner, J. D., Walker, J. D., Whitfield, C., Perry, B. D., Dube, S. R., & Giles, W. H. (2006). The enduring effects of abuse and related adverse experiences in childhood: A convergence of evidence from neurobiology and epidemiology. European Archives of Psychiatry and Clinical Neuroscience, 256(3), 174-186.
Dehaene, S., Lau, H., & Kouider, S. (2017). What is consciousness, and could machines have it? Science, 358(6362), 486-492. doi: 10.1126/science.aan8871
Rahwan, I., Cebrian, M., Obradovich, N., Bongard, J., Bonnefon, J. F., Breazeal, C., … & Jennings, N. R. (2019). Machine behaviour. Nature, 568(7753), 477-486. doi: 10.1038/s41586-019-1138-y
King, T. C., Aggarwal, N., Taddeo, M., & Floridi, L. (2020). Artificial Intelligence Crime: An Interdisciplinary Analysis of Foreseeable Threats and Solutions. Science and Engineering Ethics, 26, 89-120. doi: 10.1007/s11948-019-00119-4
Stallings, W. (2016). Data and computer communications (10th ed.). Pearson.
Siegel, D. J. (2012). The developing mind: How relationships and the brain interact to shape who we are (2nd ed.). Guilford Press.
Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age. Polity.
Katz, J., & Lindell, Y. (2014). Introduction to Modern Cryptography (2nd ed.). Chapman and Hall/CRC.
Young, K. S. (1999). Internet addiction: Symptoms, evaluation and treatment. Innovations in clinical practice: A source book, 17, 19-31.
Herman, J. L. (1997). Trauma and Recovery: The aftermath of violence—from domestic abuse to political terror. Basic Books.
Stein, D., & Griffiths, M. D. (2007). The psychology of cyber crime. Journal of Forensic Psychology Practice, 7(2), 1-15. https://doi.org/10.1300/J158v07n02_01
Wallace, P. (1999). The psychology of the Internet. Cambridge University Press.
Marcum, C. D. (2014). Cyber crime. Wolters Kluwer Law & Business.
Cozolino, L. (2014). The neuroscience of human relationships: Attachment and the developing social brain (2nd ed.). Norton.
Perry, B. D., & Szalavitz, M. (2017). The boy who was raised as a dog: And other stories from a child psychiatrist's notebook--What traumatized children can teach us about loss, love, and healing. Basic Books.
Goleman, D. (2006). Emotional intelligence. Bantam Books.
Bear, M. F., Connors, B. W., & Paradiso, M. A. (2016). Neuroscience: Exploring the brain (4th ed.). Wolters Kluwer.
Tyrka, A. R., Wyche, M. C., Kelly, M. M., Price, L. H., & Carpenter, L. L. (2009). Childhood maltreatment and adult personality disorder symptoms: Influence of maltreatment type. Psychiatry Research, 165(3), 281-287.
Sapolsky, R. M. (2017). Behave: The biology of humans at our best and worst. Penguin Books.
Hadnagy, C. (2010). Social Engineering: The Art of Human Hacking. Wiley.
Mitnick, K. D., & Simon, W. L. (2011). Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker. Little, Brown and Company.
Hare, R. D. (1999). Without Conscience: The Disturbing World of the Psychopaths Among Us. The Guilford Press.
Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys & Tutorials, 15(4), 2046-2069. https://doi.org/10.1109/SURV.2013.031413.00127
Briere, J., & Scott, C. (2015). Complex trauma in adolescents and adults: Effects and treatment. Psychiatric Clinics of North America, 38(3), 515-527. https://doi.org/10.1016/j.psc.2015.05.004
Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39-53. https://doi.org/10.1145/997150.997156
Denning, P. J., & Martell, C. H. (2015). Great principles of computing. MIT Press.
Kay, A. (1996). The early history of Smalltalk. ACM SIGPLAN Notices, 28(3), 69-95.
Winston, P. H. (1992). Artificial Intelligence (3rd ed.). Addison-Wesley.
James, N. E. (2018). Systems and psyches: Abuse survivors' psychological battles and systemic critique in technology-driven lives. Journal of Behavioral Psychology, 34(3), 209-225.
Miller, H. J., & Park, A. (2020). Digital retreats: How trauma survivors use technology to foster emotional stability. Trauma Studies Quarterly, 15(1), 45-59.
Thomas, V., & Franklin, L. R. (2017). Justice perceptions and drives for retribution among hacktivists. Journal of Cyberpsychology, 11(2), 112-126.
Jung, C. G. (1960). The structure and dynamics of the psyche. Princeton University Press.
Mitnick, K. D., & Simon, W. L. (2002). The art of deception: Controlling the human element of security. Wiley.
Coleman, G. (2014). Hacker, hoaxer, whistleblower, spy: The many faces of Anonymous. Verso Books.
Floridi, L. (2016). The Ethics of Information. Oxford University Press.
Suler, J. (2004). The Online Disinhibition Effect. Cyberpsychology & Behavior, 7(3), 321-326.
Holt, T. J., & Bossler, A. M. (2016). Cybercrime in Progress: Theory and prevention of technology-enabled offenses. Routledge.
Hofstadter, D. R. (1979). Gödel, Escher, Bach: An Eternal Golden Braid. Basic Books.
Cicchetti, D., & Toth, S. L. (1995). A developmental psychopathology perspective on child abuse and neglect. Journal of the American Academy of Child & Adolescent Psychiatry, 34(5), 541-565.
Coleman, E. G. (2014). Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous. Verso.
Southwick, S. M., & Charney, D. S. (2012). Resilience: The Science of Mastering Life's Greatest Challenges. Cambridge University Press.
Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. Public Affairs.
Bonanno, G. A. (2004). "Loss, trauma, and human resilience: Have we underestimated the human capacity to thrive after extremely aversive events?" American Psychologist, 59(1), 20–28. http://dx.doi.org/10.1037/0003-066X.59.1.20
Conway, M. (2020). Projecting the Future for Cybercrime and Cybersecurity. Future Crimes Institute Journal, 2(1), 34-56.
Durbin, P. T., & Rappert, B. (2019). Hacking and Philosophy: The Mentor's Manifesto. Routledge.
Tanczer, L. M. (2018). Hacktivism and the Malevolent Use of Technology: What Drives the Various Faces of Hackers? Science and Engineering Ethics, 24(5), 1593-1611. doi:10.1007/s11948-017-9977-0
Omnes, R. (1999). Understanding Quantum Mechanics. Princeton University Press.
Anda, R. F., Butchart, A., Felitti, V. J., & Brown, D. W. (2010). Building a framework for global surveillance of the public health implications of adverse childhood experiences. American Journal of Preventive Medicine, 39(1), 93-98.
Tedeschi, R. G., & Calhoun, L. G. (2004). Posttraumatic growth: Conceptual foundations and empirical evidence. Psychological Inquiry, 15(1), 1-18.
Marwick, A. E., & Boyd, D. (2014). Networked privacy: How teenagers negotiate context in social media. New Media & Society, 16(7), 1051-1067.
Nissenbaum, H. (2009). Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press.
Papacharissi, Z. (2010). Privacy as a luxury commodity. First Monday, 15(8).
Kitchin, R., & Dodge, M. (2011). Code/space: Software and everyday life. MIT Press.
Finkelhor, D., Ormrod, R. K., & Turner, H. A. (2007). Re-victimization patterns in a national longitudinal sample of children and youth. Child Abuse & Neglect, 31(5), 479-502.
Ungar, M. (2013). Resilience, trauma, context, and culture. Trauma, Violence, & Abuse, 14(3), 255-266.
Stein, D. J., Seedat, S., & Iversen, A. (2015). The neurobiology of PTSD: implications for the Internet. Journal of Cyberpsychology, Behavior, and Social Networking, 18(3), 122-128. https://doi.org/10.1089/cyber.2015.0298
Southwick, S. M., Bonanno, G. A., Masten, A. S., Panter-Brick, C., & Yehuda, R. (2014). Resilience definitions, theory, and challenges: Interdisciplinary perspectives. European Journal of Psychotraumatology, 5(1), 25338. https://doi.org/10.3402/ejpt.v5.25338
Linehan, M. M. (1993). Cognitive-behavioral treatment of borderline personality disorder. Guilford Press. ISBN 978-0898621839
Cloitre, M., Stolbach, B. C., Herman, J. L., van der Kolk, B., Pynoos, R., Wang, J., & Petkova, E. (2009). A developmental approach to complex PTSD: Childhood and adult cumulative trauma as predictors of symptom complexity. Journal of Traumatic Stress, 22(5), 399-408. https://doi.org/10.1002/jts.20444
Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2015). Cybercrime and digital forensics: An introduction. Routledge. https://www.routledge.com/Cybercrime-and-Digital-Forensics-An-Introduction/Holt-Bossler-Seigfried-Spellar/p/book/9781138024035
Maruna, S. (2001). Making good: How ex-convicts reform and rebuild their lives. American Psychological Association. https://doi.org/10.1037/10430-000
Mishna, F., Cook, C., Gadalla, T., Daciuk, J., & Solomon, S. (2010). Cyber bullying behaviors among middle and high school students. American Journal of Orthopsychiatry, 80(3), 362-374.
Briere, J., & Scott, C. (2015). Principles of trauma therapy: A guide to symptoms, evaluation, and treatment (DSM-5 update). Sage Publications.
Tedeschi, R. G., & Calhoun, L. G. (2004). Posttraumatic growth: Conceptual foundations and empirical evidence. Psychological Inquiry, 15(1), 1-18.
Joseph, S. (2011). What doesn’t kill us: The new psychology of posttraumatic growth. Basic Books.
Durlak, J. A., Weissberg, R. P., Dymnicki, A. B., Taylor, R. D., & Schellinger, K. B. (2011). The impact of enhancing students’ social and emotional learning: A meta-analysis of school-based universal interventions. Child Development, 82(1), 405-432.
Pfefferbaum, B., & North, C. S. (2020). Mental Health and the Covid-19 Pandemic. New England Journal of Medicine, 383(6), 510-512.