This module is a resource for lecturers
Publications, media articles and audio-visual materials
Barclay, Corlane. (2017). Cybercrime and legislation: a critical reflection on the Cybercrimes Act, 2015 of Jamaica.
Commonwealth Law Bulletin, Vol. 43(1), 77-107. BBC News. (2017).
21 July 2017. Young children groomed on live streaming app Periscope. Berliner, Lucy and Jon R. Conte (1990). The process of victimization: A victims' perspective.
Child Abuse & Neglect, Vol. 14(1), 29-40. CloudFlare. (2018).
What is a DDoS Attack? Davies, Caroline. (2018).
'Sadistic' paedophile Matthew Falder jailed for 32 years. The Guardian, 19 February 2018. European Parliament, Citizens' Rights and Constitutional Affairs. (2016).
Directorate General For Internal Policies, Policy Department C (PE 571.367). Cyberbullying Among Young People. Hern, Alex. (2017).
Hackers publish private photos from cosmetic surgery clinic. The Guardian, 31 May 2017. Dennison, Kesta. (2018). The Fight Against Child Exploitation Material Online. Presentation at
International Academic Conference: Linking Organized Crime and Cybercrime. A conference hosted by Hallym University and sponsored by the United Nations Office on Drugs and Crime (UNODC), 8 June 2018. International Centre for Missing & Exploited Children (ICMEC) and The United Nations Children's Fund (UNICEF). (2016).
Online Child Sexual Abuse and Exploitation. Maras, Marie-Helen. (2014).
Computer Forensics: Cybercriminals, Laws and Evidence, second edition. Jones and Bartlett. Maras, Marie-Helen. (2016).
Cybercriminology. Oxford University Press. McMenemy, Rachel. (2018).
Reaction as one of Britain's most prolific paedophiles is jailed. Cambridge News, 19 February 2018. O'Connell, Rachel. (2003).
Cyberspace Research Unit: University of Central Lancashire. A typology of cyber sexploitation and online grooming practices. Ospina, Maria, Christa Harstall, and Liz Dennet (2010).
Alberta, Canada: Institute of Health Economics. Sexual exploitation of children and youth over the internet: A rapid review of the scientific literature. Parkin, Simon. (2017).
Keyboard warrior: the British hacker fighting for his life. The Guardian, 8 September 2017. Ragan, Steven. (2016).
Chinese scammers take Mattel to the bank, Phishing them for $3 million. CSO, 29 March 2016. Reuters. (2015).
Corrected - Scoular hit with $17.2 million fraud - newspaper. United Nations Commission on Crime Prevention and Criminal Justice. (2017).
United Nations Economic and Social Council (2 April 2017). Results of the second meeting of the Intergovernmental Expert Group to Prepare a Study on Fraud and the Criminal Misuse and Falsification of Identity. UNODC. (2011).
Handbook on Identity-related Crime. UNODC. (2012).
The Use of the Internet for Terrorist Purposes. UNODC. (2013).
Draft Comprehensive Study on Cybercrime. UNODC. (2015).
Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children. UNODC. (n.d.).
Economic Fraud and Identity-related Crime. US Department of Justice (DOJ). (2018).
Thirty-six defendants indicted for alleged roles in transnational criminal organization responsible for more than $530 Million in losses from cybercrimes. Vernalls, Richard and Rachel McMenemy. (2018).
Warped paedophile began his sick campaign of abuse while at Cambridge University. Cambridge News, 20 February 2018. Whittle, Helen, Catherine Hamilton-Giachritsis, Anthony Beech and Guy Collings. (2013).
A review of online grooming: Characteristics and concerns. Aggression and Violent Behavior, Vol. 18(1), 62-70. World Intellectual Property Organization (WIPO). (2016).
Understanding Copyright and Related Rights. WIPO. (n.d.).
What is Intellectual Property.
Geoffrey Andare v AG & DPP & Article 19 East Africa  eKLR.
R v. Tsouli  EWCA (Crim) 3300.
United States of America v. Emerson Winfield Begolly, Criminal No 1:11 CR 326 (2013)
National and international legislation