Este módulo es un recurso para los catedráticos
Referencias
American Marketing Association. (2018). The Murky Ethics of Data Gathering in a Post-Cambridge Analytica World. The Medium , 31 May 2018.
Asia-Pacific Network Information Center (APNIC). (2018). WDNS01: DNS Concepts. Workshop .
Bilge, Leyla and Tudor Dumitras. (2012). Before We Knew It: An Empirical Study of Zero-Day Attacks in The Real World. Proceedings of the 2012 ACM conference on Computer and communications security.
China Internet Network Information Center. (2018). The 41st Statistical Report on Internet Development in China (January 2018).
Cisco. (2016). IP Addressing and Subnetting for New Users.
Council of Europe. (2001). Convention on Cybercrime. Budapest.
Cybercrime Convention Committee (2012). T-CY Guidance Note # 1. On the notion of computer system. Article 1(a) Budapest Convention on Cybercrime. Adopted by the T-CY at its 8th Plenary (December 2012).
Directorate General For Internal Policies Policy Department C: Citizens' Rights and Constitutional Affairs (2015). The Law Enforcement Challenges of Cybercrime: Are we really catching up?
Europol. (2017). Internet Organised Crime Threat Assessment 2017.
Europol. (2018). Internet Organised Crime Threat Assessment 2018.
Europol. (2018). Public Awareness and Prevention Guides.
Europol. (2011). Cybercrime Presents a Major Challenge for Law Enforcements.
Fisher, Tim. (2018). Free and Public DNS Servers. Lifewire.
Garcia, Michael John and Doyle, Charles. (2010). Extradition to and from the United States: Overview of the Law and Recent Treaties. Congressional Research Service 7-5700.
Goodman, Marc D. and Brenner, Susan W. (2002). The Emerging Consensus on Criminal Conduct in Cyberspace. International Journal of Law and Information Technology , Vol. 10, No. 2, 139-223.
Hern, Alex. (2017). WannaCry, Petya, NotPetya: how ransomware hit the big time in 2017. The Guardian , 30 December 2017.
Holt, Thomas, J., Adam M. Bossler, and Kathryn C. Seigfried-Spellar. (2018). Cybercrime and Digital Forensics , 2nd edition. Routledge.
IGI Global. (n.d.) What is the penetration rate.
International Telecommunication Union (ITU). (2012). Understanding cybercrime: Phenomena, challenges and legal response.
Jaishankar, K. (Ed.). Cyber criminology: Exploring Internet crimes and criminal behavior . CRC Press.
Kessel, J. M. and Mozur, P. (2016). How China Is Changing Your Internet. New York Times .
Krocker, Rachel. (2013). An Internet Connection does not equal Internet access. ICT Works.
Lee, Seung-ho. (2013). Cybercrime sleuths have highly intricate challenges.
Maras, Marie-Helen. (2014). Computer Forensics: Cybercriminals, Laws and Evidence ,second edition. Jones and Bartlett.
Maras, Marie-Helen. (2016). Cybercriminology . Oxford University Press.
Maras, Marie-Helen. (2015). The Internet of Things: Security and Privacy Implications. International Data Privacy Law , Vol. 5(2), 99-104.
McGuire, Mike and Dowling, Samantha. (2013). Cyber crime: A review of the evidence . Research Report 75 , Chapter 1: Cyber-dependent crimes.
OECD. (2018). Data: Internet access.
Reuters. (2017). Cyber attack hits 200,000 in at least 150 countries: Europol. Reuters , 14 May 2017.
Rouse, Margaret. (2014). Confidentiality, integrity and availability (CIA Triad). TechTarget.
Securelist. (2018). Software vulnerabilities. Kaspersky Lab .
Statcounter. (2016). Mobile and tablet internet usage exceeds desktop for first time worldwide . GlobalStats .
Statista. (2018). Global internet penetration rate as of September 2017, by region.
Timberg, Craig, Elizabeth Dowskin, Brian Fung. (2017). Data of 143 million Americans exposed in hack of credit reporting agency Equifax. The Washington Post .
UNODC. (2013). (Draft) Comprehensive Study on Cybercrime.
Wall, David. (2007). Cybercrime: The Transformation of Crime in the Information Age . Polity.
Wall, Matthew. (2016). How long will you wait for a shopping website to load? BBC News , 19 August 2017.
Wilson, Clay. (2008). Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress.
Zetter, Kim. (2014). Hacker Lexicon: What Is A Zero Day? Wired , 11 November 2014.