Butterfield, Andrew and Ekembe Ngondi. (eds.). (2016). A Dictionary of Computer Science (7 ed.). Oxford University Press.
Black, John, Nigar Hashimzade, and Gareth Myles. (eds.). (2017). A Dictionary of Economics (5 ed.). Oxford University Press.
Baines, Victoria. (2008). Online Child Sexual Abuse: The Law Enforcement Response.ECPAT International. A contribution of ECPAT International to the World Congress III against the Sexual Exploitation of Children and Adolescents (Rio de Janeiro, Brazil; 25-28 November 2008).
Beran, Tanya and Qing Li. (2005). Cyber-Harassment: A Study of a New Method for an Old Behavior. Journal of Educational Computing Research, Vol. 32, 265-277.
Bishop, Jonathan. (2013). The effect of de-individuation of the Internet Troller on Criminal Procedure implementation: An interview with a Hater. International Journal of Cyber Criminology, No. 7(1), 28-48.
Black, Pamela J., Mellisa Wollis, Michael Woodworth, and Jeffrey T. Hancock. (2015). A Linguistic Analysis of Grooming Strategies of Online Child Sex Offenders: Implications for our Understanding of Predatory Sexual Behavior in an Increasingly Computer-Mediated World. Child Abuse and Neglect 44, 140-149.
Brail, Stephanie. (1994). Take back the net! On the Issues (Winter), 40-42.
Calvete, Esther, Izaskun Orue, Ana Estevez, Lourdes Villardon, and Patricia Padilla. (2010). Cyberbullying in adolescents: modalities and aggressors' profile. Computers in Human Behavior, Vol. 26(5), 1128-1135.
Cassim, Fawzia. (2013). Formulating Adequate Legislation to Address Cyber-Bullying: Has the Law Kept Pace with Advancing Technology. South African Journal of Criminal Justice, Vol. 26(1), 1-120.
Cohen, Lawrence E., and Mark Felson (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, Vol. 44, 588-608.
Cooper, Karol, Ethel Quayle, Linda Jonsson, and Carl Goren Svedin. (2016). Adolescents and self-taken sexual images: A review of the literature. Computers in Human Behaviour, Vol. 55, 706-716.
Demetriou, Christina and Andrew Silke. (2003). A criminological internet 'sting': Experimental evidence of illegal and deviant visits to a website trap. British Journal of Criminology, Vol. 43(1), 213-222.
Fanti, Kostas A., Andreas G. Demetriou, and Veronica V. Hawa. (2012). A longitudinal study of cyberbullying: Examining risk and protective factors. European Journal of Developmental Psychology, Vol. 9(2), 168-181.
Flynn, Asher and Henry, Nicola. (Forthcoming, 2018). Image-Based Sexual Abuse. In Oxford Research Encyclopedia of Criminology and Criminal Justice. Oxford University Press.
Frangež, Danijela, Anton Toni Klančnik, Mojca Žagar Karer, Bj?rn-Erik Ludvigsen, Jarosław Kończyk, Fernando Ruiz Perez, Mikko Veijalainen, and Maurine Lewin. (2015). The Importance of Terminology Related to Child Sexual Exploitation. Journal of Criminal Investigation and Criminology, Vol. 66(4), 291-299.
Henry, Nicola, Flynn, Asher and Powell, Anastasia. (2018). Policing Image-based Sexual Abuse: Stakeholder Perspectives. Police Practice and Research: An International Journal,Vol. 19(6), 565-581.
Henry, Nicola and Anastasia Powell. (2014). The Darker Side of the Virtual World: Towards a Digital sexual ethics. In Preventing Sexual violence: Interdisciplinary Approaches to Overcoming a Rape Culture, eds. Nicola Henry, and Anastasia Powell, 84-104. Basingstoke: Palgrave Macmillan.
Henry, Nicola and Anastasia Powell. (2017). Sexual Violence and Harassment in the Digital Era. In Antje Deckert and Rick Sarre (eds.). The Palgrave Handbook of Australian and New Zealand Criminology, Crime and Justice. Palgrave Macmillan.
Interagency Working Group. (2016). Terminology Guidelines for the Protection of Children from Sexual Exploitation and Sexual Abuse. ECPAT International and ECPAT Luxembourg (Luxembourg, 28 January 2016).
International Centre for Missing & Exploited Children. (2017). Online Grooming of Children for Sexual Purposes: Model Legislation & Global Review . First Edition.
International Centre for Missing & Exploited Children (ICMEC) and The United Nations Children's Fund (UNICEF). (2016). Online Child Sexual Abuse and Exploitation.
INTERPOL. (2017a). Global operation targets child sexual abuse material exchanged via messaging apps.
INTERPOL. (2017b). Japan's child sex abuse network ringleader identified via Interpol is jailed.
Kalim, Alexander. (2013). Addressing the Gap in International Instruments Governing Internet Child Pornography. CommLaw Conspectus: Journal of Communications law and Technology Policy, Vol. 21(2), 428-452.
Kent, Spencer. (2017). #Roastme: New form of cyberbullying parents should know about.
Krischer, Hayley. (2017). It's 10 P.M. do you know what apps your children are using? New York Times, 6 September 2017.
Kingkade. (2014). Porn Star Belle Knox: Every Day Is "Like A Nightmare." Huffington Post, 20 March 2014.
Klettke Bianca, Hallford David and Mellor David. (2015). Sexting prevalence and correlates: A systematic literature review. Clinical Psychology Review,Vol. 34(1), 44-53.
Kowalski, Robin M. and Susan P. Limber. (2007). Electronic bullying among middle school students. Journal of Adolescent Health, Vol. 41(6), S22-S30
Kohm, Amelia. (2015). Childhood bullying and social dilemmas. Aggressive Behavior, Vol. 41(2), 97-108.
Lanning, Keith. (2010). Child Molesters: A Behavioral Analysis for Professional Investigating the Sexual Exploitation of Children. National Centre for Missing and Exploited Children (5th ed.).
Lanzarote Committee. (2015). Opinion on Article 23 of the Lanzarote Committee and its Explanatory Note.
Li, Qing. (2008). A cross-cultural comparison of adolescents' experience related to cyberbullying. Educational Research, Vol. 50(3), 223-234.
Li, Qing. (2006). Cyberbullying in schools: a research of gender differences. School Psychology International, Vol. 27(2), 157-170.
Livingstone Sonia, Leslie Haddon, Anke Gorzig, and Kjartan Olafsson. (2011). Risks and safety on the Internet: The perspective of European children. London School of Economics, London: EU Kids Online.
Lounsbury Kaitlin, Mitchell, Kimberley and Finkelhor David. (2011). The true prevalence of 'sexting'. Crimes Against Children Research Centre, University of New Hampshire.
Maras, Marie-Helen. (2014). Computer Forensics: Cybercriminals, Laws and Evidence, Secondedition. Jones and Bartlett.
Maras, Marie-Helen. (2016). Cybercriminology. University Press.
Maras, Marie-Helen. (2015). Unprotected Speech Communicated via Social Media: What Amounts to a True Threat? Journal of Internet Law, Vol. 19(3), 3-9.
Maras, Marie-Helen, and Alex Alexandrou. (2018). Determining Authenticity of Video Evidence in the Age of Artificial Intelligence and in the Wake of Deepfake Videos. International Journal of Evidence and Proof, available online 28 October 2018. https://doi.org/10.1177/1365712718807226.
Marcum, Catherine D., Geroge E. Higgins, and Melissa L. Ricketts. (2014). Juveniles and Cyber Stalking in the United States: An Analysis of Theoretical Predictors of Patterns of Online Perpetration. International Journal of Cyber Criminology, No. 8(1), 47-56.
Matsui, Shigenori. (2015). The criminalization of revenge porn in Japan. Washington International Law Journal Association, Vol. 1, 289-218.
McGlynn, Clare and Rackley, Erika (2017). Image-based sexual abuse . Oxford Journal of Legal Studies, 37(3), 534-561.
McGlynn, Clare, Rackley, Erika, and Houghton, Ruth. (2017). Beyond 'Revenge Porn': The Continuum of Image-Based Sexual Abuse. Feminist Legal Studies, Vol. 25, 25-46.
Morris, Steven. (2011). Internet troll jailed after mocking deaths of teenagers. The Guardian, 13 September 2011.
Moriarty, Laura J. and Kimberly Freiberger. (2008). Cyberstalking: Utilizing Newspaper Accounts to Establish Victimization Patterns. Victims & Offenders, Vol. 3(2-3), 131-141.
Navarro, Jordana N. and Jana L. Jasinski. (2012). Going Cyber: Using Routine Activities Theory to Predict Cyberbullying Experiences. Sociological Spectrum, Vol. 32(1), 81-94.
Navarro, Jordana N. and Jana L. Jasinski. (2013). Why Girls? Using Routine Activities Theory to Predict Cyberbullying Experiences Between Girls and Boys. Women & Criminal Justice, Vol. 23(4), 286-303.
Newton, Paula. (2013). Canadian teen commits suicide after alleged rape, bullying. CNN, 10 April 2013.
Mooney, Jamie-Lee and Suzanne Ost. (2013). Group Localised Grooming: What Is It and What Challenges Does It Pose for Society and Law? Child and Family Law Quarterly,Vol. 25(4), 1-20.
Nouwen, Ivonne. (2017). Virtual Currency Uses for Child Sex Offending Online. ECPAT International Journal, Online Child Sexual Exploitation: An Analysis of Emerging and Selected Issues, April (12), 4-13.
O'Connell, Rachel. 2003. A Typology of Cyber Sexploitation and Online Grooming Practices. Preston, England: University of Central Lancashire.
Patchin, Justin. W. and Sameer Hinduja. (2006). Bullies Move Beyond the Schoolyard: A Preliminary Look at Cyberbullying. Youth Violence and Juvenile Justice, Vol. 4(2), 148-169.
O'Connor, Kimberly, Drouin, Michelle, Yergens, Nicholas, and Newsham, Genni. (2017). Sexting Legislation in the United States and Abroad: A Call for Uniformity. International Journal of Cyber Criminology, Vol. 11(2), 218-245.
Powell, Anastasia, Henry, Nicola and Flynn, Asher. (2018) Image-based Sexual Abuse. In Walter DeKeseredy and Molly Dragiewicz (eds.) Handbook of Critical Criminology (Chapter 25). New York: Routledge.
Reyns, Bradford, Billy Henson and Bonnie S. Fisher. (2011). Being pursued online. Applying Cyberlifestyle-Routine activities theory to cyberstalking victimization. Criminal Justice and Behavior, Vol. 38(11), 1149-1169.
Ringrose, Jessica and Renold, E. (2012). Slut-shaming, girl power and 'sexualisation': Thinking through the politics of the international SlutWalks with teen girls. Gender and Education, Vol.24(3), 333-343.
Secretariat of the Lanzarote Committee. (2018). Information Note: The Council of Europe Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse (20 June 2018).
Slonje, Robert, Peter K. Smith, and Ann Frisen. (2012). Processes of cyberbullying, and feelings of remorse by bullies: A pilot study. European Journal of Developmental Psychology, Vol. 9(2), 84.
Smith, Peter K. (2012). Cyberbullying and cyber aggression. In S.R. Jimerson, A.B. Nickerson, M.J. Mayer, and M.J. Furlong. (eds). Handbook of school violence and school safety: International research and practice (pp. 93-103). Routledge.
Smith, Peter K., Georges Steffen, and Ruth Sittichai. (2013). The nature of cyberbullying and an international network. In Peter K. Smith and Georges Steffen, eds. Severability Through The New Media: Findings From An International Network. Psychology Press.
Smith, Peter K., Jess Mahdavi, Manuel Carvalho, Sonja Fisher, Shanette Russell and Neil Tippett. (2008). Cyberbullying: the nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry, Vol. 49(4), 376-385.
Soukup, Charles. (1999). The gendered interactional patterns of computer-mediated chatrooms: A critical ethnographic study. Information Society, Vol. 15(3), 169-176.
Southworth, Cindy and Tucker, Sarah. (2007) Technology, stalking and domestic violence victims. Mississippi Law Journal, Vol. 76, 667-676.
Take Back the Tech.
Terre des Hommes. (n.d.). Sweetie: How to Stop Webcam Child Sex Tourism.
Terre des Hommes. (2018). The Dark Side of the Internet for Children: Online Child Sexual Exploitation in Kenya - A Rapid Assessment Report.
Vakhitova, Zarina I. and Danielle M. Reynald. (2014). Australian Internet Users and Guardianship against Cyber Abuse. International Journal of Cyber Criminology, Vol. 8(2), 156-171.
Walker, Shelley, Sanci, Lena and Temple-Smith Meredith. (2013). Sexting: Young women's and men's views on its nature and origins. Journal of Adolescent Health, Vol. 52, 697-701.
Webster, Stephen, Julia Davidson and Antonia Bifulco, Eds. Online offending behavior and child victimization: New findings and policy. Palgrave-Macmillan.
Williford, Anne, Lawrence Christian Elledge, Aaron J. Boulton, Kathryn J. DePaolis, Todd D. Little, and Christina Salmivalli. (2013). Effects of the KiVa Antibullying Program on Cyberbullying and Cybervictimization Frequency Among Finnish Youth. Journal of Clinical Child & Adolescent Psychology, Vol. 42(6), 820-833.
Winters, Georgia M. and Elizabeth L. Jeglic. (2017). Stages of Sexual Grooming: Recognizing Potentially Predatory Behaviors of Child Molesters. Deviant Behavior, Vol. 38(6), 724-733.
Working to Halt Online Abuse. (2012). Online Harassment/Cyberstalking Statistics: Cumulative statistics for the years 2000-2011.
Cases
Alkaya v Turkey, ECHR (App no. 42811/06), 9 October 2012.
Flinkkilä and others v. Finland, ECHR (App no. 25576/04), 6 April 2010.
Kurier Zeitungsverlag und Druckerei GmbH v. Austria, ECHR 49 (App no. 3401/07) [2012].
R v. Costi, EWCA Crim 3152 [2006].
Saaristo and Others v. Finland, ECHR (App no. 184/06), 12 October 2010.
The Queen vs. Ian Watkins and others, Case No: 62CA1726112 (18 December 2013).