This module is a resource for lecturers
Core reading
The following readings are (mostly open source) required readings that should be completed before taking a class based on this Module:
(Materials with * will be soon available at the Sherloc Bibliography Database)
- Chang, Weiping and Peifang Chung. (2014). Knowledge Management in Cybercrime Investigation - A Case Study of Identifying Cybercrime Investigation Knowledge in Taiwan . Pacific-Asia Workshop on Intelligence and Security Informatics (PAISI 2014: Intelligence and Security Informatics), pp. 8-17.*
- Domain Tools. Best Practices Guide: Getting Started with Domain Tools for Threat Intelligence and Incident Forensics .*
- Fafinski, Stefan, William H. Dutton, and Helen Margetts. (2010). Mapping and Measuring Cybercrime . OII Forum Discussion Paper, No 18. Oxford Internet Institute, University of Oxford.*
- Finklea, Kristin. (2017). Dark Web . Congressional Research Service.
- GLACY. (2014). Good practice study: Cybercrime reporting mechanisms .
- Harkin, Diarmaid, Chad Whelan, and Lennon Chang (2018). The challenges facing specialist police cyber-crime units: an empirical analysis . Police Practice and Research, Vol. 19(6), 519-536.*
- Lin, Herbert. (2017). Attribution of Malicious Cyber Incidents . Aegis Paper Series, No. 1607, Hoover Institution.*
- Maras, Marie-Helen. (2014). Computer Forensics: Cybercriminals, Laws, and Evidence . Jones and Bartlett; Chapters, 8-11.*
- Pihelgas, Mauno. (2013). Back-tracing and Anonymity in Cyberspace. In Katharina Ziolkowski (ed.). Peacetime Regime for State Activities in Cyberspace International Law, International Relations and Diplomacy (pp. 31-60). NATO Cooperative Cyber Defence Centre of Excellence.
- Wall, David S. (2007). Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace . Police Practice and Research, 8(2), 183-205.*