Epley, C. (June 23, 2010). Cyber-Crimes: An Analysis of Cyber-extortion. Retrieved from http://www.suite101.com/content/cyber-crimes-part-one-cyber-extortion
Greenberg, P. (January 26, 2011). State Cyberstalking, Cyberharrasment and Cyberbullying Laws.
National Conference of State Legislatures (NCSL). Retrieved from http://www.ncls.org/IssuesResearch/TelecommunicationsInformationTechnology/CyberstalkingLaws.html.
Cisneros, D. "Virtual Child" Pornography on the Internet: A "Virtual" Victim? (2002) Duke L. & Tech. Rev. 0019, retrieved 12 August 2011 from www.law.duke.edu > Journals > Duke Law & Technology Review.
Coleman, S. You only live twice: How the First Amendment Impacts Child Pornography in Second Life. (2009) LOY L.A. ENT. L. REV. 193 (2009). Retrieved 12 August 2011 from http://elr.lls.edu/issues/v29-issue2/documents/07.Coleman29.2.pdf
Balkin, J., Grimmelmann, J., Katz, E., Kozlovski, N., Wagman, S. & Zarsky, T. Cybercrime: Digital Cops in a Networked Environment, New York University Press, New York. (2006)
Halder, D., & Jaishankar, K. Cyber crime and the Victimization of Women: Laws, Rights, and Regulations. Hershey, PA, USA: IGI Global. (2011)
McQuade, S. (ed) The Encyclopedia of Cybercrime, Westport, CT: Greenwood Press. (2009)
Williams, M. Virtually Criminal: Crime, Deviance and Regulation Online, Routledge, London. (2006)
Areheart, Bradley a. (2007) "Regulating Cyberbullies through Notice-Based Liability" 117 Yale
L.J. Pocket Part 41, pp: 26-31.
Effects of Anonymity and Pre- Employment Integrity." International Journal of Cyber Criminology, vol. 3, no. 2, pp: 536 -- 549.
Farsole, Ajinkya a; Kashikar, Amruta G; Zunzunwala, Apurva. (2010) "Ethical
Hacking." International Journal of Computer Applications, vol. 1, no. 10, pp: 11 -- 17.
Hinduja, Sameer. (2007) "Computer Crime Investigations in the United States: Leveraging
Knowledge from the Past to Address the Future." International Journal of Cyber Criminology, vol. 1, no. 1, pp: 1-26.
Holbrook, Emily. (2010) "A weekend of hacker attacks"
Risk Monitor, pp: 4-6.
Jaishankar, K. (2007) "Cyber Criminology: Evolving a novel discipline with a new journal."
International Journal of Cyber Criminology, vol 1; no. 1, pp: 17-20.
May, Maxim. (2004) "Federal Computer Crime Laws." GSEC Practical 1.4b. SANS Institute
InfoSec Reading Room.
Ngafeeson, Madison. (2010) "Cybercrime Classification: A Motivational Model." Southwest
Decision Sciences Institute Proceedings Paper.
Nykodym, Nick; Ariss, Sonny; Kurtz, Katarina. (2008) "Computer Addiction and Cyber Crime."
Journal of Leadership, Accountability and Ethics, vol. 12, no. 1, pp: 78-82.
Pocar, Fausto. (2004) "New Challenges for International Rules Against Cyber-Crime." European
Journal on Criminal Policy and Research, vol. 10, no. 1, pp: 27-37.
Rahman, Aftar. (2010) "Tough law required: Cyber crimes on rise."
Priyo News, p. 6.
Rege, Aunshul. (2009) "What's Love Got to Do with it? Exploring Online Dating Scams and Identity Fraud." International Journal of Cyber Criminology, vol. 3, no. 2, pp: 494-512.
Wolak, J; Finkelhor, D; Mitchell, K; Ybarra, M. (2008) "Online "Predators" and their Victims:
Myths, Realities and Implications for Prevention and Treatment." American Psychologist, vol. 63, no. 2, pp: 111-128.
Yar, Majid. (2005) "Computer Hacking: Just another Case of Juvenile Delinquency?" the
Howard Journal of Criminal Justice, vol. 44, no. 4, pp: 387 -- 399.