Open Access

Cybercrime: Internet Driven Illicit Activities and Behavior

   | Dec 16, 2020

Cite

Ayalew, Y. E. (2019). The Internet shutdown muzzle (s) freedom of expression in Ethiopia: competing narratives. Information & Communications Technology Law, Vol. 28, Issue 2, 208-224.Search in Google Scholar

Bryans, D. (2014). Bitcoin and money laundering: mining for an effective solution. Indiana Law Journal, Vol. 89, Issue 1, 441.Search in Google Scholar

Committee to Protect Journalists. (2020). 10 Most Censored Countries, available at: https://cpj.org/reports/2019/09/10-most-censored-eritrea-north-korea-turkmenistan-journalist/, accessed on 12 September 2020.Search in Google Scholar

Cunningham, S., & Kendall, T. D. (2011). Prostitution 2.0: The changing face of sex work. Journal of Urban Economics, Vol. 69, Issue 3, 273-287.Search in Google Scholar

Dawson, M., & Omar, M. (2015). New Threats and Countermeasures in Digital Crime and Cyber Terrorism. Hershey PA, USA: IGI Global.10.4018/978-1-4666-8345-7Search in Google Scholar

Deibert, R. J. (2009). The geopolitics of internet control: Censorship, sovereignty, and cyberspace. In Chadwick, A., & Howard, P.N., Routledge handbook of Internet Politics (323-336). London, UK: Routledge Handbooks.Search in Google Scholar

Foley, S., Karlsen, J. R., & Putninš, T. J. (2019). Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies?. The Review of Financial Studies, Vol. 32, Issue 5, 1798-1853.Search in Google Scholar

Greenwood, F. (2013). Internet access is “essential” human right, rules German court, available at: https://www.pri.org/stories/2013-01-28/internet-access-essential-human-right-rules-german-court, accessed on 12 September 2020.Search in Google Scholar

Hemmingson, M. (2008). Cyber-Hookers AKA Providers: Off the Street and onto Craigslist. SSRN Electronic Journal.http://dx.doi.org/10.2139/ssrn.1084415.10.2139/ssrn.1084415Search in Google Scholar

Jamieson, K. H. (2020). Cyberwar: how Russian hackers and trolls helped elect a president: what we don’t, can’t, and do know. New York, USA: Oxford University Press.10.1093/oso/9780190058838.001.0001Search in Google Scholar

Johnson, D. E. (2019). Russian Election Interference and Race-Baiting. Columbia. Journal of Race and Law, Vol. 9, No. 2, 191.Search in Google Scholar

Maddox, A., Barratt, M. J., Allen, M., & Lenton, S. (2016). Constructive activism in the dark web: cryptomarkets and illicit drugs in the digital ‘demimonde’. Information, Communication & Society, Vol. 19, Issue 1, 111-126.Search in Google Scholar

Martínez, F. G. (2019). Special Problems in Information Security: from Privacy to Emerging Technologies for Hyperconnected Systems. Master Thesis, Universidad Politécnica de Madrid, Spain.Search in Google Scholar

Martinez, F. G., & Dawson, M. (2019). Unprotected Data: Review of Internet Enabled Psychological and Information Warfare. Land Forces Academy Review, Vol. XXIV, Issue 3(95), 187-198.10.2478/raft-2019-0022Search in Google Scholar

Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press.Search in Google Scholar

Portnoff, R. S., Huang, D. Y., Doerfler, P., Afroz, S., & McCoy, D. (2017). Backpage and bitcoin: Uncovering human traffickers. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 1595-1604).10.1145/3097983.3098082Search in Google Scholar

Reglitz, M. (2020). The Human Right to Free Internet Access. Journal of Applied Philosophy, Vol. 37, Issue 2, 314-331.Search in Google Scholar

Sinha, S. (2017). Dark Web and Tor. In Beginning Ethical Hacking with Python (pp. 173-177). Berkeley, CA: Apress.Search in Google Scholar

Stewart, J., & Dawson, M. (2018). How the modification of personality traits leave one vulnerable to manipulation in social engineering. International Journal of Information Privacy, Security and Integrity, Vol. 3, Issue 3, 187-208.Search in Google Scholar

Walther, G. (2015). Printing insecurity? The security implications of 3d-printing of weapons. Science and engineering ethics, Vol. 21, Issue 6, 1435-1445.Search in Google Scholar

Wolfson, R. (2018). Tracing Illegal Activity through the Bitcoin Blockchain to Combat Cryptocurrency-Related Crimes, available at: https://www.forbes.com/sites/rachelwolfson/2018/11/26/tracing-illegal-activity-through-the-bitcoin-blockchain-to-combat-cryptocurrency-related-crimes/, accessed on 12 September 2020.Search in Google Scholar