References
- Anderson, R. C., Barton, R., Böhme, M. J., van Eeten, M., Levi, T. M. & Savage, S. (2013). Measuring the Cost of Cybercrime. In Böhme, R. (Ed.), The Economics of Information Security and Privacy. Springer.
- Al Fahdi, M., Clarke, N. L., & Furnell, S. M. (2013). Challenges to digital forensics: A survey of researchers and practitioners attitudes and opinions. 2013 Information Security for South Africa - Proceedings of the ISSA 2013 Conference, pp. 1–8. http://doi.org/10.1109/ISSA.2013.6641058
- Adams, R. B. (2012). The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice. Journal of Digital Forensics, Security and Law, 8(4), pp. 25–48.
- Adams, R. B. (2013). The Advanced Data Acquisition Model (ADAM): A process model for digital forensic practice. [Doctoral dissertation, Murdoch Unversity]. Retrieved from: http://researchrepository.murdoch.edu.au/14422/2/02Whole.pdf
- Bouveret, A. (2018). Cyber Risk for the Financial Sector: A Framework for Quantitative Assessment. International Monetary Fund (IMF) Working Paper 2018/143, pp. 1-29.
- Casciani, D. (2017, January 19). Cybercrime and fraud scale revealed in annual figures. BBC News. Retrieved from: http://www.bbc.co.uk/news/uk-38675683
- Casey, E. (2007) What Does “Forensically Sound” Really Mean? Digital Investigation, 4(2), pp. 49–50. doi: 10.1016/j.diin.2007.05.001.
- Constantiou, I., & Kallinikos, J. (2015). New Games, New Rules: Big Data and the Changing Context of Strategy. Journal of Information Technology 30(1), pp. 1-32.
- Choo, K. R. (2011). The Cyber Threat Landscape: Challenges and Future Research Directions. Computers & Security 30(8), pp. 719-731.
- Cebula, J. J. & Young, L. R. (2010). A taxonomy of Operational Cyber Security Risks, (CMU/SEI-2010-TN-028). Software Engineering Institute, Carnegie Mellon University.
- Caviglione, L., Wendzel, S., & Mazurczyk, W. (2017). The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Security Privacy, 15(6), pp. 12–17. http://doi.org/10.1109/MSP.2017.4251117
- Dorrell, D. D., & Gadawski, G. A. (2012). Financial forensics body of knowledge. John Wiley & Sons.
- Du, X., Le-Khac, N., & Scanlon, M. (2017). Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service. ArXiv, abs/1708.01730.
- Eling, M. & Wirfs, J. H. (2016). Cyber Risk: Too Big to Insure? Risk Transfer Options for a Mercurial Risk Class. I.VW HSG Schriftenreihe 59(59), University of St.Gallen, Institute of Insurance Economics (I.VW-HSG).
- European Central Bank. (2018, February 23). A Euro Cyber Resilience Board for pan-European Financial Infrastructures. Retrieved from: https://www.ecb.europa.eu/press/key/date/2018/html/ecb.sp180309_1.en.html
- Homem, I. (2018). Advancing Automation in Digital Forensic Investigations [Doctoral Dissertation, Stockholm University, Department of Computer and Systems Sciences].
- Horsman, G. (2018). Framework for Reliable Experimental Design (FRED): A Research Framework To Ensure The Dependable Interpretation Of Digital Data For Digital Forensics. Computers and Security 73, pp. 294–306. http://doi.org/10.1016/j.cose.2017.11.009
- Hewling, M. (2010). Digital Forensics: The UK Legal Framework [Masters dissertation, University of Liverpool].
- Harbawi, M., & Varol, A. (2016). The role of digital forensics in combating cybercrimes. 2016 4th International Symposium on Digital Forensic and Security (ISDFS), pp. 138-142.
- Hassan, A., Lass, F., & Makinde, J. (2012). Cybercrime in Nigeria: Causes, Effects and the way out. ARPNJ Science and Technology 2(7), pp. 626-631.
- United Nations. International Telecommunication Unit (ITU). (2017). Global Cybersecurity Index (GCI) 2017.
- James, J., & Gladyshev, P. (2013). Challenges with Automation in Digital Forensic Investigations. ArXiv, abs/1303.4498.
- Jaleshgari, R. (1999). Document Trading Online. Information Week 755(136).
- Kuchta K. J., (2000). Computer Forensics Today’s Law, Investigations and Ethics Available from: http://www.liv.ac.uk/library/ohecampus/
- Lavorgna, A., & Sergi, A. (2014). Types of organized crime in Italy. The multifaceted spectrum of Italian criminal associations and their different attitudes in the financial crisis and in the use of Internet technologies. International Journal of Law, Crime and Justice 42(1), pp. 16-32.
- Mugisha, D. (2019). Role and Impact of Digital Forensics in Cybercrime Investigations. International Journal of Cyber Criminology 47(3). Retrieved from: https://www.researchgate.net/publication/331991596_role_and_impact_of_digital_forensics_in_cyber_crime_investigations.
- Mimoso, M. (2017). Maersk Shipping Reports $300M Loss Stemming from Not Petya Attack. Threat Post - The Kaspersky Lab Security News Service. Retrieved from: https://threatpost.com/maersk-shipping-reports-300m-lossstemming-from-notpetya-attack/127477/
- Macdermott, Á., Baker, T., & Shi, Q. (2018). IoT Forensics: Challenges For The IoT Era. In 9th IFIP International Conference on New Technologies Mobility and Security (NTMS) (pp. 1–5). Paris, France. http://doi.org/10.1109/NTMS.2018.8328748
- McAfee, A., & Brynjolfsson, E. (2012). Big Data: The Management Revolution. Harvard Business Review 90(10), pp. 1-9.
- McAfee & CSIS (2018). The Economic Impact of Cybercrime - No Slowing Down.
- Mac Dermott, A. M., Baker, T., Buck, P., Iqbal, F., & Shi, Q. (2019). The Internet of Things: Challenges and Considerations For Cybercrime Investigations And Digital Forensics. International Journal of Digital Crime and Forensics (IJDCF) 12(1), pp. 1-13.
- Mocas, S. (2004). Building Theoretical Underpinnings for Digital Forensics Research. Digital Investigation 1(1), pp. 61–68. http://doi.org/10.1016/j.diin.2003.12.004
- Okutan, A., & Cebi, Y. (2019). A framework for Cyber Crime Investigation. Procedia Computer Science 158, pp. 287–294.
- Oruc, E., & Tatar, C. (2017). An investigation of factors that affect internet banking usage based on structural equation modelling. Computational Human Behavior 66, pp. 232–235.
- Reith, M., Carr, C., & Gunsch, G. (2002). An Examination of Digital Forensic Models. International Journal of Digital Evidence 1(3), pp. 1–12.
- Rogers, M. (2006). DCSA: A Practical Approach to Digital Crime Scene Analysis. In Tipton, H. F. & Krause, M. (Eds.), Information Security Management Handbook. Auerbach Publications.
- Schatz, B. (2007). Bodysnatcher: Towards Reliable Volatile Memory Acquisition By Software. Digital Investigation 4, pp. 126-134.
- Selamat, S. R., Yusof, R., & Sahib, S. (2008). Mapping Process of Digital Forensic Investigation Framework. International Journal of Computer Science and Network Security 8(10), pp. 163–169.
- Taylor, M., Haggerty, J., Gresty, D., & Hegarty, R. (2010). Digital evidence in cloud computing systems. Computer Law & Security Review 26(3), pp. 304–308. http://doi.org/10.1016/j.clsr.2010.03.002
- Vrancianu, M., & Popa, L. A. (2010). Considerations Regarding the Security and Protection of E-Banking Services Consumers Interests. The Amfiteatru Economic Journal, 1228: pp. 388-403.
- Wall, D. S. (2007). Cybercrime: The Transformation of Crime in the Information Age. Polity Press.