These are the sources and citations used to research id theft. This bibliography was generated on Cite This For Me on

  • Journal

    Beebe, N. L. and Clark, J. G.

    A hierarchical, objectives-based framework for the digital investigations process

    2005 - Digital Investigation

    In-text: (Beebe and Clark, 2005)

    Your Bibliography: Beebe, N. and Clark, J., 2005. A hierarchical, objectives-based framework for the digital investigations process. Digital Investigation, 2(2), pp.147-167.

  • Journal

    Casey, E.

    Differentiating the phases of digital investigations

    2016 - Digital Investigation

    In-text: (Casey, 2016)

    Your Bibliography: Casey, E., 2016. Differentiating the phases of digital investigations. Digital Investigation, 19, pp.A1-A3.

  • Journal

    Djukic, A.

    Identity theft: Forms, characteristics, and distribution

    2017 - Vojno delo

    In-text: (Djukic, 2017)

    Your Bibliography: Djukic, A., 2017. Identity theft: Forms, characteristics, and distribution. Vojno delo, 69(4), pp.99-118.

  • Book

    Gladyshev, P., Marrington, A. and Baggili, I.

    Digital Forensics and Cyber Crime

    2014 - Springer International Publishing - Cham

    In-text: (Gladyshev, Marrington and Baggili, 2014)

    Your Bibliography: Gladyshev, P., Marrington, A. and Baggili, I., 2014. Digital Forensics and Cyber Crime. 1st ed. Cham: Springer International Publishing, pp.67-103.

  • Website

    Griffith, D.

    How To Investigate Cybercrime

    2018 - Policemag

    In-text: (Griffith, 2018)

    Your Bibliography: Griffith, D., 2018. How To Investigate Cybercrime. [online] Policemag.com. Available at: <http://www.policemag.com/channel/technology/articles/2003/11/how-to-investigate-cybercrime.aspx> [Accessed 27 May 2018].

  • Book

    Nelson, T.

    The King James study Bible

    2008 - Thomas Nelson Publishers - Nashville

    In-text: (Nelson, 2008)

    Your Bibliography: Nelson, T., 2008. The King James study Bible. 1st ed. Nashville: Thomas Nelson Publishers.

  • Book

    Sood, A. K. and Enbody, R. J.

    Targeted cyber attacks

    2014 - Syngress - Waltham, MA

    In-text: (Sood and Enbody, 2014)

    Your Bibliography: Sood, A. and Enbody, R., 2014. Targeted cyber attacks. 1st ed. Waltham, MA: Syngress, pp.78-197.

  • Journal

    Yılmaz, E. N. and Gönen, S.

    Attack detection/prevention system against cyber attack in industrial control systems

    2018 - Computers & Security

    In-text: (Yılmaz and Gönen, 2018)

    Your Bibliography: Yılmaz, E. and Gönen, S., 2018. Attack detection/prevention system against cyber attack in industrial control systems. Computers & Security, 77, pp.94-105.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join