These are the sources and citations used to research id theft. This bibliography was generated on Cite This For Me on
In-text: (Beebe and Clark, 2005)
Your Bibliography: Beebe, N. and Clark, J., 2005. A hierarchical, objectives-based framework for the digital investigations process. Digital Investigation, 2(2), pp.147-167.
In-text: (Casey, 2016)
Your Bibliography: Casey, E., 2016. Differentiating the phases of digital investigations. Digital Investigation, 19, pp.A1-A3.
In-text: (Djukic, 2017)
Your Bibliography: Djukic, A., 2017. Identity theft: Forms, characteristics, and distribution. Vojno delo, 69(4), pp.99-118.
In-text: (Gladyshev, Marrington and Baggili, 2014)
Your Bibliography: Gladyshev, P., Marrington, A. and Baggili, I., 2014. Digital Forensics and Cyber Crime. 1st ed. Cham: Springer International Publishing, pp.67-103.
In-text: (Griffith, 2018)
Your Bibliography: Griffith, D., 2018. How To Investigate Cybercrime. [online] Policemag.com. Available at: <http://www.policemag.com/channel/technology/articles/2003/11/how-to-investigate-cybercrime.aspx> [Accessed 27 May 2018].
In-text: (Nelson, 2008)
Your Bibliography: Nelson, T., 2008. The King James study Bible. 1st ed. Nashville: Thomas Nelson Publishers.
In-text: (Sood and Enbody, 2014)
Your Bibliography: Sood, A. and Enbody, R., 2014. Targeted cyber attacks. 1st ed. Waltham, MA: Syngress, pp.78-197.
In-text: (Yılmaz and Gönen, 2018)
Your Bibliography: Yılmaz, E. and Gönen, S., 2018. Attack detection/prevention system against cyber attack in industrial control systems. Computers & Security, 77, pp.94-105.
10,587 students joined last month!