Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.
Aransiola, J. O. and Asindemade, S. O. (2011) ‘Understanding cybercrime perpetrators and the strategies they employ in Nigeria’, Cyberpsychology, Behavior, and Social Networking, 14, pp. 759−763.
Bates, S. (2017) ‘Revenge porn and mental health: A qualitative analysis of the mental health effects of revenge porn on female survivors,’ Feminist Criminology, 12(1), pp. 22−42.
BBC News (2011) ‘Who, What, Why: Can phone hackers still access messages?’, BBC News 6 July. Available at: https://www.bbc.co.uk/news/magazine-14044499 (Accessed: 04 November 2020).
Bishop, J. (2014) ‘Representations of ‘trolls’ in mass media communication: a review of media-texts and moral panics relating to ‘internet trolling’, International Journal of Web Based Communities, 10(1), pp. 7-24.
Buchanan, T. and Whitty, M. T. (2014) ‘The online dating romance scam: causes and consequences of victimhood’, Psychology, Crime and Law, 20(3), pp.261–283.
Buckels, E. E., Trapnell, P. D. and Paulhus, D. L. (2014). ‘Trolls just want to have fun’ Personality and individual Differences, 67, pp. 97–102.
Button, M., Lewis, C. and Tapley, J. (2009) Fraud typologies and the victims of fraud literature review. London, National Fraud Authority.
Button, M., Lewis, C. and Tapley, J. (2014) ‘Not a victimless crime: The impact of fraud on individual victims and their families’, Security Journal, 27(1), pp. 36−54.
Canter, D. and Youngs, D. (2009) Investigative Psychology: Offender Profiling and the Analysis of Criminal Action, Chichester, Wiley.
Coles, B. A. and West, M. (2016) ‘Trolling the trolls: Online forum users constructions of the nature and properties of trolling’, Computers in Human Behavior, 60, pp. 233–244.
Conklin, A., Dietrich, G. and Walz, D. (2004) ‘Password-based Authentication: A System Perspective’, Proceedings of the 37th Annual Hawaii International Conference on System Sciences, pp. 1−10.
Cooper, K., Quayle, E., Jonsson, L. and Göran Svedin, C. (2016) ‘Adolescents and self-taken sexual images: A review of the literature’, Computers in Human Behavior, 55, Part B, pp. 706−716.
Cross, C. (2015). ‘No laughing matter: Blaming the victim of online fraud’, International Review of Victimology, 21(2), pp. 187–204.
Dreßing, H., Bailer, J., Anders, A., Wagner, H. and Gallas, C. (2014) ‘Cyberstalking in a large sample of social network users: Prevalence, characteristics, and impact upon victims’, Cyberpsychology, Behavior, and Social Networking, 17(2), pp. 61–67.
Fichman, P. and Sanfilippo, M.R. (2016). ‘Online trolling and its perpetrators: Under the cyberbridge’. Lanham, Maryland: Rowman & Littlefield.
Herring, S., Job-Sluder, K., Scheckler, R. and Barab, S. (2002) ‘Searching for safety online: Managing “trolling” in a feminist forum’, The Information Society, 18, pp. 371–384.
Kirwan, G. and Power, A. (2013) ‘Cyberbullying and Cyberstalking’, in Kirwan, G. and Power, A. Cybercrime: The Psychology of Online Offenders, Cambridge, Cambridge University Press, pp. 147–168.
Låftman, S. B., Modin, B. and Östberg, V. (2013) ‘Cyberbullying and subjective health: A large-scale study of students in Stockholm, Sweden’, Children and Youth Services Review, 35, pp. 112–119.
Langos, C. (2015) ‘Cyberbullying: The shades of harm’ Psychiatry, psychology and law, 22(1), pp.106–123.
Lerner, M. J. (1980) The Belief in a Just World: A Fundamental Delusion, New York, Plenum Press.
McGlynn, C., Rackley, E. and Houghton, R. (2017) ‘Beyond ‘revenge porn’: The continuum of image-based sexual abuse’ Feminist Legal Studies, 25(1), pp. 25–46.
Mendelsohn, B. (1956) ‘The Victimology’, Etudes Internationales de Psycho-Sociologie Criminelle, 3, pp. 25–26 (in French).
Naughton, J. (2016). ‘The evolution of the internet: from military experiment to general purpose technology’, Journal of Cyber Policy, vol.35, no. 1, pp.5-28.
Nigam, S. (2018) ‘Revenge Porn Laws across the World’, The Centre for Internet and Society [Online] Available at: https://cis-india.org/internet-governance/blog/revenge-porn-laws-across-the-world (Accessed: 04 November 2020).
Nuccitelli, M (n.d.) 130+ types of internet trolls and online provocateurs. Available at: https://www.ipredator.co/troll/ (Accessed: 04 November 2020).
Rege, A. (2009) ‘What's love got to do with it? Exploring online dating scams and identity fraud’, International Journal of Cyber Criminology, 3, pp. 494−512.
Samimi, P. and Alderson, K. (2014) ‘Sexting among undergraduate students’, Computers in Human Behavior, 31, pp. 230−241.
Schneider, S. K., O’Donnell, L., Stueve, A. and Coulter, R. (2012) ‘Cyberbullying, school bullying, and psychological distress: A regional census of high school students’, American Journal of Public Health, 102, pp. 171–177.
Shachaf, P. and Hara, N. (2010) ‘Beyond vandalism: Wikipedia trolls’, Journal of Information Science, 36(3), pp. 357–370.
Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S. and Tippett, N. (2008) ‘Cyberbullying: its nature and impact in secondary school pupils’, Journal of Child Psychology and Psychiatry, 49(4), pp. 376–385.
Schneider, S. K., O’Donnell, L., Stueve, A. and Coulter, R. (2012) ‘Cyberbullying, school bullying, and psychological distress: A regional census of high school students’, American Journal of Public Health, 102, pp. 171–177.
Sourander, A., Brunstein Klomek, A., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., Ristkari, T. and Helenius, H. (2010) ‘Psychosocial risk factors associated with cyberbullying among adolescents: A population-based study’, Archives of General Psychiatry, 67(7), pp. 720–728.
Tam, L., Glassman, M. and Vanderwauver, M. (2009) ‘The psychology of password management: a tradeoff between security and convenience’, Behaviour & Information Technology, 29(3), pp. 233−244.
Whitty, M. T. and Buchanan, T. (2012) ‘The online dating romance scam: A serious cybercrime’, Cyberpsychology, Behavior, and Social Networking, 15(3), pp. 181−183.
Whitty, M.T. and Buchanan, T. (2016) ‘The online dating romance scam: The psychological impact on victims – both financial and non-financial’, Criminology & Criminal Justice, 16(2), pp. 176−194.
Williams, M. L., & Levi, M. (2017). ‘Cybercrime prevention’. In N. Tilley & A. Sidebottom (Eds.), Handbook of crime prevention and community safety (pp. 454−469). London: Routledge.
Youngs, D., Ioannou, M. and Eagles, J. (2016) ‘Expressive and instrumental offending: Reconciling the paradox of specialisation and versatility’, International Journal of Offender Therapy and Comparative Criminology, 60(4), pp. 397–422.