1. Abou-Zeid A (2018) Policies and legislation, international cooperation and capacity building. African Forum on Cybercrime, Addis-Ababa. Accessed 8 Sept 2018
2. African Union Commission (AUC) and Symantec (2016) Report, cyber crime and cyber security trends in Africa (November 2016) 22.
https://www.symantec.com/content/dam/symantec/docs/reports/cyber-security-trends-report-africa-interactive-en.pdf
3. Akande D, Vermeer Z (2015) The airstrikes against Islamic State in Iraq and the alleged prohibition on military assistance to governments in civil wars. EJIL: Talk! (2 February 2015).
https://www.ejiltalk.org/the-airstrikes-against-islamic-state-in-iraq-and-the-alleged-prohibition-on-military-assistance-to-governments-in-civil-wars/
. Accessed 8 Jan 2018
4. Alexander J, Finkle J (2015) Apparent Islamic State backers hack US military Twitter feed. Reuters (12 January 2015).
https://www.reuters.com/article/us-cybersecurity-centcom-hack/apparent-islamic-state-backers-hack-u-s-military-twitter-feed-idUSKBN0KL1UZ20150112
. Accessed 9 May 2018
5. Alkousaa R (2017) Iraq seeks international help to investigate Islamic State crimes. Reuters (16 August 2017).
https://www.reuters.com/article/us-mideast-crisis-iraq-un/iraq-seeks-international-help-to-investigate-islamic-state-crimes-idUSKCN1AW2E7
. Accessed 4 June 2018