1. Afanasyev, M. et al. (2011). Privacy-preserving network forensics. Communications of the ACM, 54(5), 78. Retrieved September 6, 2011 from
http://portal.acm.org/citation.cfm?doid=1941487.1941508
.
2. Boutros-Ghali, B. (1994) Transnational crime. Vital Speeches of the Day, 61(5), 130.
3. Dunn Cavelty, M., & Mauer, V. (2009). Postmodern intelligence: Strategic warning in an age of reflexive intelligence. Security Dialogue, 40(2), 123–144. Retrieved September 29, 2011 from
http://sdi.sagepub.com/cgi/doi/10.1177/0967010609103071
.
4. Etges, R., & Sutcliffe, E. (2008). An overview of transnational organized cyber crime. Information Security Journal: A Global Perspective, 17(2), 87–94. Retrieved October 21, 2011 from
http://www.tandfonline.com/doi/abs/10.1080/19393550802036631
.
5. Europol, (2006). EU organised crime threat assessment 2006 (p.26). Retrieved January 3, 2012 from
http://scholar.google.com/scholar?hl=en&btnG=Search&q=intitle:EU+Organised+Crime+Threat+Assessment+2006#0
.