1. Abad-Santos, A. (2013). Inside the anonymous hacking file on the Steubenville ‘rape crew’. Retrieved from https://www.theatlantic.com/national/archive/2013/01/inside-anonymous-hacking-file-steubenville-rape-crew/317301/
2. Aiken, M., Davidson, J., & Amann, P. (2016). Youth pathways into cybercrime. Retrieved from https://www.europol.europa.eu/publications-documents/youth-pathways-cybercrime
3. Ashton, M. C., & Lee, K. (2007). Empirical, theoretical, and practical advantages of the HEXACO model of personality structure. Personality and Social Psychology Review: An Official Journal of the Society for Personality and Social Psychology, 11(2), 150–166.
4. Atlantic Council. (2011). International subversives. Retrieved from https://www.atlanticcouncil.org/blogs/new-atlanticist/international-subversives/
5. Bada, M., & Nurse, J. R. C. (2021). Profiling the cybercriminal: A systematic review of research. In 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) (pp. 1–8). https://doi.org/10.1109/CyberSA52016.2021.9478246