1. All URLs were last accessed (and correct) on 5 November 2016
2. Burke, A., Corpuz, M., & Gans, F. (2015). Jury presented with electronic evidence in Tsarnaev trial, updated 24 March, 2015, The Daily Free Press. viewed 4 July,
http://dailyfreepress.com/2015/03/24/jury-presented-with-electronic-evidence-in-tsarnaev-trial/
.
3. Choo, K-K. R. (2009). Online child grooming: A literature review on the misuse of social networking sites for grooming children for sexual offences. Research and public policy No 103, Canberra, ACT.
4. Conti, M., Das, S. K., Bisdikian, C., Kumar, M., Ni, L. M., Passarella, A., et al. (2012). Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber–physical convergence. Pervasive and Mobile Computing, 8(1), 2–21.
5. Corera, G. (2015). The MI5 spy in your mobile: How 7/7 London attack triggered new data-fed war on terror which led to capture of 21/7 bomb plotters which made ISIS vanish into encrypted web but makes your calls transparent to GCHQ spooks in ‘Doughnut’, updated 14 June 2015,
http://www.dailymail.co.uk/news/article-3122808/How-7-7-London-attack-triggered-new-data-fed-war-terror-led-capture-21-7-bomb-plotters-ISIS-vanish-encrypted-web-makes-calls-transparent-GCHQ-spooks-Doughnut.html
.