Joseph Cuseo. 2002. Igniting Student Involvement, Peer Interaction, and Teamwork: A Taxonomy of Specific Cooperative Learning Structures and Collaborative Learning Strategies. New Forums Press.
Ovie Carroll and Mark Krotoski. 2014. Using "Digital Fingerprints" (or Hash Values) for Investigations and Cases Involving Electronic Evidence, 62 United States Attorneys' Bulletin 44-82 (May 2014). Retrieved from https://www.justice.gov/sites/default/files/usao/legacy/2014/06/03/usab6203.pdf.
Supreme Court of Western Australia. 2007. Mowday Vs The State of Western Australia. WASCA 165. JADE. Retrieved from https://jade.io/article/12808.
United States District Court for the District of Vermont. 2007. In re: Grand Jury Subpoena to Sebastien Boucher. Retrieved from https://www.crowell.com/PDF/In-re-Boucher.pdf.
Robert McMillan. 2008. State Worker's Child Porn Charges Dropped; Virus Blamed. Retrieved from https://www.csoonline.com/article/2122832/state-worker-s-child-porn-charges-dropped--virus-blamed.html.
Mozilla. 2008. Julie Amero Trial Transcript. Retrieved from http://julieamero.blogspot.com.
Tony Romm. 2008. Why Would a Virus Look at Kiddie Porn? Retrieved from https://slate.com/news-and-politics/2008/06/why-would-hackers-program-a-virus-to-view-child-pornography.html.
Gavin Clowes. The Essential 5: A Starting Point for Kagan Cooperative Learning. San Clemente, CA: Kagan Publishing. Kagan Online Magazine, Spring 2011.
Associated Press. 2009. Framed for Porn – By a PC Virus. Retrieved from https://www.cnbc.com/2009/11/09/framed-for-porn-by-a-pc-virus.html.
American Broadcasting Company. 2009. A Misconfigured Laptop, a Wrecked Life. Retrieved from https://abcnews.go.com/Technology/PCWorld/story?id=5188541|N/A.
April Tanner and David Dampier. 2009. Concept mapping for digital forensic investigations. IFIP International Conference on Digital Forensics. Springer.
Alex Eckelberry, Glenn Dardick, Joel Folkerts, Alex Shipp, Eric Sites, Joe Stewart and Robin Stuart. 2013. Technical review of the trial testimony State of Connecticut vs. Julie Amero.
Stephen Bowles and Julio Hernandez-Castro. 2015. The first 10 years of the Trojan Horse defence. Computer Fraud and Security. Elsevier.
Gail Taylor Rice. 2017. Hitting pause: 65 lecture breaks to refresh and reinforce learning. Stylus Publishing, LLC
What I learned today quad-fold activity. 2017. Retrieved from www.literacyteacher.com/what-i-learned-today-quad-fold-activity.
CyBOK. 2021. CyBOK. Retrieved from https://www.cybok.org.
The British Library. 2022. The British Library’s collections on Flickr Commons. Retrieved from https://www.flickr.com/people/britishlibrary/.
Elliot Aronson. 2022. The Jigsaw Classroom. Retrieved from https://www.jigsaw.org.
Alexander Kahlkopf. 2002. iconmonstr. Retrieved from https://iconmonstr.com/about/.
P4N4Rd1. 2019. First steps to volatile memory analysisMedium. Retrieved from https://medium.com/@zemelusa/first-steps-to-volatile-memory-analysis-dcbd4d2d56a1
Paul Newton. 2020. Malware Analysis: Memory Forensics with Volatility 3.https://newtonpaul.com/malware-analysis-memory-forensics-with-volatility-3/
More information available via www.ease.ws