[5] Benatar Marco, The Use of Cyber Force: Need for Legal Justification?, Goettingen Journal of
International Law 1 (2009)
[6] Berkman, S., Boswell, N.Z., Brüner, F.H., Gough, M., McCormick, J.T., Pedersen, P.E., Ugaz, J. and
Zimmermann, S. (2008), “The fight against corruption: international organizations at a
cross-roads”, Journal of Financial Crime, Vol. 15 No. 2
[7] Bradbury Steven G., The Developing Legal Framework for Defensive and Offensive Cyber
Operations, 2 Harv. Nat'l Sec. J. 629, 2011
[8] Cilluffo FrankJ, Paul Byron Pattak , George Charles Salmoiraghi Bad Guys and Good Stuff: When
and Where Will the Cyber Threats Converge?, 12 DePaul Bus. L.J. 131 1999-2000
[9] Cilluffo FrankJ. & Paul Byron Pattak, Cyber Threats: Ten Issues for Consideration, 1 Geo. J. Int'l Aff.
41 2000
[10] Elvins,M. (2003), “Europe's response to transnational organised crime”, in Edwards,A. and Gill,
P. (Eds), Crime: Perspectives on Global Security, Routledge, London.
[11] Ferrer, M. (2009), “Prosecuting extortion victims: how counter-terrorist finance measure
executive order 13224 is going to far”, Journal of Financial Crime, Vol. 16 No. 3.
[12] Filho, L.A. (2008), “The dynamics of drug-related organized crime and corruption in Brazil from
a development perspective”, Journal of Financial Crime, Vol. 15 No. 1.
[13] Fisher, J. (2008), “The UK's faster payment project: avoiding a bonanza for cybercrime
fraudsters”, Journal of Financial Crime, Vol. 15 No. 2.