Bibliography
Best, Alison J. “Elonis v. United States: The Need to Uphold Individual Rights to Free Speech While Protecting Victims of Online True Threats.” Maryland Law Review 75, no. 4 (2016): 1127-1158.
Brandenburg v. Ohio, 395 U.S. 444 (1969).
Chaplinsky v. New Hampshire, 315 U.S. 568 (1942)
Domdouzis, K., Babak Akhgar, Simon Andrews, Helen Gibson, and Laurence Hirsch. “A Social Media and Crowdsourcing Data Mining System for Crime Prevention During and Post-Crisis Situations.” Journal of Systems and Information Technology 18, no.4 (2016): 364-382.
Douglas, John E., Ann W. Burgess, Allen G. Burgess, and Robert K. Ressler. Crime Classification Manual: A Standard System for Investigating and Classifying Violent Crime. Hoboken: John Wiley & Sons, Inc., 2013.
Elonis v. United States, 575 U.S. ___ (2015).
Gerard, F. Jeane, Norair Khachatryan, and Bethany Browning. “Exploration of Crime Scene Characteristics in Cyber-Related Homicides.” Homicide Studies 24, no. 1 (2020): 45-68.
Khazaeli Jah, Mohammadmoein, and Ardavan Khoshnood. “Profiling Lone-Actor Terrorists: A Cross-Sectional Study of Lone-Actor Terrorists in Western Europe (2015-2016).” Journal of Strategic Security 12, no. 4 (2019): 25-49.
Kipane, Aldona. “Meaning of Profiling of Cybercriminals in the Security Context.” SHS Web of Conferences 68 (2019): 1-15.
Kruglanski, Arie W., Rohan Gunaratna, Molly Ellenberg, and Anne Speckhard. “Terrorism in Time of the Pandemic: Exploiting Mayhem.” Global Security: Health, Science and Policy 5, no. 1 (2020): 121-132.
Lankford, Adam, Krista Grace Adkins, and Eric Madfis. “Are the Deadliest Mass Shootings Preventable? An Assessment of Leakage, Information Reported to Law Enforcement, and Firearms Acquisition Prior to Attacks in the United States.” Journal of Contemporary Criminal Justice 35, no. 3 (2019): 315-341.
Lidsky, Lyrissa Barnett, and Linda Riedemann Norbut. “#I U: Considering the Context of Online Threats.” California Law Review 106, no. 6 (December 2018): 1885-1930.
Liem, M.C.A., and M.E.F. Greelen. “The Interface Between Homicide and the Internet.” Aggression and Violent Behavior 48 (2019): 65-71.
Lopez, Ernesto, and Richard Rosenfeld. “Crime, Quarantine, and the U.S. Coronavirus Pandemic.” Criminology & Public Policy 20 (2021): 401-422.
Packingham v. North Carolina, 137 S.Ct. 1730 (2017).
Radojevic, Nemanja, Ivana Curovic, and Miodrag Soc. “Using a Facebook Profile in Determining the Motive of Homicide.” Journal of Forensic and Legal Medicine 20 (2013): 575-577.
Recupero, Patricia R. “Homicide and the Internet.” Behavioral Sciences & the Law 39 (2021): 216-229.
Rønn, Kira Vrist, and Sille Obelitz Søe. “Is Social Media Intelligence Private? Privacy in Public and the Nature of Social Media Intelligence.” Intelligence and National Security 34, no. 3 (2019): 362-378.
Steel, Chad. “Idiographic Digital Profiling: Behavioral Analysis Based on Digital Footprints.” The Journal of Digital Forensics, Security and Law 9, no. 1 (2014): 7-18.
Todd, Chris, Joanne Bryce, and Virginia N. L. Franqueira. “Technology, Cyberstalking and Domestic Homicide: Informing Prevention and Response Strategies.” Policing and Society 31, no. 1 (2021): 82-99.
Virginia v. Black, 538 U.S. 343 (2003).
Watts v. United States, 394 U.S. 705 (1969).
Table of Contents
- Introduction
- Misconstrual of Privacy in Cyberspace
- Demystifying True Online Threats vs. Protected Violent Speech
- Cyberspace is a Hunting Ground
- Shrinking Big Data
- Behavioral Profiling and Human Judgment
- Conclusion
- Bibliography