... coming soon!

Project deliverables

D2.5 Project legal and ethical handbook
This document is intended to provide an overview about the meaning of ‘ethics’ and data protection, how these relate specifically to the PROPHETS project and what partners must do in order to comply with the respective requirements.
D2.5 Ethical and Legal Project Handbook.
Adobe Acrobat Document 1.0 MB


Suggested Scientific Literature

  • Akhgar, B., & Brewster, B. (2016). Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities. Advanced Sciences and Technologies for Security Applications.
  • Akhgar, B., Staniforth, A., & Bosco, F. (2014). Cyber Crime and Cyber Terrorism Investigator’s Handbook. Cyber Crime and Cyber Terrorism Investigator’s Handbook.
  • Bayerl, P. S., Akhgar, B., Brewster, B., Domdouzis, K., & Gibson, H. (2014). Social media and its role for LEAs: Review and applications. In Cyber Crime and Cyber Terrorism Investigator’s Handbook.
  • Iliou, C., Kalpakis, G., Tsikrika, T., Vrochidis, S., & Kompatsiaris, I. (2016). Hybrid focused crawling for homemade explosives discovery on surface and dark Web. In Proceedings - 2016 11th International Conference on Availability, Reliability and Security, ARES 2016.
  • Lockley, E., & Akhgar, B. (2014). Understanding the situational awareness in cybercrimes: Case studies. In Cyber Crime and Cyber Terrorism Investigator’s Handbook.
  • Ronert, S., & Nitsch, H. (2017). Community Policing and Radicalization: Evaluation and European Examples. In S. Bayerl, R. Karlovic, B. Akhgar, & G. Markarian (Eds.). Community Policing - A European Perspective (pp. 67–82). Springer.
  • Staniforth, A., & Nitsch, H. (2013). Preventing Terrorism Together. A Framework to Provide Social Media Anti-Radicalization Training for Credible Community Voices. In Emerging Trends in ICT Security.
  • Wölfer, R., & Scheithauer, H. (2014). Social influence and bullying behavior: Intervention-based network dynamics of the fairplayer.manual bullying prevention program. Aggressive Behavior.