Suggested Scientific Literature

  • Akhgar, B., Bayerl, P. S., & Sampson, F. (Eds.). (2017). Open Source Intelligence Investigation: From Strategy to Implementation. Springer.
  • Akhgar, B. & Brewster, B. (Eds.) (2016). Combatting cybercrime and cyberterrorism: Challenges, trends and priorities. Springer.
  • Akhgar, B., Staniforth, A., & Bosco, F. (Eds.) (2014). Cyber crime and cyber terrorism investigator’s handbook. Syngress.
  • Akhgar, B., Saathoff, G. B., Arabnia, H. R., Hill, R., Staniforth, A., & Bayerl, P. S. (2015). Application of big data for national security: a practitioner’s guide to emerging technologies. Butterworth-Heinemann.
  • Akhgar, B., Staniforth, A., & Waddington, D. (2017). Application of Social Media in Crisis Management. Springer International Publishing.
  • Bayerl, P. S., Karlović, R., Akhgar, B., & Markarian, G. (Eds.). (2017). Community policing - a European perspective: Strategies, best practices and guidelines. Springer.
  • Fiedler, N., Sommer, F., Leuschner, F., & Scheithauer, H. (in press). Student crisis prevention in schools: The NETWork Against School Shootings Program (NETWASS) - an approach suitable for the prevention of radicalization processes? In B. Akhgar, D. Wells, & J. M. Blanco (Eds.), Emerging radicalisation trends across Europe - transversal threats in a liquid world. London: Springer.
  • Jacobs, G. & Bayerl, P. S (2015). Accounting for cultural influences in the supply-demandchain of big data production and interpretation. In B. Akhgar, G. Saathoff, H. Arabnia, R. Hill, A. Staniforth, & P. S. Bayerl (Eds). Applications of Big Data for national security. A practitioner's guide to emerging technologies (pp. 250-260). Elsevier.
  • Lockley, E. & Akhgar, B. (2014). Understanding the situational awareness in cybercrimes: Case studies. In Cyber Crime and Cyber Terrorism Investigator’s Handbook (pp. 101-121). Springer.
  • Segura Serrano, A. (2015). Cybersecurity: Towards a global standard in the protection of critical information infrastructures. European Journal of Law and Technology, 6(3).