Source: http://cybercrimejournal.com/Richards&WoodVol12Issue1IJCC2018.pdf