Aydin, F., & Dirilen-Gumus, O. (2011). Development of a criminal profiling instrument. Procedia-Social and Behavioral Sciences, 30, 2612–2616.
Boaz Ganor (2021): A Typology of Terrorist Attacks: The “32 Profiles” Model, Studies in Conflict & Terrorism. https://doi.org/10.1080/1057610X.2020.1868095
Cannell, M. (2017). Incendiary: The Psychiatrist, the Mad Bomber, and the Invention of Criminal Profiling. Minotaur Books.
Canter, D. v, Alison, L. J., Alison, E., & Wentink, N. (2004). The
organized/disorganized typology of serial murder: Myth or model Psychology, Public Policy, and Law, 10(3), 293.
Chifflet, P. (2015). Questioning the validity of criminal profiling: An evidence-based approach. Australian & New Zealand Journal of Criminology, 48(2), 238–255.
Christopher J. Koegl & David P. Farrington (2021): Advancing Knowledge about Motivations for Criminal Offending, Victims & Offenders. https://doi.org/10.1080/15564886.2021.1895940
Dafna Tener, Janis Wolak & David Finkelhor (2015). A Typology of Offenders WhoUse Online Communications to Commit Sex Crimes Against Minors, Journal ofAggression, Maltreatment & Trauma. http://dx.doi.org/10.1080/10926771.2015.1009602
Fink, A. (2019). Conducting research literature reviews: From the internet to paper. Sagepublications.
Helfgott, J. B. (2013). The popular conception of the psychopath: Implications for criminal justice practice. Praeger/ABC-CLIO.
Higgs, T., Carter, A. J., Tully, R. J., & Browne, K. D. (2017). Sexual murder typologies: Asystematic review. Aggression and Violent Behavior, 35, 1-12. https://doi.org/10.1016/j.avb.2017.05.004.
Holmes, R. M., & Holmes, S. T. (1998). Serial murder.
Holmes, R. M., de Burger, J., & Holmes, S. T. (1988). Inside the mind of the serial murder. American Journal of Criminal Justice, 13(1), 1–9.
Holt, T. J. (2009). The attack dynamics of political and religiously motivated hackers. In Proceedings of the Cyber Infrastructure Protection Conference. City University of New York. http://www.arifyildirim.com/ilt510/thomas.holt.pdf
Hurlburt, R. T., & Knapp, T. J. (2006). Münsterberg in 1898, not Allport in 1937, introduced the terms ‘idiographic ‘and ‘nomothetic ‘to American psychology. Theory & Psychology, 16(2), 287–293.
Keppel, R. (2010). The riverman: Ted Bundy and I hunt for the Green River killer. SimonandSchuster. Marc Rogers, The role of criminal profiling in the computer forensics process, Computers& Security, Volume 22, Issue 4, 2003, Pages 292-298, ISSN 0167-4048, https://doi.org/10.1016/S0167-4048(03)00405-X.
Martineau, M., Spiridon, E., & Aiken, M. (2023). A Comprehensive Framework for Cyber Behavioral Analysis Based on a Systematic Review of Cyber Profiling Literature. Forensic Sciences, 3(3), 452–477.
Messori, L. R. (2016). Frequencies Between Serial Killer Typology and Theorized Etiological Factors. https://aura.antioch.edu/etds/316
Muller, D. A. (2000). Criminal profiling: Real science or just wishful thinking? Homicide Studies, 4(3), 234–264.
Payne, B. K. (2020). Defining cybercrime. The Palgrave Handbook of International Cybercrimeand Cyberdeviance, 3–25.
Phillips, K., Davidson, J.C., Farr, R.R., Burkhardt, C., Caneppele, S., & Aiken, M.P. (2022). Conceptualizing Cybercrime: Definitions, Typologies and Taxonomies. Forensic Science, 2(2), 379-398. https://doi.org/10.3390/forensicsci2020028
Rajan, A., & Aswathy, P. (2018). A Comparative Study on the Difference Between Conventional Crime and Cyber Crime. 1451-1464.
Rakestraw, D., & Cameron, B. (2019). Ted Bundy: The Development of a Serial Murderer
Reid, R., Dolp, R., Hassan, T., & Khalifa, N. (2023). Terrorism typologies and considerations for clinical practice in psychiatry. International Journal of Risk and Recovery, 6(1), 4-14. https://doi.org/10.59703/ijrr.v6i1.4-14
Ribeiro R. A. B., Soeiro C. B. B. M. (2021). Analyzing criminal profiling validity:Underlyingproblems and future directions. International Journal of Law and Psychiatry, 74, 101670.
Rogers, M.(2003). The role of criminal profiling in the computer forensics process. Computers & Security, 22(4), 292–298.
Shadach, E., Geller, S., Barak, M., Hill, I., & Azani, E. (2021). A psychological typology of terror organizations. Aggression and Violent Behavior, 58. https://doi.org/10.1016/j.avb.2021.101562
Sharma, M. (2018). The development of serial killers: A grounded theory study.
Tampomuri, F. J., Syauqillah, M., & Logahan, J. (2020). Terror Acts by Dr. Azahari of The Al-Jamaah Alislamiyah Organization: The Use of Signature Bombs.
Proceedings of 3rd International Conference on Strategic and Global Studies, ICSGS 2019, 6-7 November 2019, Sari Pacific, Jakarta, Indonesia.
Triandini, E., Jayanatha, S., Indrawan, A., Werla Putra, G., & Iswara, B. (2019). Metode Systematic Literature Review untuk Identifikasi Platform dan Metode
Pengembangan Sistem Informasi di Indonesia. Indonesian Journal of Information Systems, 1(2), 63–77. https://doi.org/10.24002/ijis.v1i2.1916
Turvey, B. E. (2008). Case linkage: Offender modus operandi and signature.
Turvey, B. E. (2011). Criminal profiling: An introduction to behavioral evidence analysis. Academic press.
Turvey, M. T., & Shaw, R. E. (1999). Ecological foundations of cognition. I: Symmetry and specificity of animal-environment systems. Journal of Consciousness Studies, 6(11–12), 95–110.
Van Aken, C.(2015). The use of criminal profilers in the prosecution of serial killers. THEMIS: Research Journal of Justice Studies and Forensic Science, 3(1), 7.
Warikoo, A. (2021). The triangle model for cyber threat attribution. Journal of Cyber Security Technology, 5(3–4), 191–208.
Weulen Kranenbarg, M. (2018). Cyber-offenders versus traditional offenders: An empirical comparison. [PhD- Thesis – Research external, graduation internal, Vrije Universiteit Amsterdam
Journal Psikologi Tabularasa has been indexing:
Journal Psikologi Tabularasa has been tools:
Jurnal Psikologi Tabularasa Faculty of Psychology Mailing Address: Address: Jl. Terusan Raya Dieng No. 62-64, Malang, Indonesia, 65146 Phone/Fax: +62341-568395 ext. 821 Email: [email protected]
|