A. Sustainability and . Issn, (10) ENTREPRENEURSHIP AND SUSTAINABILITY ISSUES ISSN 2345-0282 (online) http://jssidoi.org/jesi, pp.2345-0282, 2017.

N. Akatyev and J. I. James, Cyber Peacekeeping, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST 157, pp.126-139, 2015.
DOI : 10.1007/978-3-319-25512-5_10

I. J. Bihariová and F. L. Faust, Cyber hate ? nenávis? na internete. [Cyber hate -hate on Internet] Available on the Internet http://www.beznenavisti.sk/wp-content/themes/beznenavisti/podklady-a-materialy/Cyberhate-Nenavist-na-internete.pdf Brantingham, P A conceptual model of crime prevention, Crime and Delinquency, vol.22, issue.3, p.290, 1976.

G. Clancey, Thesis submitted in fulfilment of the requirements for the degree of Doctor of Philosophy, 2014.

P. Gu?tafík, Gamifikácia vo vzdelávaní: ?o to je, ako na ?u, a pre?o o ?u usilova?? [Gamification in education: what it is how to on it, and why seeking it?]. Available on the Internet, 2016.

V. Krej?í, Available on the Internet: http://cms.e-bezpeci.cz/content, Kyber?ikana. [Cyberbullying], vol.1439, 2010.

J. Mete?ko, Kriminalistické metódy a mo?nosti kontroly sofistikovanej kriminality [Investigative techniques and sophisticated options to control crime, Bratislava: Akadémia Policajného zboru, 2004.

A. Moustafa, M. M. Shomrani, A. Al-marghirani, and A. A. Al-rababah, Hacking and cyber crimes: A preventive guide, Journal of Engineering and Applied Sciences, vol.8, issue.7, pp.225-229, 2013.

T. Perina, Sociálne siete a ich vyu?itie v marketingu. [Social networks and their use in marketing], 2011.

K. Sadhukhan, R. A. Mallari, and T. Yadav, Cyber Attack Thread: A control-flow based approach to deconstruct and mitigate cyber threats, 2015 International Conference on Computing and Network Communications (CoCoNet), pp.170-178, 2015.
DOI : 10.1109/CoCoNet.2015.7411183

V. Sekgwathe and M. Talib, Cyber Crime Detection and Protection: Third World Still to Cope-Up, Communications in Computer and Information Science, vol.2, issue.2, pp.171-171, 2011.
DOI : 10.1007/s11416-006-0015-z

T. Somer, B. Hallaq, and T. Watson, Utilising journey mapping and crime scripting to combat cyber crime, Proceedings of the European Conference on Information Warfare and Security (ECCWS), pp.276-281, 2016.

S. M. Smyth, Crime prevention and community safety: From realspace to cyberspace (MR07360) ProQuest Central, 2005.

S. ?i?ulák and M. ?almík, Cyberbullying ako forma zneu?itia sociálnych sietí na internete [Cyberbullying as a form of abuse of social networking on the internet], Policajná teória a prax, pp.112-123, 2013.

J. Tomková, Adolescenti a negatívne zá?itky na internete, Kyber?ikanovanie. [Adolescents and negative experiences on the internet. Cyberbullying]. Available on the Internet, 2016.

P. Vnou?ek, Facebookový vrah má do?ivotí Sociální sí? sklízí kritiku [The Facebook murderer has life. Social network reaps criticism], Týden. Available on the Interne, 2010.

S. Wasserman and K. Faust, Social Network Analysis: Methods and Applications, 1994.
DOI : 10.1017/CBO9780511815478