A. Aleem and A. Antwi-boasiako, Internet auction fraud: The evolving nature of online auctions criminality and the mitigating framework to address the threat, International Journal of Law, Crime and Justice, vol.39, issue.3, pp.140-160, 2011.
DOI : 10.1016/j.ijlcj.2011.05.003

D. Canter, C. Bennell, L. Alison, and S. Reddy, Differentiating sex offences: a behaviorally based thematic classification of stranger rapes, Behavioral Sciences & the Law, vol.21, issue.2, pp.157-174, 2003.
DOI : 10.1002/bsl.526

E. Casey, Cyberpatterns, pp.547-573, 2003.
DOI : 10.1016/B978-0-12-385243-4.00015-0

F. Dong, S. Shatz, and H. Xu, Combating online in-auction fraud: Clues, techniques and challenges, Computer Science Review, vol.3, issue.4, pp.245-258, 2009.
DOI : 10.1016/j.cosrev.2009.09.001

D. Farrington and S. Lambert, The Feasibility of a Statistical Approach to Offender Profiling: Burglary and Violence in Nottinghamshire , Home Office, 1992.

A. Goodwill, L. Alison, and A. Beech, What works in offender profiling? A comparison of typological, thematic, and multivariate models, Behavioral Sciences & the Law, vol.4, issue.3, pp.507-529, 2009.
DOI : 10.1002/bsl.867

R. Hazelwood, Analyzing the rape and profiling the offender, in Practical Aspects of Rape Investigation: A Multidisciplinary Approach, pp.169-199, 1987.

M. Kjaerland, A taxonomy and comparison of computer security incidents from the commercial and government sectors, Computers & Security, vol.25, issue.7, pp.522-538, 2006.
DOI : 10.1016/j.cose.2006.08.004

R. Knight and R. Prentky, Classifying Sexual Offenders, pp.23-52, 1990.
DOI : 10.1007/978-1-4899-0915-2_3

S. Pandit, D. Chau, S. Wang, and C. Faloutsos, Netprobe, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.201-210, 2007.
DOI : 10.1145/1242572.1242600

F. Richter, eBay's profit rises 19 percent, Statista.com (www.stat ista.com/topics/871/online-shopping/chart/1053/ebays-fi rst-quarter-results), 2013.

M. Rogers, The role of criminal profiling in the computer forensics process, Computers & Security, vol.22, issue.4, pp.292-298, 2003.
DOI : 10.1016/S0167-4048(03)00405-X

M. Rogers, K. Seigfried, and K. Tidke, Self-reported computer criminal behavior: A psychological analysis, Digital Investigation, pp.116-120, 2006.
DOI : 10.1016/j.diin.2006.06.002

A. Stabek, P. Watters, and R. Layton, The Seven Scam Types: Mapping the Terrain of Cybercrime, 2010 Second Cybercrime and Trustworthy Computing Workshop, pp.41-51, 2010.
DOI : 10.1109/CTC.2010.14

J. Trevathan and W. Read, Undesirable and fraudulent behavior in online auctions, Proceedings of the International Conference on Security and Cryptography, pp.450-458, 2006.