<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://cyber-criminology.com/2017/04/29/sextortion-online-blackmail-through-sexual-exposed-imagery-please-dont/</loc><image:image><image:loc>https://cyber-criminology.com/wp-content/uploads/2017/04/geralt-pixabay.jpg</image:loc><image:title>geralt @pixabay</image:title></image:image><lastmod>2017-04-29T07:43:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-criminology.com/research/</loc><lastmod>2017-03-27T20:25:38+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyber-criminology.com/2017/03/27/sextortion/</loc><lastmod>2017-03-27T19:40:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-criminology.com/2017/03/05/why-cyber-grooming-is-not-so-different-to-the-process-of-hooking-on%e2%80%8b-victims-of-online-romance-scam/</loc><image:image><image:loc>https://cyber-criminology.com/wp-content/uploads/2017/03/ijmaki-pixabay.png</image:loc><image:title>ijmaki-pixabay</image:title></image:image><lastmod>2017-03-05T20:58:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-criminology.com/2017/01/31/why-do-victims-fall-for-online-romance-scam/</loc><lastmod>2017-02-16T13:44:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-criminology.com/2017/02/16/what-you-should-know-about-your-children-playing-cute-looking-online-games/</loc><lastmod>2017-02-16T13:40:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-criminology.com/2017/02/07/the-broken-web-a-summary/</loc><image:image><image:loc>https://cyber-criminology.com/wp-content/uploads/2017/02/spider-web-with-water-beads-921039_1280.jpg</image:loc><image:title>spider-web-with-water-beads-921039_1280</image:title></image:image><lastmod>2017-02-07T16:45:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-criminology.com/2017/02/06/falling-in-love-on-the-internet-investigating-online-romance-scam-as-a-cybercrime-with-an-interpersonal-nature/</loc><lastmod>2017-02-06T15:47:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-criminology.com/blog/</loc><lastmod>2017-01-31T17:05:38+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyber-criminology.com/2017/01/02/erster-blogbeitrag/</loc><image:image><image:loc>https://cyber-criminology.com/wp-content/uploads/2017/01/alternate-sidebar1.jpg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2017-01-31T16:48:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-criminology.com/consultancy/</loc><lastmod>2017-01-31T15:38:50+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyber-criminology.com/education-workshops/</loc><lastmod>2017-01-31T15:36:26+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyber-criminology.com/services/</loc><image:image><image:loc>https://cyber-criminology.com/wp-content/uploads/2017/01/grid1.jpg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2017-01-31T14:05:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyber-criminology.com/for-the-good-cause/</loc><lastmod>2017-01-31T12:37:29+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyber-criminology.com/about-us/</loc><image:image><image:loc>https://cyber-criminology.com/wp-content/uploads/2017/01/biometrics-e1436375917147.jpg</image:loc><image:title>biometrics-e1436375917147</image:title></image:image><image:image><image:loc>https://cyber-criminology.com/wp-content/uploads/2017/01/stux.jpg</image:loc><image:title>stux</image:title></image:image><image:image><image:loc>https://cyber-criminology.com/wp-content/uploads/2017/01/pexels.jpg</image:loc><image:title>pexels</image:title></image:image><image:image><image:loc>https://cyber-criminology.com/wp-content/uploads/2017/01/mikerenpeningpixabay.jpg</image:loc><image:title>mikerenpeningpixabay</image:title></image:image><image:image><image:loc>https://cyber-criminology.com/wp-content/uploads/2017/01/love-1281655_1280.jpg</image:loc><image:title>love-1281655_1280</image:title></image:image><image:image><image:loc>https://cyber-criminology.com/wp-content/uploads/2017/01/geraltpixabay.jpg</image:loc><image:title>geraltpixabay</image:title></image:image><image:image><image:loc>https://cyber-criminology.com/wp-content/uploads/2017/01/face-268908_1920.jpg</image:loc><image:title>face-268908_1920</image:title></image:image><image:image><image:loc>https://cyber-criminology.com/wp-content/uploads/2017/01/diana-copy.jpg</image:loc><image:title>diana-copy</image:title></image:image><image:image><image:loc>https://cyber-criminology.com/wp-content/uploads/2017/01/diana-selck_01172x.jpg</image:loc><image:title>Werbefoto - px MEDIA (firmenwebseite-mv)</image:title></image:image><image:image><image:loc>https://cyber-criminology.com/wp-content/uploads/2017/01/diana-selck_01172x-2.jpg</image:loc><image:title>diana-selck_01172x-2</image:title></image:image><lastmod>2017-01-31T12:00:16+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyber-criminology.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2017-04-29T07:43:05+00:00</lastmod></url></urlset>
