Return to Article Details
Strategies for disguise in written threatening communications and ransom demands: an analysis of English and German texts
Download
Download PDF