[1]
K. Marko, “Strategies for disguise in written threatening communications and ransom demands: an analysis of English and German texts”, IJSLL, vol. 24, no. 2, pp. 243–247, Dec. 2017, doi: 10.1558/ijsll.35084.