[1]
K. Marko, “Strategies for disguise in written threatening communications and ransom demands: an analysis of English and German texts”,
IJSLL
, vol. 24, no. 2, pp. 243–247, Dec. 2017, doi:
10.1558/ijsll.35084
.