literature review on cyber crimeakshay kumarg
1200 words (harvad style)
Moore, R 2010, Cybercrime : Investigating High-Technology Computer Crime, Cincinnati : Taylor and Francis, 2010.
Wall, D 2007, Cybercrime : the transformation of crime in the information age, Cambridge, UK ; Malden, MA : Polity, 2007.
'Security operations centre: Situation awareness, threat intelligence and cybercrime', 2017, 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2017 International Conference On, p. 1. Available from: 10.1109/CyberSA.2017.8073384. [3 May 2018].
Clifford, RD 2011, Cybercrime : the investigation, prosecution and defense of a computer-related crime, Durham, N.C. : Carolina Academic Press, c2011.
Furnell, S 2002, Cybercrime : vandalizing the information society, Boston ; London : Addison-Wesley, 2002.
Stanciu, V, & Tinca, A 2017, 'Exploring cybercrime - realities and challenges', Accounting & Management Information Systems / Contabilitate si Informatica de Gestiune, vol. 16, no. 4, pp. 610-632.
Balajanov, E 2018, 'Setting the minimum age of criminal responsibility for cybercrime', International Review of Law, Computers and Technology, vol. 32, no. 1, p. 2-20. Available from: 10.1080/13600869.2018.1417764. [3 May 2018].
'Cybercriminals, cyberattacks and cybercrime', 2016, 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF), Cybercrime and Computer Forensic (ICCCF), IEEE International Conference on, p. 1. Available from: 10.1109/ICCCF.2016.7740434. [3 May 2018].
Elaine, F 2014, 'The EU's Cybercrime and Cyber-Security Rulemaking: Mapping the Internal and External Dimensions of EU Security', European Journal of Risk Regulation, no. 1, p. 46.
Florida Tech Online. (2018). A Brief History of Cyber Crime – Florida Tech Online. [online] Available at: https://www.floridatechonline.com/blog/information-technology/a-brief-history-of-cyber-crime
Nagpal, R. (2008). evolution of cyber crimes. [online] Asclonline.com. Available at: http://asclonline.com/images/7/74/Evolution_of_Cyber_Crime.pdf
Acs.org.au. (2016). cyber Security. [online] Available at: https://www.acs.org.au/content/dam/acs/acs-publications/ACS_Cybersecurity_Guide.pdf
Vincent, L. (2017). The 5 current cyber security issues Australian companies face. [online] Savv-e.com.au. Available at: https://www.savv-e.com.au/blog/current-cyber-security-issues-australia
Das, S. and Nayak, T. (2013). IMPACT OF CYBER CRIME: ISSUES AND CHALLENGES. [online] Ijeset.com. Available at: http://www.ijeset.com/media/0002/2N12-IJESET0602134A-v6-iss2-142-153.pdf
Anon, (2018). National Plan to Combat Cybercrime. [online] Available at: https://www.ag.gov.au/CrimeAndCorruption/Cybercrime/Documents/national-plan-to-combat-cybercrime.pdf
Anon, (2017). As It Is. [online] Available at: https://pavuk-legal.leapwp.com.au/wp-content/uploads/sites/813/0001/01/Cybercrime-Law-in-Australia.pdf
- 3 years ago
- Miss Professor
- Wendy Lewis
- best tutor 2014
- A-QUALITY AND ORIGINAL
- Elvis the writer
- guru answers
- brilliant answers
- Michelle Owens
- Julie Wayne
- Rey writer
- Catherine Owens
- phyllis young
- kim woods
- Prof_Marcos A.
- James Wang'du
- DBA 715 Case Analysis 2 and 3
- A health care organization is comprised of different professionals who serve different functions. Their roles may determine how they view quality initiatives, including the different methods measurement and types of improvement tools. Design a graphic or
- Finance Question
- summary 3
- Thermo 1 - Pressure, Temp, Energy
- computer science web architecture Tony’s Chips has recently been sold to a new independent company. The new company has hired you to manage a project that will move the old Website from an externally hosted solution to an internal one. The company’s lead
- ECO 365 week 5 Team Assignment Competitive Strategies and Government Policies
- Professor Anthony
- BUS 630 Week 1 Assignment - Dell, Inc.
- I have a homework that needs to be done ASAP!