Cyber Crime references

download Cyber Crime references

of 3

Transcript of Cyber Crime references

  • 8/12/2019 Cyber Crime references

    1/3

    Aliyu, A. A., T. Rosmain and J. Takala (2014). "Online Banking and Customer Service Delivery inMalaysia: Data Screening and Preliminary Findings." Procedia - Social and Behavioral Sciences129(0): 562-570.

    Ammar Yassir, S. N. (2012). "Cybercrime: A threat to Network Security." International Journal ofComputer Science and Network Security 12(02): 04.

    rpd, I. (2013). "A Greater Involvement of Education in Fight Against Cybercrime." Procedia -Social and Behavioral Sciences 83(0): 371-377.

    AsSadhan, B. and J. M. F. Moura (2014). "An efficient method to detect periodic behavior in botnettraffic by analyzing control plane traffic." Journal of Advanced Research 5(4): 435-448.

    Aziz, N. A. and I. Ibrahim (2012). "Child's Right to Free Flow Information via Internet: Liabilityand Responsibility of the Internet Service Provider." Procedia - Social and Behavioral Sciences 38(0):160-168.

    Baggili, I. and M. Rogers (2009). "Self-Reported Cyber Crime: An Analysis on the Effects of

    Anonymity and Pre-Employment Integrity." International Journal of Cyber Criminology 03(02).

    Broadhurst, R., P. Grabosky , M. Alazab and S. Chon (2014). "Organizations and Cyber crime: AnAnalysis of the Nature of Groups engaged in Cyber Crime." International Journal of CyberCriminology 08(01): 20.

    Bucciarelli, E., F. Muratore, I. Odoardi and C. Pagliari (2011). "Is it possible to define gender effectsof the human capital on the processes of well-being?" Procedia - Social and Behavioral Sciences15(0): 1067-1075.

    ankaya, . H. and . Tan (2010). "Effect of cyber bullying on the distrust levels of pre -serviceteachers: considering internet addiction as a mediating variable." Procedia - Social and BehavioralSciences 9(0): 1634-1640.

    ankaya, . H. and . Tan (2011). "Effect of cyber bullying on the distrust levels of preserviceteachers: considering internet addiction as a mediating Variable." Procedia Computer Science 3(0):1353-1360.

    elen, F. K. and S. S. Seferolu (2013). "Investigation of Elementary School Students OpinionsRelated to Unethical Behavior in the Use of Information and Communication Technologies."Procedia - Social and Behavioral Sciences 83(0): 417-421.

    Chakraborty, R., M. Agrawal and H. R. Rao (2014). "Information processing under stress: A study ofMumbai Police first responders." IIMB Management Review 26(2): 91-104.

    miel, S. (2014). "Cyberbullying Legislation in Poland and Selected EU Countries." Procedia - Socialand Behavioral Sciences 109(0): 29-34.

    Din, N., S. Yahya, R. Suzan and R. Kassim (2012). "Online Social Networking for Quality of Life."Procedia - Social and Behavioral Sciences 35(0): 713-718.

  • 8/12/2019 Cyber Crime references

    2/3

    Edler, L., A. Hart, P. Greaves, P. Carthew, M. Coulet, A. Boobis, G. M. Williams and B. Smith"Selection of appropriate tumour data sets for Benchmark Dose Modelling (BMD) and derivation ofa Margin of Exposure (MoE) for substances that are genotoxic and carcinogenic: Considerations ofbiological relevance of tumour type, data quality and uncertainty assessment." Food and ChemicalToxicology(0).

    Elmaghraby, A. S. and M. M. Losavio (2014). "Cyber security challenges in Smart Cities: Safety,security and privacy." Journal of Advanced Research 5(4): 491-497.

    Erftemeijer, P. L. A., B. Riegl, B. W. Hoeksema and P. A. Todd (2012). "Environmental impacts ofdredging and other sediment disturbances on corals: A review." Marine Pollution Bulletin 64(9):1737-1765.

    Garca, A. I. S. and E. M. Margallo (2014). "Bullying: What's Going on? A Bibliographic Review ofLast Twelve Months." Procedia - Social and Behavioral Sciences 132(0): 269-276.

    Getzen, T. E. (2010). "Public Health Security and Forecasting Economic Trends." Procedia - Social

    and Behavioral Sciences 2(5): 7137-7144.Grimmond, C. S. B., M. Roth, T. R. Oke, Y. C. Au, M. Best, R. Betts, G. Carmichael, H. Cleugh, W.Dabberdt, R. Emmanuel, E. Freitas, K. Fortuniak, S. Hanna, P. Klein, L. S. Kalkstein, C. H. Liu, A.Nickson, D. Pearlmutter, D. Sailor and J. Voogt (2010). "Climate and More Sustainable Cities:Climate Information for Improved Planning and Management of Cities (Producers/CapabilitiesPerspective)." Procedia Environmental Sciences 1(0): 247-274.

    Halder, D. (2011). Information Technology Act and Cyber Terrorism: A Critical Review. CyberCrime and Digital Disorder. P. Madhava Soma Sundaram and S. E. Umarhathab. Tirunelveli, India,Publications Division, Manonmaniam Sundaranar University: 11.

    Ho, L.-H., Y.-T. Lin and C.-H. Huang (2012). "Influences of Online Lifestyle on JuvenileCybercrime Behaviors in Taiwan." Procedia Engineering 29(0): 2545-2550.

    Igbo, H. I., E. G. Egbe-Okpenge and R. G. Awopetu (2013). "Influence of Information andCommunication Technology on Behavior Problems of Nigerian Youths." Procedia - Social andBehavioral Sciences 84(0): 97-106.

    Iqbal, A., H. Al Obaidli, A. Marrington and A. Jones (2014). "Windows Surface RT tablet forensics."Digital Investigation 11, Supplement 1(0): S87-S93.

    Jouini, M., L. B. A. Rabai and A. B. Aissa (2014). "Classification of Security Threats in InformationSystems." Procedia Computer Science 32(0): 489-496.

    Kopeck, K. (2014). "Cyberbullying and Other Risks of Internet Communication Focused onUniversity Students." Procedia - Social and Behavioral Sciences 112(0): 260-269.

    Kopeck, K., R. Szotkowski and V. Krej (2012). "The Risks of Internet Communication 3."Procedia - Social and Behavioral Sciences 69(0): 1348-1357.

    Kowalski, R. M. and S. P. Limber (2013). "Psychological, Physical, and Academic Correlates ofCyberbullying and Traditional Bullying." Journal of Adolescent Health 53(1, Supplement): S13-S20.

  • 8/12/2019 Cyber Crime references

    3/3

    Makri-Botsari, E. and G. Karagianni (2014). "Cyberbullying in Greek Adolescents: The Role ofParents." Procedia - Social and Behavioral Sciences 116(0): 3241-3253.

    Maskun, A. Manuputty, S. M. Noor and J. Sumardi (2013). "Cyber Security: Rule of Use InternetSafely?" Procedia - Social and Behavioral Sciences 103(0): 255-261.

    Mohamed N and E. Guindy (October 13th 2012). "Cybercrime Challenges in Middle East."Oksanen, A. and T. Keipi (2013). "Young people as victims of crime on the internet: A population-based study in Finland." Vulnerable Children and Youth Studies 8(4): 298-309.

    Rasmi, M. and A. Jantan (2013). "A New Algorithm to Estimate the Similarity between theIntentions of the Cyber Crimes for Network Forensics." Procedia Technology 11(0): 540-547.

    Shiferaw, B., K. Tesfaye, M. Kassie, T. Abate, B. M. Prasanna and A. Menkir "Managingvulnerability to drought and enhancing livelihood resilience in sub-Saharan Africa: Technological,institutional and policy options." Weather and Climate Extremes(0).

    Stahl, B. C., G. Eden, M. Jirotka and M. Coeckelbergh "From computer ethics to responsibleresearch and innovation in ICT: The transition of reference discourses informing ethics-relatedresearch in information systems." Information & Management(0).

    Wenxian, X., L. Zhen, G. Guohong and W. Wenlong (2012). "A Discussion on Network's NegativeImpact on College Students." Energy Procedia 17, Part B(0): 1358-1361.

    Yu, S. (2014). "Fear of Cyber Crime among College Students in the United States: An ExploratoryStudy." International Journal of Cyber Criminology 08(01): 11.

    Zainol, Z., S. P. Nelson and A. Malami (2012). "Internal Human based Threats and SecurityControls in Computerized Banking Systems: Evidence from Malaysia." Procedia - Social and

    Behavioral Sciences 65(0): 199-204.