literature review on cyber crime
Psych employee 4
January 25, 2019
It is important to understand that humans and technology interact in all information systems. Why do you feel businesses must spend time and money to educate their employees on security matters?
January 25, 2019

literature review on cyber crime

1200 words  (harvad style)

  

Bibliography

Moore, R 2010, Cybercrime : Investigating High-Technology Computer Crime, Cincinnati : Taylor and Francis, 2010.

Wall, D 2007, Cybercrime : the transformation of crime in the information age, Cambridge, UK ; Malden, MA : Polity, 2007.

‘Security operations centre: Situation awareness, threat intelligence and cybercrime’, 2017, 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2017 International Conference On, p. 1. Available from: 10.1109/CyberSA.2017.8073384. [3 May 2018].

Clifford, RD 2011, Cybercrime : the investigation, prosecution and defense of a computer-related crime, Durham, N.C. : Carolina Academic Press, c2011.

Furnell, S 2002, Cybercrime : vandalizing the information society, Boston ; London : Addison-Wesley, 2002.

Stanciu, V, & Tinca, A 2017, ‘Exploring cybercrime – realities and challenges’, Accounting & Management Information Systems / Contabilitate si Informatica de Gestiune, vol. 16, no. 4, pp. 610-632.

Balajanov, E 2018, ‘Setting the minimum age of criminal responsibility for cybercrime’, International Review of Law, Computers and Technology, vol. 32, no. 1, p. 2-20. Available from: 10.1080/13600869.2018.1417764. [3 May 2018].

‘Cybercriminals, cyberattacks and cybercrime’, 2016, 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF), Cybercrime and Computer Forensic (ICCCF), IEEE International Conference on, p. 1. Available from: 10.1109/ICCCF.2016.7740434. [3 May 2018].

Elaine, F 2014, ‘The EU’s Cybercrime and Cyber-Security Rulemaking: Mapping the Internal and External Dimensions of EU Security’, European Journal of Risk Regulation, no. 1, p. 46.

Florida Tech Online. (2018). A Brief History of Cyber Crime – Florida Tech Online. [online] Available at: https://www.floridatechonline.com/blog/information-technology/a-brief-history-of-cyber-crime

Nagpal, R. (2008). evolution of cyber crimes. [online] Asclonline.com. Available at: http://asclonline.com/images/7/74/Evolution_of_Cyber_Crime.pdf

Acs.org.au. (2016). cyber Security. [online] Available at: https://www.acs.org.au/content/dam/acs/acs-publications/ACS_Cybersecurity_Guide.pdf

Vincent, L. (2017). The 5 current cyber security issues Australian companies face. [online] Savv-e.com.au. Available at: https://www.savv-e.com.au/blog/current-cyber-security-issues-australia

Das, S. and Nayak, T. (2013). IMPACT OF CYBER CRIME: ISSUES AND CHALLENGES. [online] Ijeset.com. Available at: http://www.ijeset.com/media/0002/2N12-IJESET0602134A-v6-iss2-142-153.pdf

Anon, (2018). National Plan to Combat Cybercrime. [online] Available at: https://www.ag.gov.au/CrimeAndCorruption/Cybercrime/Documents/national-plan-to-combat-cybercrime.pdf

Anon, (2017). As It Is. [online] Available at: https://pavuk-legal.leapwp.com.au/wp-content/uploads/sites/813/0001/01/Cybercrime-Law-in-Australia.pdf

 

Looking for a Similar Assignment? Order now and Get 20% Discount!
Use Code; GET20

WhatsApp Chat with us on Whatsapp