0% found this document useful (0 votes)
417 views5 pages

(1.) Sharma, S. (2007) .: Bibliography

This document contains a bibliography listing 31 references related to cybercrime and cybersecurity. The references are from various sources including articles, reports, and websites and were published between 2000 and 2010.

Uploaded by

Anthony
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
417 views5 pages

(1.) Sharma, S. (2007) .: Bibliography

This document contains a bibliography listing 31 references related to cybercrime and cybersecurity. The references are from various sources including articles, reports, and websites and were published between 2000 and 2010.

Uploaded by

Anthony
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 5

Bibliography

[1.] Sharma, S. (2007). Cyber Crime-the New Threat to the Advanced World
Retrieved September 18, 2008, from
http://www.articlesbase.com/cyber-law-articles/cyber-crimethe-new-threat-to-the-advanced-
world-217562.html

[2.] George, R. (2008). Data Theft in Cyber Space – Issues and Laws
Retrieved September 18, 2008, from
http://www.articlesbase.com/cyber-law-articles/data-theft-in-cyber-space-issues-and-laws-
561270.html

[3.] Vezina, R. (2008). What is Cybercrime?


Retrieved September 18, 2008, from
http://www.articlesbase.com/cyber-law-articles/what-is-cybercrime-549869.html

[4.] Roy, S. (2008). Cyber Crimes


Retrieved September 18, 2008, from
http://www.articlesbase.com/cyber-law-articles/cyber-crimes-539363.html

[5.] Fontelera, J. (2008). Safeguard Yourself Against Cyber Threats


Retrieved October 18, 2008, from
http://news.thomasnet.com/IMT/archives/2008/09/safeguard-yourself-against-
cyber-threats-internet-computer-security-data.html

[6.] Villafania, A. (2008). Expert: RP still lacks cybercrime laws


Retrieved October 11, 2008, from
http://technology.inquirer.net/infotech/infotech/view/20081010-165658/Expert-RP-
still-lacks-cybercrime-laws

43
[7.] Oliva, E. (2008). Cybercrime bill ready before Congress resumes -- CICT exec
Retrieved October 11, 2008, from
http://newsinfo.inquirer.net/breakingnews/infotech/view/20080716-
148822/Cybercrime-bill-ready-before-Congress-resumes----CICT-exec

[8.] Regalado, E. (2007). US helps enhance cops skills vs cyber-terrorism


Retrieved October 11, 2008, from
http://seclists.org/isn/2007/Dec/0026.html

[9.] Carter, E. (2002). Examining Cybercrime: Its Forms and Its Perpetrators
Retrieved September 18, 2008, from
http://www.univd.edu.ua/_projects/ezloch_kor/docs/eng/37.doc

[10.] Ferguson, T. (2000). Google: 10 percent of sites are dangerous


Retrieved October 19, 2008, from
http://news.cnet.com/Google-10-percent-of-sites-are-dangerous/2100-7349_3-
6183818.html

[11.] Field, M. (2007). Pacific atolls host world's most dangerous websites
Retrieved October 19, 2008, from
http://www.theage.com.au/news/security/pacific-atolls-host-worlds-most-
dangerous-websites/2007/03/16/1173722722104.html?page=fullpage

[12.] Robertson, J. (2008). Survey: Most computer users repeat passwords


Retrieved October 19, 2008, from
http://www.msnbc.msn.com/id/24162478/

[13.] Mandal, A. (2008). Social: A short summary of cyber crime


Retrieved October 14, 2008, from
http://www.ecademy.com/node.php?id=110978

[14.] Dangerous Wbsites. (2000).


Retrieved September 18, 2008, from
http://www.geek.com/articles/news/dangerous-websites-20000529/

44
[15.] Stop Taking Net for Granted!. (2008)
Retrieved October 19, 2008, from
http://infotech.indiatimes.com/articleshow/3448505.cms

[16.] Social Web Safety for Teens.(2007)


Retrieved September 18, 2008, from
http://www.safekids.com/safe-blogging-tips/

[17.] Etter, B. (2008). Cybercrime – Now This Changes Everything!


Retrieved October 11, 2008, from
http://www.acpr.gov.au/pdf/Presentations/NetAlertDec02.pdf

[18.] SYMPOSIUM ON PROTECTING YOUR CHILD AGAINST THE CYBER MENACE 24:7.
(2008)
Retrieved October 15, 2008, from
http://www.stmargaretssec.moe.edu.sg/Protecting_Your_Children_Against_the_C
yber_Menace.pdf

[19.] Internet Safety. (2008)


Retrieved October 19, 2008, from
http://www.louisville.sparcc.org/tech/internet_safety/documents/internet_safety.pp
t

[20.] Key Points. (2008)


Retrieved October 15, 2008, from
http://www.netsmartz.org/safety/videos/dr-bullying.htm

[21.] Cyber Threats. (2010)


Retrieved January 8, 2010 from
http://www.icasit.org/ecommerce/cyberthreats.html

45
[22.] ICT TRENDS IN INDIA 2009 BY PERRY4LAW AND PTLB. (2009)

Retrieved January 8, 2010 from

http://hrpic.blogspot.com/2009/12/ict-trends-in-india-2009-by-perry4law.html

[23.] Emerging Risks for Internet Users. (2010)

Retrieved January 8, 2010 from

http://www.acma.gov.au/webwr/_assets/main/lib311250/emerging_risks_for_inter
net_users.pdf

[24.] Risks on the Internet – Indian Context. (2010)

Retrieved January 8, 2010 from

http://www.indianchild.com/risks_on_the_internet.htm

[25.] Internet Security (2010)

Retrieved January 8, 2010 from

http://www.rcmp-grc.gc.ca/qc/pub/cybercrime/cybercrime-eng.htm#4

[26.] Webroot® Survey Reveals Social Networkers’ Risky Behaviors. (2009)

Retrieved January 8, 2010 from


http://www.webroot.com/En_US/about-press-room-press-releases-social-
networking-behaviors-revealed.html

[27.] Draft WGIG Issue Paper on Cybersecurity and Cybercrime. (2010)


Retrieved January 10, 2010n from
http://www.wgig.org/docs/WP-cybersec.pdf

[28.] Cyber Crime . . . and Punishment? (2010)


Retrieved January 10, 2010 from
http://www.iwar.org.uk/law/resources/cybercrime/mcconnell/CyberCrime.pdf

46
[29.] Risky Online Behavior. (2010)
Retrieved January 10, 2010 from
http://www.internetsafety101.org/predatorsrisk.htm

[30.] Guide to Social Networking: Risks (2010)


Retrieved January 8, 2010 from
http://www.mediafamily.org/network_pdf/MediaWise_Guide_to_Social_Networkin
g_Risks_09.pdf

[31.] Threats of Social Online Networks. (2010)


Retrieved January 10, 2010 from
http://www.cse.tkk.fi/en/publications/B/1/papers/Hasib_final.pdf

[32.] Perceived Benefit and Threat in Internet Use (2006)


Retrieved January 8, 2010 from
http://www.allacademic.com//meta/p_mla_apa_research_citation/0/9/0/3/5/pages
90354/p90354-1.php

47

You might also like