Literature Review On Cyber Crime
1200 words (harvad style)
Bibliography
Moore, R 2010, Cybercrime : Investigating High-Technology Computer Crime, Cincinnati : Taylor and Francis, 2010.
Wall, D 2007, Cybercrime : the transformation of crime in the information age, Cambridge, UK ; Malden, MA : Polity, 2007.
‘Security operations centre: Situation awareness, threat intelligence and cybercrime’, 2017, 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2017 International Conference On, p. 1. Available from: 10.1109/CyberSA.2017.8073384. [3 May 2018].
Clifford, RD 2011, Cybercrime : the investigation, prosecution and defense of a computer-related crime, Durham, N.C. : Carolina Academic Press, c2011.
Furnell, S 2002, Cybercrime : vandalizing the information society, Boston ; London : Addison-Wesley, 2002.
Stanciu, V, & Tinca, A 2017, ‘Exploring cybercrime – realities and challenges’, Accounting & Management Information Systems / Contabilitate si Informatica de Gestiune, vol. 16, no. 4, pp. 610-632.
Balajanov, E 2018, ‘Setting the minimum age of criminal responsibility for cybercrime’, International Review of Law, Computers and Technology, vol. 32, no. 1, p. 2-20. Available from: 10.1080/13600869.2018.1417764. [3 May 2018].
‘Cybercriminals, cyberattacks and cybercrime’, 2016, 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF), Cybercrime and Computer Forensic (ICCCF), IEEE International Conference on, p. 1. Available from: 10.1109/ICCCF.2016.7740434. [3 May 2018].
Elaine, F 2014, ‘The EU’s Cybercrime and Cyber-Security Rulemaking: Mapping the Internal and External Dimensions of EU Security’, European Journal of Risk Regulation, no. 1, p. 46.
Florida Tech Online. (2018). A Brief History of Cyber Crime – Florida Tech Online. [online] Available at: https://www.floridatechonline.com/blog/information-technology/a-brief-history-of-cyber-crime
Nagpal, R. (2008). evolution of cyber crimes. [online] Asclonline.com. Available at: http://asclonline.com/images/7/74/Evolution_of_Cyber_Crime.pdf
Acs.org.au. (2016). cyber Security. [online] Available at: https://www.acs.org.au/content/dam/acs/acs-publications/ACS_Cybersecurity_Guide.pdf
Vincent, L. (2017). The 5 current cyber security issues Australian companies face. [online] Savv-e.com.au. Available at: https://www.savv-e.com.au/blog/current-cyber-security-issues-australia
Das, S. and Nayak, T. (2013). IMPACT OF CYBER CRIME: ISSUES AND CHALLENGES. [online] Ijeset.com. Available at: http://www.ijeset.com/media/0002/2N12-IJESET0602134A-v6-iss2-142-153.pdf
Anon, (2018). National Plan to Combat Cybercrime. [online] Available at: https://www.ag.gov.au/CrimeAndCorruption/Cybercrime/Documents/national-plan-to-combat-cybercrime.pdf
Anon, (2017). As It Is. [online] Available at: https://pavuk-legal.leapwp.com.au/wp-content/uploads/sites/813/0001/01/Cybercrime-Law-in-Australia.pdf