Bibliography [1.] Sharma, S. (2007). Cyber Crime-the New Threat to the Advanced
Bibliography [1.] Sharma, S. (2007). Cyber Crime-the New Threat to the Advanced World Retrieved September 18, 2008, from http://www.articlesbase.com/cyber-law-articles/cyber-crimethe-new-threat-to-the-advanced- world-217562.html [2.] George, R. (2008). Data Theft in Cyber Space – Issues and Laws Retrieved September 18, 2008, from http://www.articlesbase.com/cyber-law-articles/data-theft-in-cyber-space-issues-and-laws- 561270.html [3.] Vezina, R. (2008). What is Cybercrime? Retrieved September 18, 2008, from http://www.articlesbase.com/cyber-law-articles/what-is-cybercrime- 549869.html [4.] Roy, S. (2008). Cyber Crimes Retrieved September 18, 2008, from http://www.articlesbase.com/cyber-law-articles/cyber-crimes-539363.html [5.] Fontelera, J. (2008). Safeguard Yourself Against Cyber Threats Retrieved October 18, 2008, from http://news.thomasnet.com/IMT/archives/2008/09/safeguard-yourself-against- cyber-threats-internet-computer-security-data.html [6.] Villafania, A. (2008). Expert: RP still lacks cybercrime laws Retrieved October 11, 2008, from http://technology.inquirer.net/infotech/infotech/view/20081010-165658/Expert-RP- still-lacks-cybercrime-laws 43 [7.] Oliva, E. (2008). Cybercrime bill ready before Congress resumes -- CICT exec Retrieved October 11, 2008, from http://newsinfo.inquirer.net/breakingnews/infotech/view/20080716- 148822/Cybercrime-bill-ready-before-Congress-resumes----CICT-exec [8.] Regalado, E. (2007). US helps enhance cops skills vs cyber-terrorism Retrieved October 11, 2008, from http://seclists.org/isn/2007/Dec/0026.html [9.] Carter, E. (2002). Examining Cybercrime: Its Forms and Its Perpetrators Retrieved September 18, 2008, from http://www.univd.edu.ua/_projects/ezloch_kor/docs/eng/37.doc [10.] Ferguson, T. (2000). Google: 10 percent of sites are dangerous Retrieved October 19, 2008, from http://news.cnet.com/Google-10-percent-of-sites-are-dangerous/2100-7349_3- 6183818.html [11.] Field, M. (2007). Pacific atolls host world's most dangerous websites Retrieved October 19, 2008, from http://www.theage.com.au/news/security/pacific-atolls-host-worlds-most- dangerous-websites/2007/03/16/1173722722104.html?page=fullpage [12.] Robertson, J. (2008). Survey: Most computer users repeat passwords Retrieved October 19, 2008, from http://www.msnbc.msn.com/id/24162478/ [13.] Mandal, A. (2008). Social: A short summary of cyber crime Retrieved October 14, 2008, from http://www.ecademy.com/node.php?id=110978 [14.] Dangerous Wbsites. (2000). Retrieved September 18, 2008, from 44 http://www.geek.com/articles/news/dangerous-websites-20000529/ [15.] Stop Taking Net for Granted!. (2008) Retrieved October 19, 2008, from http://infotech.indiatimes.com/articleshow/3448505.cms [16.] Social Web Safety for Teens.(2007) Retrieved September 18, 2008, from http://www.safekids.com/safe-blogging-tips/ [17.] Etter, B. (2008). Cybercrime – Now This Changes Everything! Retrieved October 11, 2008, from http://www.acpr.gov.au/pdf/Presentations/NetAlertDec02.pdf [18.] SYMPOSIUM ON PROTECTING YOUR CHILD AGAINST THE CYBER MENACE 24:7. (2008) Retrieved October 15, 2008, from http://www.stmargaretssec.moe.edu.sg/Protecting_Your_Children_Against_the_C yber_Menace.pdf [19.] Internet Safety. (2008) Retrieved October 19, 2008, from http://www.louisville.sparcc.org/tech/internet_safety/documents/internet_safety.pp t [20.] Key Points. (2008) Retrieved October 15, 2008, from http://www.netsmartz.org/safety/videos/dr-bullying.htm [21.] Cyber Threats. (2010) Retrieved January 8, 2010 from http://www.icasit.org/ecommerce/cyberthreats.html 45 [22.] ICT TRENDS IN INDIA 2009 BY PERRY4LAW AND PTLB. (2009) Retrieved January 8, 2010 from http://hrpic.blogspot.com/2009/12/ict-trends-in-india-2009-by-perry4law.html [23.] Emerging Risks for Internet Users. (2010) Retrieved January 8, 2010 from http://www.acma.gov.au/webwr/_assets/main/lib311250/emerging_risks_for_inter net_users.pdf [24.] Risks on the Internet – Indian Context. (2010) Retrieved January 8, 2010 from http://www.indianchild.com/risks_on_the_internet.htm [25.] Internet Security (2010) Retrieved January 8, 2010 from http://www.rcmp-grc.gc.ca/qc/pub/cybercrime/cybercrime-eng.htm#4 [26.] Webroot® Survey Reveals Social Networkers’ Risky Behaviors. (2009) Retrieved January 8, 2010 from http://www.webroot.com/En_US/about-press-room-press-releases-social- networking-behaviors-revealed.html [27.] Draft WGIG Issue Paper on Cybersecurity and Cybercrime. (2010) Retrieved January 10, 2010n from http://www.wgig.org/docs/WP-cybersec.pdf [28.] Cyber Crime . . . and Punishment? (2010) Retrieved January 10, 2010 from http://www.iwar.org.uk/law/resources/cybercrime/mcconnell/CyberCrime.pdf 46 [29.] Risky Online Behavior. (2010) Retrieved January 10, 2010 from http://www.internetsafety101.org/predatorsrisk.htm [30.] Guide to Social Networking: Risks (2010) Retrieved January 8, 2010 from http://www.mediafamily.org/network_pdf/MediaWise_Guide_to_Social_Networkin g_Risks_09.pdf [31.] Threats of Social Online Networks. (2010) Retrieved January 10, 2010 from http://www.cse.tkk.fi/en/publications/B/1/papers/Hasib_final.pdf [32.] Perceived Benefit and Threat in Internet Use (2006) Retrieved January 8, 2010 from http://www.allacademic.com//meta/p_mla_apa_research_citation/0/9/0/3/5/pages 90354/p90354-1.php 47 uploads/Geographie/ 1-sharma-s-2007-bibliography.pdf
Documents similaires






-
26
-
0
-
0
Licence et utilisation
Gratuit pour un usage personnel Attribution requise- Détails
- Publié le Jui 22, 2021
- Catégorie Geography / Geogra...
- Langue French
- Taille du fichier 0.0828MB