Sie sind auf Seite 1von 5

Bibliography

[1.] Sharma, S. (2007). Cyber Crime-the New Threat to the Advanced World
Retrieved September 18, 2008, from
http://www.articlesbase.com/cyber-law-articles/cyber-crimethe-new-threat-to-the-advanced-
world-217562.html

[2.] George, R. (2008). Data Theft in Cyber Space – Issues and Laws
Retrieved September 18, 2008, from
http://www.articlesbase.com/cyber-law-articles/data-theft-in-cyber-space-issues-and-laws-
561270.html

[3.] Vezina, R. (2008). What is Cybercrime?


Retrieved September 18, 2008, from
http://www.articlesbase.com/cyber-law-articles/what-is-cybercrime-549869.html

[4.] Roy, S. (2008). Cyber Crimes


Retrieved September 18, 2008, from
http://www.articlesbase.com/cyber-law-articles/cyber-crimes-539363.html

[5.] Fontelera, J. (2008). Safeguard Yourself Against Cyber Threats


Retrieved October 18, 2008, from
http://news.thomasnet.com/IMT/archives/2008/09/safeguard-yourself-against-
cyber-threats-internet-computer-security-data.html

[6.] Villafania, A. (2008). Expert: RP still lacks cybercrime laws


Retrieved October 11, 2008, from
http://technology.inquirer.net/infotech/infotech/view/20081010-165658/Expert-RP-
still-lacks-cybercrime-laws

43
[7.] Oliva, E. (2008). Cybercrime bill ready before Congress resumes -- CICT exec
Retrieved October 11, 2008, from
http://newsinfo.inquirer.net/breakingnews/infotech/view/20080716-
148822/Cybercrime-bill-ready-before-Congress-resumes----CICT-exec

[8.] Regalado, E. (2007). US helps enhance cops skills vs cyber-terrorism


Retrieved October 11, 2008, from
http://seclists.org/isn/2007/Dec/0026.html

[9.] Carter, E. (2002). Examining Cybercrime: Its Forms and Its Perpetrators
Retrieved September 18, 2008, from
http://www.univd.edu.ua/_projects/ezloch_kor/docs/eng/37.doc

[10.] Ferguson, T. (2000). Google: 10 percent of sites are dangerous


Retrieved October 19, 2008, from
http://news.cnet.com/Google-10-percent-of-sites-are-dangerous/2100-7349_3-
6183818.html

[11.] Field, M. (2007). Pacific atolls host world's most dangerous websites
Retrieved October 19, 2008, from
http://www.theage.com.au/news/security/pacific-atolls-host-worlds-most-
dangerous-websites/2007/03/16/1173722722104.html?page=fullpage

[12.] Robertson, J. (2008). Survey: Most computer users repeat passwords


Retrieved October 19, 2008, from
http://www.msnbc.msn.com/id/24162478/

[13.] Mandal, A. (2008). Social: A short summary of cyber crime


Retrieved October 14, 2008, from
http://www.ecademy.com/node.php?id=110978

[14.] Dangerous Wbsites. (2000).


Retrieved September 18, 2008, from
http://www.geek.com/articles/news/dangerous-websites-20000529/

44
[15.] Stop Taking Net for Granted!. (2008)
Retrieved October 19, 2008, from
http://infotech.indiatimes.com/articleshow/3448505.cms

[16.] Social Web Safety for Teens.(2007)


Retrieved September 18, 2008, from
http://www.safekids.com/safe-blogging-tips/

[17.] Etter, B. (2008). Cybercrime – Now This Changes Everything!


Retrieved October 11, 2008, from
http://www.acpr.gov.au/pdf/Presentations/NetAlertDec02.pdf

[18.] SYMPOSIUM ON PROTECTING YOUR CHILD AGAINST THE CYBER MENACE 24:7.
(2008)
Retrieved October 15, 2008, from
http://www.stmargaretssec.moe.edu.sg/Protecting_Your_Children_Against_the_C
yber_Menace.pdf

[19.] Internet Safety. (2008)


Retrieved October 19, 2008, from
http://www.louisville.sparcc.org/tech/internet_safety/documents/internet_safety.pp
t

[20.] Key Points. (2008)


Retrieved October 15, 2008, from
http://www.netsmartz.org/safety/videos/dr-bullying.htm

[21.] Cyber Threats. (2010)


Retrieved January 8, 2010 from
http://www.icasit.org/ecommerce/cyberthreats.html

45
[22.] ICT TRENDS IN INDIA 2009 BY PERRY4LAW AND PTLB. (2009)

Retrieved January 8, 2010 from

http://hrpic.blogspot.com/2009/12/ict-trends-in-india-2009-by-perry4law.html

[23.] Emerging Risks for Internet Users. (2010)

Retrieved January 8, 2010 from

http://www.acma.gov.au/webwr/_assets/main/lib311250/emerging_risks_for_inter
net_users.pdf

[24.] Risks on the Internet – Indian Context. (2010)

Retrieved January 8, 2010 from

http://www.indianchild.com/risks_on_the_internet.htm

[25.] Internet Security (2010)

Retrieved January 8, 2010 from

http://www.rcmp-grc.gc.ca/qc/pub/cybercrime/cybercrime-eng.htm#4

[26.] Webroot® Survey Reveals Social Networkers’ Risky Behaviors. (2009)

Retrieved January 8, 2010 from


http://www.webroot.com/En_US/about-press-room-press-releases-social-
networking-behaviors-revealed.html

[27.] Draft WGIG Issue Paper on Cybersecurity and Cybercrime. (2010)


Retrieved January 10, 2010n from
http://www.wgig.org/docs/WP-cybersec.pdf

[28.] Cyber Crime . . . and Punishment? (2010)


Retrieved January 10, 2010 from
http://www.iwar.org.uk/law/resources/cybercrime/mcconnell/CyberCrime.pdf

46
[29.] Risky Online Behavior. (2010)
Retrieved January 10, 2010 from
http://www.internetsafety101.org/predatorsrisk.htm

[30.] Guide to Social Networking: Risks (2010)


Retrieved January 8, 2010 from
http://www.mediafamily.org/network_pdf/MediaWise_Guide_to_Social_Networkin
g_Risks_09.pdf

[31.] Threats of Social Online Networks. (2010)


Retrieved January 10, 2010 from
http://www.cse.tkk.fi/en/publications/B/1/papers/Hasib_final.pdf

[32.] Perceived Benefit and Threat in Internet Use (2006)


Retrieved January 8, 2010 from
http://www.allacademic.com//meta/p_mla_apa_research_citation/0/9/0/3/5/pages
90354/p90354-1.php

47

Das könnte Ihnen auch gefallen