THE RAPID GROWTH OF CYBERCRIMES AFFECTING INFORMATION SYSTEMS IN THE GLOBAL: IS THIS A MYTH OR REALITY IN TANZANIA?
暂无分享,去创建一个
Camilius Sanga | Maduhu Mshangi | Edephonce N. Nfuka | Edephonce Ngemera Nfuka | C. Sanga | Maduhu Mshangi
[1] Yougal Joshi,et al. A Study on Cyber Crime and Security Scenario in INDIA , 2013 .
[2] Hakan Senturk,et al. Cyber Security Analysis of Turkey , 2012 .
[3] T. Jick. Mixing Qualitative and Quantitative Methods: Triangulation in Action. , 1979 .
[4] Michael Ccna Watkins,et al. CCNA Security Official Exam Certification Guide , 2008 .
[5] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[6] Programmes In Tanzania. MINISTRY OF EDUCATION AND VOCATIONAL TRAINING , 2007 .
[7] A. Bola. Cybercrime in Nigeria , 2010 .
[8] Nir Kshetri,et al. Cybercrime and Cybersecurity in the Global South , 2013 .
[9] Roy Want,et al. Global Perspectives , 2006, IEEE Pervasive Comput..
[10] Philip E. T. Lewis,et al. Research Methods for Business Students , 2006 .
[11] Lynette Kvasny,et al. Criminal Uses of Information & Communication Technologies in Sub-Saharan Africa: Trends, Concerns and Perspectives , 2009 .
[12] Eric Mayer. Scene Of The Cybercrime Computer Forensics Handbook , 2016 .
[13] D. Clemente. Cyber Security and Global Interdependence: What is Critical? , 2013 .
[14] P Speck,et al. Global perspectives , 1999, Palliative medicine.
[15] Steven J. Ross. Creating a Culture of Security , 2011 .
[16] Jabiri Kuwe Bakari,et al. A Holistic Approach for Managing ICT Security in Non-Commercial Organisations : A Case Study in a Developing Country , 2007 .
[17] H. Smith,et al. Strategies of social research : the methodological imagination , 1976 .
[18] Glenn A. Bowen. Document Analysis as a Qualitative Research Method , 2009 .
[19] A. T. Kingsmith. Virtual Roadblocks: The Securitisation of the Information Superhighway , 2013 .