Australian business assessment of computer user security: a national survey
暂无分享,去创建一个
[1] Kim-Kwang Raymond Choo,et al. Resource materials on technology-enabled crime , 2008 .
[2] Russell G. Smith,et al. Cyber Criminals on Trial: List of figures and tables , 2004 .
[3] L. Hughes,et al. Viruses, Worms, and Trojan Horses: Serious Crimes, Nuisance, or Both? , 2007 .
[4] Susan W. Brenner,et al. Cybercrime jurisdiction , 2006 .
[5] K J Spike Quinn. Second annual New Zealand computer crime and security survey , 2005 .
[6] Kim-Kwang Raymond Choo,et al. Future directions in technology-enabled crime: 2007-09 , 2008 .
[7] S. Brenner. 'At Light Speed' - Attribution and Response to Cybercrime/Terrorism/Warfare , 2007 .
[8] Rob McCusker,et al. Transnational organised cyber crime: distinguishing threat from reality , 2007 .
[9] Benjamin R. Jones,et al. Comment: Virtual neighborhood watch: Open source software and community policing against cybercrime , 2007 .
[10] Tony Krone. Concepts and terms , 2005 .
[11] Gregor H Allan. Responding to Cybercrime: A Delicate Blend of the Orthodox and the Alternative , 2005 .
[12] Dennis J. Turner,et al. Symantec Internet Security Threat Report Trends for July 04-December 04 , 2005 .
[13] Russell G. Smith. Crime Control in the Digital Age: An exploration of Human Rights Implications , 2007 .
[14] Kiah Rollings,et al. Counting the costs of crime in Australia: a 2005 update , 2008 .
[15] Peter Grabosky,et al. Requirements of prosecution services to deal with cyber crime , 2007 .
[16] Kim-Kwang Raymond Choo,et al. The future of technology-enabled crime in Australia , 2007 .
[17] Darin Walker,et al. Faceless-Oriented Policing: Traditional Policing Theories are Not Adequate in a Cyber World , 2006 .
[18] N. Chantler. Book Review of Cybercrime – The Reality of the Threat , 2007 .
[19] Kim-Kwang Raymond Choo. Organised crime groups in cyberspace: a typology , 2008 .
[20] D. Marron,et al. ‘Alter Reality’ Governing the Risk of Identity Theft , 2007 .
[21] M. White,et al. Assessing Our Knowledge of Identity Theft , 2008 .
[22] M. Yar. The Novelty of ‘Cybercrime’ , 2005 .
[23] D. Wall. Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace , 2007 .
[24] Tom Cross,et al. Emerging Cyber Threats Report for 2009 , 2008 .