You are on page 1of 3

Aliyu, A. A., T. Rosmain and J. Takala (2014).

"Online Banking and Customer Service Delivery in


Malaysia: Data Screening and Preliminary Findings." Procedia - Social and Behavioral Sciences
129(0): 562-570.
Ammar Yassir, S. N. (2012). "Cybercrime: A threat to Network Security." International Journal of
Computer Science and Network Security 12(02): 04.
rpd, I. (2013). "A Greater Involvement of Education in Fight Against Cybercrime." Procedia -
Social and Behavioral Sciences 83(0): 371-377.
AsSadhan, B. and J. M. F. Moura (2014). "An efficient method to detect periodic behavior in botnet
traffic by analyzing control plane traffic." Journal of Advanced Research 5(4): 435-448.
Aziz, N. A. and I. Ibrahim (2012). "Child's Right to Free Flow Information via Internet: Liability
and Responsibility of the Internet Service Provider." Procedia - Social and Behavioral Sciences 38(0):
160-168.
Baggili, I. and M. Rogers (2009). "Self-Reported Cyber Crime: An Analysis on the Effects of
Anonymity and Pre-Employment Integrity." International Journal of Cyber Criminology 03(02).
Broadhurst, R., P. Grabosky , M. Alazab and S. Chon (2014). "Organizations and Cyber crime: An
Analysis of the Nature of Groups engaged in Cyber Crime." International Journal of Cyber
Criminology 08(01): 20.
Bucciarelli, E., F. Muratore, I. Odoardi and C. Pagliari (2011). "Is it possible to define gender effects
of the human capital on the processes of well-being?" Procedia - Social and Behavioral Sciences
15(0): 1067-1075.
ankaya, . H. and . Tan (2010). "Effect of cyber bullying on the distrust levels of pre-service
teachers: considering internet addiction as a mediating variable." Procedia - Social and Behavioral
Sciences 9(0): 1634-1640.
ankaya, . H. and . Tan (2011). "Effect of cyber bullying on the distrust levels of preservice
teachers: considering internet addiction as a mediating Variable." Procedia Computer Science 3(0):
1353-1360.
elen, F. K. and S. S. Seferolu (2013). "Investigation of Elementary School Students Opinions
Related to Unethical Behavior in the Use of Information and Communication Technologies."
Procedia - Social and Behavioral Sciences 83(0): 417-421.
Chakraborty, R., M. Agrawal and H. R. Rao (2014). "Information processing under stress: A study of
Mumbai Police first responders." IIMB Management Review 26(2): 91-104.
miel, S. (2014). "Cyberbullying Legislation in Poland and Selected EU Countries." Procedia - Social
and Behavioral Sciences 109(0): 29-34.
Din, N., S. Yahya, R. Suzan and R. Kassim (2012). "Online Social Networking for Quality of Life."
Procedia - Social and Behavioral Sciences 35(0): 713-718.
Edler, L., A. Hart, P. Greaves, P. Carthew, M. Coulet, A. Boobis, G. M. Williams and B. Smith
"Selection of appropriate tumour data sets for Benchmark Dose Modelling (BMD) and derivation of
a Margin of Exposure (MoE) for substances that are genotoxic and carcinogenic: Considerations of
biological relevance of tumour type, data quality and uncertainty assessment." Food and Chemical
Toxicology(0).
Elmaghraby, A. S. and M. M. Losavio (2014). "Cyber security challenges in Smart Cities: Safety,
security and privacy." Journal of Advanced Research 5(4): 491-497.
Erftemeijer, P. L. A., B. Riegl, B. W. Hoeksema and P. A. Todd (2012). "Environmental impacts of
dredging and other sediment disturbances on corals: A review." Marine Pollution Bulletin 64(9):
1737-1765.
Garca, A. I. S. and E. M. Margallo (2014). "Bullying: What's Going on? A Bibliographic Review of
Last Twelve Months." Procedia - Social and Behavioral Sciences 132(0): 269-276.
Getzen, T. E. (2010). "Public Health Security and Forecasting Economic Trends." Procedia - Social
and Behavioral Sciences 2(5): 7137-7144.
Grimmond, C. S. B., M. Roth, T. R. Oke, Y. C. Au, M. Best, R. Betts, G. Carmichael, H. Cleugh, W.
Dabberdt, R. Emmanuel, E. Freitas, K. Fortuniak, S. Hanna, P. Klein, L. S. Kalkstein, C. H. Liu, A.
Nickson, D. Pearlmutter, D. Sailor and J. Voogt (2010). "Climate and More Sustainable Cities:
Climate Information for Improved Planning and Management of Cities (Producers/Capabilities
Perspective)." Procedia Environmental Sciences 1(0): 247-274.
Halder, D. (2011). Information Technology Act and Cyber Terrorism: A Critical Review. Cyber
Crime and Digital Disorder. P. Madhava Soma Sundaram and S. E. Umarhathab. Tirunelveli, India,
Publications Division, Manonmaniam Sundaranar University: 11.
Ho, L.-H., Y.-T. Lin and C.-H. Huang (2012). "Influences of Online Lifestyle on Juvenile
Cybercrime Behaviors in Taiwan." Procedia Engineering 29(0): 2545-2550.
Igbo, H. I., E. G. Egbe-Okpenge and R. G. Awopetu (2013). "Influence of Information and
Communication Technology on Behavior Problems of Nigerian Youths." Procedia - Social and
Behavioral Sciences 84(0): 97-106.
Iqbal, A., H. Al Obaidli, A. Marrington and A. Jones (2014). "Windows Surface RT tablet forensics."
Digital Investigation 11, Supplement 1(0): S87-S93.
Jouini, M., L. B. A. Rabai and A. B. Aissa (2014). "Classification of Security Threats in Information
Systems." Procedia Computer Science 32(0): 489-496.
Kopeck, K. (2014). "Cyberbullying and Other Risks of Internet Communication Focused on
University Students." Procedia - Social and Behavioral Sciences 112(0): 260-269.
Kopeck, K., R. Szotkowski and V. Krej (2012). "The Risks of Internet Communication 3."
Procedia - Social and Behavioral Sciences 69(0): 1348-1357.
Kowalski, R. M. and S. P. Limber (2013). "Psychological, Physical, and Academic Correlates of
Cyberbullying and Traditional Bullying." Journal of Adolescent Health 53(1, Supplement): S13-S20.
Makri-Botsari, E. and G. Karagianni (2014). "Cyberbullying in Greek Adolescents: The Role of
Parents." Procedia - Social and Behavioral Sciences 116(0): 3241-3253.
Maskun, A. Manuputty, S. M. Noor and J. Sumardi (2013). "Cyber Security: Rule of Use Internet
Safely?" Procedia - Social and Behavioral Sciences 103(0): 255-261.
Mohamed N and E. Guindy (October 13th 2012). "Cybercrime Challenges in Middle East."
Oksanen, A. and T. Keipi (2013). "Young people as victims of crime on the internet: A population-
based study in Finland." Vulnerable Children and Youth Studies 8(4): 298-309.
Rasmi, M. and A. Jantan (2013). "A New Algorithm to Estimate the Similarity between the
Intentions of the Cyber Crimes for Network Forensics." Procedia Technology 11(0): 540-547.
Shiferaw, B., K. Tesfaye, M. Kassie, T. Abate, B. M. Prasanna and A. Menkir "Managing
vulnerability to drought and enhancing livelihood resilience in sub-Saharan Africa: Technological,
institutional and policy options." Weather and Climate Extremes(0).
Stahl, B. C., G. Eden, M. Jirotka and M. Coeckelbergh "From computer ethics to responsible
research and innovation in ICT: The transition of reference discourses informing ethics-related
research in information systems." Information & Management(0).
Wenxian, X., L. Zhen, G. Guohong and W. Wenlong (2012). "A Discussion on Network's Negative
Impact on College Students." Energy Procedia 17, Part B(0): 1358-1361.
Yu, S. (2014). "Fear of Cyber Crime among College Students in the United States: An Exploratory
Study." International Journal of Cyber Criminology 08(01): 11.
Zainol, Z., S. P. Nelson and A. Malami (2012). "Internal Human based Threats and Security
Controls in Computerized Banking Systems: Evidence from Malaysia." Procedia - Social and
Behavioral Sciences 65(0): 199-204.

You might also like