References
[1]. Aghatise E. J. (2006): Level of Awareness of Internet Intermediaries Liability. (HND Project
work) Unpublished. Auchi Polytechnic, Auchi, Edo State, Nigeria.
[2]. Alpna (2016), "Cyber Crime-Its Types, Analysis and Prevention Techniques", International
Journal of Advanced Research in Computer Science and Software Engineering, Volume
6, Issue 5, May 2016 ISSN: 2277 128X
[3]. Angel cruz,chief information security officer state of Texas, cyber security tips, monthly
newsletter 2013,volume
[4]. Atul Kum ar, Sr. Analyst, Chiranshu Ahuja, Sr. Analyst, Cyber Security Research Developments
Global and Indian Context, A NASSCOM Initiative
[5]. Atul M. Tonge1, Suraj S. Kasture2, Surbhi R. Chaudhari3 IOSR Journal of Computer
Engineering (IOSR-JCE) CSE, Cyber security: challenges for society, ISSN: 2278-0661,
p- ISSN: 2278-8727Volume 12, Issue 2 (May. - Jun. 2013).
[6]. Baskerville, R., 1991, Risk Analysis: An Interpretive Feasibility Tool in Justifying Information
Systems Security, European Journal of Information Systems, 1(2): 121-130.
[7]. Berinato, S. (2002), Enron IT: A take of Excess and Chaos, CIO.com, March 5
http://www.cio.com/executive/edit/030502_enron.html, Visited: 28/01/2012
[8]. Bowen, Mace (2009), Computer Crime, Available at: http://www.guru.net/, Visited: 28/01/2012.
By Jessica Stanicon (2009), Available at:
http://www.dynamicbusiness.com/articles/articles-news/one-in-five-victims-ofcybercrime3907.html,
Visited: 28/01/2012.
[9]. CAPEC (2010), CAPEC-117: Data Interception Attacks, Available at:
http://capec.mitre.org/data/definitions/117.html, Visited: 28/01/2012.
[10]. Computer Hope (2012), Data Theft, Available at: http://www.computerhope.com/jargon/d/
datathef.htm, Visited: 28/01/2012.
[11]. Crime Desk (2009), Million Online Crimes in the Year: Cyber Crime Squad Established,
Available at: http://www.thelondondailynews.com/million-online-crimes-year-cybercrime-squad-established-p-3117.html,
Visited: 28/01/2012.
[12]. Cyber Trust and Crime Prevention, Mid-Term Review, November 2005 - January 2009,
Available at:
http://www.bis.gov.uk/assets/bispartners/foresight/docs/cyber/ctcp_midterm_ review.pdf,
Visited: 28/01/2012
[13]. Cyberlawtimes (2009), Available at: http://www.cyberlawtimes.com/forums/index.php?board
=52.0, Visited: 10/31/09
[14]. D. Ariz. (April 19, 2000), American Guarantee & Liability Insurance Co. v. Ingram Micro, Inc.
Civ. 99-185 TUC ACM, 2000 U.S. Dist. Lexis 7299.
[15]. D'Amico, A., 2000, What Does a Computer Security Breach Really Cost?, The Sans Institute
DSL Reports (2011), Network Sabotage, Available at:
http://www.dslreports.com/forum/r26182468-Network-Sabotage-or-incompetentmanagers-trying-to-,
Visited: 28/01/2012.
en.wikipedia.org/wiki/Cyber_security_standards
[16]. Er. Harpreet Singh Dalla, Ms. Geeta HOD, Department of CSE & IT Patiala Institute of
Engineering & Technology for Women, Patiala, India, Cyber Crime - A Threat to
Persons, Property, Government and Societies, Volume 3, Issue 5, May 2013 ISSN: 2277
128X Forensic technology services cybercrime survey report 2014 kpmg.com/in
[17]. Gordon, L. A. et al., 2003, A Framework for Using Insurance for Cyber-Risk Management,
Communications of the ACM, 46(3): 81-85.
[18]. Hancock, B., 2002, Security Crisis Management-The Basics, Computers & Security, 21(5):
397-401.
[19]. Harish Chander 2012, "Cyber Laws and IT Protection", PHI Learning
[20]. Hemraj Saini and Yerra Shankar Rao (2012), "Cyber-Crimes and their Impacts: A Review",
International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-
9622 www.ijera.com Vol. 2, Issue 2, Mar-Apr, pp.202-209.
[21]. Hemraj Saini and Yerra Shankar Rao (2012), "Cyber-Crimes and their Impacts: A Review",
International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-
9622 www.ijera.com Vol. 2, Issue 2, Mar-Apr, pp.202-209.
[22]. Hoffer, J. A., and D. W. Straub, 1989, The 9 to 5 Underground: Are You Policing Computer
Crimes?, Sloan Management Review (Summer 1989): 35-43
[23]. IMDb (2012), Unauthorized Attacks, Available at: http://www.imdb.com/title/tt0373414/,
Visited: 28/01/2012
[24]. India emerging as major cyber crime centre (2009), Available at: http://wegathernews.com/
203/india-emerging-as-major-cyber-crime-centre/, Visited: 10/31/09
[25]. Jamal Raiyn, A survey of Cyber Attack Detection Strategies, International Journal of Security
and Its Applications Vol.8, No.1 (2014).
[26]. Janhavi J Deshmukh and Surbhi R Chaudhari, Cyber crime in Indian scenario - a literature
snapshot, International Journal of Conceptions on Computing and Information
Technology Vol.2, Issue 2, April' 2014; ISSN: 2345 - 9808.
[27]. Kelly, B. J., 1999, Preserve, Protect, and Defend, Journal of Business Strategy, 20(5): 22-26.
[28]. Kevin G. Coleman (2011), Cyber Intelligence: The Huge Economic Impact of Cyber Crime,
Available at: http://gov.aol.com/2011/09/19/cyber-intelligence-the-huge-economicimpact-of-cyber-crime/,
Visited: 28/01/2012
[29]. Leagal Info (2009), Crime Overview Aiding And Abetting Or Accessory, Available at:
http://www.legalinfo.com/content/criminal-law/crime-overview-aiding-and-abetting-oraccessory.
html, Visited: 28/01/2012
[30]. Longe, O.B. (2004): Proprietary Software Protection and Copyright issues in contemporary
Information Technology. (M.Sc Thesis) Unpublished. Federal University of Technology,
Akure, Nigeria.
[31]. Lyman, J., 2002, In Search of the World's Costliest Computer Virus, http://www.
newsfactor.com/perl/story/16407.html. 2002.
[32]. Newswise (2009), China Linked to 70 Percent of World's Spam, Says Computer Forensics
Expert, Available at: http://www.newswise.com/articles/view/553655/, Visited:
28/01/2012.
[33]. Nigel Jones, Director or the Cyber Security Knowledge Transfer Network, was featured in the
daily telegraph (May 6, 2008), Cyber Security KTN,
[34]. Nilkund Aseef, Pamela Davis, Manish Mittal, Khaled Sedky, Ahmed Tolba (2005), CyberCriminal
Activity and Analysis,White Paper, Group 2.
[35]. Oracle (2003), Security Overviews, Available at: http://docs.oracle.com/cd/B13789_01/
network.101/ b10777/overview.htm, Visited: 28/01/2012.
[36]. Panda T.C. (2012), "Cyber-Crimes and their Impacts", International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 2,
Mar-Apr, pp.202-209.
[37]. Pooja Aggarwal, Piyush Arora and Neha (2014), "Review on Cyber Crime and Security",
International Journal of Research in Engineering and Applied Sciences (IJREAS), ISSN :
2249-9210, c IJREAS, Vol. 02, Issue 01, Jan.
[38]. Poonam (2014), "Review on Cyber Crime and Security", International Journal of Research in
Engineering and Applied Sciences (IJREAS), ISSN : 2249-9210, C IJREAS, Vol. 02,
Issue 01, Jan 2014
[39]. Power, R., 2001, 2001 CSI/FBI Computer Crime and Security Survey, Computer Security Issues
and Trends, 7(1): 1-18.
[40]. Prasun Sonwalkar (2009), India emerging as centre for cybercrime: UK study, Available at:
http://www.livemint.com/2009/08/20000730/India-emerging-as-centre-for-c.html,
Visited: 10/31/09
[41]. PTI Contents (2009), India: A major hub for cybercrime, Available at: http://business.rediff.com/
slide-show/2009/aug/20/slide-show-1-india-major-hub-for-cybercrime.htm, Visited:
28/01/2012.
[42]. Ryder D. Rodney 2007, "Guide to Cyber Laws", Nagpur Wadhawa and Company.
[43]. S. Sai Sushanth, "Cyber Law: Various Aspects of Cyber Legal System", Cyber Times
International Journal of Technology and Management.
[44]. Seema Vijay Rane & Pankaj Anil Choudhary, April 2012-September 2012, "Cyber Crime and
Cyber Law in India", Cyber Times International Journal of Technology and
Management, Vol. 5 Issue 2
[45]. Shantosh Rout (2008), Network Interferences, Available at: http://www.santoshraut.com/
forensic/ cybercrime.htm, Visited: 28/01/2012
[46]. Sheri R.K. & Chhabru S.T.N 2002, "Cyber Crime", New Delhi, Pentagon Press
[47]. Smith, R. G., Holmes, M. N. & Kaufmann, P. (1999): Nigerian Advance Fee Fraud., Trends and
Issues in Crime and Criminal Justice, No. 121, Australian Institute of Criminology,
Canberra (republished in The Reformer February 2000, pp. 17-19).
[48]. Sona Malhotra (2016), "Cyber Crime-Its Types, Analysis and Prevention Techniques",
International Journal of Advanced Research in Computer Science and Software
Engineering, Volume 6, Issue 5, May 2016 ISSN: 2277 128X.
[49]. Sprecher, R., and M. Pertl, 1988, Intra-Industry Effects of the MGM Grand Fire, Quarterly
Journal of Business and Economics, 27: 96-16.
[50]. Stephen Northcutt et al. (2011), Security Predictions 2012 & 2013 - The Emerging Security
Threat, Available at: http://www.sans.edu/research/security-laboratory/article/securitypredict
2011, Visited: 29/01/2012.
[51]. Sumanjit Das and Tapaswini Nayak, "impact of cyber crime: issues and challenges||,
International Journal of Engineering Sciences & Emerging Technologies, October 2013.
ISSN: 22316604 Volume 6, Issue 2, pp: 142-153 cIJESET.
[52]. Sylvester, Linn (2001): The Importance of Victimology in Criminal Profiling. Available online
at: http://isuisse.ifrance.com/emmaf/base/impvic.html
[53]. Vineet Kandpal and **R. K. Singh, Latest Face of Cybercrime and Its Prevention In India,
International Journal of Basic and Applied Sciences Vol. 2. No. 4. 2013
[54]. Virus Glossary (2006), Virus Dissemination, Available at: http://www.virtualpune.com/citizencentre/html/cyber_crime_glossary.shtml,
Visited: 28/01/2012
[55]. Wow Essay (2009), Top Lycos Networks, Available at: http://www.wowessays.com/ dbase/ab2/
nyr90.shtml, Visited: 28/01/2012.