These are the sources and citations used to research Your bibliography - 6 Jan 2015. This bibliography was generated on Cite This For Me on

  • Journal

    Application of Protection Motivation Theory to Adoption of Protective Technologies

    2009 - 2009 42nd Hawaii International Conference on System Sciences

    In-text: (Application of Protection Motivation Theory to Adoption of Protective Technologies, 2009)

    Your Bibliography: 2009 42nd Hawaii International Conference on System Sciences, 2009. Application of Protection Motivation Theory to Adoption of Protective Technologies.

  • Journal

    Economics of Information Security and Privacy III

    2013

    In-text: (Economics of Information Security and Privacy III, 2013)

    Your Bibliography: 2013. Economics of Information Security and Privacy III.

  • Journal

    Friend, R.

    Making the gigabit IPsec VPN architecture secure

    2004 - Computer

    In-text: (Friend, 2004)

    Your Bibliography: Friend, R., 2004. Making the gigabit IPsec VPN architecture secure. Computer, 37(6), pp.54-60.

  • Journal

    Hu, Q. and Dinev, T.

    Is spyware an Internet nuisance or public menace?

    2005 - Commun. ACM

    In-text: (Hu and Dinev, 2005)

    Your Bibliography: Hu, Q. and Dinev, T., 2005. Is spyware an Internet nuisance or public menace?. Commun. ACM, 48(8), p.61.

  • Journal

    Jahankhani, H.

    Developing a Model to Reduce and/or Prevent Cybercrime Victimization among the User Individuals

    2013 - Strategic Intelligence Management

    In-text: (Jahankhani, 2013)

    Your Bibliography: Jahankhani, H., 2013. Developing a Model to Reduce and/or Prevent Cybercrime Victimization among the User Individuals. Strategic Intelligence Management, pp.258-268.

  • Journal

    McGee, J. A. and Byington, J. R.

    How to Counter Cybercrime Intrusions

    2013 - J. Corp. Acct. Fin.

    In-text: (McGee and Byington, 2013)

    Your Bibliography: McGee, J. and Byington, J., 2013. How to Counter Cybercrime Intrusions. J. Corp. Acct. Fin., 24(5), pp.45-49.

  • Journal

    Newman, R. C.

    Cybercrime, identity theft, and fraud

    2006 - Proceedings of the 3rd annual conference on Information security curriculum development - InfoSecCD '06

    In-text: (Newman, 2006)

    Your Bibliography: Newman, R., 2006. Cybercrime, identity theft, and fraud. Proceedings of the 3rd annual conference on Information security curriculum development - InfoSecCD '06,.

  • Journal

    Post, G. and Kagan, A.

    Computer security and operating system updates

    2003 - Information and Software Technology

    In-text: (Post and Kagan, 2003)

    Your Bibliography: Post, G. and Kagan, A., 2003. Computer security and operating system updates. Information and Software Technology, 45(8), pp.461-467.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join