These are the sources and citations used to research Your bibliography - 6 Jan 2015. This bibliography was generated on Cite This For Me on
In-text: (Application of Protection Motivation Theory to Adoption of Protective Technologies, 2009)
Your Bibliography: 2009 42nd Hawaii International Conference on System Sciences, 2009. Application of Protection Motivation Theory to Adoption of Protective Technologies.
In-text: (Economics of Information Security and Privacy III, 2013)
Your Bibliography: 2013. Economics of Information Security and Privacy III.
In-text: (Friend, 2004)
Your Bibliography: Friend, R., 2004. Making the gigabit IPsec VPN architecture secure. Computer, 37(6), pp.54-60.
In-text: (Hu and Dinev, 2005)
Your Bibliography: Hu, Q. and Dinev, T., 2005. Is spyware an Internet nuisance or public menace?. Commun. ACM, 48(8), p.61.
In-text: (Jahankhani, 2013)
Your Bibliography: Jahankhani, H., 2013. Developing a Model to Reduce and/or Prevent Cybercrime Victimization among the User Individuals. Strategic Intelligence Management, pp.258-268.
In-text: (McGee and Byington, 2013)
Your Bibliography: McGee, J. and Byington, J., 2013. How to Counter Cybercrime Intrusions. J. Corp. Acct. Fin., 24(5), pp.45-49.
In-text: (Newman, 2006)
Your Bibliography: Newman, R., 2006. Cybercrime, identity theft, and fraud. Proceedings of the 3rd annual conference on Information security curriculum development - InfoSecCD '06,.
In-text: (Post and Kagan, 2003)
Your Bibliography: Post, G. and Kagan, A., 2003. Computer security and operating system updates. Information and Software Technology, 45(8), pp.461-467.
10,587 students joined last month!