Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet224/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   220   221   222   223   224   225   226   227   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

219
 
References
Security Imperatives and Information and Communications Technologies. Elsevier, 
Oxford, pp. 93–107.
McCarthy, C., 2009. How the Mafia conquered social networks. Available at: 
http://news.cnet.
com/8301-13577_3-10274060-36.html
(accessed 07.02.14).
McKenna, K.Y.A., Bargh, J.A., 2000. Plan 9 from cyberspace: the implications of the Internet 
for personality and social psychology. Person. Soc. Psychol. Rev. 4 (1), 57–75.
Mesch, G.S., 2012. Minority status and the use of computer-mediated communication: a test 
of the social diversification hypothesis. Commun. Res. 39 (3), 317–337.
Miller, G.A., 1995. WordNet: a lexical database for English. Commun. ACM 38 (11), 39–41.
Moore, K., McElroy, J.C., 2012. The influence of personality on Facebook usage, wall post-
ings, and regret. Comput. Hum. Behav. 28 (1), 267–274.
Oh, O., Agrawal, M., Rao, H.R., 2011. Information control and terrorism: tracking the 
Mumbai terrorist attack through twitter. Inform. Syst. Front. 13 (1), 33–43. http://dx.doi.
org/10.1007/s10796-010-9275-8.
Peluchette, J., Karl, K., 2010. Examining students’ intended image on Facebook: “what were 
they thinking?” J. Educ. Bus. 85 (1), 30–37.
Polhamous, A., 2014. Pitman police evacuate high school for ‘potential threat’. Available at: 
http://www.nj.com/gloucester-county/index.ssf/2014/01/pitman_police:evacuate_high_
school_for_potential_threat.html
(accessed 02.06.14).
Priss, U., 2006. Formal concept analysis in information science. Annu. Rev. Inform. Sci. 
Technol. 40 (1), 521–543.
Rankin, G., Kinsella, N., 2011. Human trafficking—the importance of knowledge informa-
tion exchange. In: Akhgar, B., Yates (Eds.), Simeon Intelligence Management. Springer 
London, pp. 159–180.
Reiner, R., 2010. The Politics of the Police. Oxford University Press, Oxford.
Ross, C., Orr, E.S., Sisic, M., Arseneault, J.M., Simmering, M.G., Orr, R.R., 2009. Personality 
and motivations associated with Facebook use. Comput. Hum. Behav. 25 (2), 578–586.
The Seattle Times, 2012. Threat closes skyline high school in sammamish. Available at:
http://seattletimes.com/html/localnews/2019206262_apwasammamishschoolthreat.html
 
(accessed 16.02.14).
Shah, S., Bao, F., Lu, C.-T., Chen, I.-R., 2011. CROWDSAFE: crowd sourcing of crime inci-
dents and safe routing on mobile devices. In: Proceedings of the 19th ACM SIGSPATIAL 
International Conference on Advances in Geographic Information Systems. ACM, New 
York, NY, USA, pp. 521–524. http://dx.doi.org/10.1145/2093973.2094064.
Skog, D., 2005. Social interaction in virtual communities: the significance of technology. Int. 
J. Web Based Commun. 1 (4), 464–474.
Snasel, V., Horak, Z., Abraham, A., 2008. Understanding social networks using Formal Concept 
Analysis. In: 2008 IEEE/WIC/ACM International Conference on Web Intelligence and 
Intelligent Agent Technology, pp. 390–393.
Statistics Brain, 2014. Social Networking Statistics. Available at: 
http://www.statisticbrain.
com/social-networking-statistics/
(accessed 14.02.14).
Sundar, S.S., Marathe, S.S., 2010. Personalization versus customization: the importance of 
agency, privacy, and power usage. Hum. Commun. Res. 36 (3), 298–322.
Taddicken, M., 2013. The ‘privacy paradox’ in the social web: the impact of privacy concerns, 
individual characteristics, and the perceived social relevance on different forms of self-
disclosure. J. Comput.-Mediated Commun. 19 (2), 248–273.
Timelists, 2014. The Boss of All Bosses. Available at: 
http://content.time.com/time/spe-
cials/2007/article/0,28804,1683530_1683532_1683538,00.html
(07.02.14).



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   220   221   222   223   224   225   226   227   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish