SHAHJAHAN, M.,MIAH, A.K., (2023). Pattern of Cybercrime among Adolescents: An Exploratory Study. International Journal of Information Security and Cybercrime, 12(2), 43-48. Retrieve from https://www.ijisc.comSHAHJAHAN, M., MIAH, A.K., 2023. Pattern of Cybercrime among Adolescents: An Exploratory Study. International Journal of Information Security and Cybercrime 12(2), 43-48. Available from: https://www.ijisc.comM. SHAHJAHAN, A.K. MIAH, "Pattern of Cybercrime among Adolescents: An Exploratory Study," International Journal of Information Security and Cybercrime, vol. 12, no. 2, pp. 43-48, 2023. Available: https://www.ijisc.comSHAHJAHAN, M., MIAH, A.K., 'Pattern of Cybercrime among Adolescents: An Exploratory Study', International Journal of Information Security and Cybercrime, vol. 12, no. 2, 43-48, (2023).SHAHJAHAN, M.,MIAH, A.K.,: Pattern of Cybercrime among Adolescents: An Exploratory Study. International Journal of Information Security and Cybercrime 12 (2023) 43-48. https://www.ijisc.comSHAHJAHAN, M., MIAH, A.K., (2023), Pattern of Cybercrime among Adolescents: An Exploratory Study. International Journal of Information Security and Cybercrime, 12: 43-48. https://www.ijisc.com Citation Format :
DE SILVA, B. (2023). Exploring the Relationship Between Cybersecurity Culture and Cyber-Crime Prevention: A Systematic Review. International Journal of Information Security and Cybercrime, 12(1), 23-29. Retrieve from https://www.ijisc.comDE SILVA, B., 2023. Exploring the Relationship Between Cybersecurity Culture and Cyber-Crime Prevention: A Systematic Review. International Journal of Information Security and Cybercrime 12(1), 23-29. Available from: https://www.ijisc.comB. DE SILVA, "Exploring the Relationship Between Cybersecurity Culture and Cyber-Crime Prevention: A Systematic Review," International Journal of Information Security and Cybercrime, vol. 12, no. 1, pp. 23-29, 2023. Available: https://www.ijisc.comDE SILVA, B., 'Exploring the Relationship Between Cybersecurity Culture and Cyber-Crime Prevention: A Systematic Review', International Journal of Information Security and Cybercrime, vol. 12, no. 1, 23-29, (2023).DE SILVA, B.: Exploring the Relationship Between Cybersecurity Culture and Cyber-Crime Prevention: A Systematic Review. International Journal of Information Security and Cybercrime 12 (2023) 23-29. https://www.ijisc.comDE SILVA, B., (2023), Exploring the Relationship Between Cybersecurity Culture and Cyber-Crime Prevention: A Systematic Review. International Journal of Information Security and Cybercrime, 12: 23-29. https://www.ijisc.com Citation Format :
HUMIED, I.A. (2022). Cybersecurity as Emerging Challenge to Yemen Security. International Journal of Information Security and Cybercrime, 11(2), 35-44. Retrieve from https://www.ijisc.comHUMIED, I.A., 2022. Cybersecurity as Emerging Challenge to Yemen Security. International Journal of Information Security and Cybercrime 11(2), 35-44. Available from: https://www.ijisc.comI.A. HUMIED, "Cybersecurity as Emerging Challenge to Yemen Security," International Journal of Information Security and Cybercrime, vol. 11, no. 2, pp. 35-44, 2022. Available: https://www.ijisc.comHUMIED, I.A., 'Cybersecurity as Emerging Challenge to Yemen Security', International Journal of Information Security and Cybercrime, vol. 11, no. 2, 35-44, (2022).HUMIED, I.A.: Cybersecurity as Emerging Challenge to Yemen Security. International Journal of Information Security and Cybercrime 11 (2022) 35-44. https://www.ijisc.comHUMIED, I.A., (2022), Cybersecurity as Emerging Challenge to Yemen Security. International Journal of Information Security and Cybercrime, 11: 35-44. https://www.ijisc.com Citation Format :
BOROWSKI, M.,DYSARZ, J.,REICHWALD, M., (2021). Assessing the Actual Impact of a Cryptojacking Attack on Individual IT Systems and Measuring Legal Responses. International Journal of Information Security and Cybercrime, 10(2), 51-74. Retrieve from https://www.ijisc.comBOROWSKI, M., DYSARZ, J., REICHWALD, M., 2021. Assessing the Actual Impact of a Cryptojacking Attack on Individual IT Systems and Measuring Legal Responses. International Journal of Information Security and Cybercrime 10(2), 51-74. Available from: https://www.ijisc.comM. BOROWSKI, J. DYSARZ, M. REICHWALD, "Assessing the Actual Impact of a Cryptojacking Attack on Individual IT Systems and Measuring Legal Responses," International Journal of Information Security and Cybercrime, vol. 10, no. 2, pp. 51-74, 2021. Available: https://www.ijisc.comBOROWSKI, M., DYSARZ, J., REICHWALD, M., 'Assessing the Actual Impact of a Cryptojacking Attack on Individual IT Systems and Measuring Legal Responses', International Journal of Information Security and Cybercrime, vol. 10, no. 2, 51-74, (2021).BOROWSKI, M.,DYSARZ, J.,REICHWALD, M.,: Assessing the Actual Impact of a Cryptojacking Attack on Individual IT Systems and Measuring Legal Responses. International Journal of Information Security and Cybercrime 10 (2021) 51-74. https://www.ijisc.comBOROWSKI, M., DYSARZ, J., REICHWALD, M., (2021), Assessing the Actual Impact of a Cryptojacking Attack on Individual IT Systems and Measuring Legal Responses. International Journal of Information Security and Cybercrime, 10: 51-74. https://www.ijisc.com Citation Format :
DRAGOMIR, A. (2021). Cyber Diplomacy. International Journal of Information Security and Cybercrime, 10(2), 37-50. Retrieve from https://www.ijisc.comDRAGOMIR, A., 2021. Cyber Diplomacy. International Journal of Information Security and Cybercrime 10(2), 37-50. Available from: https://www.ijisc.comA. DRAGOMIR, "Cyber Diplomacy," International Journal of Information Security and Cybercrime, vol. 10, no. 2, pp. 37-50, 2021. Available: https://www.ijisc.comDRAGOMIR, A., 'Cyber Diplomacy', International Journal of Information Security and Cybercrime, vol. 10, no. 2, 37-50, (2021).DRAGOMIR, A.: Cyber Diplomacy. International Journal of Information Security and Cybercrime 10 (2021) 37-50. https://www.ijisc.comDRAGOMIR, A., (2021), Cyber Diplomacy. International Journal of Information Security and Cybercrime, 10: 37-50. https://www.ijisc.com Citation Format :
BALABAN, I. (2021). Denial-of-Service Attack. International Journal of Information Security and Cybercrime, 10(1), 59-64. Retrieve from https://www.ijisc.comBALABAN, I., 2021. Denial-of-Service Attack. International Journal of Information Security and Cybercrime 10(1), 59-64. Available from: https://www.ijisc.comI. BALABAN, "Denial-of-Service Attack," International Journal of Information Security and Cybercrime, vol. 10, no. 1, pp. 59-64, 2021. Available: https://www.ijisc.comBALABAN, I., 'Denial-of-Service Attack', International Journal of Information Security and Cybercrime, vol. 10, no. 1, 59-64, (2021).BALABAN, I.: Denial-of-Service Attack. International Journal of Information Security and Cybercrime 10 (2021) 59-64. https://www.ijisc.comBALABAN, I., (2021), Denial-of-Service Attack. International Journal of Information Security and Cybercrime, 10: 59-64. https://www.ijisc.com Citation Format :
MITRĂ, S.E. (2020). The Structure of Cyber Attacks. International Journal of Information Security and Cybercrime, 9(1), 43-52. Retrieve from https://www.ijisc.comMITRĂ, S.E., 2020. The Structure of Cyber Attacks. International Journal of Information Security and Cybercrime 9(1), 43-52. Available from: https://www.ijisc.comS.E. MITRĂ, "The Structure of Cyber Attacks," International Journal of Information Security and Cybercrime, vol. 9, no. 1, pp. 43-52, 2020. Available: https://www.ijisc.comMITRĂ, S.E., 'The Structure of Cyber Attacks', International Journal of Information Security and Cybercrime, vol. 9, no. 1, 43-52, (2020).MITRĂ, S.E.: The Structure of Cyber Attacks. International Journal of Information Security and Cybercrime 9 (2020) 43-52. https://www.ijisc.comMITRĂ, S.E., (2020), The Structure of Cyber Attacks. International Journal of Information Security and Cybercrime, 9: 43-52. https://www.ijisc.com Citation Format :
MIHAI, I.C.,ZETU, C., (2019). Romanian Law Enforcement Involvement in Fighting Cyber Crime. International Journal of Information Security and Cybercrime, 8(2), 89-96. Retrieve from https://www.ijisc.comMIHAI, I.C., ZETU, C., 2019. Romanian Law Enforcement Involvement in Fighting Cyber Crime. International Journal of Information Security and Cybercrime 8(2), 89-96. Available from: https://www.ijisc.comI.C. MIHAI, C. ZETU, "Romanian Law Enforcement Involvement in Fighting Cyber Crime," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 89-96, 2019. Available: https://www.ijisc.comMIHAI, I.C., ZETU, C., 'Romanian Law Enforcement Involvement in Fighting Cyber Crime', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 89-96, (2019).MIHAI, I.C.,ZETU, C.,: Romanian Law Enforcement Involvement in Fighting Cyber Crime. International Journal of Information Security and Cybercrime 8 (2019) 89-96. https://www.ijisc.comMIHAI, I.C., ZETU, C., (2019), Romanian Law Enforcement Involvement in Fighting Cyber Crime. International Journal of Information Security and Cybercrime, 8: 89-96. https://www.ijisc.com Citation Format :
STAMATAKIS, N.,SMITH, T., (2019). Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research. International Journal of Information Security and Cybercrime, 8(2), 53-88. Retrieve from https://www.ijisc.comSTAMATAKIS, N., SMITH, T., 2019. Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research. International Journal of Information Security and Cybercrime 8(2), 53-88. Available from: https://www.ijisc.comN. STAMATAKIS, T. SMITH, "Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 53-88, 2019. Available: https://www.ijisc.comSTAMATAKIS, N., SMITH, T., 'Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 53-88, (2019).STAMATAKIS, N.,SMITH, T.,: Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research. International Journal of Information Security and Cybercrime 8 (2019) 53-88. https://www.ijisc.comSTAMATAKIS, N., SMITH, T., (2019), Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research. International Journal of Information Security and Cybercrime, 8: 53-88. https://www.ijisc.com Citation Format :
BELSHAW, S.H. (2019). Investigating the New Criminal Neighborhood: The Need for Dark Web Education for Law Enforcement Personnel. International Journal of Information Security and Cybercrime, 8(2), 27-38. Retrieve from https://www.ijisc.comBELSHAW, S.H., 2019. Investigating the New Criminal Neighborhood: The Need for Dark Web Education for Law Enforcement Personnel. International Journal of Information Security and Cybercrime 8(2), 27-38. Available from: https://www.ijisc.comS.H. BELSHAW, "Investigating the New Criminal Neighborhood: The Need for Dark Web Education for Law Enforcement Personnel," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 27-38, 2019. Available: https://www.ijisc.comBELSHAW, S.H., 'Investigating the New Criminal Neighborhood: The Need for Dark Web Education for Law Enforcement Personnel', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 27-38, (2019).BELSHAW, S.H.: Investigating the New Criminal Neighborhood: The Need for Dark Web Education for Law Enforcement Personnel. International Journal of Information Security and Cybercrime 8 (2019) 27-38. https://www.ijisc.comBELSHAW, S.H., (2019), Investigating the New Criminal Neighborhood: The Need for Dark Web Education for Law Enforcement Personnel. International Journal of Information Security and Cybercrime, 8: 27-38. https://www.ijisc.com Citation Format :
ŞCHEAU, M.C.,ARSENE, A.L.,POPESCU, G., (2018). Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime, 7(1), 11-22. Retrieve from https://www.ijisc.comŞCHEAU, M.C., ARSENE, A.L., POPESCU, G., 2018. Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime 7(1), 11-22. Available from: https://www.ijisc.comM.C. ŞCHEAU, A.L. ARSENE, G. POPESCU, "Artificial Intelligence/Machine Learning Challenges and Evolution," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 11-22, 2018. Available: https://www.ijisc.comŞCHEAU, M.C., ARSENE, A.L., POPESCU, G., 'Artificial Intelligence/Machine Learning Challenges and Evolution', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 11-22, (2018).ŞCHEAU, M.C.,ARSENE, A.L.,POPESCU, G.,: Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime 7 (2018) 11-22. https://www.ijisc.comŞCHEAU, M.C., ARSENE, A.L., POPESCU, G., (2018), Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime, 7: 11-22. https://www.ijisc.com Citation Format :
RAZA, M.S. (2015). Cyber Laundering: Understanding the Trends and Typologies. International Journal of Information Security and Cybercrime, 4(2), 86-90. Retrieve from https://www.ijisc.comRAZA, M.S., 2015. Cyber Laundering: Understanding the Trends and Typologies. International Journal of Information Security and Cybercrime 4(2), 86-90. Available from: https://www.ijisc.comM.S. RAZA, "Cyber Laundering: Understanding the Trends and Typologies," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 86-90, 2015. Available: https://www.ijisc.comRAZA, M.S., 'Cyber Laundering: Understanding the Trends and Typologies', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 86-90, (2015).RAZA, M.S.: Cyber Laundering: Understanding the Trends and Typologies. International Journal of Information Security and Cybercrime 4 (2015) 86-90. https://www.ijisc.comRAZA, M.S., (2015), Cyber Laundering: Understanding the Trends and Typologies. International Journal of Information Security and Cybercrime, 4: 86-90. https://www.ijisc.com Citation Format :
NWOYE, C.J. (2015). Cybercrime Prevention in Online Transaction Using Biometric Access Control. International Journal of Information Security and Cybercrime, 4(2), 61-72. Retrieve from https://www.ijisc.comNWOYE, C.J., 2015. Cybercrime Prevention in Online Transaction Using Biometric Access Control. International Journal of Information Security and Cybercrime 4(2), 61-72. Available from: https://www.ijisc.comC.J. NWOYE, "Cybercrime Prevention in Online Transaction Using Biometric Access Control," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 61-72, 2015. Available: https://www.ijisc.comNWOYE, C.J., 'Cybercrime Prevention in Online Transaction Using Biometric Access Control', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 61-72, (2015).NWOYE, C.J.: Cybercrime Prevention in Online Transaction Using Biometric Access Control. International Journal of Information Security and Cybercrime 4 (2015) 61-72. https://www.ijisc.comNWOYE, C.J., (2015), Cybercrime Prevention in Online Transaction Using Biometric Access Control. International Journal of Information Security and Cybercrime, 4: 61-72. https://www.ijisc.com Citation Format :
DOBRINOIU, M. (2015). New Challenges for Cybersecurity and Possible Criminal Law. International Journal of Information Security and Cybercrime, 4(1), 15-21. Retrieve from https://www.ijisc.comDOBRINOIU, M., 2015. New Challenges for Cybersecurity and Possible Criminal Law. International Journal of Information Security and Cybercrime 4(1), 15-21. Available from: https://www.ijisc.comM. DOBRINOIU, "New Challenges for Cybersecurity and Possible Criminal Law," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 15-21, 2015. Available: https://www.ijisc.comDOBRINOIU, M., 'New Challenges for Cybersecurity and Possible Criminal Law', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 15-21, (2015).DOBRINOIU, M.: New Challenges for Cybersecurity and Possible Criminal Law. International Journal of Information Security and Cybercrime 4 (2015) 15-21. https://www.ijisc.comDOBRINOIU, M., (2015), New Challenges for Cybersecurity and Possible Criminal Law. International Journal of Information Security and Cybercrime, 4: 15-21. https://www.ijisc.com Citation Format :
PRIPAS, M.I. (2014). Phishing Attack – Detection and Removal. International Journal of Information Security and Cybercrime, 3(1), 59-64. Retrieve from https://www.ijisc.comPRIPAS, M.I., 2014. Phishing Attack – Detection and Removal. International Journal of Information Security and Cybercrime 3(1), 59-64. Available from: https://www.ijisc.comM.I. PRIPAS, "Phishing Attack – Detection and Removal," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 59-64, 2014. Available: https://www.ijisc.comPRIPAS, M.I., 'Phishing Attack – Detection and Removal', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 59-64, (2014).PRIPAS, M.I.: Phishing Attack – Detection and Removal. International Journal of Information Security and Cybercrime 3 (2014) 59-64. https://www.ijisc.comPRIPAS, M.I., (2014), Phishing Attack – Detection and Removal. International Journal of Information Security and Cybercrime, 3: 59-64. https://www.ijisc.com Citation Format :
BASAMAC, L. (2014). Computer Frauds. International Journal of Information Security and Cybercrime, 3(1), 53-58. Retrieve from https://www.ijisc.comBASAMAC, L., 2014. Computer Frauds. International Journal of Information Security and Cybercrime 3(1), 53-58. Available from: https://www.ijisc.comL. BASAMAC, "Computer Frauds," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 53-58, 2014. Available: https://www.ijisc.comBASAMAC, L., 'Computer Frauds', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 53-58, (2014).BASAMAC, L.: Computer Frauds. International Journal of Information Security and Cybercrime 3 (2014) 53-58. https://www.ijisc.comBASAMAC, L., (2014), Computer Frauds. International Journal of Information Security and Cybercrime, 3: 53-58. https://www.ijisc.com Citation Format :
MARIN, R.I. (2014). An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks. International Journal of Information Security and Cybercrime, 3(1), 47-52. Retrieve from https://www.ijisc.comMARIN, R.I., 2014. An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks. International Journal of Information Security and Cybercrime 3(1), 47-52. Available from: https://www.ijisc.comR.I. MARIN, "An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 47-52, 2014. Available: https://www.ijisc.comMARIN, R.I., 'An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 47-52, (2014).MARIN, R.I.: An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks. International Journal of Information Security and Cybercrime 3 (2014) 47-52. https://www.ijisc.comMARIN, R.I., (2014), An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks. International Journal of Information Security and Cybercrime, 3: 47-52. https://www.ijisc.com Citation Format :
PARODI, F. (2013). The Concept of Cybercrime and Online Threats Analysis. International Journal of Information Security and Cybercrime, 2(1), 59-66. Retrieve from https://www.ijisc.comPARODI, F., 2013. The Concept of Cybercrime and Online Threats Analysis. International Journal of Information Security and Cybercrime 2(1), 59-66. Available from: https://www.ijisc.comF. PARODI, "The Concept of Cybercrime and Online Threats Analysis," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 59-66, 2013. Available: https://www.ijisc.comPARODI, F., 'The Concept of Cybercrime and Online Threats Analysis', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 59-66, (2013).PARODI, F.: The Concept of Cybercrime and Online Threats Analysis. International Journal of Information Security and Cybercrime 2 (2013) 59-66. https://www.ijisc.comPARODI, F., (2013), The Concept of Cybercrime and Online Threats Analysis. International Journal of Information Security and Cybercrime, 2: 59-66. https://www.ijisc.com Citation Format :
CONSTANTIN, A. (2013). Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime, 2(1), 43-48. Retrieve from https://www.ijisc.comCONSTANTIN, A., 2013. Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime 2(1), 43-48. Available from: https://www.ijisc.comA. CONSTANTIN, "Cybercrime and National Security in the Context of Globalization," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 43-48, 2013. Available: https://www.ijisc.comCONSTANTIN, A., 'Cybercrime and National Security in the Context of Globalization', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 43-48, (2013).CONSTANTIN, A.: Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime 2 (2013) 43-48. https://www.ijisc.comCONSTANTIN, A., (2013), Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime, 2: 43-48. https://www.ijisc.com Citation Format :
BARBU, I.D. (2012). Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime, 1(1), 55-65. Retrieve from https://www.ijisc.comBARBU, I.D., 2012. Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime 1(1), 55-65. Available from: https://www.ijisc.comI.D. BARBU, "Computer Systems Vulnerabilities," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 55-65, 2012. Available: https://www.ijisc.comBARBU, I.D., 'Computer Systems Vulnerabilities', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 55-65, (2012).BARBU, I.D.: Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime 1 (2012) 55-65. https://www.ijisc.comBARBU, I.D., (2012), Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime, 1: 55-65. https://www.ijisc.com Citation Format :