CHAMUDDIKA, K.,RANAWEERA, K., (2021). A Criminological Study on Trends of Cybercrimes Against Financial Institutions in Sri Lanka. International Journal of Information Security and Cybercrime, 10(2), 81-88. Retrieve from https://www.ijisc.comCHAMUDDIKA, K., RANAWEERA, K., 2021. A Criminological Study on Trends of Cybercrimes Against Financial Institutions in Sri Lanka. International Journal of Information Security and Cybercrime 10(2), 81-88. Available from: https://www.ijisc.comK. CHAMUDDIKA, K. RANAWEERA, "A Criminological Study on Trends of Cybercrimes Against Financial Institutions in Sri Lanka," International Journal of Information Security and Cybercrime, vol. 10, no. 2, pp. 81-88, 2021. Available: https://www.ijisc.comCHAMUDDIKA, K., RANAWEERA, K., 'A Criminological Study on Trends of Cybercrimes Against Financial Institutions in Sri Lanka', International Journal of Information Security and Cybercrime, vol. 10, no. 2, 81-88, (2021).CHAMUDDIKA, K.,RANAWEERA, K.,: A Criminological Study on Trends of Cybercrimes Against Financial Institutions in Sri Lanka. International Journal of Information Security and Cybercrime 10 (2021) 81-88. https://www.ijisc.comCHAMUDDIKA, K., RANAWEERA, K., (2021), A Criminological Study on Trends of Cybercrimes Against Financial Institutions in Sri Lanka. International Journal of Information Security and Cybercrime, 10: 81-88. https://www.ijisc.com Citation Format :
HASHIM, M.S.,RAHMAN, N.A.,ZIN, A.N.,MAHAMAD, K.A.,AHMAD, F.A., (2017). Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data. International Journal of Information Security and Cybercrime, 6(2), 9-16. Retrieve from https://www.ijisc.comHASHIM, M.S., RAHMAN, N.A., ZIN, A.N., MAHAMAD, K.A., AHMAD, F.A., 2017. Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data. International Journal of Information Security and Cybercrime 6(2), 9-16. Available from: https://www.ijisc.comM.S. HASHIM, N.A. RAHMAN, A.N. ZIN, K.A. MAHAMAD, F.A. AHMAD, "Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 9-16, 2017. Available: https://www.ijisc.comHASHIM, M.S., RAHMAN, N.A., ZIN, A.N., MAHAMAD, K.A., AHMAD, F.A., 'Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 9-16, (2017).HASHIM, M.S.,RAHMAN, N.A.,ZIN, A.N.,MAHAMAD, K.A.,AHMAD, F.A.,: Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data. International Journal of Information Security and Cybercrime 6 (2017) 9-16. https://www.ijisc.comHASHIM, M.S., RAHMAN, N.A., ZIN, A.N., MAHAMAD, K.A., AHMAD, F.A., (2017), Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data. International Journal of Information Security and Cybercrime, 6: 9-16. https://www.ijisc.com Citation Format :
EFG, A. (2016). The Impact of Cybercrimes on Global Trade and Commerce. International Journal of Information Security and Cybercrime, 5(2), 31-50. Retrieve from https://www.ijisc.comEFG, A., 2016. The Impact of Cybercrimes on Global Trade and Commerce. International Journal of Information Security and Cybercrime 5(2), 31-50. Available from: https://www.ijisc.comA. EFG, "The Impact of Cybercrimes on Global Trade and Commerce," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 31-50, 2016. Available: https://www.ijisc.comEFG, A., 'The Impact of Cybercrimes on Global Trade and Commerce', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 31-50, (2016).EFG, A.: The Impact of Cybercrimes on Global Trade and Commerce. International Journal of Information Security and Cybercrime 5 (2016) 31-50. https://www.ijisc.comEFG, A., (2016), The Impact of Cybercrimes on Global Trade and Commerce. International Journal of Information Security and Cybercrime, 5: 31-50. https://www.ijisc.com Citation Format :
EFG, A. (2015). The Challenges to Enforcement of Cybercrimes Laws and Policy. International Journal of Information Security and Cybercrime, 4(2), 33-48. Retrieve from https://www.ijisc.comEFG, A., 2015. The Challenges to Enforcement of Cybercrimes Laws and Policy. International Journal of Information Security and Cybercrime 4(2), 33-48. Available from: https://www.ijisc.comA. EFG, "The Challenges to Enforcement of Cybercrimes Laws and Policy," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 33-48, 2015. Available: https://www.ijisc.comEFG, A., 'The Challenges to Enforcement of Cybercrimes Laws and Policy', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 33-48, (2015).EFG, A.: The Challenges to Enforcement of Cybercrimes Laws and Policy. International Journal of Information Security and Cybercrime 4 (2015) 33-48. https://www.ijisc.comEFG, A., (2015), The Challenges to Enforcement of Cybercrimes Laws and Policy. International Journal of Information Security and Cybercrime, 4: 33-48. https://www.ijisc.com Citation Format :
ÇAKIR, H.,KILIÇ, M.S., (2015). Importance of Operating Systems Type in Computer Forensics. International Journal of Information Security and Cybercrime, 4(2), 9-20. Retrieve from https://www.ijisc.comÇAKIR, H., KILIÇ, M.S., 2015. Importance of Operating Systems Type in Computer Forensics. International Journal of Information Security and Cybercrime 4(2), 9-20. Available from: https://www.ijisc.comH. ÇAKIR, M.S. KILIÇ, "Importance of Operating Systems Type in Computer Forensics," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 9-20, 2015. Available: https://www.ijisc.comÇAKIR, H., KILIÇ, M.S., 'Importance of Operating Systems Type in Computer Forensics', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 9-20, (2015).ÇAKIR, H.,KILIÇ, M.S.,: Importance of Operating Systems Type in Computer Forensics. International Journal of Information Security and Cybercrime 4 (2015) 9-20. https://www.ijisc.comÇAKIR, H., KILIÇ, M.S., (2015), Importance of Operating Systems Type in Computer Forensics. International Journal of Information Security and Cybercrime, 4: 9-20. https://www.ijisc.com Citation Format :