NWOYE, C.J. (2015). Cybercrime Prevention in Online Transaction Using Biometric Access Control. International Journal of Information Security and Cybercrime, 4(2), 61-72. Retrieve from https://www.ijisc.comNWOYE, C.J., 2015. Cybercrime Prevention in Online Transaction Using Biometric Access Control. International Journal of Information Security and Cybercrime 4(2), 61-72. Available from: https://www.ijisc.comC.J. NWOYE, "Cybercrime Prevention in Online Transaction Using Biometric Access Control," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 61-72, 2015. Available: https://www.ijisc.comNWOYE, C.J., 'Cybercrime Prevention in Online Transaction Using Biometric Access Control', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 61-72, (2015).NWOYE, C.J.: Cybercrime Prevention in Online Transaction Using Biometric Access Control. International Journal of Information Security and Cybercrime 4 (2015) 61-72. https://www.ijisc.comNWOYE, C.J., (2015), Cybercrime Prevention in Online Transaction Using Biometric Access Control. International Journal of Information Security and Cybercrime, 4: 61-72. https://www.ijisc.com Citation Format :
HOLM, E. (2015). Identity Crime: Deliberating on Remedies for the Victim. International Journal of Information Security and Cybercrime, 4(2), 49-60. Retrieve from https://www.ijisc.comHOLM, E., 2015. Identity Crime: Deliberating on Remedies for the Victim. International Journal of Information Security and Cybercrime 4(2), 49-60. Available from: https://www.ijisc.comE. HOLM, "Identity Crime: Deliberating on Remedies for the Victim," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 49-60, 2015. Available: https://www.ijisc.comHOLM, E., 'Identity Crime: Deliberating on Remedies for the Victim', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 49-60, (2015).HOLM, E.: Identity Crime: Deliberating on Remedies for the Victim. International Journal of Information Security and Cybercrime 4 (2015) 49-60. https://www.ijisc.comHOLM, E., (2015), Identity Crime: Deliberating on Remedies for the Victim. International Journal of Information Security and Cybercrime, 4: 49-60. https://www.ijisc.com Citation Format :