These are the sources and citations used to research BIBLIOGRAPHY. This bibliography was generated on Cite This For Me on
In-text: (Cyber Crime: Critical View, 2016)
Your Bibliography: Cyber Crime: Critical View. (2016). International Journal of Science and Research (IJSR), 5(1), pp.85-87.
In-text: (Lehto, 2013)
Your Bibliography: Lehto, M. (2013). The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies. International Journal of Cyber Warfare and Terrorism, 3(3), pp.1-18.
In-text: (Narang and Jain, 2011)
Your Bibliography: Narang, M. and Jain, G. (2011). Cyber Crimes: Problems of Investigation and Solution. Indian Journal of Applied Research, 3(11), pp.73-76.
In-text: (Ward, 2017)
Your Bibliography: Ward, L. (2017). Universities need to plug into threat of cyber-attacks. [online] the Guardian. Available at: http://www.theguardian.com/education/2015/mar/31/universities-cyber-attacks-research-criminals [Accessed 29 Dec. 2017].
In-text: (BBC News, 2017)
Your Bibliography: BBC News. (2017). Cyber-thefts hit UK universities. [online] Available at: http://www.bbc.co.uk/news/technology-41160385 [Accessed 29 Dec. 2017].
In-text: (The Week UK, 2017)
Your Bibliography: The Week UK. (2017). Hackers target research from UK universities. [online] Available at: http://www.theweek.co.uk/88192/hackers-target-research-from-uk-universities [Accessed 29 Dec. 2017].
In-text: (Khan, 2013)
Your Bibliography: Khan, R. (2013). Cyber Crimes Against Property (Cyber Squatting & Software Piracy). SSRN Electronic Journal.
10,587 students joined last month!