These are the sources and citations used to research 6-1 Discussion: Computer Crimes. This bibliography was generated on Cite This For Me on

  • Press release

    FOX 5 Atlanta Digital Team

    Child porn, 'pedophile manual' found encrypted on man's electronic devices, investigators say

    2022

    In-text: (FOX 5 Atlanta Digital Team, 2022)

    Your Bibliography: FOX 5 Atlanta Digital Team, 2022. Child porn, 'pedophile manual' found encrypted on man's electronic devices, investigators say. [online] Available at: <https://www.fox5atlanta.com/news/peachtree-city-man-coweta-coutny-porn-arrest> [Accessed 15 July 2022].

  • Website

    How data mining techniques can be used in cyber security solutions

    2021 - NEC New Zealand

    In-text: (How data mining techniques can be used in cyber security solutions, 2021)

    Your Bibliography: How data mining techniques can be used in cyber security solutions. 2021. How data mining techniques can be used in cyber security solutions. [online] Available at: <https://www.nec.co.nz/market-leadership/publications-media/how-data-mining-techniques-can-be-used-in-cyber-security-solutions/> [Accessed 16 July 2022].

  • Press release

    NPR - THE ASSOCIATED PRESS

    Apple Will Scan U.S. iPhones For Images Of Child Sexual Abuse

    2021

    In-text: (NPR - THE ASSOCIATED PRESS, 2021)

    Your Bibliography: NPR - THE ASSOCIATED PRESS, 2021. Apple Will Scan U.S. iPhones For Images Of Child Sexual Abuse. [online] Available at: <https://www.npr.org/2021/08/06/1025402725/apple-iphone-for-child-sexual-abuse-privacy> [Accessed 15 July 2022].

  • Website

    3 Ways Predictive Analytics Can Boost Your Cybersecurity l Sisense

    2022 - Sisense Inc

    In-text: (3 Ways Predictive Analytics Can Boost Your Cybersecurity l Sisense, 2022)

    Your Bibliography: Sisense. 2022. 3 Ways Predictive Analytics Can Boost Your Cybersecurity l Sisense. [online] Available at: <https://www.sisense.com/blog/3-ways-predictive-analytics-can-boost-cybersecurity/> [Accessed 16 July 2022].

  • Website

    how are computer crimes driven changes in information technology security?

    2022 - nstec.com

    In-text: (how are computer crimes driven changes in information technology security?, 2022)

    Your Bibliography: Technology Network Security Information Tech News Guides VPN. 2022. how are computer crimes driven changes in information technology security?. [online] Available at: <https://www.nstec.com/information/information-security/how-are-computer-crimes-driven-changes-in-information-technology-security/#qa_9> [Accessed 12 July 2022].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join