These are the sources and citations used to research 6-1 Discussion: Computer Crimes. This bibliography was generated on Cite This For Me on
In-text: (FOX 5 Atlanta Digital Team, 2022)
Your Bibliography: FOX 5 Atlanta Digital Team, 2022. Child porn, 'pedophile manual' found encrypted on man's electronic devices, investigators say. [online] Available at: <https://www.fox5atlanta.com/news/peachtree-city-man-coweta-coutny-porn-arrest> [Accessed 15 July 2022].
In-text: (How data mining techniques can be used in cyber security solutions, 2021)
Your Bibliography: How data mining techniques can be used in cyber security solutions. 2021. How data mining techniques can be used in cyber security solutions. [online] Available at: <https://www.nec.co.nz/market-leadership/publications-media/how-data-mining-techniques-can-be-used-in-cyber-security-solutions/> [Accessed 16 July 2022].
In-text: (NPR - THE ASSOCIATED PRESS, 2021)
Your Bibliography: NPR - THE ASSOCIATED PRESS, 2021. Apple Will Scan U.S. iPhones For Images Of Child Sexual Abuse. [online] Available at: <https://www.npr.org/2021/08/06/1025402725/apple-iphone-for-child-sexual-abuse-privacy> [Accessed 15 July 2022].
In-text: (3 Ways Predictive Analytics Can Boost Your Cybersecurity l Sisense, 2022)
Your Bibliography: Sisense. 2022. 3 Ways Predictive Analytics Can Boost Your Cybersecurity l Sisense. [online] Available at: <https://www.sisense.com/blog/3-ways-predictive-analytics-can-boost-cybersecurity/> [Accessed 16 July 2022].
In-text: (how are computer crimes driven changes in information technology security?, 2022)
Your Bibliography: Technology Network Security Information Tech News Guides VPN. 2022. how are computer crimes driven changes in information technology security?. [online] Available at: <https://www.nstec.com/information/information-security/how-are-computer-crimes-driven-changes-in-information-technology-security/#qa_9> [Accessed 12 July 2022].
10,587 students joined last month!