76
Kshetri, N. (2010b). Cloud Computing in Developing Economies: Drivers, Effects and Policy Measures,
Proceedings of the Pacific Telecommunications Council’s (PTC) Annual Conference, Honolulu, HI, January 16-20,
2010.
77
asiaone.com. (2011). Most Shady Online Bank Accounts Bear Chinese Names,
The Yomiuri Shimbun/Asia News
Network
. -
316522.html
78
washingtonpost.com (2012). Global police network Interpol to make war on cyber criminals a priority.May 8.
-
cyber-criminals-a-priority/2012/05/08/gIQARD4RAU_story.html
. Accessed 12 May 2012.
79
Fletcher, O. (2009,August 28).
China Game Boss Sniped Rivals, Took Down Internet
, Retrieved
from
. Accessed 12 May 2012.
80
Guillén, M. F., & Suárez, S. L. (2005). Explaining the global digital divide: Economic, political and sociological drivers
of cross-national internet use.
Social Forces, 84
(2), 681–708.
81
Cetron, M. J., &
Davies, O. (2009). Ten critical trends for cybersecurity.
Futurist, 43
(5):40–49.
82
Havely, J. (2000, February 16). Online’s when states go to cyber-war.
BBC News
.
83
Lunau, K. (2008).
Burma sets its sights on online critics Maclean’s
,
121
(39):51–51
84
foxnews.com 2014a.
85
Risen
, T., 2014a. Companies unprepared as hacking increases,
86
Barker
, I., 2014. How US organizations are losing the cyber war, -
organizations-are-losing-the-cyber-war/
87
Vinton, K., 2014. Hacking gets physical: Utilities at risk for Cyber attacks,

88
Simonite
, T., 2013. Protecting power grids from hackers is a huge challenge,
89
Bennett, C., 2014.Cybersecurity help coming for franchises,
-
cybersecurity-help-coming-for-franchise-owners
90
The Philadelphia Daily News, 2014, For small biz, cybercrime can be deadly, October 15
91
Creswell, J., Perlroth, N., 2014. Ex- employee say Home Depot left data vulnerable,
92
Friedman, A.A., 2013. Cybersecurity and Trade: National Policies, Global and Local Consequences,
Center for
Technology and Innovation at Brookings.
93
Fouquet, H., Mawad, M., 2014.
France demonstrates security savoir faire as it enforces new cyber-security
law
94

You've reached the end of your free preview.
Want to read all 30 pages?
- Fall '15
- NIRKSHETRI
- Computer Security, Security Management, cybercrimes, extrinsically motivated cybercrimes, intrinsically motivated cybercrimes