Have a personal or library account? Click to login
Cyber Security Cover

References

  1. [1] Bendovschi, A. (2015). Cyber-Attacks – Trends, Patterns and Security Countermeasures. Procedia Economics and Finance, 24-31. doi:10.1016/S2212-5671(15)01077-10.1016/S2212-5671(15)01077-
  2. [2] Cabaj, K., Kotulski, Z., Księżopolski, B., & Mazurczyk, W. (2018). Cybersecurity: trends, issues, and challenges. EURASIP Journal on Information Security. doi:10.1186/s13635-018-0080-010.1186/s13635-018-0080-0
  3. [3] Dervojeda, K., Verzijl, D., Nagtegaal, F., Lengton, M., & Rouwmaat, E. (2014). Innovative Business Models: Supply chain finance. Netherlands: Business Innovation Observatory; European Union.
  4. [4] Gade, N. R., & Reddy, U. G. (2014). A Study Of Cyber Security Challenges And Its Emerging Trends On Latest Technologies. Retrieved from https://www.researchgate.net/publication/260126665_A_Study_Of_Cyber_Security_Challenges_And_Its_Emerging_Trends_On_Latest_Technologies
  5. [5] Gross, M. L., Canetti, D., & Vashdi, D. R. (2017). Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes. Journal of Cybersecurity, 3(1), 49–58. doi:10.1093/cybsec/tyw01810.1093/cybsec/tyw018
  6. [6] Hua, J., & Bapna, S. (2013). The economic impact of cyber terrorism. The Journal of Strategic Information Systems, 22(2), pp. 175-186.10.1016/j.jsis.2012.10.004
  7. [7] Kumar, S., & Somani, V. (2018). Social Media Security Risks, Cyber Threats And Risks Prevention And Mitigation Techniques. International Journal of Advance Research in Computer Science and Management, 4(4), pp. 125-129.
  8. [8] Panchanatham, D. N. (2015). A case study on Cyber Security in E-Governance. International Research Journal of Engineering and Technology.
  9. [9] Samuel, K. O., & Osman, W. R. (2014). Cyber Terrorism Attack of The Contemporary Information Technology Age: Issues, Consequences and Panacea. International Journal of Computer Science and Mobile Computing, 3(5), pp. 1082-1090.
  10. [10] Sharma, R. (2012). Study of Latest Emerging Trends on Cyber Security and its challenges to Society. International Journal of Scientific & Engineering Research, 3(6).
  11. [11] Sreenu, M., & Krishna, D. V. (2017). A General Study on Cyber-Attacks on Social Networks. IOSR Journal of Computer Engineering (IOSR-JCE), 19(5), pp. 01-04.10.9790/0661-1903060104
  12. [12] Sutton, D. (2017). Cyber Security : A Practitioner’s Guide. Swindon, UK: BCS, the Chartered Institute for IT.
DOI: https://doi.org/10.2478/hjbpa-2019-0020 | Journal eISSN: 2067-9785 | Journal ISSN: 2457-5720
Language: English
Page range: 115 - 128
Published on: Aug 21, 2019
In partnership with: Paradigm Publishing Services
Publication frequency: 3 issues per year

© 2019 Rohit Kalakuntla, Anvesh Babu Vanamala, Ranjith Reddy Kolipyaka, published by Association Holistic Research Academic (Hora)
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.