Review
References
Ahamad M, Amster D, Barrett M, Cross T, Heron G, Jackson D, King J, Lee W, Naraine R, Ollmann G, Ramsey J, Schmidt HA, Traynor P (2008). Emerging Cyber Threats Report for 2009, Georgia Tech Information Security Centre. Georgia Inst. Technol. 9p. |
|
Ajayi EFG (2015). The Challenges to Enforcement of Cybercrimes Laws and Policy. International Journal of Information Security and Cybercrime, 4(2):33-48. Available at: http://www.ijisc.com/year-2015-issue-2-article-4/ |
|
Ajayi EFG (2016). The Impact of Cybercrimes on Global Trade and Commerce. Available at SSRN: |
|
Bassiouni MC (1999). The Sources and Content of International Criminal Law: A Theoretical Framework, 1 International Criminal Law 3-126. 2:353-356 |
|
Centre for Strategic and International Studies (CSIS) (2014). Net Losses - Estimating the global cost of cybercrime. Economic impact of cybercrime II. June 2014. pp. 1-24. Available at: |
|
Chang W, Chung W, Chen H, Chou S (2003). An International Perspective on Fighting Cybercrime,ISI'03 Proceedings of the 1st NSF/NIJ conference on Intelligence and security informatics. pp. 379-384. |
|
Commonwealth, Litigation Practice (1962). Macfoy versus United Africa Company Limited (West Africa). PC 27 NOV 1961 |
|
Convention on Cybercrime (2001). Summary of the treaty, European Convention on cybercrime. Available at: |
|
Encyclopedia of Library and Information Science (1977). The modern age regarded as a time in which information has become a commodity that is quickly and widely disseminated and easily available especially through the use of computer technology. Available at: |
|
Ernst, Young (2003). Fraud: Unmanaged risk. 8th global survey. Global investigations dispute advisory services, South Africa. Available at: |
|
Hawes J (2014). "2013 An Epic Year for data breaches with over 800 Million records lost." Naked Security, February 19, 2014. Available at: |
|
International Telecommunication Union (2009). Understanding Cybercrime: A Guide for Developing Countries, ITU Telecommunication Development Sector. |
|
KPMG (2001). Global efraud Survey, KPMG Forensic and Litigation Services. Available at: |
|
McGuire M, Dowling S (2013). Cyber-crime: A review of the evidence Summary of key findings and implications Home Office Research Report 75, Home Office, United Kingdom, October. 30p. |
|
Miquelon-Weismann MF (2005). The Convention on Cybercrime: A Harmonized Implementation of International Penal Law: What Prospects for Procedural Due Process?, 23 J. Marshall J. Comput. Info. L. 329. |
|
Nicholas CAMQC (2008). Emerging Trends in Cyber Crime, 13th Annual Conference - New Technologies in Crime and Prosecution: Challenges and Opportunities, International Association of Prosecutors, Singapore. Available at: |
|
Oxford Dictionary of Law (2002). Oxford Dictionary of Law 5th Edition p. 132, 149. Available at: |
|
Paganini P (2013). InfoSec Institute 2013 Cost of cybercrimes |
|
Sieber U (1997). Memorandum on a European Model Penal Code. P. 2. |
|
United Nations Office On Drugs And Crime (2014). United Nations Convention Against Corruption. Available at: View. |
|
Uniterd Nation Human Right (2005). Ratification of the Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment. Available at: |
|
Uniterd nations educational scientific and cultural organization (1954). Convention for the Protection of Cultural Property in the Event of Armed Conflict with Regulations for the Execution of the Convention 1954. The Hague, 14 May 1954. Available at: |
Copyright © 2025 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0