References
- Ahmed, A., & Khan, D. S. (2015). Cyber Security Issues and Ethical Hacking in Pakistan. Department of Computer Science Karachi University.
- Al-Hamami, A. H., & Al-Sadoon, G. M. (2014). Handbook of Research on Threat Detection and Coutermeasures in Network Security: Advances in Information Security, Privacy and Ethics. Hersley: IGI Global.
- Alkaabi, A., Mohay, G., McCullagh, A., & Chantier, N. (2010). Dealing with the Problem of Cybercrime. Digital Forensics and Cyber Crime: Second International ICST Conference (pp. 14-15). Abu Dhabi: Springer Science & Business Media.
- Bandura, A. (1977). Social Learning Theory. Eaglewood Cliffs, NJ: Prentice Hall.
- Bansal, D., Sofat, S., Harsha, S., & Saluja, S. (2011, June). Current Trends in Internet Usage and Cyber Crimes against Youth. International Journal of Cyber Society and Education, IV(1), 55-62
- Batke, K. (2011, December 21). 7 types of cyber crimes and criminals. Retrieved March 17, 2015 from Faronics https://www.faronics.com/news/blog/7-types-of-cyber-criminals
- Bhakare, J. (2013). Sexual exploitation of children over the Internet - International perspectives. SASCV 2013 Proceedings (pp. 396-399). K. Jaishankar.
- Citron, D. K. (2014). Hate Crimes in Cyberspace. Cambridge, Massachuetts, London: Harvard University Press
- EC-Council. (2009). Computer Forensics: Investigating Network Intrusions and Cyber Crime. Cengage Learning
- Kumar, T., Jha, R. k., & Ray, S. M. (2012, October). Cyber Crime And Thier Solution. International Journal Of Engineering And Computer Science, I(1), 48-52.
- liao, x. (2006). central asia and china,s energy security. china and eurasian quarterly, 62.
- Maniscalchi, J. (2010, October 4). The Human Impact of Cyber Crime. Retrieved 12 14, 2015, from Digital Threat http://www.digitalthreat.net/2010/10/the-human-impact-of-cyber- crime
- Nirmala, M., & Kumar, K. N. (2010, September-October). A Survey on Methodologies and Techniques for Detection and Prevention of Phishing. International Journal of Advanced Research in Computer Science, I(3).
- NR3C. (2015). Cyber Crime. Retrieved March 17, 2015, from National Response Centre for Cyber Crime http://www.nr3c.gov.pk/cybercrime.html
- Opala, O. J., & Rahman, S. M. (2013, September). Corporate Role in Protecting Consumers from the Rist of Identity Theft. International Journal of Computer Networks & Communications, V(5), 19-33
- Panda Security. (2018, August 20). Types of Cybercrimes. Retrieved from Panda Security https://www.pandasecurity.com/mediacenter/panda-security/types-of-cybercrime/
- Shalhoub, Z. K., & Al-Qasimi, S. L. (2010). Cyber Law and Cyber Security in Developing and Emerging Economies. Edward Elgar Publishing.
- Trout, B. J. (2007). Cyber Law: A legal arsenal for online businesses. World Audience Inc
- USAID. (2015). Cyber Crime: Its impact on Government, Society an the Prosecutor. Retrieved December 16, 2015, from http://pdf.usaid.gov/pdf_docs/Pnada641.pdf
- Vazquez, C. I. (2006). Cyber crime, the internet and its impact on the business enterprise and the role of the technology manager. Capstone Project, University of Denver.
- Villiers, M. d. (2011). Enabling Technologies of Cyber Crime: Why Lawyers Need to Understatand IT. Pittsburgh Journal of Technology Law and Policy, 01-53.
- Wall, D. S. (2007). Cybercrime: The Transformation of Crime in the Information Age Crime and society series. Cambridge: Polity Press
- Ahmed, A., & Khan, D. S. (2015). Cyber Security Issues and Ethical Hacking in Pakistan. Department of Computer Science Karachi University.
- Al-Hamami, A. H., & Al-Sadoon, G. M. (2014). Handbook of Research on Threat Detection and Coutermeasures in Network Security: Advances in Information Security, Privacy and Ethics. Hersley: IGI Global.
- Alkaabi, A., Mohay, G., McCullagh, A., & Chantier, N. (2010). Dealing with the Problem of Cybercrime. Digital Forensics and Cyber Crime: Second International ICST Conference (pp. 14-15). Abu Dhabi: Springer Science & Business Media.
- Bandura, A. (1977). Social Learning Theory. Eaglewood Cliffs, NJ: Prentice Hall.
- Bansal, D., Sofat, S., Harsha, S., & Saluja, S. (2011, June). Current Trends in Internet Usage and Cyber Crimes against Youth. International Journal of Cyber Society and Education, IV(1), 55-62
- Batke, K. (2011, December 21). 7 types of cyber crimes and criminals. Retrieved March 17, 2015 from Faronics https://www.faronics.com/news/blog/7-types-of-cyber-criminals
- Bhakare, J. (2013). Sexual exploitation of children over the Internet - International perspectives. SASCV 2013 Proceedings (pp. 396-399). K. Jaishankar.
- Citron, D. K. (2014). Hate Crimes in Cyberspace. Cambridge, Massachuetts, London: Harvard University Press
- EC-Council. (2009). Computer Forensics: Investigating Network Intrusions and Cyber Crime. Cengage Learning
- Kumar, T., Jha, R. k., & Ray, S. M. (2012, October). Cyber Crime And Thier Solution. International Journal Of Engineering And Computer Science, I(1), 48-52.
- liao, x. (2006). central asia and china,s energy security. china and eurasian quarterly, 62.
- Maniscalchi, J. (2010, October 4). The Human Impact of Cyber Crime. Retrieved 12 14, 2015, from Digital Threat http://www.digitalthreat.net/2010/10/the-human-impact-of-cyber- crime
- Nirmala, M., & Kumar, K. N. (2010, September-October). A Survey on Methodologies and Techniques for Detection and Prevention of Phishing. International Journal of Advanced Research in Computer Science, I(3).
- NR3C. (2015). Cyber Crime. Retrieved March 17, 2015, from National Response Centre for Cyber Crime http://www.nr3c.gov.pk/cybercrime.html
- Opala, O. J., & Rahman, S. M. (2013, September). Corporate Role in Protecting Consumers from the Rist of Identity Theft. International Journal of Computer Networks & Communications, V(5), 19-33
- Panda Security. (2018, August 20). Types of Cybercrimes. Retrieved from Panda Security https://www.pandasecurity.com/mediacenter/panda-security/types-of-cybercrime/
- Shalhoub, Z. K., & Al-Qasimi, S. L. (2010). Cyber Law and Cyber Security in Developing and Emerging Economies. Edward Elgar Publishing.
- Trout, B. J. (2007). Cyber Law: A legal arsenal for online businesses. World Audience Inc
- USAID. (2015). Cyber Crime: Its impact on Government, Society an the Prosecutor. Retrieved December 16, 2015, from http://pdf.usaid.gov/pdf_docs/Pnada641.pdf
- Vazquez, C. I. (2006). Cyber crime, the internet and its impact on the business enterprise and the role of the technology manager. Capstone Project, University of Denver.
- Villiers, M. d. (2011). Enabling Technologies of Cyber Crime: Why Lawyers Need to Understatand IT. Pittsburgh Journal of Technology Law and Policy, 01-53.
- Wall, D. S. (2007). Cybercrime: The Transformation of Crime in the Information Age Crime and society series. Cambridge: Polity Press
Cite this article
-
APA : Munir, A., & Shabir, G. (2018). Social Media and Cyber Crimes in Pakistan: Facts, Propaganda, Awareness, and Legislation. Global Political Review, III(II), 84-97. https://doi.org/10.31703/gpr.2018(III-II).09
-
CHICAGO : Munir, Asad, and Ghulam Shabir. 2018. "Social Media and Cyber Crimes in Pakistan: Facts, Propaganda, Awareness, and Legislation." Global Political Review, III (II): 84-97 doi: 10.31703/gpr.2018(III-II).09
-
HARVARD : MUNIR, A. & SHABIR, G. 2018. Social Media and Cyber Crimes in Pakistan: Facts, Propaganda, Awareness, and Legislation. Global Political Review, III, 84-97.
-
MHRA : Munir, Asad, and Ghulam Shabir. 2018. "Social Media and Cyber Crimes in Pakistan: Facts, Propaganda, Awareness, and Legislation." Global Political Review, III: 84-97
-
MLA : Munir, Asad, and Ghulam Shabir. "Social Media and Cyber Crimes in Pakistan: Facts, Propaganda, Awareness, and Legislation." Global Political Review, III.II (2018): 84-97 Print.
-
OXFORD : Munir, Asad and Shabir, Ghulam (2018), "Social Media and Cyber Crimes in Pakistan: Facts, Propaganda, Awareness, and Legislation", Global Political Review, III (II), 84-97
-
TURABIAN : Munir, Asad, and Ghulam Shabir. "Social Media and Cyber Crimes in Pakistan: Facts, Propaganda, Awareness, and Legislation." Global Political Review III, no. II (2018): 84-97. https://doi.org/10.31703/gpr.2018(III-II).09