Investigating Tertiary Students' Perceptions on Internet Security
Abstract
Keywords
References
L. Strazewski. (2005, Sept). Internet security - a growing risk for businesses, [Online]. Available: http://www.roughnotes.com/rnmagazine/2005/september05/09p186.htm
V. G. Cerf, "The Internet at risk," IEEE Internet Computing, vol. 17, no. 2, pp. 3-5, 2013.
T. Greene. (2012, Oct). Microsoft: users trying to get something for nothing wind up with malware, [Online]. Available: http://www.networkworld.com/article/2160543/windows/microsoft--users-trying-to-get-something-for-nothing-wind-up-with-malware.html
P. M. Odell, K. O. Korgen, P. Schumacher, and M. Delucchi, "Internet use among female and male college students," CyberPsychology and Behavior, vol. 3, no. 5, pp. 855-862, 2000.
L. Weinstein and P. G. Neumann, "Inside risks: Internet risks," Communications of the ACM, vol. 43, no. 5, pp. 144, 2000.
M. Russinovich, "Unearthing RootKits," Windows IT Pro, vol. 11, pp. 55-60, 2005.
J. Aycock, Spyware and Adware. Dordrecht: Springer, 2008.
B. Potter, "Wireless hotspots: petri dish of wireless security," Communications of the ACM, vol. 49, no. 6, pp. 50-56, 2006.
G. Walsh and J. Elliott. (2004, Jan 18). Serious female crime increases, Sunday Times, [Online]. Available: http://www.thesundaytimes.co.uk/sto/news/uk_news/article248116.ece
M. Thelwall and K. Kousha, "Academia.edu: social network or academic network?," J. Assoc. Information Science and Technology, vol. 65, no. 4, pp. 721-731, 2014.
B. Leiba, "Aspects of Internet security," IEEE Internet Computing, vol. 16, no. 4, pp. 72-75, 2012.
J. Wagley. (2008). Internet threat management, Security Management, [Online]. Available: http://www.securitymanagement.com/article/internet-threat-management
T. J. Speed, Asset Protection through Security Awareness. Hoboken: Taylor and Francis, 2012.
X. Jiang and Y. Zhou, "A survey of Android malware," in Android Malware. Dordrecht: Springer, 2013, pp. 3-20.
B. Barrett. (2011). German states used malware to spy on their citizens, [Online]. Available: http://gizmodo.com/5848799/german-states-used-malware-to-spy-on-their-citizens
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.