Home | Title Page | Introduction | Background | Legal Consequences | Prevention | Conclusion | References |
B4USurf.org. (2012). Tips on Protecting Your Computer. Retrieved from http://www.b4usurf.org/index.php?page=tips-on-protecting-yourcomputer
This is a reliable source because it is a ".org" and it discusses protecting computers from cyber crimes.
Craig , F. C. (2013, April 13). Downingtown area school district recovers $665,000 from apparent cyber attack. The Tribune-Review , Retrieved from http://triblive.com/news/allegheny/3835809-74/district-downingtown-bank?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed: alltribstories (TribLIVE News)
This is a reliable source because it discusses cyber crimes in schools which affects people my age.
Gilbert, D. ( 2011, August 01). World's largest cyber crime uncovered. Retrieved from http://www.trustedreviews.com/news/world-s-largest-cyber-crime-uncovered
This may not have been as reliable as my other sources but it gave me a clearer aspect of cyber crimes.
Goyal, K. G. (n.d.). Top hackers of the world. (2012). World Top 10, Retrieved from http://worldtop10.net/top-10-hackers-of-the-world
This is a reliable source because it is a ".net" and it provides information about the top ten hackers in the world.
HG.org. (2012). Computer crime law. Retrieved from http://www.hg.org/computer-crime.html, (International Federation of the Phonographic Industry. (2007, October). Why is piracy illegal?. Retrieved from http://www.ifpi.org/content/section_views/why_is_piracy_illegal.html
This is a reliable source because it is a ".org" and it provides infromation about piracy.
Kane, M. ( 2009, May 4). 'iloveyou' e-mail worm invades pcs. Retrieved from http://web.archive.org/web/20081227123742/http:/news.zdnet.com/2100-9595_22-107318.html?legacy=zdnn
This is a reliable source because it provides infromation about a popular global virus that affected multiple countries.
Krasavin, S. (2001, March 20) "What Is Cyber-terrorism?" What Is Cyber-terrorism? N.p., n.d. Web. 14 Apr. 2013 Retrieved from http://www.crime-research.org/library/Cyber-terrorism.htm
This is a reliable source because it clearly defines cyber terrorism and it is a ".org".
Robinson, J. "Internet as the scene of crime". (2001). Forensic Accounting Review and Computer Security Digest, 17(8), 5-8. Retrieved from http://search.proquest.com/docview/197255673?accountid=14541
This is a reliable source because it states what role computers play in cyber-crimes.
Suddath, C. (2009, August 19). Master Hacker Albert Gonzalez. Retrieved from http://www.time.com/time/business/article/0,8599,1917345,00.html
This is a reliable source because it discusses the famous hacker Albert Gonzalez.
All clip art images were obtained from the Microsoft Word 2013. Each image was used in order to evoke the message on each content page.
"Facts About Cyber Crimes"Youtube.com Retrieved from: http://www.youtube.com/watch?feature=player_embedded&v=PIELVMQhvXc
Link to the Terms of Use/Service webpage: Terms of Use/Service