1 |
Hill, J. B., & Marion, N. E. (2016). Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century. Westport, CT: Praeger Publishers.
|
2 |
Agnew, R. (1992). Foundation for a general strain theory of crime and delinquency. Criminology, 30(1), 47-88.
DOI
|
3 |
Ali, L., Ali, F., Surendran, P., & Thomas, B. (2017). The effects of cyber threats on customer's behaviour in e-Banking services. International Journal of e-Education, e-Business, e-Management and e-Learning, 7(1), 70-78.
DOI
|
4 |
Baker, P., & Glasser, S. (2005). Kremlin rising: Vladimir Putin's Russia and the end of revolution. New York, NY: Scribner.
|
5 |
Bandura, A., Ross, D., & Ross, S. A. (1963). Vicarious reinforcement and imitative learning. The Journal of Abnormal and Social Psychology, 67(6), 601-607.
DOI
|
6 |
Carmines, E. G., & Zeller, R. A. (1979). Reliability and validity assessment. Thousand Oaks, CA: Sage Publications.
|
7 |
Cascavilla, G., Tamburri, D.A., and Van Den Heuvel, W.-J. (2021), Cybercrime threat intelligence: A systematic multi-vocal literature review, Computers and Security, 1-29.
|
8 |
Chen, C. W. (2014). Are workers more likely to be deviant than managers? A cross-national analysis. Journal of Business Ethics, 123(2), 221-233.
DOI
|
9 |
Gordon, L.A. & Loeb, M.P. (2003). A Framework for Using Insurance for Cyber-Risk Management. Communications of the ACM, 46(3), 81-85.
DOI
|
10 |
Johanson, G. A., & Brooks, G. P. (2010). Initial scale development: sample size for pilot studies. Educational and psychological measurement, 70(3), 394-400.
DOI
|
11 |
Krishna V. V., & Purandare, P. A Qualitative Research on the Impact and Challenges of Cybercrimes (2021), Journal of Physics: Conference Series, 1-12.
|
12 |
Lakomski, G. (2001). Organizational change, leadership and learning: culture as cognitive process. International Journal of Educational Management. 79-88.
|
13 |
Lowry, R. (2014). Concepts and applications of inferential statistics. Computer Science.
|
14 |
Maslina D., Rajah R., Mary G., David A. & Govindamal T. (2018). Bridging the gap between organizational practices and cyber security compliance: Can cooperation promote compliance in organizations? International Journal of Business and Society, 19(1), 161-180.
|
15 |
Nachmias, D. (1972). Political alienation and political behavior. Oxfordshire,UK: Routledge.
|
16 |
Nunnally, J. C., & Bernstein, I. H. (1994). Psychometric theory (3rd ed.). NY: McGraw-Hill.
|
17 |
Ponto, J. (2015). Understanding and evaluating survey research. Journal of the advanced practitioner in oncology, 6(2), 168-171.
|
18 |
Rameli, M. N. F., Mohd-Sanusi, Z., Mat-Isa, Y., & Omar, N. (2013). Fraud occurrences in bank branches: The importance of internal control and risk management. The 5th International Conference on Financial Criminology (ICFC). (p. 77-89). May 28-29, Kuala Lumpur, Malaysia.
|
19 |
Rubin, D. S., & Levin, R. I. (1998). Statistics for management. Language, 16(1026p), 25.
|
20 |
Singh, J., & Singh, H. (2012). Continuous improvement approach: state-of-art review and future implications. International Journal of Lean Six Sigma. 3 (2), 88-111.
DOI
|
21 |
Siyanda Dlamini & Candice Mbambo (2019). Understanding policing of cyber-crime in South Africa: The phenomena, challenges and effective responses, Cogent Social Sciences, 5:1, DOI: 10.1080/23311886.2019.1675404
DOI
|
22 |
Suter, W. N. (2012). Qualitative data, analysis, and design. Introduction to educational research: A critical thinking approach, 2, 342-386.
DOI
|
23 |
Xu, J., & Gordon, J. I. (2003). Honor thy symbionts. Proceedings of the National Academy of Sciences, 100(18), 0452-10459.
|
24 |
Connelly, L. M. (2008). Pilot studies. Medsurg Nursing, 17(6), 411-412.
|
25 |
Schell, B. H., & Martin, C. (2004). Cybercrime: A reference handbook. Santa Barbara, CA: ABC-CLIO.
|
26 |
Neuman, S. B., & Roskos, K. (1997). Literacy knowledge in practice: Contexts of participation for young writers and readers. Reading Research Quarterly, 32(1), 10-32.
DOI
|
27 |
Mark M., Greg P, & Dikla S, (2006) Self-control depletion and the general theory of crime Journal of Quantitative Criminology, 22, 263-277.
DOI
|
28 |
Check, J., & Schutt, R. K. (2012). Teacher research and action research. Research methods in education, 255-271.
|
29 |
Collins, N. L., & Miller, L. C. (1994). Self-disclosure and liking: a meta-analytic review. Psychological bulletin, 116(3), 457-475.
DOI
|
30 |
Farhana, S. (2020, October 25). The rise of cybercrime in Malaysia - what you need to avoid. Astro AWANI Television Network.
|
31 |
Felson, M., & Cohen, L. E. (2017). Human ecology and crime: A routine activity approach. In Crime Opportunity Theories, (pp. 73-90), Oxfordshire, England: UK.
|
32 |
Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Palo Alto, CA: Stanford University Press.
|
33 |
Kuder, G. F., & Richardson, M. W. (1937). The theory of the estimation of test reliability. Psychometrika, 2(3), 151-160.
DOI
|
34 |
Gupta, S. (2012). Buffer overflow attack. IOSR Journal of Computer Engineering, 1(1), 10-23.
DOI
|
35 |
Hill, R. (1998). The mathematical theory of plasticity. Oxford,UK: Oxford University press.
|
36 |
Isaac, S., & Michael, W. B. (1995). Handbook in research and evaluation: A collection of principles, methods, and strategies useful in the planning, design, and evaluation of studies in education and the behavioral sciences. Washington, DC: American Psychological Association.
|
37 |
Khalid, K., Abdullah, H. H., & Kumar M, D. (2012). Get along with quantitative research process. International Journal of Research in Management, 79-88.
|
38 |
Krejcie, R. V., & Morgan, D. W. (1970). Determining sample size for research activities. Educational and psychological measurement, 30(3), 607-610.
DOI
|
39 |
Raghavan, A. R., & Parthiban, L. (2014). The effect of cybercrime on a Bank's finances. International Journal of Current Research & Academic Review, 2(2), 173-178.
|
40 |
Santoso, Edy (2012), Consumer Protection for Online Banking Scams via e-mail in Malaysia, UUM Journal of Legal Studies, 3, 1-22.
|
41 |
Singleton, R. A., & Straits, B. C. (2012). Survey interviewing. In SAGE handbook of interview research: The complexity of the craft, (pp. 77-98), Newcastle upon Tyne, UK: Sage Publications.
|
42 |
Vladimir. G., (2005). International cooperation in fighting cybercrime. [Online]. Available: https://www.crime-research.org/articles/Golubev0405
|
43 |
Dzomira, S. (2016). Espousal of combined assurance model in South Africa's public sector. Public and Municipal Finance, 5(4), 23-30.
DOI
|