Author of the publication

A Comparison of Cyber-Crime Definitions in India and the United States.

, , and . Cyber Security, Cyber Crime and Cyber Forensics, IGI Global, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Matching intermediaries for information goods in the presence of direct search: an examination of switching costs and obsolescence of information., , , and . Decis. Support Syst., 41 (1): 20-36 (2005)Workshop: Using Virtual Machine Labs for the Data Comm Class., , and . AMCIS, Association for Information Systems, (2021)RQ Labs: A Cybersecurity Workforce Talent Program Design., , and . SKM, volume 1549 of Communications in Computer and Information Science, page 171-185. Springer, (2021)Choice of Information: A Study of Twitter News Sharing during the 2009 Israel-Gaza Conflict., , , and . ICIS, Association for Information Systems, (2011)Survelliance monitoring based routing optimization for wireless sensor networks., , , , , , and . Wirel. Networks, 30 (6): 6069-6087 (August 2024)A conceptual approach to information security in financial account aggregation., , , , and . ICEC, volume 60 of ACM International Conference Proceeding Series, page 619-626. ACM, (2004)A comparison of B2B e-service solutions., , , and . Commun. ACM, 46 (12): 317-324 (2003)Message diffusion through social network service: The case of rumor and non-rumor related tweets during Boston bombing 2013., , and . Inf. Syst. Frontiers, 17 (5): 997-1005 (2015)Design and Evaluation of Agent-Based Negotiation Heuristic for Online Negotiations., and . ICEIS (4), page 92-97. (2004)Information control and terrorism: Tracking the Mumbai terrorist attack through twitter, , and . Information Systems Frontiers, 13 (1): 33--43 (2011)