Page 13 - مجلة التنوير العدد الخامس
P. 13
لجنة الفلسفة وعلم الاجتماع والأنثروبولوجيا المجلس الأعلى للثقافة
zenodo.495762.p.,4 15. Jaishankar, K. (2011). Introduction /
Conclusion. In K. Jaishankar (Ed.),
3. Ngo, F., & Jaishan- Cyber criminology: Exploring Internet
crimes and criminal behavior (pp. xxvii–
kar, K. (2017). Special ar- xxxv and pp. 411414-). Boca Raton,
FL: CRC Press.
ticle: Commemorating a
16. Jaishankar, K., & Chandra, R.R.
Decade in Existence of the (2017). Space Transition Theory of
Cyber Crimes. Module 23, e-Pathsala,
International Journal of Cy- University Grants Com-mission.
Retrieved from http://epgp.inibnet.
ber Cri-minology: A Re- ac.in/ahl.php?csr-no=1608.
search Agenda to Advance 1. Kethineni, S., Cao,
Y., & Dodge, C. (2017). Use
the Scholarship on Cyber of Bitcoin in Darknet Markets:
Examining
Crime. International Journal
2. Ngo, F., & Jaishan-
of Cyber Criminology, 11(1), kar, K. (2017). Special ar-
ticle: Commemorating a
1–9. http://doi.org/10.5281/ Decade in Existence of the
International Journal of Cy-
zenodo.495762. ber Cri-minology: A Re-
search Agenda to Advance
4. Suler, J. (2005). the Scholarship on Cyber
Crime. International Journal
The Psychology of Cyber- of Cyber Criminology, 11(1),
1–9. http://doi.org/10.5281/
space. Retrieved on March
15, 2017 from Technol-
ogy-enabled Offenses.
Abingdon, Oxon: Routledge
5. Zhang, X. H. (2009).
An Exploration of Student
Teachers’ Interaction with
on-line activities, and their
influence on their teaching
topics such as netiquette and
cyber-bullying: An Australian
and Chinese Study. Doctor-
al Thesis submitted to the
Griffith University, Austra-
lia. Retrieved from https://
www120.secure.griffith.edu.
au/rch/file/cf7a4f3e-5132-
1570-f88e-8efd334cf8d1/1/
Zhang_2001_02Thesis.
13