Page 39 - ISCI’2017
P. 39

References


            [1]  Angela Moscaritolo (2009). Medical data leakage rampant on P2P networks, SC Magazine,

                  Retrieved August 20, 2014, from http://www.scmagazine.com/medical-data-leakage-rampant-
                  on-p2p-networks/article/127216/.

            [2]  Ansoff I. Strategicheskoe upravlenie / I. Ansoff. – M. : E`konomika, 1989. – 519 p.
            [3]  Bandurka O. M. Osnоvi ekоnоmichnоi bezpeki: pidruchnik / O. M. Bandurka, V. Ye. Duхоv,

                  K. Ya. Petrоva, I. M. Cherviakоv. – Kh. : Vidavnitstvо Natsiоnalnоhо un-tu vnutrishniх sprav,

                  2003. – 236 p.
            [4]  Campbell, K., Gordon, L. A., Loeb, M. P., Zhou, L. (2003). “The Economic Cost of Publicly

                  Announced Information Security Breaches: Empirical Evidence  from the Stock Market,”
                  Journal of Computer Security, vol. 11, issue 3, pp. 431-448.

            [5]  Chimiris, M. (2013). Computer Crime Research Center. To limit anonymity in the net does not
                  mean to  oppress liberty of speech. Retrieved  August 5, 2013, from  http://www.crime-

                  research.ru/interviews/maxim27/.

            [6]  Council of Europe  -  Documents  database.  (1989).  Recommendation  No.  R(89)9  of  the
                  Committee of Ministers to Member States on  Computer-related Crime (adopted by the

                  Committee of Ministers on 13 September 1989 at the 428th Meeting of the Ministers' Deputies).

                  Retrieved    August    5,   2013,    from    https://wcd.coe.int/com.instranet.InstraServlet?
                  command=com.instranet.CmdBlobGet&InstranetImage=610660&SecMode=1&DocId=7022

                  80&Usage=2.
            [7]  Darlington,  Mwendabai.  (2013).  Zambia  Daily  mail.  Cyber  crime:  threat  to  economies?

                  Retrieved August 5, 2013, from http://www.daily-mail.co.zm/?p=5209.
            [8]  Georg, L., et al. (2009). The value of information security to European banking. Retrieved

                  April, 2011. Available  from www.personal.lse.ac.uk/  LIEBENAU/BankingSecurity

                  DETECOM.doc.
            [9]  Gordon, L. A. (2006). “Economic aspects of  information security:  An emerging  field of

                  research”. In: Gordon, L. A, Loeb P. M., Information Systems Frontiers, Volume 8, Issue 5, pp.
                  335–337.

            [10]  Goykhman, M., Kavun, S. (2014). Evaluation Method of Banking System Stability Based on
                  the  Volume  of  Subsystems.  Journal  of  Finance  and  Economics,  2(4),  118-124. DOI:

                  10.12691/jfe-2-4-3      Available     from:      http://www.sciepub.com/portal/downloads?

                  doi=10.12691/jfe-2-4-3&filename=jfe-2-4-3.pdf.





                                                                                                          39
   34   35   36   37   38   39   40   41   42   43   44