Cybercrime is a form of criminal behavior which uses any type electronic device through internet connection service which enables a criminal behavior being carried out, whether it involves an individual or a group of people and is able to transcend limitation from one country to another, in periods that are short and without reserved limitation. Cybercrime causes loss or damage to the equipment, data and information that involves a computer’s software or processing; whether from a virus attack, invasion (unauthorized access and use) and information theft on a computer or electronic device that becomes the target. The present paper presents the review literature on cyber crime, certain forms of cyber offences and some suggestions and steps to tackle cyber crimes.
Agarwal, Rohit. CYBER CRIME AGAINST WOMEN AND REGULATIONS IN INDIA. 2013. Available at: <http://www.tmu.ac.in/gallery/viewpointsdcip2013/pdf/track4/t-403.pdf>.
Ahmad Shawal A. 2012. Facebook, Manfaat atau Mudharat. In. Melati Sabtu (Ed,), Penulisan Ilmiah Kolej Komuniti Temerloh. Temerloh: UPeN, KKTM.
Anita A. R. dan Nazura A. M. 2004. Jenayah Berkaitan Dengan Komputer Perspektif Undang-Undang Malaysia. Kuala Lumpur: Dewan Bahasa dan Pustaka.
Duggal ,Pavan(2009).Cyberlaw:The Indian Perspective, New Delhi: Saakshar Law Publications.
Ghosh, Sumit (2010). Cyber crimes: A Multidisciplinary Analysis,New york:Springer Publications.
Halder, Debarati and K. Jaishankar. CYBER VICTIMIZATION IN INDIA. A Baseline Survey Report. Tamil Nadu: Centre for Cyber Victim Counselling, 2010: 1-22.Available at: http://www.cybervictims.org/CCVCresearchreport2010.pdf
HalDer, Debarati and Karuppannan JaishanKar. “Cyber Socializing and Victimization of Women.” September 2009: 5-26. Available at: <http://www.doiserbia.nb.rs/img/doi/1450-6637/2009/1450-66370903005H.pdf>.
http://cirjah.com/ojs/index.php/JAH/article/download/85/pdf_30.
Jalaluddin A. M. 2008. Siber Urbanisme: Pemikiran Melayu Tentang Bandar Pintar. Sari, (26), 111-125.
Jameson ,Fredric(2003). Postmodernism, or, The cultural logic of late capitalism,USA:Duke University Press
Jewkes ,Yvonne(2006).Crime Online, Canada: William Publishing.
Mali, Adv. Prashant. IT Act 2000: Types of Cyber Crimes & Cyber Law in India-Part 1. December2011.Availableat:<http://www.csiindia.org/c/document_library/get_file?uuid=047c826d-171c-49dc-b71b 4b434c5919b6&groupId=10157>.
Moore, Alexis A. 12 Tips to Protect Yourself From Cyberstalking. 8 January 2009.Available at: <http://womensissues.about.com/od/violenceagainstwomen/a/CyberPrevention.htm>.
McQuade,C.Samuel(2008).Understanding and Managing cybercrime,Boston:Allyn and Bacon.
Pennelli, Paul. Cyberstalking Awareness: Protect Yourself On-Campus and Beyond With These 7 Steps. 31 January 2012. Available at: <http://blog.gradguard.com/2012/01/cyberstalking-awareness-protect-yourself-on-campus-and-beyond-with-these-7-steps/>.
Rusli H. A. et al. 2003. Teknologi Maklumat dan Penggunaannya. Petaling Jaya: Prentice Hall Pearson Malaysia Sdn. Bhd.
Termimi, M. A. A., Rosele, M. I., Meerangani, K. A., Marinsah, S. A., & Ramli, M. A. (2015).
Women‘s Involvement in Cybercrime: A Premilinary Study.JOURNAL OF ADVANCES IN HUMANITIES, 3(3), 266-270.
Wall, David (2004).Cybercrimes and Internet,New York: Barnes & Noble.
www.dell.com/…/top_10_steps_to_protect_against_cybercrime_dell_en.