REFERENCES
- Kshetri, N. (2013). Cybercrime and cybersecurity in the global south. Basingstoke, UK: Palgrave Macmillan.
- Kshetri, N. (2014). China’s data privacy regulations: A tricky trade-off between ICT’s productive utilization and cyber-control. IEEE Security & Privacy, 12(4), 38–45. doi:10.1109/MSP.2013.105
- Kshetri, N. (2015). India’s cybersecurity landscape: The roles of the private sector and public-private partnership. IEEE Security & Privacy, 13(3), 16–23.
- Leyden, J. (2010). Russian trade body aims to fight cybercrime: Russia no safe haven for spammers and cybercriminals. Retrieved from http://www.theregister.co.uk/2010/04/12/russia_cybercrime_feature/
- Nolen, S. (2012, June 13). India’s IT revolution doesn’t touch a government that runs on paper. The Globe and Mail (Canada), A1, para. 5.
- Personal Data Protection. (2012, April 6). [Editorial]. China Daily. Retrieved from http://www.chinadaily.com.cn/opinion/2012-04/06/content_14987674.htm//website/
- Symantec Corporation. (2011). Norton Cybercrime Report 2011: The Shocking Scale of Cybercrime. Mountain View, CA: Author. Retrieved from http://www.symantec.com/content/en/us/home_homeoffice/html/cybercrimereport/
- Symantec Corporation. (2013). 2013 Norton Report. Mountain View, CA: Author. Retrieved from http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=norton-report-2013
- Stankey, R. ( 2014). Brazil enacts “Internet Bill of Rights,” including net neutrality and privacy protections. Retrieved from http://www.jdsupra.com/legalnews/brazil-enacts-internet-bill-of-rights-36906/
- Stuenkel, O. (2012, August 12). Keep BRICS and IBSA separate. The Diplomat. Retrieved from http://thediplomat.com/the-editor/2012/08/13/keep-the-brics-and-ibsa-seperate/
- Yao, Z. Z. (2014, April 7). Role of emerging economies. China Daily. Retrieved from http://usa.chinadaily.com.cn/opinion/2014-07/14/content_17756717.htm