References

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Cites

Adams, M., & Makramalla, M. (2015). Cybersecurity skills training: an attacker-centric Gamified
approach. Technology Innovation Management Review, 5(1). Retrieved From
http://timreview.ca/article/861 Katelyn A Golladay, The Palgrave handbook of international
cybercrime and cyberdeviance, 981-999, 2020

Ahlmeyer, M., & Chircu, A. M. (2016). Securing the Internet of things: A review. Issues In Information
Systems,17(4).Retrievedfromhttps://pdfs.semanticscholar.org/12bf/f696d912535ab235c4e67a1
e72c39cef2fe2.pdf

Quigley, K., Burns, C., & Stallard, K. (2015). ‘Cyber Gurus’: A rhetorical analysis of the Language of
cybersecurity specialists and the implications for security policy and Critical infrastructure
protection. Government Information Quarterly, 32(2), 108-117. doi:10.1016/j.giq.2015.02.001

Massacci, F., Ruprai, R., Collinson, M., & Williams, J. (2016). Economic impacts of Rules-versus risk-based
cybersecurity regulations for critical infrastructure Providers. IEEE Security & Privacy, 14(3), 52-
60. Doi:10.1109/msp.2016.48

Weinberg, B. D., Milne, G. R., Andonova, Y. G., & Hajjat, F. M. (2015). Internet of Things: Convenience vs.
privacy and secrecy. Business Horizons, 58(6), 615-624. Doi:10.1016/j.bushor.2015.06.005

Wirtz, B. W., & Weyerer, J. C. (2017). Cyberterrorism and cyber attacks in the public Sector: How public
administration copes with digital threats. International Journal of Public Administration, 40(13),
1085-1100

Official Site | NortonTM – Antivirus & Anti-Malware Software. (n.d.). https://asia.norton.com/

Baccarella, C. V., Wagner, T. F., Kietzmann, J., & McCarthy, I. P. (2018, August 1). Social media? It’s
serious! Understanding the dark side of social media. European Management Journal.
https://doi.org/10.1016/j.emj.2018.07.002

Song, J. T., Song, T. M., Seo, D. C., Jin, D. L., & Kim, J. S. (2017, January 1). Social Big Data Analysis of
Information Spread and Perceived Infection Risk During the 2015 Middle East Respiratory
Syndrome Outbreak in South Korea. Cyberpsychology, Behavior and Social Networking (Print).

El‐Toukhy, S. (2015, March 6). Parsing Susceptibility and Severity Dimensions of Health Risk Perceptions.
Journal of Health Communication. https://doi.org/10.1080/10810730.2014.989342

Federal Trade Commission. (2024, February 5). Federal Trade Commission. https://www.ftc.gov/

McWhirter, J. E., & Hoffman‐Goetz, L. (2016, March 3). Application of the Health Belief Model to U.S.
Magazine Text and Image Coverage of Skin Cancer and Recreational Tanning (2000–2012).
Journal of Health Communication. https://doi.org/10.1080/10810730.2015.1095819

Zaeem, R. N., Manoharan, M., Yang, Y., & Barber, K. S. (2017, March 1). Modeling and analysis of identity
threat behaviors through text mining of identity theft stories. Computers & Security.
https://doi.org/10.1016/j.cose.2016.11.002
Shah, M. H., Ahmed, J., & Soomro, Z. A. (n.d.). Investigating the Identity Theft Prevention Strategies in
M-Commerce. https://eric.ed.gov/?
q=Developing+effective+strategies+in+identity+theft&id=ED571576

Ekoteson, R. (n.d.). Effective Strategies University Information Technology Leaders Use to Prevent or
Mitigate Cyberattack Costs.https://eric.ed.gov/?
q=Developing+effective+strategies+in+identity+theft&id=ED645177

Golladay, K., &Holtfreter, K. (2017). The Consequences of Identity Theft Victimization: An Examination of
Emotional and Physical Health Outcomes.Victims & Offenders, 12(5), 741-760.

Shah, M., Ahmed, J., & Soomro, Z. 2016, December 18. Investigating the Identity Theft Prevention
Strategies in M-Commerce. Teesside University’s Research Portal.
https://research.tees.ac.uk/en/publications/investigating-the-identity-theft-prevention-
strategies-in-m-comme

Thomas, J. E., & Galligher, G. C. (2018). Improving backup system evaluations in Information security risk
assessments to Combat ransomware. Computer and Information Science, 11(1), 14-25.

Social Security Administration. (2015). Identity theft And your social security number. Social Security

Administration. https://www.ssa.gov/pubs/EN-05-10064.pdf

FBI Law Enforcement Bulletin. (2015, April 8). Hate crime Victimization statistics (Bulletin Report).
https://leb.fbi.Gov/2015/april/bulletin-reports

Susan Helser, Mark I Hwang. (2021)International Journal of Cyber Research and Education (IJCRE) 3 (1),
65-77

Katelyn A Golladay, The Palgrave handbook of international cybercrime and cyberdeviance, 981-999,
2020

Social Security Administration. (2015). Identity theft And your social security number. Social Security
Administration. https://www.ssa.gov/pubs/EN-05-10064.pdf

N., & hreflibrarian. (n.d.). all draft.docx. Scribd. Retrieved 2012, from
https://www.scribd.com/document/333373406/all-draft-docx

FBI Law Enforcement Bulletin. (2015, April 8). Hate crime Victimization statistics (Bulletin Report).
https://leb.fbi.Gov/2015/april/bulletin-reports

Susan Helser, Mark I Hwang (2021) International Journal of Cyber Research and Education (IJCRE) 3 (1),
65-77

Helser, Susan, and Mark I. Hwang. “Identity Theft: A Review of Critical Issues.” IJCRE vol.3, no.1 2021:
pp.65-77. http://doi.org/10.4018/IJCRE.2021010107
USPIS, 2017

Harrell, 2019

Bradbury, 2015

Moti Zwilling, Galit Klien, Dušan Lesjak, Łukasz Wiechetek, Fatih Cetin & Hamdullah Nejat Basim (2022)
Cyber Security Awareness, Knowledge and Behavior: A Comparative Study, Journal of Computer
Information Systems, 62:1, 82-97, DOI: 10.1080/08874417.2020.1712269

Moallem, A. (2019). Cyber Security Awareness Among College Students. In: Ahram, T., Nicholson, D.
(eds) Advances in Human Factors in Cybersecurity. AHFE 2018. Advances in Intelligent Systems
and Computing, vol 782. Springer, Cham. https://doi.org/10.1007/978-3-319-94782-2_8

Choi, J., Han, S., & Hicks, R. D. (2022, June 30). Exploring Gender Disparity in Capable Guardianship
Against Identity Theft: A Focus on Internet-Based Behavior. International Journal of Criminal
Justice. https://doi.org/10.36889/ijcj.2022.002

K. Thakur, M. Qiu, K. Gai and M. L. Ali, “An Investigation on Cyber Security Threats and Security Models,”
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, New York, NY,
USA, 2015, pp. 307-311, doi: 10.1109/CSCloud.2015.71

Kong, A. Y., Myers, A., Isgett, L. F., & Ribisl, K. M. (2020, March 1). Neighborhood racial, ethnic, and
income disparities in accessibility to multiple tobacco retailers: Mecklenburg County, North
Carolina, 2015. Preventive Medicine Reports.

Sabillón, R., Serra-Ruiz, J., Cavaller, V., & Cano, J. M. J. (2019, July 1). An Effective Cybersecurity Training
Model to Support an Organizational Awareness Program. Journal of Cases on Information
Technology. https://doi.org/10.4018/jcit.2019070102

Chohan, R. (2016). ‘An evaluation of inter-organisational identity theft knowledge sharing practice In the
UK retail sector’, PhD thesis published by University of Central Lancashire.

Indu, I., Anand, P. M. R., & Bhaskar, V. (2018, August 1). Identity and access management in cloud
environment: Mechanisms and challenges. Engineering Science and Technology, an
International Journal. https://doi.org/10.1016/j.jestch.2018.05.010

Adrienn, L., (2016). WHAT IS PRIVACY? THE HISTORY AND DEFINITION OF

PRIVACY. Doktoranduszok Országos Szövetsége, 2016.

GHAZALEH B., (2018). Privacy in Social Media: Identification, Mitigation and

Applications. Arizona State Univesity, USA

HUAN LIU, Arizona State Univesity, USA. ACM Trans. Web, Vol. 9, No. 4, Article 39. Publication date: July
2018.

Abokhodair , N., Vieweg, S., (2016). Privacy & social media in the context of the Arab Gulf. Proceedings
of the 2016 ACM conference on designing interactive systems, 672-683, 2016.
Harrell, E. (2019). Victims of Identity Theft, 2016. Washington, DC: US Depart-

ment of Justice, Ofce of Justice Programs, Bureau of Justice Statistics.

https://www.bjs.gov/content/pub/pdf/vit16.pdf. Accessed 5 Dec 2021.

Harrell, E. (2021). Victims of identity theft, 2018. Washington, DC: US Depart-

ment of Justice, Ofce of Justice Programs, Bureau of Justice Statistics.

https://www.bjs.gov/content/pub/pdf/vit16.pdf. Accessed 5 Dec 2021.

Pascual, A., Marchini, K., & Miller, S. (2018). 2018 Identity fraud: fraud enters a new

era of complexity. Javelin Strategy & Research.

Tarmo K., Marek T., Pille U.H. (2019). Risks and societal implications of identity theft. Electronic
Governance and Open Society: Challenges in Eurasia: 5th International Conference, EGOSE 2018,
St. Petersburg, Russia, November 14-16, 2018, Revised Selected Papers 5 …, 2019.

You might also like