Professional Documents
Culture Documents
References
References
References
Adams, M., & Makramalla, M. (2015). Cybersecurity skills training: an attacker-centric Gamified
approach. Technology Innovation Management Review, 5(1). Retrieved From
http://timreview.ca/article/861 Katelyn A Golladay, The Palgrave handbook of international
cybercrime and cyberdeviance, 981-999, 2020
Ahlmeyer, M., & Chircu, A. M. (2016). Securing the Internet of things: A review. Issues In Information
Systems,17(4).Retrievedfromhttps://pdfs.semanticscholar.org/12bf/f696d912535ab235c4e67a1
e72c39cef2fe2.pdf
Quigley, K., Burns, C., & Stallard, K. (2015). ‘Cyber Gurus’: A rhetorical analysis of the Language of
cybersecurity specialists and the implications for security policy and Critical infrastructure
protection. Government Information Quarterly, 32(2), 108-117. doi:10.1016/j.giq.2015.02.001
Massacci, F., Ruprai, R., Collinson, M., & Williams, J. (2016). Economic impacts of Rules-versus risk-based
cybersecurity regulations for critical infrastructure Providers. IEEE Security & Privacy, 14(3), 52-
60. Doi:10.1109/msp.2016.48
Weinberg, B. D., Milne, G. R., Andonova, Y. G., & Hajjat, F. M. (2015). Internet of Things: Convenience vs.
privacy and secrecy. Business Horizons, 58(6), 615-624. Doi:10.1016/j.bushor.2015.06.005
Wirtz, B. W., & Weyerer, J. C. (2017). Cyberterrorism and cyber attacks in the public Sector: How public
administration copes with digital threats. International Journal of Public Administration, 40(13),
1085-1100
Baccarella, C. V., Wagner, T. F., Kietzmann, J., & McCarthy, I. P. (2018, August 1). Social media? It’s
serious! Understanding the dark side of social media. European Management Journal.
https://doi.org/10.1016/j.emj.2018.07.002
Song, J. T., Song, T. M., Seo, D. C., Jin, D. L., & Kim, J. S. (2017, January 1). Social Big Data Analysis of
Information Spread and Perceived Infection Risk During the 2015 Middle East Respiratory
Syndrome Outbreak in South Korea. Cyberpsychology, Behavior and Social Networking (Print).
El‐Toukhy, S. (2015, March 6). Parsing Susceptibility and Severity Dimensions of Health Risk Perceptions.
Journal of Health Communication. https://doi.org/10.1080/10810730.2014.989342
Federal Trade Commission. (2024, February 5). Federal Trade Commission. https://www.ftc.gov/
McWhirter, J. E., & Hoffman‐Goetz, L. (2016, March 3). Application of the Health Belief Model to U.S.
Magazine Text and Image Coverage of Skin Cancer and Recreational Tanning (2000–2012).
Journal of Health Communication. https://doi.org/10.1080/10810730.2015.1095819
Zaeem, R. N., Manoharan, M., Yang, Y., & Barber, K. S. (2017, March 1). Modeling and analysis of identity
threat behaviors through text mining of identity theft stories. Computers & Security.
https://doi.org/10.1016/j.cose.2016.11.002
Shah, M. H., Ahmed, J., & Soomro, Z. A. (n.d.). Investigating the Identity Theft Prevention Strategies in
M-Commerce. https://eric.ed.gov/?
q=Developing+effective+strategies+in+identity+theft&id=ED571576
Ekoteson, R. (n.d.). Effective Strategies University Information Technology Leaders Use to Prevent or
Mitigate Cyberattack Costs.https://eric.ed.gov/?
q=Developing+effective+strategies+in+identity+theft&id=ED645177
Golladay, K., &Holtfreter, K. (2017). The Consequences of Identity Theft Victimization: An Examination of
Emotional and Physical Health Outcomes.Victims & Offenders, 12(5), 741-760.
Shah, M., Ahmed, J., & Soomro, Z. 2016, December 18. Investigating the Identity Theft Prevention
Strategies in M-Commerce. Teesside University’s Research Portal.
https://research.tees.ac.uk/en/publications/investigating-the-identity-theft-prevention-
strategies-in-m-comme
Thomas, J. E., & Galligher, G. C. (2018). Improving backup system evaluations in Information security risk
assessments to Combat ransomware. Computer and Information Science, 11(1), 14-25.
Social Security Administration. (2015). Identity theft And your social security number. Social Security
Administration. https://www.ssa.gov/pubs/EN-05-10064.pdf
FBI Law Enforcement Bulletin. (2015, April 8). Hate crime Victimization statistics (Bulletin Report).
https://leb.fbi.Gov/2015/april/bulletin-reports
Susan Helser, Mark I Hwang. (2021)International Journal of Cyber Research and Education (IJCRE) 3 (1),
65-77
Katelyn A Golladay, The Palgrave handbook of international cybercrime and cyberdeviance, 981-999,
2020
Social Security Administration. (2015). Identity theft And your social security number. Social Security
Administration. https://www.ssa.gov/pubs/EN-05-10064.pdf
N., & hreflibrarian. (n.d.). all draft.docx. Scribd. Retrieved 2012, from
https://www.scribd.com/document/333373406/all-draft-docx
FBI Law Enforcement Bulletin. (2015, April 8). Hate crime Victimization statistics (Bulletin Report).
https://leb.fbi.Gov/2015/april/bulletin-reports
Susan Helser, Mark I Hwang (2021) International Journal of Cyber Research and Education (IJCRE) 3 (1),
65-77
Helser, Susan, and Mark I. Hwang. “Identity Theft: A Review of Critical Issues.” IJCRE vol.3, no.1 2021:
pp.65-77. http://doi.org/10.4018/IJCRE.2021010107
USPIS, 2017
Harrell, 2019
Bradbury, 2015
Moti Zwilling, Galit Klien, Dušan Lesjak, Łukasz Wiechetek, Fatih Cetin & Hamdullah Nejat Basim (2022)
Cyber Security Awareness, Knowledge and Behavior: A Comparative Study, Journal of Computer
Information Systems, 62:1, 82-97, DOI: 10.1080/08874417.2020.1712269
Moallem, A. (2019). Cyber Security Awareness Among College Students. In: Ahram, T., Nicholson, D.
(eds) Advances in Human Factors in Cybersecurity. AHFE 2018. Advances in Intelligent Systems
and Computing, vol 782. Springer, Cham. https://doi.org/10.1007/978-3-319-94782-2_8
Choi, J., Han, S., & Hicks, R. D. (2022, June 30). Exploring Gender Disparity in Capable Guardianship
Against Identity Theft: A Focus on Internet-Based Behavior. International Journal of Criminal
Justice. https://doi.org/10.36889/ijcj.2022.002
K. Thakur, M. Qiu, K. Gai and M. L. Ali, “An Investigation on Cyber Security Threats and Security Models,”
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, New York, NY,
USA, 2015, pp. 307-311, doi: 10.1109/CSCloud.2015.71
Kong, A. Y., Myers, A., Isgett, L. F., & Ribisl, K. M. (2020, March 1). Neighborhood racial, ethnic, and
income disparities in accessibility to multiple tobacco retailers: Mecklenburg County, North
Carolina, 2015. Preventive Medicine Reports.
Sabillón, R., Serra-Ruiz, J., Cavaller, V., & Cano, J. M. J. (2019, July 1). An Effective Cybersecurity Training
Model to Support an Organizational Awareness Program. Journal of Cases on Information
Technology. https://doi.org/10.4018/jcit.2019070102
Chohan, R. (2016). ‘An evaluation of inter-organisational identity theft knowledge sharing practice In the
UK retail sector’, PhD thesis published by University of Central Lancashire.
Indu, I., Anand, P. M. R., & Bhaskar, V. (2018, August 1). Identity and access management in cloud
environment: Mechanisms and challenges. Engineering Science and Technology, an
International Journal. https://doi.org/10.1016/j.jestch.2018.05.010
HUAN LIU, Arizona State Univesity, USA. ACM Trans. Web, Vol. 9, No. 4, Article 39. Publication date: July
2018.
Abokhodair , N., Vieweg, S., (2016). Privacy & social media in the context of the Arab Gulf. Proceedings
of the 2016 ACM conference on designing interactive systems, 672-683, 2016.
Harrell, E. (2019). Victims of Identity Theft, 2016. Washington, DC: US Depart-
Pascual, A., Marchini, K., & Miller, S. (2018). 2018 Identity fraud: fraud enters a new
Tarmo K., Marek T., Pille U.H. (2019). Risks and societal implications of identity theft. Electronic
Governance and Open Society: Challenges in Eurasia: 5th International Conference, EGOSE 2018,
St. Petersburg, Russia, November 14-16, 2018, Revised Selected Papers 5 …, 2019.