Sources

Arctic Wolf. The Fascinating Decade in Cybercrime: 2010-2020. Arctic Wolf. Published February 10, 2020. Accessed May 2, 2024. https://arcticwolf.com/resources/blog/decade-of-cybercrime/

Bhardwaj, A., Sapra, V., Kumar, A., Kumar, N., & Arthi, S. (2020). Why is phishing still successful? Computer Fraud & Security, 2020(9), 15–19. https://doi.org/10.1016/s1361-3723(20)30098-1

Borky JM, Bradley TH. Protecting Information with Cybersecurity. Effective Model-Based Systems Engineering. Published online September 9, 2018:345-404. doi:10.1007/978-3-319-95669-5_10

Cybersecurity history: Hacking & Data breaches. Monroe College. (n.d.). https://www.monroecollege.edu/news/cybersecurity-history-hacking-data-breaches

FBI Internet Crime Report 2023.; 2023:1-34. Accessed May 1, 2024.  https://www.ic3.gov/Media/PDF/AnnualReport/2023_IC3Report.pdf

How hackers took over my computer. The Telegraph. Published October 10, 2014. Accessed May 2, 2024. https://www.telegraph.co.uk/technology/internet-security/11153381/How-hackers-took-over-my-computer.html

Huang, K. T. D. Y., GrierD, D. W. E. B. C., Holt, T. J., Kruegel, C., McCoy, D., Savage, S., & Vigna, G. (2015). Framing dependencies introduced by underground commoditization. In Workshop on the Economics of Information Security.

Hygeia S. Toso C, A. Jumalon AJ, R. Magadan JA, B. Alvarico A, Cuevas Jr JF. Cybercrime Awareness Among Senior High School Students. Mediterranean Journal of Basic and Applied Sciences. 2023;07(02):160-176. doi:10.46382/mjbas.2023.7218

Instagram Security Verification. Ampfluence | #1 Instagram Growth Service. Accessed May 2, 2024. https://www.ampfluence.com/instagram-security-verification/

ITRC Annual Data Breach Report. ITRC. Published January 24, 2024. Accessed May 2, 2024. https://www.idtheftcenter.org/publication/2023-data-breach-report/

Kaur, P., Dhir, A., Tandon, A., Alzeiby, E. A., & Abohassan, A. A. (2021). A systematic literature review on cyberstalking. an analysis of past achievements and future promises. Technological Forecasting and Social Change, 163, 120426. https://doi.org/10.1016/j.techfore.2020.120426

KS, C., TM, S., & DP, L. (2016). Ransomware against police: Diagnosis of risk factors via application of Cyber-Routine activities theory. International Journal of Forensic Science & Pathology, 253–258. https://doi.org/10.19070/2332-287x-1600061

Lapuh Bele J, Dimc M, Rozman D, Sladoje A. RAISING AWARENESS of CYBERCRIME -the USE of EDUCATION as a MEANS of PREVENTION and PROTECTION.; 2024. https://files.eric.ed.gov/fulltext/ED557216.pdf

Martens, M., De Wolf, R., & De Marez, L. (2019). Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general. Computers in Human Behavior, 92, 139–150. https://doi.org/10.1016/j.chb.2018.11.002

Meyer L, Romero S, Bertoli G, Burt T, Weinert A, Ferres J. HOW EFFECTIVE IS MULTIFACTOR AUTHENTICATION at DETERRING CYBERATTACKS? Accessed May 2, 2024. https://arxiv.org/pdf/2305.00945

Peters J. How I Lost $1,350 by Falling for the Same Internet Scam Twice in One Week. Slate. Published July 19, 2013. Accessed May 2, 2024. https://slate.com/news-and-politics/2013/07/frequent-flier-miles-scam-how-i-lost-1350-by-falling-for-the-same-internet-scam-twice-in-one-week.html

Razaulla S, Fachkha C, Markarian C, et al. The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions. IEEE Access. 2023;11:40698-40723. doi:10.1109/ACCESS.2023.3268535

Sebastian N. Top Password Strengths and Vulnerabilities: Threats, Preventive Measures, and Recoveries. www.goodfirms.co. Published October 18, 2023. Accessed May 2, 2024. https://www.goodfirms.co/resources/top-password-strengths-and-vulnerabilities

So my WoW account got hacked... twice. - PC/Mac/Linux Society - GameSpot. GameSpot. Accessed May 2, 2024. https://www.gamespot.com/forums/pc-mac-linux-society-1000004/so-my-wow-account-got-hacked-twice-28771389/

St.John M. Cybersecurity Stats: Facts And Figures You Should Know – Forbes Advisor. www.forbes.com. Published February 28, 2024. Accessed May 2, 2024. https://www.forbes.com/advisor/education/it-and-tech/cybersecurity-statistics/

The Latest Cyberstalking Statistics for 2024. SafeHome.org. Accessed May 2, 2024. https://www.safehome.org/data/cyberstalking-statistics/#references