Arctic Wolf. The Fascinating Decade in Cybercrime: 2010-2020. Arctic Wolf. Published February 10, 2020. Accessed May 2, 2024.
https://arcticwolf.com/resources/blog/decade-of-cybercrime/
Bhardwaj, A., Sapra, V., Kumar, A., Kumar, N., & Arthi, S. (2020). Why is phishing still successful?
Computer Fraud & Security,
2020(9), 15–19.
https://doi.org/10.1016/s1361-3723(20)30098-1
Borky JM, Bradley TH. Protecting Information with Cybersecurity.
Effective Model-Based Systems Engineering. Published online September 9, 2018:345-404. doi:
10.1007/978-3-319-95669-5_10
Cybersecurity history: Hacking & Data breaches. Monroe College. (n.d.).
https://www.monroecollege.edu/news/cybersecurity-history-hacking-data-breaches
FBI Internet Crime Report
2023.; 2023:1-34. Accessed May 1, 2024.
https://www.ic3.gov/Media/PDF/AnnualReport/2023_IC3Report.pdf
How hackers took over my computer. The Telegraph. Published October 10, 2014. Accessed May 2, 2024.
https://www.telegraph.co.uk/technology/internet-security/11153381/How-hackers-took-over-my-computer.html
Huang, K. T. D. Y., GrierD, D. W. E. B. C., Holt, T. J., Kruegel, C., McCoy, D., Savage, S., & Vigna, G. (2015). Framing dependencies introduced by underground commoditization. In Workshop on the Economics of Information Security.
Hygeia S. Toso C, A. Jumalon AJ, R. Magadan JA, B. Alvarico A, Cuevas Jr JF. Cybercrime Awareness Among Senior High School Students.
Mediterranean Journal of Basic and Applied Sciences. 2023;07(02):160-176. doi:10.46382/mjbas.2023.7218
Instagram Security Verification. Ampfluence | #1 Instagram Growth Service. Accessed May 2, 2024.
https://www.ampfluence.com/instagram-security-verification/
ITRC Annual Data Breach Report. ITRC. Published January 24, 2024. Accessed May 2, 2024.
https://www.idtheftcenter.org/publication/2023-data-breach-report/
Kaur, P., Dhir, A., Tandon, A., Alzeiby, E. A., & Abohassan, A. A. (2021). A systematic literature review on cyberstalking. an analysis of past achievements and future promises. Technological Forecasting and Social Change, 163, 120426.
https://doi.org/10.1016/j.techfore.2020.120426
KS, C., TM, S., & DP, L. (2016). Ransomware against police: Diagnosis of risk factors via application of Cyber-Routine activities theory.
International Journal of Forensic Science & Pathology, 253–258.
https://doi.org/10.19070/2332-287x-1600061
Lapuh Bele J, Dimc M, Rozman D, Sladoje A.
RAISING AWARENESS of CYBERCRIME -the USE of EDUCATION as a MEANS of PREVENTION and PROTECTION.; 2024.
https://files.eric.ed.gov/fulltext/ED557216.pdf
Martens, M., De Wolf, R., & De Marez, L. (2019). Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general.
Computers in Human Behavior,
92, 139–150.
https://doi.org/10.1016/j.chb.2018.11.002
Meyer L, Romero S, Bertoli G, Burt T, Weinert A, Ferres J.
HOW EFFECTIVE IS MULTIFACTOR AUTHENTICATION at DETERRING CYBERATTACKS? Accessed May 2, 2024.
https://arxiv.org/pdf/2305.00945
Peters J. How I Lost $1,350 by Falling for the Same Internet Scam Twice in One Week. Slate. Published July 19, 2013. Accessed May 2, 2024.
https://slate.com/news-and-politics/2013/07/frequent-flier-miles-scam-how-i-lost-1350-by-falling-for-the-same-internet-scam-twice-in-one-week.html
Razaulla S, Fachkha C, Markarian C, et al. The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions.
IEEE Access. 2023;11:40698-40723. doi:10.1109/ACCESS.2023.3268535
Sebastian N. Top Password Strengths and Vulnerabilities: Threats, Preventive Measures, and Recoveries. www.goodfirms.co. Published October 18, 2023. Accessed May 2, 2024.
https://www.goodfirms.co/resources/top-password-strengths-and-vulnerabilities
So my WoW account got hacked... twice. - PC/Mac/Linux Society - GameSpot. GameSpot. Accessed May 2, 2024.
https://www.gamespot.com/forums/pc-mac-linux-society-1000004/so-my-wow-account-got-hacked-twice-28771389/
St.John M. Cybersecurity Stats: Facts And Figures You Should Know – Forbes Advisor. www.forbes.com. Published February 28, 2024. Accessed May 2, 2024.
https://www.forbes.com/advisor/education/it-and-tech/cybersecurity-statistics/
The Latest Cyberstalking Statistics for 2024. SafeHome.org. Accessed May 2, 2024.
https://www.safehome.org/data/cyberstalking-statistics/#references