Uploaded by Nav Lee

APA 10 Cited

advertisement
APA 10 Cited:
1:
The ethical hacker defence. (2019). ​Banker​, ​170​(1124), 10. Retrieved from
https://search.ebscohost.com/login.aspx?direct=true&db=bft&AN=138511303&site=edslive&scope=site
2:
Avila, J. D. (2009, April 15). False Security: “Scareware” Spreads. ​Wall Street Journal Eastern Edition​, pp. D1–D2. Retrieved from
https://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=37584484&site=edslive&scope=site
3:
White Hat, Black Hat, Grey Hat: Are Cybersecurity Professionals Switching
Allegiances? (2018). ​Security: Solutions for Enterprise Security Leaders​, ​55​(9), 12.
Retrieved from
https://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=131625465&site=ed
s-live&scope=site
4:
DAN-SUTEU, S.-A. dan-suteu. antonio@unap. r. (2018). Boosting Cyber Security
Innovation and Culture through Public-Private Research Projects. ​ELearning & Software
for Education​, ​4​, 20–25. ​https://doi.org/10.12753/2066-026X-18-217
5:
Akinwumi, D. A., Iwasokun, G. B., Alese, B. K., & Oluwadare, S. A. (2017). A Review of
Game Theory Approach to Cyber Security Risk Management. ​Nigerian Journal of
Technology​, ​36​(4), 1271–1285. ​https://doi.org/10.4314/njt.v36i4.38
6:
Fuller, C. J. c. fuller@soton. ac. u. (2019). The Roots of the United States’ Cyber
(In)Security. ​Diplomatic History​, ​43​(1), 157–185. ​https://doi.org/10.1093/dh/dhy038
7:
Arlitsch, K., & Edelman, A. kenning. arlitsch@montana. ed. (2014). Staying Safe: Cyber
Security for People and Organizations. ​Journal of Library Administration​, ​54​(1), 46–56.
https://doi.org/10.1080/01930826.2014.893116
8:
Reviewing Cyber Security Social Engineering Training and Awareness
Programs—Pitfalls and Ongoing Issues. (2019). Retrieved from
https://search.ebscohost.com/login.aspx?direct=true&db=edsbas&AN=edsbas.F3942D4
7&site=eds-live&scope=site
9:
Conteh, N. Y., & Schmick, P. J. (2016). Cybersecurity:risks, vulnerabilities and
countermeasures to prevent social engineering attacks. ​International Journal of
Advanced Computer Research​, ​6​(23), 31–38.
https://doi.org/10.19101/IJACR.2016.623006
10:
Horton, M., & Wimmer, H. (2017). Email Phishing Susceptibility in a Public School
Setting: Identifying At-Risk Educators. ​International Journal of Cyber Society &
Education​, ​10​(1), 31–46. ​https://doi.org/10.7903/ijcse.1551
Download