APA 10 Cited: 1: The ethical hacker defence. (2019). Banker, 170(1124), 10. Retrieved from https://search.ebscohost.com/login.aspx?direct=true&db=bft&AN=138511303&site=edslive&scope=site 2: Avila, J. D. (2009, April 15). False Security: “Scareware” Spreads. Wall Street Journal Eastern Edition, pp. D1–D2. Retrieved from https://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=37584484&site=edslive&scope=site 3: White Hat, Black Hat, Grey Hat: Are Cybersecurity Professionals Switching Allegiances? (2018). Security: Solutions for Enterprise Security Leaders, 55(9), 12. Retrieved from https://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=131625465&site=ed s-live&scope=site 4: DAN-SUTEU, S.-A. dan-suteu. antonio@unap. r. (2018). Boosting Cyber Security Innovation and Culture through Public-Private Research Projects. ELearning & Software for Education, 4, 20–25. https://doi.org/10.12753/2066-026X-18-217 5: Akinwumi, D. A., Iwasokun, G. B., Alese, B. K., & Oluwadare, S. A. (2017). A Review of Game Theory Approach to Cyber Security Risk Management. Nigerian Journal of Technology, 36(4), 1271–1285. https://doi.org/10.4314/njt.v36i4.38 6: Fuller, C. J. c. fuller@soton. ac. u. (2019). The Roots of the United States’ Cyber (In)Security. Diplomatic History, 43(1), 157–185. https://doi.org/10.1093/dh/dhy038 7: Arlitsch, K., & Edelman, A. kenning. arlitsch@montana. ed. (2014). Staying Safe: Cyber Security for People and Organizations. Journal of Library Administration, 54(1), 46–56. https://doi.org/10.1080/01930826.2014.893116 8: Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues. (2019). Retrieved from https://search.ebscohost.com/login.aspx?direct=true&db=edsbas&AN=edsbas.F3942D4 7&site=eds-live&scope=site 9: Conteh, N. Y., & Schmick, P. J. (2016). Cybersecurity:risks, vulnerabilities and countermeasures to prevent social engineering attacks. International Journal of Advanced Computer Research, 6(23), 31–38. https://doi.org/10.19101/IJACR.2016.623006 10: Horton, M., & Wimmer, H. (2017). Email Phishing Susceptibility in a Public School Setting: Identifying At-Risk Educators. International Journal of Cyber Society & Education, 10(1), 31–46. https://doi.org/10.7903/ijcse.1551