References
- Anti-Phishing Working Group. 2015. “Phishing Activity Trends Report 4th Quarter 2014.” Retrieved January 8, 2016 (https://docs.apwg.org/reports/apwg_trends_report_q4_2014.pdf).
- Baym, Nancy K. 2015. Personal Connections in the Digital Age. Malden, MA: Polity Press.
- Benkler, Yochai. 2007. The Wealth of Networks: How Social Production Transforms Markets and Freedom. New Haven, CT: Yale University Press.
- Bossler, Adam and Thomas Holt. 2010. “The Effect of Self-Control on Victimization in the Cyberworld.” Journal of Criminal Justice 38(3):227–236.
- Brooke, Tom Vanden and Michael Winter. 2015. “Hackers Penetrated Pentagon Email.” USA Today. Retrieved January 18, 2016 (http://www.usatoday.com/story/news/nation/2015/08/06/russia-reportedly-hacks-pentagon-email-system/31228625/).
- Cohen, Lawrence and Marcus Felson. 1979. “Social Change and Crime Rate Trends: A Routine Activity Approach.” American Sociological Review 44:588–608.
- Felson, Marcus. 1994. Crime and Everyday Life: Insights and Implications for Society. Thousand Oaks, CA: Pine Forge Press.
- ———. 2006. Crime and Nature. Thousand Oaks, CA: Sage.
- Ferrari, Anusca. 2013. DIGCOMP: A Framework for Developing and Understanding Digital Competence in Europe, edited by Yves Punie and Barbara N. Brečko. Seville: JRC-IPTS. Retrieved January 18, 2016 (http://ftp.jrc.es/EURdoc/JRC83167.pdf).
- Finkle, Jim and Deepa Seetharaman. 2014. “Cyber Thieves Took Data On 145 Million eBay Customers By Hacking 3 Corporate Employees.” Business Insider. Retrieved January 18, 2016 (http://www.businessinsider.com/cyber-thieves-took-data-on-145-million-ebay-customers-by-hacking-3-corporate-employees-2014-5).
- Furnell, Steven, Valleria Tsaganidi, and Andy Phippen. 2008. “Security Beliefs and Barriers for Novice Internet Users.” Computers and Security 27(7–8):235–240.
- Geng, Guang-Gang, Xiao-Dong Lee, and Yan-Ming Zhang. 2014. “Combating Phishing Attacks via Brand Identity and Authorization Features.” Security and Communication Networks 8(6):888–898.
- Gottfredson, Michael and Travis Hirschi. 1990. A General Theory of Crime. Stanford, CA: Stanford University Press.
- Graham, Roderick. 2014. The Digital Practices of African Americans: An Approach to Studying Cultural Change in the Information Society. New York: Peter Lang Publishing.
- Herzberg, Amir. 2009. “Why Johnny Can’t Surf (Safely)? Attacks and Defenses for Web Users?” Computers and Security 28(1–2):63–71.
- Higgins, George. 2005. “Can Low Self-Control Help with the Understanding of the Software Piracy Problem?” Deviant Behavior 26(1):1–24.
- Holt, Thomas and Adam Bossler. 2009. “Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization.” Deviant Behavior 30:1–25.
- Holt, Thomas and Heith Copes. 2010. “Transferring Subcultural Knowledge On-Line: Practices and Beliefs of Persistent Digital Pirates.” Deviant Behavior 31(7):625–654.
- Hsin-yi Sandy Tsai, Mengtian Jiang, Saleem Alhabash, Robert LaRose, Nora J. Rifon, and Shelia R. Cotten. 2016. “Understanding Online Safety Behaviors: A Protection Motivation Theory Perspective.” Computers & Security doi:10.1016/j.cose.2016.02.009
- Internet Crime Complaint Center. 2014. “2014 IC3 Annual Report.” Retrieved January 15, 2016 (http://www.ic3.gov/media/annualreport/2014_IC3Report.pdf).
- Leukfeldt, Rutger E. 2014. “Phishing for Suitable Targets in the Netherlands: Routine Activity Theory and Phishing Victimization.” Cyberpsychology, Behavior and Social Networking 17(8):551–555.
- Muscanell, Nicole L., Rosanna E. Guadagno, and Shannon Murphy. 2014. “Weapons of Influence Misused: A Social Influence Analysis of Why People Fall Prey to Internet Scams.” Social and Personality Psychology Compass 8(7):388–396.
- Newman, Graeme R. and Ronald V. Clarke. 2003. Superhighway Robbery: Preventing E- Commerce Crime. Devon, UK: Willan Publishing.
- Ngo, F. T. and Raymond Paternoster. 2011. “Cybercrime Victimization: An Examination of Individual and Situational Level Factors.” International Journal of Cyber Criminology 5: 773–793.
- Parsons, Kathryn, Agata McCormac, Malcolm Pattinson, Marcus Butavicius, and Cate Jerram. 2015. “The Design of Phishing Studies: Challenges for Researchers.” Computers & Security doi:10.1016/j.cose.2015.02.008
- Pratt, Travis, Kristy Holtfreter, and Michael Reiseg. 2010. “Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory.” Journal of Research in Crime and Delinquency 47(3):267–296.
- Reynald, Danielle. 2009. “Guardianship in Action: Developing a New Tool for Measurement.” Crime Prevention and Community Safety 11(1):1–20.
- ———. 2010. “Guardians on Guardianship: Factors affecting the Willingness to Monitor, the Ability to Detect Potential Offenders and the Willingness to Intervene.” Journal of Research in Crime and Delinquency 47(3):358–390.
- ———. 2011. Guarding against Crime: Measuring Guardianship within Routine Activity Theory. Farnham, UK: Ashgate.
- Shirky, Clay. 2008. Here Comes Everybody: The Power of Organizing without Organizations. New York: Penguin.
- Vakhitova, Zarina and Danielle M. Reynald. 2014. “Australian Internet Users and Guardianship against Cyber Abuse: An Empirical Analysis.” International Journal of Cyber Criminology 8(2):156–171.
- Verizon. 2015. “ 2015 Data Breach Investigations Report.” Retrieved January 8, 2016 (http://www.verizonenterprise.com/DBIR/2015/).
- Wall, David S. 2001. “Cybercrimes and the Internet.” Pp. 1–17 in Crime and the Internet, edited by D. S. Wall. New York: Routledge.
- Workman, Michael. 2008. “Wisecrackers: A Theory-Grounded Investigation of Phishing and Pretext Social Engineering Threats to Information Security.” Journal of the American Society for Information Science and Technology 59(4):662–674.
- Yar, Majid. 2013. Cybercrime and Society. 2nd ed. Thousand Oaks, CA: Sage.
- Zhang, Yanping, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang, and Hongmei Deng. 2011. “A Survey of Cyber Crimes.” Security and Communication Networks 5(4):422–437.