REFERENCES
- Ashford, W. (2014a). Google could face $100 million lawsuit over nude celebrity pictures. Computer Weekly. Retrieved from http://www.computerweekly.com/news/2240232039/Google-could-face-100m-lawsuit-over-nude-celebrity-pics
- Ashford, W. (2014b). Social media threats to business on the rise. Computer Weekly. Retrieved from http://www.computerweekly.com/news/2240236398/Social-media-threats-to-business-on-the-rise-says-report
- Berthon, P. R., Pitt, L. F., McCarthy, I., & Kates, S. (2007). When customers get clever: Managerial approaches to dealing with creative consumers. Business Horizons, 50, 39–48.
- Boggs, R. A., & Walters, D. (2006). A longitudinal look at e-government in practice. Issues in Information Systems, 7, 161–164.
- Bureau of Labor Statistics. (2014). The 2014 occupational outlook handbook. Retrieved from http://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm
- Campbell, D., & Beck, A. C. (2004). Answering allegations: The use of the corporate website for restorative ethical and social disclosure, Business Ethics, 13, 100.
- Cavaliere, V. (2012). Hasbro Easy-Bake Oven to be marketed to girls and boys in 2012 following petition for change by 13-year-old girl. New York Daily News. Retrieved from http://www.nydailynews.com/new-york/hasbro-easy-bake-oven-girls-boys-article-1.1222592
- Garcia, R. C. (2004). Network security: Mapping intrusion and anomaly detection to very-high-degree polynomials. Signals, Systems, and Computers, 2, 1449–1452.
- Gay, R. (2014). The great 2014 celebrity nude photos leak is only the beginning. The Guardian. Retrieved from http://www.theguardian.com/commentisfree/2014/sep/01/celebrity-naked-photo-leak-2014-nude-women
- Jamieson, S. (2002). The ethics and legality of port scanning. Bethesda, MD: SANS Institute. Retrieved from http://www.sans.org/reading_room/whitepapers/legal/the_ethics_and_legality_of_port_scanning_71?show=71.php&cat=legal
- Kietzmann, J. H., Hermkens, K., McCarthy, I. P., & Silvestre, B. S. (2011). Social media? Get serious! Understanding the functional building blocks of social media. Business Horizons, 54, 241–251.
- McNurlin, B. C., & Sprague, R. H. Jr. (2006). Information systems management in practice (7th ed.). Upper Saddle River, NJ: Pearson Prentice Hall.
- Moorman, C. (2012). Social media spend continues to soar. Durham, NC: The CMO Survey. Retrieved from http://www.cmosurvey.org/blog/social-media-spend-continues-to-soar/
- Nerney, C. (2011). 5 top social media security threats. Network World. Retrieved from http://www.networkworld.com/article/2177520/collaboration-social/5-top-social-media-security-threats.html
- Symantec. (2015). 2015 Internet security threat report. Retrieved from http://www.symantec.com/security_response/publications/threatreport.jsp?inid=us_ghp_hero1_istr20
- Trustwave. (2015). The 2015 trustwave global security report. Retrieved from https://www2.trustwave.com/rs/815-RFM-693/images/2015_TrustwaveGlobalSecurityReport.pdf
- U.S. Department of Justice. (2003). Fraud and related activity in connection with computers. In United States Code Annotated (Title 18, Chapter 47, Section 1030). Washington, DC: Author. Retrieved from http://www.usdoj.gov/criminal/cybercrime/1030NEW.htm
- Wilkinson, V. O. & Cappel, J. J. (2005). Impact of economic prosperity and population on e-government involvement. Issues in Information Systems, 6, 204–209.
- Winkler, I. (2004), What is a security audit? Tech Target. Retrieved from http://searchcio.techtarget.com/sDefinition/0,,sid182_gci955099,00.html
- Zhao, J. J., Truell, A. D., Alexander, M. W., & Davis, R. (2006). State e-government service and economic competitiveness: A relational analysis. Issues in Information Systems, 7, 171–176.
- Zhao, J. J., & Zhao, S. Y. (2004). Internet technologies used by INC. 500 corporate web sites. Issues in Information Systems, 5, 366–372.
- Zhao, J. J., & Zhao, S. Y. (2014). The impact of corporate social media on revenue and profit: An exploratory study. International Journal of Management and Information Technology, 10, 1892–1902.