References
- ACSC. (2019). Don’t get burned by email scams this Summer. Australian Signals Directorate. Retrieved 22nd April from https://web.archive.org/web/20200408080043/cyber.gov.au/news/dont-get-burned
- Akdemir, N., & Yenal, S. (2021). How phishers exploit the coronavirus pandemic: A content analysis of COVID-19 themed phishing emails. SAGE Open, 11(3), 21582440211031879. https://doi.org/10.1177/21582440211031879
- Apuke, O. D., & Omar, B. (2021). Fake news and COVID-19: Modelling the predictors of fake news sharing among social media users. Telematics and Informatics, 56, 101475. https://doi.org/10.1016/j.tele.2020.101475
- Atkins, B., & Huang, W. (2013). A study of social engineering in online frauds. Open Journal of Social Sciences, 1(3), 23. https://doi.org/10.4236/jss.2013.13004
- Australian Competition & Consumer Commission. (2021). Targeting scams: Report of the ACCC on scams activity 2020. Commonwealth of Australia. https://www.scamwatch.gov.au/report-a-scam
- Australian Cyber Security Centre. (2020). ACSC annual cyber threat Report July 2019 to June 2020.
- Barnes, P. (2018). Cryptocurrency and its susceptibility to speculative bubbles, manipulation, scams and fraud. Journal of Advanced Studies in Finance (JASF), 9(2 (18)), 60–77.
- BBC. (2020). Australia fires: A visual guide to the bushfire crisis. Retrieved 30 May from https://web.archive.org/web/20220217055122/https://www.bbc.com/news/world-australia-50951043
- Blanqué, P. (2003). Crisis and fraud. Journal of Financial Regulation and Compliance, 11(1), 60–70. https://doi.org/10.1108/13581980310810417
- Bradstock, R., Clarke, H., Collins, L., Clarke, M., Nolan, R. H., & Penman, T. (2021). A staggering 1.8 million hectares burned in ‘high-severity’ fires during Australia’s black summer. The Conversation US. https://web.archive.org/web/20210902055227/https://theconversation.com/a-staggering-1-8-million-hectares-burned-in-high-severity-fires-during-australias-black-summer-157883#:~:text=In%2520this%2520regard%252C%2520the%2520Black,and%25203%252C000%2520homes%2520were%2520destroyed
- Broadhurst, R., Ball, M., & Jiang, C. J. (2020). Availability of COVID-19 related products on Tor darknet markets. Australasian Policing, 12(3), 8–13. https://search.informit.org/doi/abs/10.3316/informit.435787950413234
- Buil-Gil, D., Miró-Llinares, F., Moneva, A., Kemp, S., & Díaz-Castaño, N. (2020). Cybercrime and shifts in opportunities during COVID-19: A preliminary analysis in the UK. European Societies 23 (S1) , 1–13. https://doi.org/10.1080/14616696.2020.1804973
- Buil-Gil, D., Miró-Llinares, F., Moneva, A., Kemp, S., & Díaz-Castaño, N. (2021). Cybercrime and shifts in opportunities during COVID-19: A preliminary analysis in the UK. European Societies, 23(sup1), S47–S59. https://doi.org/10.1080/14616696.2020.1804973
- Bullée, J.-W. H., Montoya, L., Pieters, W., Junger, M., & Hartel, P. (2018). On the anatomy of social engineering attacks—A literature-based dissection of successful attacks. Journal of Investigative Psychology and Offender Profiling, 15(1), 20–45. https://doi.org/10.1002/jip.1482
- Button, M., & Cross, C. (2017). Cyber frauds, scams and their victims. Routledge.
- Button, M., Lewis, C., & Tapley, J. (2009). Fraud typologies and the victims of fraud: Literature review. National Fraud Authority.
- Button, M., Nicholls, C. M., Kerr, J., & Owen, R. (2014). Online frauds: Learning from victims why they fall for these scams. Australian & New Zealand Journal of Criminology, 47(3), 391–408. https://doi.org/10.1177/0004865814521224
- Carah, N. (2017). Algorithmic brands: A decade of brand experiments with mobile and social media. New Media & Society, 19(3), 384–400. https://doi.org/10.1177/1461444815605463
- Carter, E. (2021). Distort, extort, deceive and exploit: Exploring the inner workings of a romance fraud. The British Journal of Criminology, 61(2), 283–302. https://doi.org/10.1093/bjc/azaa072
- Chawki, M., Darwish, A., Khan, M. A., & Tyagi, S. (2015). 419 scam: An evaluation of cybercrime and criminal code in Nigeria. In Cybercrime, digital forensics and jurisdiction (pp. 129–144). Springer.
- Chawla, A., Yu, J., & Ng, S. (2021). Cybercrime and scams amidst COVID-19: A review of the human vulnerabilities exploited during a global pandemic. In M. Khader, L. S. Neo, & W. X. T. Chai (Eds.), Introduction to cyber forensic psychology: Understanding the mind of the cyber deviant perpetrators (pp. 205–227). World Scientific.
- Choudhary, O. P., Priyanka, S., Mohammed, I., A, T., Rodriguez-Morales, A. J., & Rodriguez-Morales, A. J. (2021). Fake COVID-19 vaccines: Scams hampering the vaccination drive in India and possibly other countries. Human Vaccines & Immunotherapeutics 17 (11) , 1–2. https://doi.org/10.1080/21645515.2021.1960770
- Cialdini, R. B. (2009). Influence: Science and practice. Pearson.
- Cinelli, M., Quattrociocchi, W., Galeazzi, A., Valensise, C. M., Brugnoli, E., Schmidt, A. L., Zola, P., Zollo, F., & Scala, A. (2020). The COVID-19 social media infodemic. Scientific Reports, 10(1), 1–10. https://doi.org/10.1038/s41598-020-73510-5
- Coombs, J. (2014). Scamming the elderly: An increased susceptibility to financial exploitation within and outside of the family. Alb. Gov’t L. Rev, 7, 243.
- Cross, C. (2015). No laughing matter: Blaming the victim of online fraud. International Review of Victimology, 21(2), 187–204. https://doi.org/10.1177/0269758015571471
- Cross, C. (2020a). Beware of bushfire scams: How fraudsters take advantage of those in need. The Conversation, 1–3. https://web.archive.org/web/20210410123525/https://theconversation.com/beware-of-bushfire-scams-how-fraudsters-take-advantage-of-those-in-need-129549
- Cross, C. (2020b). Fake COVID-19 testing kits and lockdown puppy scams: How to protect yourself from fraud in a pandemic. The Conversation. https://web.archive.org/web/20201231023056/http://theconversation.com/fake-covid-19-testing-kits-and-lockdown-puppy-scams-how-to-protect-yourself-from-fraud-in-a-pandemic-144060
- Cross, C. (2020c). Theorising the impact of COVID-19 on the fraud victimisation of older persons. The Journal of Adult Protection 23 (2) . doi:10.1108/JAP-08-2020-0035
- Cross, C., & Gillett, R. (2020). Exploiting trust for financial gain: An overview of business email compromise (BEC) fraud. Journal of Financial Crime, 27(3), 871–884. https://doi.org/10.1108/JFC-02-2020-0026
- Cross, C., Richards, K., & Smith, R. G. (2016). The reporting experiences and support needs of victims of online fraud. Trends and Issues in Crime and Criminal Justice, 518, 1–14. https://search.informit.org/doi/epdf/10.3316/informit.300566903591621
- Cross, C., Smith, R. G., & Richards, K. (2014). Challenges of responding to online fraud victimisation in Australia. Trends & Issues in Crime and Criminal Justice, Issue, 474 , 1–6. https://search.informit.org/doi/abs/10.3316/informit.312913302944818
- Das, S., Kim, A., Tingle, Z., & Nippert-Eng, C. (2019). All about phishing: Exploring user research through a systematic literature review. arXiv preprint arXiv:1908.05897, 75 (4). https://arxiv.org/abs/1908.05897
- DeLiema, M., Deevy, M., Lusardi, A., Mitchell, O. S., & Carr, D. (2020). Financial fraud among older americans: Evidence and implications. The Journals of Gerontology: Series B, 75(4), 861–868. https://doi.org/10.1093/geronb/gby151
- Dove, M. (2020). The psychology of fraud, persuasion and scam techniques: Understanding what makes us vulnerable. Routledge.
- Edwards, M., Larson, R., Green, B., Rashid, A., & Baron, A. (2017). Panning for gold: Automatically analysing online social engineering attack surfaces. Computers & Security, 69, 18–34. https://doi.org/10.1016/j.cose.2016.12.013
- Elsworthy, E. (2020 8 February 2020). Hundreds of bushfire donation scams circulating — How to tell if you’ve been duped. ABC. https://web.archive.org/web/20220124142147/https://www.abc.net.au/news/2020-02-07/australia-fires-sees-spike-in-fraudster-behaviour/11923174
- Europol. (2020). How COVID-19-related crime infected Europe during 2020. Europol, The Hague. https://web.archive.org/web/20220210222349/https://www.europol.europa.eu/publications-events/publications/how-covid-19-related-crime-infected-europe-during-2020
- Fan, W., Lwakatare, K., & Rong, R. (2017). Social engineering: I-E based model of human weakness for attack and defense Investigations. International Journal of Computer Network and Information Security, 9(1), 1. https://doi.org/10.5815/ijcnis.2017.01.01
- Fischer, P., Lea, S. E., & Evans, K. M. (2013). Why do individuals respond to fraudulent scam communications and lose money? The psychological determinants of scam compliance. Journal of Applied Social Psychology, 43(10), 2060–2072. https://doi.org/10.1111/jasp.12158
- Fitzpatrick, M. (2009, Jul 09). Swine flu scams popping up on Internet. Calgary Herald. https://www.proquest.com/newspapers/swine-flu-scams-popping-up-on-internet/docview/243905935/se-2?accountid=10910
- Fligstein, N., & Roehrkasse, A. F. (2016). The causes of fraud in the financial crisis of 2007 to 2009: Evidence from the mortgage-backed securities industry. American Sociological Review, 81(4), 617–643. https://doi.org/10.1177/0003122416645594
- Gradoń, K. (2020). Crime in the time of the plague: Fake news pandemic and the challenges to law-enforcement and intelligence community. Society Register, 4(2), 133–148. https://doi.org/10.14746/sr.2020.4.2.10
- Gratian, M., Bandi, S., Cukier, M., Dykstra, J., & Ginther, A. (2018). Correlating human traits and cyber security behavior intentions. Computers & Security, 73, 345–358. https://doi.org/10.1016/j.cose.2017.11.015
- Gundur, R. V., Berry, M., & Taodang, D. (2021). Using digital open source and crowdsourced data in studies of deviance and crime. In A. Lavorgna & T. J. Holt (Eds.), Researching cybercrimes: Methodologies, ethics, and critical approaches (pp. 145–167). Palgrave MacMillan. https://doi.org/10.1007/978-3-030-74837-1_8
- Gundur, R. V., Levi, M., Topalli, V., Ouellet, M., Stolyarova, M., Chang, L. Y.-C., & Domínguez Mejía, D. (2021). Evaluating Criminal Transactional Methods in Cyberspace as Understood in an International Context. https://www.crimrxiv.com/pub/48bmtkg0/release/3
- Hawdon, J., Parti, K., & Dearden, T. E. (2020). Cybercrime in America amid COVID-19: The initial results from a natural experiment. American Journal of Criminal Justice, 45(4), 546–562. https://doi.org/10.1007/s12103-020-09534-4
- Horowitz, M. J., Stinson, C., & Field, N. (1991). Natural disasters and stress response syndromes. SLACK Incorporated Thorofare.
- Howie, L. (2017). Crisis and terror in the age of anxiety: 9/11, the global financial crisis and ISIS. Palgrave Macmillan Limited. https://doi.org/10.1057/978-1-137-51629-9
- Hughes, L., Steffen, W., Mullins, G., Dean, A., Weisbrot, E., & Rice, M. (2020). Summer of Crisis. Climate Council of Australia Ltd.
- INTERPOL. (2020). COVID-19 Cybercrime analysis report- august 2020 (COVID–19 Impact, Issue. https://www.interpol.int/en/News-and-Events/News/2020/INTERPOL-report-shows-alarming-rate-of-cyberattacks-during-COVID-19
- Jakobsson, M. 2016. Understanding social engineering based scams (1st ed. 2016. ed.). Springer, New York: Imprint: Springer.
- Jalali, M. S., Bruckes, M., Westmattelmann, D., & Schewe, G. (2020). Why employees (Still) click on phishing links: Investigation in hospitals. Journal of Medical Internet Research, 22(1), e16775–e16775. https://doi.org/10.2196/16775
- Jones, T. (2020, January 14). Bushfire charity scams: What to look out for. Gizmodo. https://web.archive.org/web/20210614065555/https://www.gizmodo.com.au/2020/01/bushfire-charity-scams-what-to-look-out-for/
- Kemp, S., Buil-Gil, D., Moneva, A., Miró-Llinares, F., & Díaz-Castaño, N. (2021). Empty streets, busy internet: A time-series analysis of cybercrime and fraud trends during COVID-19. Journal of Contemporary Criminal Justice, 37(4), 480–501. https://doi.org/10.1177/10439862211027986
- Kemp, S., Miró-Llinares, F., & Moneva, A. (2020). The dark figure and the cyber fraud rise in Europe: Evidence from Spain. European Journal on Criminal Policy and Research, 26(3), 293–312. https://doi.org/10.1007/s10610-020-09439-2
- Kennedy, J. P., Rorie, M., & Benson, M. L. (2021). COVID‐19 frauds: An exploratory study of victimization during a global crisis. Criminology & Public Policy.
- Kikerpill, K., & Siibak, A. (2021). Mazephishing: The COVID-19 pandemic as credible social context for social engineering attacks. Trames. Journal of the Humanities and Social Sciences, 25(4), 371. https://doi.org/10.3176/tr.2021.4.01
- Laufs, J., & Waseem, Z. (2020). Policing in pandemics: A systematic review and best practices for police response to COVID-19. International Journal of Disaster Risk Reduction, 101812 (51), 1–17 .
- Lavorgna, A. (2020). Cybercrimes: Critical issues in a global context. Macmillan Education UK. https://books.google.com.au/books?id=o0KuyAEACAAJ
- Lea, S. E., Fischer, P., & Evans, K. M. (2009). The psychology of scams: Provoking and committing errors of judgement. https://web.archive.org/web/20210420211754/http://hdl.handle.net/10871/20958
- Levi, M., & Smith, R. G. (2011). Fraud Vulnerabilities and the Global Financial Crisis. Australian Government. http://ezproxy.flinders.edu.au/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=ncj&AN=SM257165&site=ehost-live
- Levi, M., & Smith, R. G. (2021a). Fraud and its relationship to pandemics and economic crises: From Spanish flu to COVID-19 (AIC reports Research Report, 19. https://doi.org/10.52922/rr78115
- Levi, M., & Smith, R. G. (2021b). Fraud and pandemics. Journal of Financial Crime. https://doi.org/10.1108/JFC-06-2021-0137
- Lockey, S., Edwards, M. R., Hornsey, M. J., Gillespie, N., Akhlaghpour, S., & Colville, S. (2021). Profiling adopters (and non-adopters) of a contact tracing mobile application: Insights from Australia. International Journal of Medical Informatics, 149, 104414. https://doi.org/10.1016/j.ijmedinf.2021.104414
- Mackey, T. K., Li, J., Purushothaman, V., Nali, M., Shah, N., Bardier, C., Cai, M., & Liang, B. (2020). Big data, natural language processing, and deep learning to detect and characterize illicit COVID-19 product sales: Infoveillance study on Twitter and Instagram. JMIR Public Health and Surveillance, 6(3), e20794–e20794. https://doi.org/10.2196/20794
- Mengolini, A., & Debarberis, L. (2012). Lessons learnt from a crisis event: How to foster a sound safety culture. Safety Science, 50(6), 1415–1421. https://doi.org/10.1016/j.ssci.2010.02.022
- Miller, T. (2007). Donation Scams in the Wake of a Storm or Disaster, Office of the Attorney General (Iowa). https://web.archive.org/web/20170125134639/http://publications.iowa.gov/5873/1/AG5ecommerce.pdf
- Miramirkhani, N., Starov, O., & Nikiforakis, N. (2016). Dial one for scam: A large-scale analysis of technical support scams. https://doi.org/10.14722/ndss.2017.23163
- Monaghan, R. M. (2020). Cybercrime response capabilities and capacity: An evaluation of local law enforcements response to a complex problem, Defense Technical Information Center. https://apps.dtic.mil/sti/citations/AD1127022
- Muscanell, N. L., Guadagno, R. E., & Murphy, S. (2014). Weapons of influence misused: A social influence analysis of why people fall prey to internet scams. Social and Personality Psychology Compass, 8(7), 388–396. https://doi.org/10.1111/spc3.12115
- Näsi, M., Oksanen, A., Keipi, T., & Räsänen, P. (2015). Cybercrime victimization among young people: A multi-nation study. Journal of Scandinavian Studies in Criminology and Crime Prevention, 16(2), 203–210. https://doi.org/10.1080/14043858.2015.1046640
- Nguyen, T. H., & Pontell, H. N. (2010). Mortgage origination fraud and the global economic crisis: A criminological analysis. Criminology & Public Policy, 9(3), 591–612. https://doi.org/10.1111/j.1745-9133.2010.00653.x
- Norris, G., Brookes, A., & Dowell, D. (2019). The psychology of internet fraud victimisation: A systematic review. Journal of Police and Criminal Psychology, 34(3), 231–245. https://doi.org/10.1007/s11896-019-09334-5
- Oliveira, D., Rocha, H., Yang, H., Ellis, D., Dommaraju, S., Muradoglu, M., Weir, D., Soliman, A., Lin, T., & Ebner, N. (2017). Dissecting spear phishing emails for older vs young adults: On the interplay of weapons of influence and life domains in predicting susceptibility to phishing CHI 2017. Denver. https://dl.acm.org/doi/pdf/10.1145/3025453.3025831
- Olsson, E.-K. (2010). Defining crisis news events. Nordicom Review, 31(1), 87–101. https://doi.org/10.1515/nor-2017-0122
- Parsons, K., Butavicius, M., Delfabbro, P., & Lillie, M. (2019). Predicting susceptibility to social influence in phishing emails. International Journal of Human-Computer Studies, 128, 17–26. https://doi.org/10.1016/j.ijhcs.2019.02.007
- Payne, B. K. (2020). Criminals work from home during pandemics too: A public health approach to respond to fraud and crimes against those 50 and above. American Journal of Criminal Justice, 45(4), 563–577. https://doi.org/10.1007/s12103-020-09532-6
- Pienta, D., Thatcher, J. B., & Johnston, A. (2020). Protecting a whale in a sea of phish. Journal of Information Technology, 35(3), 214–231. https://doi.org/10.1177/0268396220918594
- Polage, D., & Williams, E. J. (2019). How persuasive is phishing email? The role of authentic design, influence and current events in email judgements. Behaviour & Information Technology, 38(2), 184–197. https://doi.org/10.1080/0144929X.2018.1519599
- Pranggono, B., & Arabo, A. (2021). COVID −19 pandemic cybersecurity issues. Internet Technology Letters, 4(2), e247. https://doi.org/10.1002/itl2.247
- Remorin, L., Flores, R., & Matsukawa, B. (2018). Tracking trends in business email compromise (BEC) schemes, Trend Micro.
- Rich, T. (2018). You can trust me: A multimethod analysis of the Nigerian email scam. Security Journal, 31(1), 208–225. http://dx.doi.org/10.1057/s41284-017-0095-0
- Ross, S., & Smith, R. G. (2011). Risk factors for advance fee fraud victimisation. Trends and Issues in Crime and Criminal Justice [Electronicresource], 420, 1–6. https://search.informit.org/doi/abs/10.3316/agispt.20114328
- Salahdine, F., & Kaabouch, N. (2019). Social engineering attacks: A survey. Future Internet, 11(4), 89. https://doi.org/10.3390/fi11040089
- ScamWatch. (2020). Bushfires and scams. Australian Competition & Consumer Commission. Retrieved 15 June from https://www.accc.gov.au/update/bushfires-and-scams.
- ScamWatch. (2021). Scam statistics, Australian Competition & Consumer Commission. https://www.scamwatch.gov.au/scam-statistics?scamid=all&date=2021
- Schweitzer, D. (2019). The new face of fear: How pandemics and terrorism reinvent terror (and Heroes) in the twenty-first century. In C. Tholas, J. L. Goldie, & K. A. Ritzenhoff (Eds.), New perspectives on the War Film (pp. 203–221). Springer International Publishing. https://doi.org/10.1007/978-3-030-23096-8_10
- Shaari, A. H., Kamaluddin, M. R., Paizi, W. F., & Mohd, M. (2019). Online-dating romance scam in Malaysia: An analysis of online conversations between scammers and victims. GEMA Online® Journal of Language Studies, 19(1), 97–115. http://doi.org/10.17576/gema-2019-1901-06
- Shao, J., Zhang, Q., Ren, Y., Li, X., & Lin, T. (2019). Why are older adults victims of fraud? Current knowledge and prospects regarding older adults’ vulnerability to fraud. Journal of Elder Abuse & Neglect, 31(3), 225–243. https://doi.org/10.1080/08946566.2019.1625842
- Smith, R. G. (2010). Identity theft and fraud. In Y. Jewkes & M. Yar (Eds.), Handbook of internet crime (pp. 291–319). Willan Publishing.
- Sochos, A. (2018). Post-traumatic stress during the Greek economic crisis: Is there evidence for mass traumatisation? Analyses of Social Issues and Public Policy.
- Sorell, T., & Whitty, M. (2019). Online romance scams and victimhood. Security Journal, 32(3), 342–361. https://doi.org/10.1057/s41284-019-00166-w
- Stabek, A., Watters, P., & Layton, R. (2010). The seven scam types: Mapping the terrain of cybercrime. 2010 Second Cybercrime and Trustworthy Computing Workshop (Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE).
- Steinmetz, K. F. (2021). The Identification of a model victim for social engineering: A qualitative analysis. Victims & Offenders, 16(4), 540–564. https://doi.org/10.1080/15564886.2020.1818658
- Steinmetz, K. F., Goe, R., & Pimentel, A. (2019). On social engineering. In The human factor of cybercrime (pp. 173–193). Routledge.
- Steinmetz, K. F., Knight, T., & McCarthy, A. L. (2021). Organizational characteristics associated with vulnerability to social engineering deception: A qualitative analysis. Victims & Offenders. 1–18. https://doi.org/10.1080/15564886.2021.1943092
- Steinmetz, K. F., Pimentel, A., & Goe, W. R. (2021). Performing social engineering: A qualitative study of information security deceptions. Computers in Human Behavior, 124, 106930. https://doi.org/10.1016/j.chb.2021.106930
- Taylor, R. W. (2019). Cyber crime and cyber terrorism (Fourth Edition. ed.). Pearson.
- van Wilsem, J. (2011). ‘Bought it, but never got it’ assessing risk factors for online consumer fraud victimization. European Sociological Review, 29(2), 168–178. https://doi.org/10.1093/esr/jcr053
- Vishwanath, A., Harrison, B., & Ng, Y. J. (2018). Suspicion, cognition, and automaticity model of phishing susceptibility. Communication Research, 45(8), 1146–1166. https://doi.org/10.1177/0093650215627483
- Vishwanath, A., Herath, T., Chen, R., Wang, J., & Rao, H. R. (2011). Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decision Support Systems, 51(3), 576–586. https://doi.org/10.1016/j.dss.2011.03.002
- Visontay, E. (2020, 3 June). Coronavirus Australia latest: At a glance. The Guardian. https://web.archive.org/web/20210625232011/https://www.theguardian.com/australia-news/2020/jun/03/coronavirus-australia-latest-at-a-glance
- Whitty, M. T. (2013). The scammers persuasive techniques model: Development of a stage model to explain the online dating romance scam. British Journal of Criminology, 53(4), 665–684. https://doi.org/10.1093/bjc/azt009
- Whitty, M. T. (2015). Anatomy of the online dating romance scam. Security Journal, 28(4), 443–455. https://doi.org/10.1057/sj.2012.57
- Whitty, M. T. (2019a). Predicting susceptibility to cyber-fraud victimhood. Journal of Financial Crime, 26(1), 277–292. https://doi.org/10.1108/JFC-10-2017-0095
- Whitty, M. T. (2019b). Who can spot an online romance scam? Journal of Financial Crime, 26(2), 623–633. https://doi.org/10.1108/JFC-06-2018-0053
- Whitty, M. T., & Buchanan, T. (2016). The online dating romance scam: The psychological impact on victims–both financial and non-financial. Criminology & Criminal Justice, 16(2), 176–194. https://doi.org/10.1177/1748895815603773
- Williams. (2020, May 8). Coronavirus blame game has left Australia stuck in a debate between the US and China. ABC. https://web.archive.org/web/20201205043944/https://www.abc.net.au/news/2020-05-08/coronavirus-australia-china-us/12225654
- Wilson, S., Sivasubramaniam, D., Farmer, J., Aryani, A., De Cotta, T., Kamstra, P., Adler, V., & Knox, J. (2020). Everyday humanitarianism during the 2019/2020 Australian bushfire crisis, Analysis & Policy Observatory. https://doi.org/10.25916/5ea784522f152
- World Health Organization. (2020). Listings of WHO’s response to COVID-19. https://web.archive.org/web/20210903180916/https://www.who.int/news/item/29-06-2020-covidtimeline
- Zeller, T., Jr. (2005, Jan 6). F.B.I. Warns of internet frauds that capitalize on Tsunami. The New York Times Company, A14. https://link.gale.com/apps/doc/A126733419/AONE?u=flinders&sid=AONE&xid=52322b25
- Zingerle, A., & Kronman, L. (2013). Humiliating entertainment or social activism? Analyzing scambaiting strategies against online advance fee fraud. 2013 International Conference on Cyberworlds, IEEE.
- Zorz, Z. (2020). Fake Covid-19 tracker app delivers ransomware, disinformation abounds. Help Net Security. Retrieved 29 March from https://web.archive.org/web/20211203202049/https://www.helpnetsecurity.com/2020/03/16/fake-covid-19-tracker/.