References

  1. Balan, S, Otto, J, Minasian, E & Aryal, A 2017, ‘Data Analysis of Cybercrimes in Businesses’, Information Technology & Management Science (Sciendo), vol. 20, no. 1, pp. 64–68 <http://search.ebscohost.com/login.aspx?direct=true&AuthType=sso&db=iih&AN=127283329&site=ehost-live>
  2. Calbalhin, J P 2018, ‘Facebook User’s Data Security and Awareness: A Literature Review’, Journal of Academic Research, vol. 03, no. 2, pp. 01-13 < https://www.researchgate.net/publication/331408062_Facebook_User's_Data_Security_and_Awareness_A_Literature_Review >
  3. Hardy, M 2014, Target Store Data Breaches : Examination and Insight, Cryptography, Steganography and Data Security, Nova Science Publishers, Inc, New York < https://www.researchgate.net/publication/292884201_The_target_store_data_breaches_Examination_and_insight >
  4. Manworren, N, Letwat, J & Daily, O 2016, ‘Why you should care about the Target data breach’, Business Horizons, vol. 59, no. 3, pp. 257–266 < https://www.sciencedirect.com/science/article/pii/S0007681316000033 >
  5. Pierson, CT 2009, ‘Data Breaches Highlight the Importance of Privacy’, Financial Executive, vol. 25, no. 2, pp. 62–63 < http://search.ebscohost.com/login.aspx?direct=true&AuthType=sso&db=heh&AN=37034818&site=ehost-live >
  6. Sobers, R 2020, Americans and Privacy Concerns: Who Do We Trust?, https://www.varonis.com/blog/america-privacy-concerns/
  7. Waldman, AE 2016, ‘Privacy, Sharing, and Trust: The Facebook Study’, Case Western Reserve Law Review, vol. 67, no. 1, pp. 193–233 < http://search.ebscohost.com/login.aspx?direct=true&AuthType=sso&db=aph&AN=121420919&site=ehost-live >