Furnell, 2005
| Publication | Publication Date | Title |
|---|---|---|
| Tuleun | Analysis of cybercrimes, major cyber security attacks and the overall economic impact on Nigeria | |
| Parmar | Protecting against spear-phishing | |
| Schiller et al. | Botnets: The killer web applications | |
| Jenab et al. | Cyber Security Management: A Review. | |
| Adams | Learning the lessons of WannaCry | |
| Wadhwa et al. | A Review on Cyber Crime: Major Threats and Solutions. | |
| Rai et al. | A study on cyber crimes cyber criminals and major security breaches | |
| Alazab et al. | An analysis of the nature of spam as cybercrime | |
| Minnaar | 'Crackers', cyberattacks and cybersecurity vulnerabilities: the difficulties in combatting the'new'cybercriminals | |
| Broadhurst et al. | Cybercrime and online safety in cyberspace | |
| Oreku et al. | Cybercrime: concerns, challenges and opportunities | |
| Sonowal | Introduction to phishing | |
| Fanning | Minimizing the cost of malware | |
| Furnell | Internet threats to end-users: Hunting easy prey | |
| Särökaari | Phishing attacks and mitigation tactics | |
| Chigozie-Okwum et al. | Computer forensics investigation; implications for improved cyber security in Nigeria | |
| Sawaneh | Cybercrimes: Threats, challenges, awareness, and solutions in Sierra Leone | |
| Bhattacharya et al. | Cyber literacy, awareness, and safety of senior citizens: A comprehensive case study of the contemporary landscape | |
| Dmitrieva | I Know It When I See It: Should Internet Providers Recognize Copyright Violation When They See It? | |
| Halouzka et al. | The impact of the Covid-19 pandemic on the evolution of cyber threats | |
| Emm et al. | IT threat evolution in Q3 2016 | |
| Mitră | The Structure of Cyber Attacks | |
| Reuvid | The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity | |
| Jones | Social Media and the Effects on the Everyday User | |
| Broadhurst et al. | Cybercrime update: trends and developments |