137
Schwartz, M. J. (2012). Facebook social engineering attack strikes NATO. Informationweek -
Online, Retrieved 15 February 2018, from
https://search.proquest.com/docview/927676612.
Seda, L. (2014). Identity theft and university students: Do they know, do they care? Journal
of
Financial Crime, 21(4), 461-483. Retrieved 14 February 2018, from
https://search.proquest.com/docview/1660751510.
Shane, S., Perlroth, N., & Sanger, D. (2018). Security Breach
and Spilled Secrets Have
Shaken the N.S.A. to Its Core. Nytimes.com. Retrieved 14 February 2018, from
https://www.nytimes.com/2017/11/12/us/nsa-shadow-brokers.html
Sisk, M. (2008). Social engineering: Plugging the holes in human firewalls ; the
intense
school's one-week e-course helps banks make sure staffers are following security
procedures. Bank Technology News, 17(6), 46. Retrieved 13 January 2018, from
https://search.proquest.com/docview/208140513.
Snyder, C. (2015). Handling human hacking: creating a comprehensive defensive
strategy
against modern social engineering.
Storm, D. (2018). 17 exploits the NSA uses to hack PCs, routers and servers for surveillance.
Computerworld. Retrieved 14 February 2018, from
https://www.computerworld.com/article/2474275/cybercrime-hacking/17-exploits-
the-nsa-uses-to-hack-pcs--routers-and-servers-for-surveillance.html
Talmadge, E. (2018). North Korea announces
blocks on Facebook, Twitter and YouTube. the
Guardian. Retrieved 21 February 2018, from
https://www.theguardian.com/world/2016/apr/01/north-korea-announces-blocks-on-
facebook-twitter-and-youtube
138
Tannam, E. (2018).
EU warns Facebook, Google and Twitter that they must respect
consumer rules
.
Silicon Republic
. Retrieved 21 February 2018, from
https://www.siliconrepublic.com/companies/facebook-google-twitter-consumer-eu
Tarnoff, B. (2018). How the internet was invented. the Guardian. Retrieved 8 March 2018,
from https://www.theguardian.com/technology/2016/jul/15/how-the-internet-was-
invented-1976-arpa-kahn-cerf
Thompson, S. T. C. (2006). Helping the hacker? library information, security,
and social
engineering. Information Technology and Libraries, 25(4), 222-225. Retrieved 5
February 2018, from https://search.proquest.com/docview/215828364.
W32.Koobface | Symantec. (2018). Symantec.com. Retrieved 15 February 2018, from
https://www.symantec.com/security_response/writeup.jsp%3Fdocid%3D2008-
080315-0217-99
Workman, M. (2008). A test of interventions for security threats from social engineering.
Information Management & Computer Security, 16(5), 463-483.
http://dx.doi.org/10.1108/09685220810920549
Young, R., Zhang, L., & Prybutok, V. R. (2007). Hacking into the minds of hackers.
Information
Systems Management, 24(4), 281-287. Retrieved 15 February 2018, from
https://search.proquest.com/docview/214129274.