Reference:
Lininger,
R., & Vines, R. D. (2005). Identity theft protection: How to protect
your finances, credit, and bank accounts from identity theft and fraud.
John Wiley & Sons.
Labrecque,
L. I., Markos, E., Swain, K., & Pena, P. (2021). Digital deception:
Understanding consumer vulnerability to identity theft in the digital
age.
https://www-sciencedirect-com.library.sheridanc.on.ca/science/article/pii/S0019850124000452
Davis, J.
(2005). Curb card skimming. Credit Union Magazine, 71(9),
60.
Curb Card
Skimming - ProQuest
TRAI warns
against fake calls threatening mobile disconnection. (2025). Voice &
Data. Retrieved from
https://www.proquest.com/trade-journals/trai-warns-against-fake-calls-threatening-mob
Harrell, E.,
& Langton, L. (2013). Victims of identity theft, 2012. U.S. Department
of Justice.
http://www.bjs.gov/content/pub/pdf/vit12.pdf
Watts, S.
(2016). Secure authentication is the only solution for vulnerable public
Wi-Fi. Computer Fraud & Security, 2016(1), 18–20.
https://www-sciencedirect-com.library.sheridanc.on.ca/science/article/pii/S1361372316300094
Cybersecurity & Infrastructure Security Agency. (2022). Choosing and
protecting passwords. U.S. Department of Homeland Security.
https://www.cisa.gov/news-events/news/choosing-and-protecting-passwords
Anupam Das,
Joseph Bonneau, Matthew Caesar, Nikita Borisov, XiaoFeng Wang, NDSS 14
(20140, 23-26, 2014
https://www-sciencedirect-com.library.sheridanc.on.ca/science/article/pii/S0167404819301105#bib0011
Nalin Asanka
Gamagedara Arachchilage, Steve Love, Security awareness of computer
users: A phishing threat avoidance perspective. Computers in Human
Behaviour, 38, 304–312.
https://www-sciencedirect-com.library.sheridanc.on.ca/science/article/pii/S0747563219302778#bib3
Watts, S.
(2016). Secure authentication is the only solution for vulnerable public
WiFi. Computer Fraud & Security, 2016(1), 18–20.
https://www.sciencedirect.com/science/article/abs/pii/S1361372316300094