
INTERNATIONAL JOURNAL OF RESEARCH AND INNOVATION IN SOCIAL SCIENCE (IJRISS)
ISSN No. 2454-6186 | DOI: 10.47772/IJRISS | Volume IX Issue X October 2025
www.rsisinternational.org
REFERENCES
1. Al-Harrasi, A., Shaikh, A. K., & Al-Badi, A. (2023). Towards protecting organisations’ data by preventing
data theft by malicious insiders. International Journal of Organizational Analysis, 31(3), 875-888.
2. Ali, M. M., & Mohd Zaharon, N. F. (2024). Phishing—A cyber fraud: The types, implications and
governance. International Journal of Educational Reform, 33(1), 101-121.
3. Alkhalil, Z., Hewage, C., Nawaf, L., & Khan, I. (2021). Phishing attacks: A recent comprehensive study
and a new anatomy. Frontiers in Computer Science, 3, 563060.
4. Alzaabi, F. R., & Mehmood, A. (2024). A review of recent advances, challenges, and opportunities in
malicious insider threat detection using machine learning methods. IEEE Access, 12, 30907-30927.
5. Anazodo, R. O. (2025). Cyber Security Administration in Developing Countries: A Nigerian
Perspective. International Journal of Finance, Accounting and Management Studies, 1(4), 122-139.
6. Ayinla, O. A. (2024). The Impact of Crime on Economic Hardship In Oyo State, Nigeria. Journal of
Business Development and Management Research.
7. Bhowmik, S. (2023). The Evolution of Crime: The Dynamic Definition of Crime as per Society. Issue 3
Int'l JL Mgmt. & Human., 6, 3638.
8. Button, M., & Whittaker, J. (2021). Exploring the voluntary response to cyber-fraud: From vigilantism to
responsibilisation. International Journal of Law, Crime and Justice, 66, 100482.
9. Chhabra Roy, N., & P, S. (2024). Proactive cyber fraud response: a comprehensive framework from
detection to mitigation in banks. Digital Policy, Regulation and Governance, 26(6), 678-707.
10. Chen, S., Hao, M., Ding, F., Jiang, D., Dong, J., Zhang, S., ... & Gao, C. (2023). Exploring the global
geography of cybercrime and its driving forces. Humanities and Social Sciences Communications, 10(1), 1-
10.
11. Choudhary, A., Choudhary, G., Pareek, K., Kunndra, C., Luthra, J., & Dragoni, N. (2022). Emerging cyber
security challenges after COVID pandemic: a survey. Journal of Internet Services and Information
Security, 12(2), 21-50.
12. Gryszczyńska, A. (2021). The impact of the COVID-19 pandemic on cybercrime. Bulletin of the Polish
Academy of Sciences. Technical Sciences, 69(4).
13. Harold, C. M., Hu, B., & Koopman, J. (2022). Employee time theft: Conceptualization, measure
development, and validation. Personnel Psychology, 75(2), 347-382.
14. Homoliak, I., Toffalini, F., Guarnizo, J., Elovici, Y., & Ochoa, M. (2019). Insight into insiders and it: A
survey of insider threat taxonomies, analysis, modeling, and countermeasures. ACM Computing Surveys
(CSUR), 52(2), 1-40.
15. INTERPOL. (2020, August 4). INTERPOL report shows alarming rate of cyberattacks during COVID-19.
https://www.interpol.int/News-and-Events/News/2020/INTERPOL-report-shows-alarming-rate-of-
cyberattacks-during-COVID-19.
16. Juneja, A., Goswami, S. S., & Mondal, S. (2024). Cyber security and digital economy: opportunities, growth
and challenges. Journal of technology innovations and energy, 3(2), 1-22.
17. Kenneth, A., Hayashi, B. B., Lionardi, J., Richie, S., Achmad, S., & Junior, F. A. (2023, August). Phishing
attack awareness among college students. In 2023 3rd International Conference on Electronic and
Electrical Engineering and Intelligent System (ICE3IS) (pp. 344-348). IEEE.
18. Kont, K. R. (2023). Cyber literacy skills of Estonians: activities and policies for encouraging knowledge-
based cyber security attitudes. Information & Media, (96), 80-94.
19. Kovandzic, T. V., & Vieraitis, L. M. (2006). The effect of county‐level prison population growth on crime
rates. Criminology & Public Policy, 5(2), 213-244.
20. Ma, K. W. F., & McKinnon, T. (2022). COVID-19 and cyber fraud: Emerging threats during the
pandemic. Journal of Financial Crime, 29(2), 433-446.
21. Mali, P., Sodhi, J. S., Singh, T., & Bansal, S. (2018). Analysing the awareness of cybercrime and designing
a relevant framework with respect to cyber warfare: an empirical study. International Journal of Mechanical
Engineering and Technology, 9(2), 110-124.
22. Mallick, M. A. I., & Nath, R. (2024). Navigating the cyber security landscape: A comprehensive review of
cyber-attacks, emerging trends, and recent developments. World Scientific News, 190(1), 1-69.
23. MohamedAli, R. S., & Abduhameed, R. A. (2024, May). Phishing email detection: Survey. In International
Conference on Advanced Engineering, Technology and Applications (pp. 551-570). Cham: Springer Nature