Literaturhinweise
Literaturhinweise
Bibliografie:
The Filter Bubble: What The Internet Is Hiding From You, Eli Pariser
https://edu.gcfglobal.org/en/digital-media-literacy/what-is-an-echo-chamber/1/
https://www.thepacer.net/the-destructive-nature-of-echo-chambers/
SURVEY AND BRIEF HISTORY ON MALWARE IN NETWORK SECURITY CASE STUDY: VIRUSES, WORMS AND BOTS Saif Uldun Mostfa Kamal, Rana Jabbar Abd Ali, Haider Kamal Alani and Esraa Saad Abdulmajed Faculty of Information Science and Technology, National University of Malaysia (UKM), Malaysia
https://www.kaspersky.com/resource-center/threats/computer-viruses-vs-worms
Computer Viruses and Malware, John Aycock
https://www.unicef.org/turkiye/en/cyberbullying-what-it-and-how-stop-it
https://www.scamwatch.gov.au/protect-yourself/ways-to-spot-and-avoid-scams
Learning to detect phishing emails, Authors: Ian Fette, Norman Sadeh, Anthony Tomasic, 2007
https://www.itgovernance.co.uk/blog/5-ways-to-detect-a-phishing-email
https://www.pandasecurity.com/en/mediacenter/what-is-pharming/
1st picture pharming - phishing
An Overview of Darknet, Rise and Challenges and Its Assumptions, Zakariye Mohamud Omar, Jamaluddin Ibrahim, 2020, Faculty of Information and Communication Technology, International Islamic University Malaysia (IIUM), Kuala Lumpur, Malaysia
The Darknet and the Future of Content Distribution Peter Biddle, Paul England, Marcus Peinado, and Bryan Willman
https://us.norton.com/blog/how-to/how-can-i-access-the-deep-web (picture)
Privacy-preserving deanonymization of Dark Web Tor Onion services for criminal investigations, Ângelo, Daniel José Ferreira
https://www.domaintools.com/resources/blog/dark-web-myths-and-misconceptions/
https://www.thinkuknow.co.uk/professionals/our-views/the-dark-web/
A Comprehensive Survey on Ransomware Attack: A Growing Havoc Cyberthreat, Aditya Tandon and Anand Nayyar
A brief study of Wannacry Threat: Ransomware Attack 2017, Savita Mohurle & Manisha Patil, International Journal of Advanced Research in Computer Science
PROTECTING SUB MODULE 4
https://link.springer.com/chapter/10.1007/978-1-4302-6383-8_7#Sec20
https://www.verizon.com/articles/internet-essentials/antivirus-definition/
https://www.vistainfosec.com/blog/gdpr-biometric-data-ethical-privacy/
https://www.william-russell.com/blog/global-transport-index/
https://sweden.se/climate/sustainability/10-ways-to-a-greener-future
https://swedishcleantech.com/cleantech-sectors/sustainable-transportation/
https://www.linkedin.com/pulse/7-ways-digital-technologies-helping-protect-our-planet-contreras/