Skip to content

Works Cited

Aaronson, Susan Ariel. “Inadequate Data Protection: A Threat to Economic and National Security.CEPR, 5 Feb. 2020

Aiyer, Bharath, et al. “New Survey Reveals $2 Trillion Market Opportunity for Cybersecurity Technology and Service Providers.McKinsey & Company, McKinsey & Company, 1 Nov. 2022

Andriotis, AnnaMaria. “WSJ News Exclusive | Visa, MasterCard Draw New Government Scrutiny over Debit-Card Routing.The Wall Street Journal, Dow Jones & Company, 17 Oct. 2022

Bahar, Michael. “Colorado’s New Privacy Law: How It Stacks up against Other US Privacy Laws. Eversheds Sutherland, 15 July 2021

Bannister, Adam. “Russia behind Cyber-Attack on Satellite Internet Network KA-Sat That Disrupted Ukrainian Infrastructure – EU.The Daily Swig | Cybersecurity News and Views, 10 May 2022

Bernstein, Corinne. “Personally Identifiable Information (PII).SearchSecurity, TechTarget, 24 Sept. 2021

Bloomberg Law. “What Is the VCDPA and When Does It Take Effect.Bloomberg Law, 4 Aug. 2021

Carnegie Endowment for International Peace. “Board-Level Guide: Cybersecurity Leadership – Cyber Resilience and Financial Organizations.Carnegie Endowment for International Peace

CISA. “Security Tip (ST04-001).CISA, 6 May 2009

Citrix. “What Is a Cloud Service? – Cloud Services Solutions –

Collins. “Forefront Definition and Meaning: Collins English Dictionary.Forefront Definition and Meaning | Collins English Dictionary, HarperCollins Publishers Ltd

Columbus, Louis. “2022 Cybersecurity Forecasts Predict Growth, Emphasizing Resilience.VentureBeat, VentureBeat, 5 July 2022

Cover, Rob. “Digital Surveillance.Digital Surveillance – an Overview | ScienceDirect Topics, 2016

CrowdStrike. “What Is Endpoint Detection & Response?: EDR Security, 23 Mar. 2022

Cveticanin, Nikolina. “The Largest Battlefield in History – 30 Cyber Warfare Statistics.Dataprot, 2 Nov. 2022

Editor, CSRC Content. “Cyberspace – Glossary: CSRC.CSRC Content Editor

Eira, Astrid. “16 Latest Cybercrime Trends & Predictions for 2022/2023 and,, 7 Nov. 2022

Chaos Untethered. “Elon Musk on Assassin Drones and Ai Propaganda.YouTube, YouTube, 17 Nov. 2021

Faithfull, Mark. “The Current and Future Trends in Cyber Crime.SecureTeam, 30 Sept. 2022

Fernando, Jason. “Compound Annual Growth Rate (CAGR) Formula and Calculation.Investopedia, Investopedia, 9 Nov. 2022

G2 – Business Software Reviews. “Best Cloud Ddos Mitigation Software – G2.Best Cloud DDoS Mitigation Software, 11 Nov. 2022

Garber, Judith. “Why Antitrust Laws Aren’t Stopping Some Hospital Mergers.Lown Institute, 19 Aug. 2022

Gardner, Amy. “A Majority of GOP Nominees Deny or Question the 2020 Election Results.The Washington Post, WP Company, 19 Oct. 2022

Gartner. “Future of Work.Gartner

Graphika. “Unheard Voice.Graphika Reports, 24 Aug. 2022

Greig, Jonathan. “FBI: $6.9 Billion Lost through Internet Crimes in 2021.The Record by Recorded Future, 24 Mar. 2022

HNK. “What Constitutes Misuse of Data?Higgs Newton Kenyon Solicitors, 17 Mar. 2022

Hooper, Kelly. “Trump Doesn’t Say Whether He’ll Testify in Letter to Jan. 6 Committee.POLITICO, 14 Oct. 2022

Insight. “What Is Cybersecurity Mesh?Insight

Johnson, James. “Ai, Cyberspace, and Nuclear Weapons.War on the Rocks, 31 Jan. 2020

Jones, Dustin. “What Is the ‘Great Replacement’ and How Is It Tied to the Buffalo Shooting Suspect?NPR, NPR, 16 May 2022

Kesling, Ben. “U.S. Military Bans TikTok over Ties to China.The Wall Street Journal, Dow Jones & Company, 3 Jan. 2020

Kill Switch Definition &,

Kim, Caitlin. “Data Privacy through the Lens of Big Tech.The Regulatory Review, 12 Mar. 2022

LeaksID. “How to Protect Personal Identifiable Information, When Share with Third Parties?LeaksID, 10 June 2020

Levy, Michael. “List of Amendments to the U.S. Constitution.Encyclopædia Britannica, Encyclopædia Britannica, Inc., 28 Sept. 2011

Lutkevich, Ben, et al. “What Is Phi (Protected/Personal Health Information)?SearchHealthIT, TechTarget, 5 Apr. 2021

Lutkevich, Ben. “What Is Consumer Privacy and Which Laws Protect It?SearchDataManagement, TechTarget, 12 Feb. 2020

M, Shruti. “10 Types of Cyber Attacks You Should Be Aware in, Simplilearn, 11 Nov. 2022

Malik, William, et al. “Misunderstood Private Network 5G Security Risks & Vulnerabilities.Trend Micro, 24 June 2022

McKinsey & Company. “The Global Cybersecurity Total Addressable Market May Reach $1.5 Trillion to $2 Trillion, Approximately Ten Times the Size of the Vended Market.McKinsey & Company, 2022

Meisenzahl, Mary. “US Government Agencies Are Banning TikTok, the Social Media App Teens Are Obsessed with, over Cybersecurity Fears – Here’s the Full List.Business Insider, Business Insider, 25 Feb. 2020

Metz, Cade. “Elon Musk Backtracks, Saying His Company Will Continue to Fund Internet Service in UkraineThe New York Times, The New York Times, 15 Oct. 2022

Miller, Maggie. “Ukraine’s Largest Telecom Stands against Russian Cyberattacks.POLITICO, 7 Sept. 2022

Muro, Diego. “What Does Radicalisation Look like? Four Visualisations of Socialisation into Violent Extremism.CIDOB, Dec. 2016

Pengelly, Martin. “More than 40% of Americans Think Civil War Likely within a Decade.The Guardian, Guardian News and Media, 30 Aug. 2022

Poliveiraa, UNODC. “Cybercrime Module 1 Key Issues: Global Connectivity and Technology Usage Trends.Cybercrime Module 1 Key Issues: Global Connectivity and Technology Usage Trends, May 2019

Radar Team. “Location Data Privacy Checklist.Radar Blog, 23 Feb. 2021

Rimol, Meghan. “Gartner Identifies Top Five Trends in Privacy through 2024.Gartner, 31 May 2022

Sample, Ian. “What Are Deepfakes – and How Can You Spot Them?The Guardian, Guardian News and Media, 13 Jan. 2020

Sanders, Robert. “Experts Predict: ‘by 2040 More Crime Will Be Committed by Machines than by Humans.’Futurism, Futurism, 27 Sept. 2016

Sava, Justina Alexandra. “Global Cybersecurity Market Forecast 2026.Statista, 26 July 2022

SCOTUS. “Supreme Court of the United States.Dobbs, State Health Officer of the Mississippi Department of Health, ET AL. v. Jackson Women’s Health Organization ET AL, Oct. 2021

Secuvy Inc. “Five Data Privacy Trends to Watch in 2022 and Beyond.Secuvy, 16 Feb. 2022

Sganga, Nicole. “China-Linked Influence Campaign Targeting U.S. Midterms, Security Firm Says.CBS News, CBS Interactive, 26 Oct. 2022

Shabaz, Adrian. “Freedom on the Net 2021: The Global Drive to Control Big Tech.Freedom House, 2021

Sindani, Susan. “Understanding the Process of, 1 Nov. 2022

Singleton, Camielle. “IBM Security X-Force Threat Intelligence Index.IBM, 23 Feb. 2022

Sukianto, Axel. “10 Ways to Reduce Cybersecurity Risk for Your Organization: Upguard.RSS, 27 Sept. 2022

Thompson, Mark. “CCPA-/CPRA-Related Legislation Tracker.CCPA-/CPRA-Related Legislation Tracker, Oct. 2022

Trend Micro. “Cybercriminals.Definition, 2022

Trifunovic, Darko. “Cyber War – Trends and Technologies.National Security And The Future, 2021

Tunggal, Abi Tyas. “Free Vendor Risk Assessment Questionnaire Template: Upguard.RSS, 15 Aug. 2022

U.S. D.O.D. “Strategic Direction for Cybersecurity Maturity Model Certification (CMMC) Program.U.S. Department of Defense, 4 Nov. 2021

Walker, Laura Petrone and Jemima, et al. “What Is the Splinternet and Why Does It Matter?Verdict, 30 June 2022

Ware, Jacob. “Elections, Violence, and the Future of American Democracy.Council on Foreign Relations, Council on Foreign Relations, 3 Oct. 2022 “Fact Sheet: Chips and Science Act Will Lower Costs, Create Jobs, Strengthen Supply Chains, and Counter China.The White House, The United States Government, 9 Aug. 2022 “Fact Sheet: Executive Order Addressing the Threat from Securities Investments That Finance Certain Companies of the People’s Republic of China.The White House, The United States Government, 4 June 2021 “Fact Sheet: Biden-Harris Administration Delivers on Strengthening America’s Cybersecurity.The White House, The United States Government, 10 Oct. 2022

Wolford, Ben. “What Is GDPR, the EU’s New Data Protection Law?, 26 May 2022

Wood, Molly. “We Need to Talk about ‘Cloud Neutrality’.Wired, Conde Nast, 10 Feb. 2020

Et Ciso “Gartner Identifies Top Five Trends in Privacy through 2024 – Et, 31 May 2022