Create a Annotated Bibliography using what is listed below.
References.
Cross,
Create a Annotated Bibliography using what is listed below.
References.
Cross, C., & Layt, R. (2022). “I suspect that the pictures are stolen”: romance fraud, identity crime, and responding to suspicions of inauthentic identities. Social Science Computer Review, 40(4), 955-973.
Haleem, A., Javaid, M., Qadri, M. A., & Suman, R. (2022). Understanding the role of digital technologies in education: A review. Sustainable Operations and Computers, 3, 275-285.
Jain, A. K., Sahoo, S. R., & Kaubiyal, J. (2021). Online social networks security and privacy: comprehensive review and analysis. Complex & Intelligent Systems, 7(5), 2157-2177.
Leave a Reply