“…Viruses [6,7,31], Scams [6,8,11,12], Data loss [11], Worms [31], Trojan horse [31], Spam [31], Malicious code [12], Social engineering [25,31], Phishing [31], Hijacking [31], Vulnerability scanning [31], Password cracking [31], DDoS [31], Data leaks [11], Losing passwords [12], Spyware [11,12], Hacking [11], Unencrypted communication [18], Digital forensics [24], Network reconnaissance [24], OWASP [24], DNS attacks [22], Brute force attacks [22], Packet sniffing [22], DDoS [22], Buffer overflow [22], Cross Site Scripting [22] Non-technical Risks Cyberbullying [6,10,11,12,15,19], Cyber grooming [12,37], Technology misuse [11], Addiction [11,36,37], Overspending [12]…”