Which of the following statements is NOT accurate? A. Threats that involve hacking are attempts to obtain private data. B. There are no standards for tallying computer crime costs. C. We do not know the full extent of the financial and data losses due to computer security threats. D. When conducting studies on the cost of computer crimes, some organizations don't report all of their losses. E. Forms of usurpation deny access to legitimate users.