1. Heyden, L.: Informatsionnaya bezopasnost i Vseob’emlyuschiy Internet [Information Security and Comprehensive Internet]. Avtomatizatsiya I Sovremennyie Tehnologii (Electron. J.), 11, 29–31 (2013).
https://www.cisco.com/c/ru_ua/about/press/2013/05292013g.html
2. Van Niekerk, J.F., Von Solms, R.: Information security culture: a management perspective. Comput. Secur. 29(4), 476–486 (2010).
https://doi.org/10.1016/j.cose.2009.10.005
3. Ngo, L., Zhou, W., Warren, M.: Understanding transition towards information security culture change. In: Proceedings of 3rd Australian Information Security Management Conference, pp. 67–73 (2005)
4. Furnell, S., Thomson, K.L.: From culture to disobedience: recognising the varying user acceptance of IT security. Comput. Fraud Secur. 2009(2), 5–10 (2009).
https://doi.org/10.1016/s1361-3723(09)70019-3
5. Da Veiga, A., Eloff, J.H.P.: A framework and assessment instrument for information security culture. Comput. Secur. 29(2), 196–207 (2010).
https://doi.org/10.1016/j.cose.2009.09.002