Publisher
Springer Nature Switzerland
Reference23 articles.
1. Hakak, S., Khan, W., Imran, M., Choo, K.: Have you been a victim of COVID-19-related cyber incidents? Survey, taxonomy and mitigation strategies. IEEE Access 8, 124134–124144 (2020)
2. Samonas, S., Coss, D.: The CIA strikes back: redefining confidentiality, integrity and availability in security. J. Inf. Syst. Secur. 10(3) (2014)
3. IBM: Cyber Security Intelligence Index (2014). Retrieved from IBM security services: https://i.crn.com/sites/default/files/ckfinderimages/userfiles/images/crn/custom/IBMSecurityServices2014.PDF
4. Anderson, J.: Computer security technology planning study (1972)
5. Khatib, R., Barki, H.: How different rewards tend to influence employee non-compliance with information security policies. Inf. Comput. Secur. 30, 97–116 (2021)