1. A foundation for breach data analysis;Adebayo;J. Inform. Eng. Appl.,2012
2. Towards a conceptual definition for IT assets through interrogating their nature and epistemic uncertainties;Adesemowo;Comput. Secur.,2021
3. AICPA (2015). Security regains place as top technology priority for CPAs, North American survey finds (April 16, 2015). URL: https://www.aicpa.org/press/pressreleases/2015/security-regains-place-as-top-technology-priority-for-cpas-north-american-survey-finds.html, accessed August 26, 2021
4. Technology acceptance model in M-learning context: a systematic review;Al-Emran;Comput. Educ.,2018
5. Socio-economic factors on sector-wide systematic risk of information security breaches: conceptual framework;Ali,2020