1. Bochman, A., 2018. The end of cybersecurity. H. B. Review. https://store.hbr.org/product/the-end-of-cybersecurity/BG1803.
2. Charmaz, K., 2014. Constructing grounded theory (2nd ed. ed.). Sage.
3. The Emperor has no clothes: A critique of Safety-II;Cooper;Saf. Sci.,2022
4. Dekker, S. (2011). Drift into failure : from hunting broken components to understanding complex systems. Ashgate.
5. Dragos. (2022). CHERNOVITE’s PIPEDREAM Malware Targeting Industrial Control Systems (ICS). https://www.dragos.com/blog/industry-news/chernovite-pipedream-malware-targeting-industrial-control-systems/.