[
Algarni, A.M., Malaiya, Y.K., 2016. A Consolidated Approach for Estimation of Data Security Breach Costs. Proceedings of 2016 2nd International Conference on Information Management (ICIM2016), IEEE.
]Search in Google Scholar
[
Ando, R., Shima, S., Takemura, T., 2016. Analysis of Privacy and Security Affecting the Intention of Use in Personal Data Collection in an IoT Environment. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, Volume E 99D, Issue 8, 1974-1981. DOI: 10.1587/transinf.2015INI0002
]Search in Google Scholar
[
Bishop, M., 2003. What is computer security? IEEE Security and Privacy, Volume 1, Issue 1, 67-69. DOI: 10.1109/MSECP.2003.1176998
]Search in Google Scholar
[
Bishop, M., Frincke, D.A., 2005. Teaching secure programming. IEEE Security and Privacy, Volume 3, Issue 5, 54-56.
]Search in Google Scholar
[
da Veiga, A., Martins, N., 2015. Improving the information security culture through monitoring and implementation actions illustrated through a case study. Computers & Security 49, 162-176. DOI: 10.1016/j.cose.2014.12.006
]Search in Google Scholar
[
Denning, D.A., 1982. Cryptograpy and data security, Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 3-4.
]Search in Google Scholar
[
Jowit, T., IT Security Spending To Reach £50bn, But Human Error Is Still Main Cause Of Data Loss. http://www.silicon.co.uk
]Search in Google Scholar
[
Liu, Y., 2015. Privacy Protection Method in the Era of Cloud Computing and Big Data. International Conference on Engineering Technology and Application (ICETA 2015), MATEC Web of Conferences, Volume 22, 1-4. DOI: 10.1051/matecconf/20152201041
]Search in Google Scholar
[
Misa, T.J., Computer Security Discourse at RAND, SDC, and NSA (1958-1970). IEEE Annals of the History of Computing, Volume 38, Issue 4, 12-25. DOI: 10.1109/MAHC.2016.48
]Search in Google Scholar
[
Rocha, F. W., Antonsen, E., Ekstedt, M., 2014. Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture. Computers&Security, Vol. 43, 90-110. DOI: 10.1016/j.cose.2014.03.004
]Search in Google Scholar
[
https://www.gemalto.com/press/Pages/First-Half-2017-Breach-Level-Index-Report-Identity-Theft-and-Poor-Internal-Security-Practices-Take-a-Toll.aspx
]Search in Google Scholar
[
https://www.cybercom.com/pl/Poland/security/security-blog-pl/ile-kosztuje-wyciek-danych--10-znanych-przypadkow
]Search in Google Scholar
[
https://www.breachlevelindex.com/assets/Breach-Level-Index-Report-2017-Gemalto.pdf
]Search in Google Scholar