These are the sources and citations used to research Bibliography. This bibliography was generated on Cite This For Me on

  • Website

    Al-Harrasi, A., Shaikh, A. K. and Al-Badi, A.

    Towards protecting organisations’ data by preventing data theft by malicious insiders | Emerald Insight

    2021 - International Journal of Organizational Analysis

    In-text: (Al-Harrasi, Shaikh and Al-Badi, 2021)

    Your Bibliography: Al-Harrasi, A., Shaikh, A. and Al-Badi, A., 2021. Towards protecting organisations’ data by preventing data theft by malicious insiders | Emerald Insight. [online] Emerald.com. Available at: <https://www.emerald.com/insight/content/doi/10.1108/IJOA-01-2021-2598/full/html> [Accessed 29 March 2022].

  • Website

    Althobaiti, A. F. S.

    Analyzing Security Threats to Virtual Machines Monitor in Cloud Computing Environment

    2017 - Scientific Research Publishing Inc.

    In-text: (Althobaiti, 2017)

    Your Bibliography: Althobaiti, A., 2017. Analyzing Security Threats to Virtual Machines Monitor in Cloud Computing Environment. [online] Scientific Research Publishing Inc. Available at: <https://www.scirp.org/journal/PaperInformation.aspx?PaperID=72584> [Accessed 29 March 2022].

  • Website

    Chang, A. J. and Yeh, Q.

    On security preparations against possible IS threats across industries | Emerald Insight

    2022 - Information Management & Computer Security

    In-text: (Chang and Yeh, 2022)

    Your Bibliography: Chang, A. and Yeh, Q., 2022. On security preparations against possible IS threats across industries | Emerald Insight. [online] Emerald.com. Available at: <https://www.emerald.com/insight/content/doi/10.1108/09685220610690817/full/html> [Accessed 29 March 2022].

  • Website

    Djatsa, F.

    Threat Perceptions, Avoidance Motivation and Security Behaviors Correlations

    2020 - Research Publishing Inc.

    In-text: (Djatsa, 2020)

    Your Bibliography: Djatsa, F., 2020. Threat Perceptions, Avoidance Motivation and Security Behaviors Correlations. [online] Research Publishing Inc. Available at: <https://www.scirp.org/journal/paperinformation.aspx?paperid=96987> [Accessed 29 March 2022].

  • Website

    Fenz, S., Heurix, J., Neubauer, T. and Pechstein, F.

    Current challenges in information security risk management | Emerald Insight

    2022 - Information Management & Computer Security

    In-text: (Fenz, Heurix, Neubauer and Pechstein, 2022)

    Your Bibliography: Fenz, S., Heurix, J., Neubauer, T. and Pechstein, F., 2022. Current challenges in information security risk management | Emerald Insight. [online] Emerald.com. Available at: <https://www.emerald.com/insight/content/doi/10.1108/IMCS-07-2013-0053/full/html> [Accessed 29 March 2022].

  • Website

    Hussien, A. A.

    Cyber Security Crimes, Ethics and a Suggested Algorithm to Overcome Cyber-Physical Systems Problems (CybSec1)

    2021 - authors and Scientific Research Publishing Inc.

    In-text: (Hussien, 2021)

    Your Bibliography: Hussien, A., 2021. Cyber Security Crimes, Ethics and a Suggested Algorithm to Overcome Cyber-Physical Systems Problems (CybSec1). [online] Scientific Research Publishing Inc. Available at: <https://www.scirp.org/journal/paperinformation.aspx?paperid=106538> [Accessed 29 March 2022].

  • Website

    Kwateng, K. O., Tetteh, F. K., Atchulo, H. B. and Opoku-Mensah, S.

    Effect of corporate environmental strategies on firms’ competitiveness, the mediating role of supply chain collaboration

    2022 - Journal of Global Responsibility

    In-text: (Kwateng, Tetteh, Atchulo and Opoku-Mensah, 2022)

    Your Bibliography: Kwateng, K., Tetteh, F., Atchulo, H. and Opoku-Mensah, S., 2022. Effect of corporate environmental strategies on firms’ competitiveness, the mediating role of supply chain collaboration. [online] Emerald Insight. Available at: <https://www.emerald.com/insight/content/doi/10.1108/JGR-02-2021-0026/full/html> [Accessed 29 March 2022].

  • Website

    Mbow, J. E., Msanjila, S. S. and Oreku, G. S.

    A Conceptual Framework for Threat Assessment Based on Organization's Information Security Policy

    2014 - authors and Scientific Research Publishing Inc

    In-text: (Mbow, Msanjila and Oreku, 2014)

    Your Bibliography: Mbow, J., Msanjila, S. and Oreku, G., 2014. A Conceptual Framework for Threat Assessment Based on Organization's Information Security Policy. [online] Research Gate. Available at: <https://www.researchgate.net/publication/266623388_A_Conceptual_Framework_for_Threat_Assessment_Based_on_Organization%27s_Information_Security_Policy> [Accessed 29 March 2022].

  • Website

    Mbowe, J. E., Msanjila, S. S., . Oreku, G. S. and Kalegele1, K.

    On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach

    2016 - Scientific Research Publishing Inc.

    In-text: (Mbowe, Msanjila, . Oreku and Kalegele1, 2016)

    Your Bibliography: Mbowe, J., Msanjila, S., . Oreku, G. and Kalegele1, K., 2016. On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach. [online] Scientific Research Publishing Inc. Available at: <https://www.scirp.org/journal/paperinformation.aspx?paperid=73180> [Accessed 29 March 2022].

  • Website

    Mukkavilli, S. K., Shetty, S. and Hong, L.

    Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers

    2016 - Scientific Research Publishing Inc.

    In-text: (Mukkavilli, Shetty and Hong, 2016)

    Your Bibliography: Mukkavilli, S., Shetty, S. and Hong, L., 2016. Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers. [online] Scientific Research Publishing Inc. Available at: <https://www.scirp.org/journal/paperinformation.aspx?paperid=65482> [Accessed 29 March 2022].

  • Website

    Skoll, G. R.

    Stealing Consciousness:: Using Cybernetics for Controlling Populations

    2016 - IGI Global

    In-text: (Skoll, 2016)

    Your Bibliography: Skoll, G., 2016. Stealing Consciousness:: Using Cybernetics for Controlling Populations. [online] Research Gate. Available at: <https://www.researchgate.net/publication/314565398_Stealing_Consciousness_Using_Cybernetics_for_Controlling_Populations> [Accessed 29 March 2022].

  • Website

    Weiss, N. E. W.

    The Target and Other Financial Data Breaches: Frequently Asked Questions

    2015 - Congressional Research Service

    In-text: (Weiss, 2015)

    Your Bibliography: Weiss, N., 2015. The Target and Other Financial Data Breaches: Frequently Asked Questions. [online] sgpfas.org. Available at: <https://sgp.fas.org/crs/misc/R43496.pdf> [Accessed 29 March 2022].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join