These are the sources and citations used to research Bibliography. This bibliography was generated on Cite This For Me on
In-text: (Al-Harrasi, Shaikh and Al-Badi, 2021)
Your Bibliography: Al-Harrasi, A., Shaikh, A. and Al-Badi, A., 2021. Towards protecting organisations’ data by preventing data theft by malicious insiders | Emerald Insight. [online] Emerald.com. Available at: <https://www.emerald.com/insight/content/doi/10.1108/IJOA-01-2021-2598/full/html> [Accessed 29 March 2022].
In-text: (Althobaiti, 2017)
Your Bibliography: Althobaiti, A., 2017. Analyzing Security Threats to Virtual Machines Monitor in Cloud Computing Environment. [online] Scientific Research Publishing Inc. Available at: <https://www.scirp.org/journal/PaperInformation.aspx?PaperID=72584> [Accessed 29 March 2022].
In-text: (Chang and Yeh, 2022)
Your Bibliography: Chang, A. and Yeh, Q., 2022. On security preparations against possible IS threats across industries | Emerald Insight. [online] Emerald.com. Available at: <https://www.emerald.com/insight/content/doi/10.1108/09685220610690817/full/html> [Accessed 29 March 2022].
In-text: (Djatsa, 2020)
Your Bibliography: Djatsa, F., 2020. Threat Perceptions, Avoidance Motivation and Security Behaviors Correlations. [online] Research Publishing Inc. Available at: <https://www.scirp.org/journal/paperinformation.aspx?paperid=96987> [Accessed 29 March 2022].
In-text: (Fenz, Heurix, Neubauer and Pechstein, 2022)
Your Bibliography: Fenz, S., Heurix, J., Neubauer, T. and Pechstein, F., 2022. Current challenges in information security risk management | Emerald Insight. [online] Emerald.com. Available at: <https://www.emerald.com/insight/content/doi/10.1108/IMCS-07-2013-0053/full/html> [Accessed 29 March 2022].
In-text: (Hussien, 2021)
Your Bibliography: Hussien, A., 2021. Cyber Security Crimes, Ethics and a Suggested Algorithm to Overcome Cyber-Physical Systems Problems (CybSec1). [online] Scientific Research Publishing Inc. Available at: <https://www.scirp.org/journal/paperinformation.aspx?paperid=106538> [Accessed 29 March 2022].
In-text: (Kwateng, Tetteh, Atchulo and Opoku-Mensah, 2022)
Your Bibliography: Kwateng, K., Tetteh, F., Atchulo, H. and Opoku-Mensah, S., 2022. Effect of corporate environmental strategies on firms’ competitiveness, the mediating role of supply chain collaboration. [online] Emerald Insight. Available at: <https://www.emerald.com/insight/content/doi/10.1108/JGR-02-2021-0026/full/html> [Accessed 29 March 2022].
In-text: (Mbow, Msanjila and Oreku, 2014)
Your Bibliography: Mbow, J., Msanjila, S. and Oreku, G., 2014. A Conceptual Framework for Threat Assessment Based on Organization's Information Security Policy. [online] Research Gate. Available at: <https://www.researchgate.net/publication/266623388_A_Conceptual_Framework_for_Threat_Assessment_Based_on_Organization%27s_Information_Security_Policy> [Accessed 29 March 2022].
In-text: (Mbowe, Msanjila, . Oreku and Kalegele1, 2016)
Your Bibliography: Mbowe, J., Msanjila, S., . Oreku, G. and Kalegele1, K., 2016. On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach. [online] Scientific Research Publishing Inc. Available at: <https://www.scirp.org/journal/paperinformation.aspx?paperid=73180> [Accessed 29 March 2022].
In-text: (Mukkavilli, Shetty and Hong, 2016)
Your Bibliography: Mukkavilli, S., Shetty, S. and Hong, L., 2016. Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers. [online] Scientific Research Publishing Inc. Available at: <https://www.scirp.org/journal/paperinformation.aspx?paperid=65482> [Accessed 29 March 2022].
In-text: (Skoll, 2016)
Your Bibliography: Skoll, G., 2016. Stealing Consciousness:: Using Cybernetics for Controlling Populations. [online] Research Gate. Available at: <https://www.researchgate.net/publication/314565398_Stealing_Consciousness_Using_Cybernetics_for_Controlling_Populations> [Accessed 29 March 2022].
In-text: (Weiss, 2015)
Your Bibliography: Weiss, N., 2015. The Target and Other Financial Data Breaches: Frequently Asked Questions. [online] sgpfas.org. Available at: <https://sgp.fas.org/crs/misc/R43496.pdf> [Accessed 29 March 2022].
10,587 students joined last month!