참고문헌
- Gordieiev, O., Kharchenko, V., Illiashenko, O., Morozova, O., Gasanov, M. Concept of using eye tracking technology to assess and ensure cybersecurity, functional safety and usability. International Journal of Safety and Security Engineering, Vol. 11, No. 4, 2011, pp. 361-367. https://doi.org/10.18280/ijsse.110409
- Kryshtanovych, M., Petrovskyi, P., Khomyshyn, I., Bezena, I., & Serdechna, I. Peculiarities of implementing governance in the system of social security. Business, Management and Economics Engineering, 2020, 18(1), 142-156. https://doi.org/10.3846/bme.2020.12177 .
- Ismail A., Saad M., Abbas R. Cybersecurity in internet of things, Review of Computer Engineering Studies, Vol. 5, No. 1, 2018, pp. 17-22. https://doi.org/10.18280/rces.050104
- Kryshtanovych M., Britchenko I., Losonczi P., Baranovska T., Lukashevska U. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents. International Journal of Computer Science and Network Security. Vol. 22 2022, No. 4 pp. 33-38. https://doi.org/10.22937/IJCSNS.2022.22.4.5
- Sylkin, O., Kryshtanovych, M., Bekh, Y., & Riabeka, O. Methodology of forming model for assessing the level financial security . Management Theory and Studies for Rural Business and Infrastructure Development, 2020, 42(3), 391-398. https://doi.org/10.15544/mts.2020.39
- Kryshtanovych, S., Gutsulyak, V., Huzii, I., Helzhynska, T., & Shepitchak, V. Modeling the process of risk management response to the negative impact of risks as the basis for ensuring economic security. Business, Management and Economics Engineering, 2021, 19(2), 289-302. https://doi.org/10.3846/bmee.2021.14798
- Kryshtanovych, S., Treshchov, M., Durman, M., Lopatchenko, I., & Kernova, M. Gender parity in public administration in the context of the development of european values in the management system. Financial and Credit Activity: Problems of Theory and Practice, 2021, 4(39), 475-481. https://doi.org/10.18371/.v4i39.241416
- Petroye, O., Lyulyov, O., Lytvynchuk, I., Paida, Y., Pakhomov, V. Effects of information security and innovations on country's image: Governance aspect. International Journal of Safety and Security Engineering, Vol. 10, No. 4, 2020, pp. 459-466. https://doi.org/10.18280/ijsse.100404
- Lainjo, B. Network security and its implications on program management. International Journal of Safety and Security Engineering, Vol. 10, No. 6, 2020, pp. 739-746. https://doi.org/10.18280/ijsse.100603
- Yasmin, M., Sohail, A.; Sarkar, M., & Hafeez, R. Creative methods in transforming education using human resources. Creativity Studies, 10(2), 2017, 145-158. https://doi.org/10.3846/23450479.2017.1365778
- Gandhi, R., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q., Laplante, P. Dimensions of cyber-attacks: Cultural, social, economic, and political. IEEE Technology and Society Magazine, 2011, 30(1): 28-38. https://doi.org/10.1109/MTS.2011.940293
- Jarvis, L., Macdonald, S., Nouri, L. The cyberterrorism threat: Findings from a survey of researchers. Studies in Conflict & Terrorism, 37(1): 2014, 68-90. https://doi.org/10.1080/1057610X.2014.853603
- Thijittang, S. A study of pragmatic strategies of English of Thai University students: Apology speech acts. University of Tasmania. 2010.https://eprints.utas.edu.au/10754/7/Thijittang_whole_thesis.pdf
- Hutchings, A. Crime from the keyboard: organised cybercrime, co-offending, initiation and knowledge transmission. Crime, Law and Social Change, 62(1): 2014, 1-20. https://doi.org/10.1007/s10611-014-9520-z .
- Luo, H.N. An emergency management system for government data security based on artificial intelligence. Ingenierie des Systemes d'Information, Vol. 25, No. 2, 2020, pp. 207-213. https://doi.org/10.18280/isi.250208