1 |
Eurostat (2021f). Security related problems experienced when using the internet. https://appsso.eurostat.ec.europa.eu/nui/setupDownloads.do
|
2 |
Karlsson, F., Astrom, J., & Karlsson, M. (2015). Information security culture-state-of-the-art review between 2000 and 2013. Information & Computer Security.
|
3 |
Lebek, B., Uffen, J., Neumann, M., Hohler, B., & Breitner, M. H. (2014). Information security awareness and behavior: a theory-based literature review. Management Research Review. 37 (12), 1049-1092. https://doi.org/10.1108/MRR04-2013-0085
DOI
|
4 |
Eurostat (2021g). Activities via internet not done because of security concerns. https://appsso.eurostat.ec.europa.eu/nui/setupDownloads.do
|
5 |
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 523-548.
DOI
|
6 |
Nasir, A., Arshah, R. A., Ab Hamid, M. R., & Fahmy, S. (2019). An analysis on the dimensions of information security culture concept: A review. Journal of Information Security and Applications, 44, 12-22.
DOI
|
7 |
Tang, M., & Zhang, T. (2016). The impacts of organizational culture on information security culture: a case study. Information Technology and Management, 17(2), 179-186.
DOI
|
8 |
Van Niekerk, J. F., & Von Solms, R. (2010). Information security culture: A management perspective. Computers & security, 29(4), 476-486.
DOI
|
9 |
Da Veiga, A., & Eloff, J. H. (2010). A framework and assessment instrument for information security culture. Computers & Security, 29(2), 196-207.
DOI
|
10 |
AlHogail, A., & Mirza, A. (2014, January). Information security culture: a definition and a literature review. In 2014 World Congress on Computer Applications and Information Systems (WCCAIS) (pp. 1-7). IEEE.
|
11 |
Alnatheer, M. A. (2015, April). Information security culture critical success factors. In 2015 12th International Conference on Information Technology-New Generations (pp. 731-735). IEEE.
|
12 |
Chen, Y. A. N., Ramamurthy, K. R. A. M., & Wen, K. W. (2015). Impacts of comprehensive information security programs on information security culture. Journal of Computer Information Systems, 55(3), 11-19.
DOI
|
13 |
Da Veiga, A. (2016). Comparing the information security culture of employees who had read the information security policy and those who had not: Illustrated through an empirical study. Information & Computer Security.
|
14 |
Da Veiga, A., & Martins, N. (2015). Improving the information security culture through monitoring and implementation actions illustrated through a case study. Computers & Security, 49, 162-176.
DOI
|
15 |
El-kenawy, E. S. M. T., Saber, M., & Arnous, R. (2019). An Integrated Framework to Ensure Information Security Over the Internet. International Journal of Computer Applications, 975, 8887.
|
16 |
Eurostat (2021b). Way of obtaining ICT skills. https://appsso.eurostat.ec.europa.eu/nui/show.do?dataset=isoc_sk_how_i&lang=en
|
17 |
Eurostat (2021e). Privacy and protection of personal data (2020 onwards). https://appsso.eurostat.ec.europa.eu/nui/setupDownloads.do
|
18 |
Eurostat (2021c). Cross-classification of fixed assets by industry and by asset (stocks). https://ec.europa.eu/eurostat/web/main/data/database?p_p_id=NavTreeportletprod_WAR_NavTreeportletprod_INSTANCE_nPqeVbPXRmWQ&p_p_lifecycle=0&p_p_state=normal&p_p_mode=view
|
19 |
Eurostat (2021d). Identification procedures used for online services (2020 onwards). https://appsso.eurostat.ec.europa.eu/nui/setupDownloads.do
|
20 |
Eurostat (2021a). Individuals' level of digital skills. https://appsso.eurostat.ec.europa.eu/nui/show.do?dataset=isoc_sk_dskl_i&lang=en
|
21 |
Parsons, K. M., Young, E., Butavicius, M. A., McCormac, A., Pattinson, M. R., & Jerram, C. (2015). The influence of organizational information security culture on information security decision making. Journal of Cognitive Engineering and Decision Making, 9(2), 117-129.
DOI
|
22 |
AlHogail, A. (2015). Design and validation of information security culture framework. Computers in Human Behavior, 49, 567-575.
DOI
|
23 |
Varenia N., Avramenko S. (2020) Virtual reality as a new global factor for analyzing the level of terrorist threat. Ukrainian Journal of International Law, 2, 46-60. https://doi.org/10.36952/uail.2020.2.46-60
DOI
|
24 |
Okere, I., Van Niekerk, J., & Carroll, M. (2012, August). Assessing information security culture: A critical analysis of current approaches. In 2012 Information Security for South Africa (pp. 1-8). IEEE.
|
25 |
Hanus, B., & Wu, Y. A. (2016). Impact of users' security awareness on desktop security behavior: A protection motivation theory perspective. Information Systems Management, 33(1), 2-16. https://doi.org/10.1080/10580530.2015.1117842
DOI
|
26 |
Mahfuth, A., Yussof, S., Baker, A. A., & Ali, N. A. (2017, July). A systematic literature review: Information security culture. In 2017 International Conference on Research and Innovation in Information Systems (ICRIIS) (pp. 1-6). IEEE.
|