1.
Susanto, H., Almunawar, M. N., & Tuan, Y. C. “Information security management system standards: A comparative study of the big fiveâ€. 2011
2.
Dubois, É., Heymans, P., Mayer, N., & MatuleviÄius, R. “A systematic approach to define the domain of information system security risk managementâ€. In Intentional Perspectives on Information Systems Engineering, 2010, pp. 289-306. Springer Berlin Heidelberg.
3.
Liang, H., & Xue, Y. “Understanding security behaviors in personal computer usage: A threat avoidance perspectiveâ€. Journal of the Association for Information Systems, 2010, 11(7), 394-413.
4.
Hu, Q., Xu, Z., Dinev, T., & Ling, H. “Does deterrence work in reducing information security policy abuse by employees?†Communications of the ACM, 2011, 54(6), 54-60.
5.
Lioy, Antonio, Antonio Pastor, Fulvio Risso, Roberto Sassu, and Adrian L. Shaw. "Offloading security applications into the network." In eChallenges e-2014, 2014 Conference, pp. 1-9. IEEE.
6.
Thomson, G. “BYOD: enabling the chaosâ€. Network Security, 2012, (2), 5-8.
7.
Huang, C. C., Lin, F. Y., Lin, F. Y. S., & Sun, Y. S. “A novel approach to evaluate software vulnerability prioritizationâ€. Journal of Systems and Software, 2013, 86(11), 2822-2840.
8.
Park, Y., Lee, C., Kim, J., Cho, S. J., & Choi, J. “An Android security extension to protect personal information against illegal accesses and privilege escalation attacksâ€. Journal of Internet Services and Information Security (JISIS), 2012, 2(3/4), 29-42.
9.
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. “Information security policy compliance: an empirical study of rationality-based beliefs and information security awarenessâ€. MIS quarterly, 2010, 34(3), 523-548.
10.
Fenz, S. “Ontology-based generation of IT-security metricsâ€. In Proceedings of the 2010 ACM Symposium on Applied Computing, 2010, (pp. 1833-1839).
11.
Al Kailani, M., & Kumar, R. “Investigating uncertainty avoidance and perceived risk for impacting internet buying: a study in three national culturesâ€. International Journal of Business and Management, 2011, 6(5), p76.
12.
Weber, R. H. (2011) “Internet of Things–New security and privacy challengesâ€. Computer Law & Security Review, 26(1), 23-30.
13.
Herath, T., & Rao, H. R. “Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectivenessâ€. Decision Support Systems, 2009, 47(2), 154-165.
14.
Warkentin, M., & Willison, R. “Behavioral and policy issues in information systems security: the insider threatâ€. European Journal of Information Systems, 2009, 18(2), 101.
15.
D'Arcy, J., Hovav, A., & Galletta, D. “User awareness of security countermeasures and its impact on information systems misuse: a deterrence approachâ€. Information Systems Research, 2009, 20(1), 79-98.
16.
Dlamini, M. T., Eloff, J. H., & Eloff, M. M. “Information security: The moving targetâ€. Computers & Security, 2009, 28(3), 189-198.
17.
Kandukuri, B. R., Paturi, V. R., & Rakshit, A. “Cloud security issuesâ€. In Services Computing, SCC'09. IEEE International Conference on, 2009, (pp. 517-520). IEEE.
18.
Tapia, A. H., Bajpai, K., Jansen, B. J., Yen, J., & Giles, L. “Seeking the trustworthy tweet: Can microblogged data fit the information needs of disaster response and humanitarian relief organizationsâ€. In Proceedings of the 8th International ISCRAM Conference, 2011, (pp. 1-10).
19.
Otero, A. R., Otero, C. E., & Qureshi, A. “A multi-criteria evaluation of information security controls using Boolean featuresâ€. International Journal of Network Security & its application (IJNSA), 2010, 2(4).
20.
Ahmad, A., Maynard, S. B., & Park, S. “Information security strategies: towards an organizational multi-strategy perspectiveâ€. Journal of Intelligent Manufacturing, 2014, 25(2), 357-370.
21.
Lo, C. C., & Chen, W. J. “A hybrid information security risk assessment procedure considering interdependences between controlsâ€. Expert Systems with Applications, 2012, 39(1), 247-257.
22.
Ross, S. M., & Morrison, G. R. “Experimental research methodsâ€. In D. H. Jonassen (Ed.), Handbook of research on educational communications and technology (2nd ed). 2004, Mahwah, New Jersey: Lawrence Erlbaum Associates, Inc.
23.
Williams, C. “Research methodsâ€. Journal of Business & Economics Research (JBER), 2011, 5(3).