1. Chaffey, Wood.Business Information Management: Improving Performance Using Information Systems.Essex: Pearson Education Limited, 2005. 2. Olugbode, M., Richards, R. and Biss, T.The Role of Information Technology in Achieving the Organisation's Strategic Development Goals: A Case Study. Information Systems, vol. 32, no. 5, pp. 641-648, 2007. 3. Yeganegi K., Arbabi Z., andHussein, A.I. The Role of Information Technology in National Security. In Journal of Physics: Conference Series, vol.1530, no. 1, pp. 012112, 2020. 4. Assefa T.Factors Influencing Information Security Compliance: An Institutional Perspective. SINET: Ethiopian Journal of Science, vol. 44, no. 1, pp. 108-118, 2021. 5. Kim, D. and Solomon, M.G.Fundamentals of information systems security. Jones & Bartlett Publishers. 2018 6. Alotaibi, M., Furnell, S. and Clarke, N.Information Security Policies: A Review of Challenges and Influencing Factors. In2016 11th International Conference for Internet Technology and Secured Transactions (ICITST), IEEE, pp. 352-358, 2016. 7. www.iso.org, accessed April 2022. 8. https://www.wsj.com/articles/travelex-currency-exchange-network-shut-down-by-virus-attack-11577995684, accessed April 2022. 9. https://www.csoonline.com/article/2365062/code-spaces-forced-to-close-its-doors-after-security-incident.html, accessed April 2022. 10. https://www.hipaajournal.com/wood-ranch-medical-announces-permanent-closure-due-to-ransomware-attack, accessed April 2022. 11. https://economictimes.indiatimes.com/industry/banking/ finance/banking/cosmos-banks-server-hacked-rs-94-crore -siphoned-off-in-2-days/articleshow/65399477.cms?from=mdr, accessed April 2022. 12. Siponen, M. and Willison, R.Information Security Management Standards: Problems and Solutions. Information & management, vol.46, no. 5, pp. 267-270. 2009. 13. www.gartner.com, accessed April 2022. 14. https://appwiki.checkpoint.com/appwikisdb/public.htm, accessed April 2022. 15. https://www.fortiguard.com/encyclopedia/applications/, accessed April 2022. 16. https://applipedia.paloaltonetworks.com/, accessed April 2022. 17. www.radware.com, accessed April 2022. 18. www.imperva.com, accessed April 2022. 19. Mishra, S. and Chasalow, L.Information Security Effectiveness: A Research Framework. Issues in Information Systems, vol.12, no. 1, pp. 246-255. 2011. |