References
- Algarni, A.M., Malaiya, Y.K., 2016. A Consolidated Approach for Estimation of Data Security Breach Costs. Proceedings of 2016 2nd International Conference on Information Management (ICIM2016), IEEE.
- Ando, R., Shima, S., Takemura, T., 2016. Analysis of Privacy and Security Affecting the Intention of Use in Personal Data Collection in an IoT Environment. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, Volume E 99D, Issue 8, 1974-1981. DOI: 10.1587/transinf.2015INI0002
- Bishop, M., 2003. What is computer security? IEEE Security and Privacy, Volume 1, Issue 1, 67-69. DOI: 10.1109/MSECP.2003.1176998
- Bishop, M., Frincke, D.A., 2005. Teaching secure programming. IEEE Security and Privacy, Volume 3, Issue 5, 54-56.
- da Veiga, A., Martins, N., 2015. Improving the information security culture through monitoring and implementation actions illustrated through a case study. Computers & Security 49, 162-176. DOI: 10.1016/j.cose.2014.12.006
- Denning, D.A., 1982. Cryptograpy and data security, Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 3-4.
- Jowit, T., IT Security Spending To Reach £50bn, But Human Error Is Still Main Cause Of Data Loss. http://www.silicon.co.uk
- Liu, Y., 2015. Privacy Protection Method in the Era of Cloud Computing and Big Data. International Conference on Engineering Technology and Application (ICETA 2015), MATEC Web of Conferences, Volume 22, 1-4. DOI: 10.1051/matecconf/20152201041
- Misa, T.J., Computer Security Discourse at RAND, SDC, and NSA (1958-1970). IEEE Annals of the History of Computing, Volume 38, Issue 4, 12-25. DOI: 10.1109/MAHC.2016.48
- Rocha, F. W., Antonsen, E., Ekstedt, M., 2014. Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture. Computers&Security, Vol. 43, 90-110. DOI: 10.1016/j.cose.2014.03.004
- https://www.gemalto.com/press/Pages/First-Half-2017-Breach-Level-Index-Report-Identity-Theft-and-Poor-Internal-Security-Practices-Take-a-Toll.aspx
- https://www.cybercom.com/pl/Poland/security/security-blog-pl/ile-kosztuje-wyciek-danych--10-znanych-przypadkow
- https://www.breachlevelindex.com/assets/Breach-Level-Index-Report-2017-Gemalto.pdf