References
- Alpcan, T., & Başar, T. (2010). Network security: A decision and Game-Theoretic approach. In Network Security: A Decision and Game-Theoretic Approach, available at: https://doi.org/10.1017/CBO978051176077810.1017/CBO9780511760778
- Business Insider. (2018). Facebook just announced it was hacked, and almost 50 million users have been affected, available at: https://www.businessinsider.com.au/facebook-security-attack-affecting-50-million-users-2018-9
- Business Insider. (2019). Facebook understood how dangerous the Trump-linked data firm Cambridge Analytica could be much earlier than it previously said. Here’s everything that’s happened up until now, available at: https://www.businessinsider.com/cambridge-analytica-a-guide-to-the-trump-linked-data-firm-that-harvested-50-million-facebook-profiles-2018-3
- Chandler, A.D. (1962). Strategy and Structure: Chapters in the History of the American. MIT Press.
- CNBC. (2019, October 30). Facebook stock rises on better-than-expected revenue and earnings, available at: https://www.cnbc.com/2019/10/30/facebook-fb-q3-2019-earnings.html
- Das Magazin. (2016, December 3). Ich habe nur gezeigt, dass es die Bombe gibt, available at: https://www.dasmagazin.ch/2016/12/03/ich-habe-nur-gezeigt-dass-es-die-bombe-gibt/
- Dawson, M., Bacius, R., Gouveia, L. B., & Vassilakos, A. (2021). Understanding the challenge of cybersecurity in critical infrastructure sectors. Land Forces Academy Review, Vol. 101, Issue 1, 69–75, available at: https://doi.org/10.2478/raft-2021-001110.2478/raft-2021-0011
- European Parliament and of the Council. (2015). Directive (EU) 2015/2366 of the European Parliament and of the Council. Journal of the European Union.
- European Parliament and of the Council. (2016). Directive (EU) 2016/1148 of the European Parliament and of the Council. Journal of the European Union.
- Emmanuel Chukwudi, A. (2017). Game Theory Basics and Its Application in Cyber Security. Advances in Wireless Communications and Networks, available at: https://doi.org/10.11648/j.awcn.20170304.1310.11648/j.awcn.20170304.13
- Ernst &Young. (2020). How does security evolve from bolted on to built-in?, available at: https://assets.ey.com/content/dam/ey-sites/ey-com/en_gl/topics/advisory/ey-global-information-security-survey-2020-report-single-pages.pdf
- European Commission. (2012). Tackling Crime in our Digital Age: Establishing a European Cybercrime Centre (COM/2012/0140 final).
- Facebook. (2019). Keeping Passwords Secure, available at: https://about.fb.com/news/2019/03/keeping-passwords-secure/, accessed on 10 august 2020.
- Facebook. (2020). Available at: https://about.fb.com/company-info/, accessed on 30 October 2020.
- Herath, T., Herath, H., & Bremser, W. G. (2010). Balanced Scorecard Implementation of Security Strategies: A Frameworkfor IT Security Performance Management. Information Systems Management, Vol. 27, Issue 1, 72–81, available at: https://doi.org/10.1080/1058053090345524710.1080/10580530903455247
- ISO/IEC. (2013). ISO/IEC 27001:2013 Information technology – Security techniques – Information security management systems – Requirements.
- Kaplan, R.S., & Norton, D.P. (1992). The Balanced Scorecard-Measures that Drive Performance. Harvard Business Review.
- Manshaei, M.H., Zhu, Q., Alpcan, T., Basar, T., & Hubaux, J.P. (2013). Game theory meets network security and privacy. ACM Computing Surveys, available at: https://doi.org/10.1145/2480741.248074210.1145/2480741.2480742
- Markets Insider. (2019). Facebook shares drop sharply after unearthed emails reportedly show Mark Zuckerberg is aware of “problematic privacy practices” (FB), available at: https://markets.businessinsider.com/news/stocks/facebook-stock-price-reaction-to-zuckerberg-reportedly-aware-privacy-issues-2019-6-1028274446
- Omalaja, M.A., Eruola, O.A., & College, I. (2011). Strategic Management Theory : Concepts, Analysis and Critiques in Relation to Corporate Competitive Advantage from the Resource-based Philosophy. Economic Analysis.
- PCI Security Standards Council. (2018). Payment Card Industry (PCI) – Data Security Standard – Requirements and Security Assessment Procedures, available at: https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf
- European Parliament and of the Council. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council, Official Journal of the European Union.
- European Parliament and of the Council. (2014). Regulation (EU) No 910/2014 of the European Parliament and of the Council. Official Journal of the European Union.
- StatCounter. (2020). GlobalStats, available at: from https://gs.statcounter.com/, accessed on 27 October, 2020
- Techcrunch. (2019, September 4). A huge database of Facebook users’ phone numbers found online, available at: https://techcrunch.com/2019/09/04/facebook-phone-numbers-exposed/
- The Guardian. (2015, December 6). What are Facebook and other social media doing about Donald Trump?, available at: https://www.theguardian.com/technology/2015/dec/06/donald-trump-facebook-social-media-tv
- The Guardian. (2017). Watchdog to launch inquiry into misuse of data in politics, available at: https://www.theguardian.com/technology/2017/mar/04/cambridge-analytics-data-brexit-trump
- The Guardian. (2018). Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach, available at: https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election
- The Intercept. (2017). Facebook failed to protect 30 million users from having their data harvested by Trump campaign affiliate, available at: https://theintercept.com/2017/03/30/facebook-failed-to-protect-30-million-users-from-having-their-data-harvested-by-trump-campaign-affiliate/
- The New York Times. (2016, November 20). Cambridge Analytica and the Secret Agenda of a Facebook Quiz, available at: https://www.nytimes.com/2016/11/20/opinion/cambridge-analytica-facebook-quiz.html
- The Verge. (2019, March 13). Facebook, Instagram, and WhatsApp are still down for some users around the world, available at: https://www.theverge.com/2019/3/13/18264092/facebook-instagram-down-partially-post-messages-profile-loading
- Van Grembergen, W. (2000). The balanced scorecard and IT governance. ISACA Journal.
- von Neumann, J., & Morgenstern, O. (2007). Theory of games and economic behavior. In Theory of Games and Economic Behavior. Princeton University Press, available at: https://doi.org/10.2307/201932710.2307/2019327
- Wheeler, E. (2011). Security Risk Management. Syngress.
