dc.identifier.citation |
[1] Atul M. Tonge1, S. S. (2013). Cyber security:challenges for society-literature review. IOSR Journal of Computer Engineering (IOSR-JCE)e-ISSN: 2278-0661, p-ISSN: 2278-8727Volume 12, Issue 2(May. -Jun. 2013), PP 67-75 www.iosrjournals.orgwww.iosrjournals.org 2278-0661, p-ISSN: 2278-8727Volume 12, Issue 2(May. -Jun. 2, 67-75. [2] Benini, A. P. (2017, August). The Use of Expert Judgment in Humanitarian Analysis Theory, Methods,Applications. Geneva, Assessment Capacities Project - ACAPS. [3] Blair, A. D. (2009). Annual Threat Assessment. House Permanent Select Committee on Intelligence, . [4] Boyce, M. (2015). Human Performance in Cybersecurity. Proceedings of the Human Factors and Ergonomics Society 55th Annual Meeting (pp. 1002-1006). Las Vegas, Nevada USA.: HFES-Human Factors and Ergonomics Society. [5] Chelanga, M. (2014, August Wednesday). Cyber-criminals Hack Government of Kenya At Will and the State is Helpless. Retrieved from Eastafrican Standard: http://ilaw.co.ke/tech-and-innovation/cyber-criminals-hack-government-of-kenya-at-will-and-the-state-is-helpless/#.WQiaesb-vIU [6] Clark, A. &. (2016, june 07). Proceedings of a Workshop on Deterring Cyber Attacks. Cyber Security and International Agreements ,Internet Corporation for Assigned Names and Numbers, pp. 185-205. [7] Cresswell, J. (2014). Research Design Qualitative, Quantitative and Mixed Methods Approaches 4th Edition. In C. J.W, Research Design. Canada: Canadian Center of Science and Education. Paper ID: SR21714030154 DOI: 10.21275/SR21714030154 796 International Journal of Science and Research (IJSR) ISSN: 2319-7064 SJIF (2020): 7.803 Volume 10 Issue 7, July 2021 www.ijsr.net Licensed Under Creative Commons Attribution CC BY [8] Cresswell, J. W. (2016). Planning , Conducting and Evaluating Qualitative and Quantitative Research. London: Pearson Education Inc. [9] Green, L. A. (2015). Purposeful Sampling for Qualitative Data Collection and Analysis in Mixed Method Implementation Research. Administration and Policy in Mental Health and Mental Health Services Research, September 2015, Volume 42, Issue 5, pp 533–544, 533-544. [10] Ilker Etikan, S. A. (2016). Comparison of Convenience Sampling and Purposive Sampling. American Journal of Theoretical and Applied Statistics,Published online December 22, 2015 (http://www.sciencepublishinggroup.com/j/ajtas) doi: 10.11648/j.ajtas.20160501.11, 1-4. [11] Jean-Paul A. Yaacoub, a. O. (2020). Cyber-physical systems security: Limitations, issues and future trends. Elsevier Public Health Emergency Collection-Published online 2020 Jul 8. doi: 10.1016/j.micpro.2020.103201. [12] Jingguo. (2010). An Investigation of Network Attacks and Vulnerability. ACM Transactionson Management, Information Systems. [13] Julian Jang-Jaccard, S. N. (2018). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences-Volume 80, Issue 5, August 2014, Pages 973-993-https://doi.org/10.1016/j.jcss.2014.02.005, 973-993. [14] Knave, C. (2009). Cyber security effectively negating further use. IEEE, 20 - 24. [15] Kothari, C. (2010). Research Methodology: Methods and Techniques. Mumbai: New Age International publishers. . [16] Michael Boyce, &. K. (2015). Human Performance in Cybersecurity. Proceedings of the Human Factors and Ergonomics Society 55th Annual Meeting (pp. 1002-1006). Las Vegas, Nevada USA: HFES-Human Factors and Ergonomics Society. [17] Mohamed Abomhara & Geir M. Køien. (2015). Cyber Security and the Internet ofThings:Vulnerabilities,Threats, Intruders and Attacks. Journal of Cyber Security, Vol. 4, 65–88-doi: 10.13052/jcsm2245-1439.414 , 65-88. [18] Murithi & Mwinzi. (2016). he Influence of Financial Resources on the integration of the National Goals of Education. International Journal of Education and Research. [19] Murithi Tiberious, M. J. (2016). The Influence of Financial Resources on the integration of the National Goals of Education . International Journal of Education and ResearchVol. 4 No. 9 September2016. [20] Neetesh Saxena, E. H. (2020). Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses. MDPI Electronics Open Acess Journal . [21] Nepal, J. J. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences,Volume 80, Issue 5, August 2014, Pages 973-993, 973-993. [22] Paula Kigen, C. K. (2014). KENYA CYBER SECURITY REPORT 2014 Rethinking Cyber Security –An Integrated Approach: Processes, Intelligence and Monitoring. Nairobi: Serianu Limited. [23] Pressman, R. S. (2004). Software Engineering: A Practitioner's Approach: 6th (Sixth) Edition. ISA: McGraw-Hill Companies, The (March 24, 2004). [24] RegDennick, M. T. (2011). Making sense of Cronbach’s alpha. International Journal of Medical Education. 2011; 2:53-55 , ISSN: 2042-6372 DOI: 10.5116/ijme.4dfb.8dfd, 53-55 . [25] Rossouwvon Solms & Johanvan Niekerk. (2013). From information security to cyber security. Volume 38, October 2013, Pages 97-102 -https://doi.org/10.1016/j.cose.2013.04.004, 97-102. [26] Saunders, M. (2009). Ethics in Research. London: Pearson Education. [27] Suraj, A. &. (2013, may). Cyber security: challenges for society- literature review. IOSR Journal of Computer Engineering (IOSR-JCE), pp. 67-75. [28] Thomas W. Edgar, D. O. (2017). Science and Cyber Security in Research Methods for Cyber Securit. In D. O. Thomas W. Edgar, Research Methods for Cyber Security (pp. 393-404). Elsevier B.V. . [29] Wang, P. &. (2010). The deterrent and displacement effects of information security enforcement. International evidence. J. Manag. Inf. Syst., 125–144. |
en_US |