Part A: Reflective CPD (Continuous Professional Development)
1.1 Introduction
In this reflective CPD (Continuous Professional Development) session, which is dedicated to my personal growth and development in cybersecurity research, I am uplifting issues on issues regarding the area of cybersecurity research. This introductory narration traverses past accomplishments, existing capabilities, and a prospect plan in the context of dissertation writing. This part would be focused on the reflection of oneself and a SWOT analysis, which would reveal weaknesses, strengths, opportunities, and threats, bringing the research plan into a more formal designing phase. This plan will be a guide, mapping out the steps to the other three pillars for the final Project and for professional considerations, ethics, and research.
1.2 Self-Reflection on Past Achievements
During the various academic and professional stages in my learning pathway, I came across numerous occasions of struggle and success that have defined my knowledge and understanding of cybersecurity, research methodologies, and project planning and execution. A notable accomplishment in my past activities was that I managed to get through a research project about the vulnerability of cybersecurity in e-commerce systems. At the same time, I was an undergrad at the university. This task broadened my cybersecurity knowledge and improved my research skills with the data sets analyzed and how I approach the research question. Alongside attending different cyber-security workshops and sessions, I realized that I have roped in people from diverse backgrounds and of the latest developments in digital security. My skills in solving tough cybersecurity challenges have greatly improved through these new exposure areas.
Despite the successes, I realized how adversities and difficulties pushed my limits and forced me to discover new ways to tackle the problems. The overshadowing matter being considered was the entanglement in the cybersecurity frameworks and regulations, mainly when working on a consulting project for a multinational corporation. The initial period of my internship was virtually a tragedy. However, it showed me the absolute imperativeness of adaptation and constant learning in the fast-changing cybersecurity field. In addition, the transformation from academic research to real-life applications has been my challenge, which I overcame mainly during the theory-practical abstractions. Implementing complex ideas in an engaging yet real-world way was challenging and demanded interdisciplinary interaction with industry professionals.
1.3 Personal SWOT Analysis
Strengths
Among the things that I often set as my strong points, I refer to the strength of my knowledge in cybersecurity and ways of researching a topic. I have gained a considerable understanding of cybersecurity using formal training and practical experience that involves detecting and assessing risks and introducing a security system. Furthermore, I bring research methodological skills, like collecting, analyzing, and interpreting data, that make me capable of performing advanced and thorough research projects. Besides that, learning completion, as well as upgrading myself with accompanying technology and standards, makes sure that my cybersecurity skills are of the last practice.
Weaknesses
Despite my skills, I recognize myself as a person with some space for growth. One of my areas for improvement is my limited exposure to contrasting analysis and case studies, which I am optimistic about in cyber security. I am perfectly aware of my theoretical knowledge of cybersecurity concepts, yet I have never had a chance to apply it in real-world cases. Another thing I agree with is the need to enhance my time management skills, especially when balancing a professional life with educational responsibilities.
Opportunities
Cybersecurity has great potential because it offers plenty of growth and development to be tapped into. In the first place, cybersecurity evolves rapidly, providing flexibility that opens doors for the continuous increase of skills and learning. By being aware of recent developments in the area of cybersecurity technologies and its related industries, I could enhance my know-how and expertise in well-known areas of the cybersecurity field. The rising demand for cybersecurity experts across different sectors will further create the career ladder and specialization for cybersecurity professionals. Similarly, interdisciplinary collaboration with industry experts and networking with them can offer an alternative way of exposing ourselves to many novel insights and methods.
Threats
Though the advantages above are the reality, this is not the end of the line because there are dangers, some of which I may encounter in the dissertation quest. The other significant risk is the elusive quality and rapid turnover of cybersecurity menaces and rules. Adapting to the increasing computing threats and policy requirements could lead to problems in research focus and project management, so far as this issue is concerned. Furthermore, my research capacity may be limited by imbalances like the availability of proper data and industry relations, which implies that I will need more in-depth and extensive research. Lastly, the possibility of cybersecurity research being overcome by the competition might cause problems in terms of the uniqueness and the innovation of the research contribution.
1.4 Research Personal Development Plan
Table 1: Research Personal Development Plan
Goals/Steps | Timeline | Resources Needed | Skill Development | Milestones |
Literature Review | Month 1 – Month 2 | Access to academic databases, journals | Critical analysis, synthesis | Completion of literature review |
Identify Research Questions | Month 2 – Month 3 | Guidance from supervisor, relevant literature | Problem formulation | Finalization of research questions |
Develop Research Methodology | Month 3 – Month 4 | Consultation with supervisor, textbooks | Research design, data collection | Approval of research methodology by supervisor |
Data Collection | Month 4 – Month 6 | Access to relevant datasets, surveys | Data gathering techniques | Completion of data collection |
Data Analysis | Month 6 – Month 7 | Statistical software, guidance from the supervisor | Data interpretation | Completion of data analysis |
Drafting Chapters | Month 7 – Month 9 | Word processing software, literature | Writing, structuring | Completion of draft chapters |
Revision and Editing | Month 9 – Month 10 | Writing resources, feedback from peers | Editing, proofreading | Finalization of the dissertation draft |
Final Dissertation Submission | Month 10 | Submission guidelines, supervisor approval | Presentation skills | Submission of the finalized dissertation to the examiner |
Part B: Research Log
Table 2: Reflective Logs
Entry Number | Date | Key Activities | Reflection |
1 | 2024-05-14 | Attended online seminar on cybersecurity trends | Learned about emerging threats and industry best practices |
2 | 2024-05-15 | Conducted a literature review on cybersecurity in the retail industry | Identified key research gaps and potential sources for data collection |
3 | 2024-05-18 | Discussed research methodology with supervisor | Clarified doubts regarding data collection techniques and research design |
4 | 2024-05-21 | Started drafting literature review section of dissertation | Faced challenges in synthesizing diverse literature and integrating findings into a coherent narrative |
5 | 2024-05-25 | Met with a librarian to explore access to relevant datasets | Explored available datasets and identified potential sources for primary data collection |
6 | 2024-05-28 | Attended workshop on data analysis techniques | Learned about advanced statistical methods and tools for data interpretation |
7 | 2024-06-02 | Surveyed on cybersecurity awareness among retail employees | Faced challenges in survey design and response collection but gained valuable insights from responses |
8 | 2024-06-07 | Analyzed survey data and preliminary findings | Encountered difficulties in data cleaning and analysis but identified initial trends and patterns |
9 | 2024-06-12 | Revised research methodology based on feedback from supervisor | Incorporated suggestions for improving research design and data collection techniques |
10 | 2024-06-15 | Presented preliminary findings to the research group for feedback | Received constructive criticism and suggestions for refining analysis and interpretation |
11 | 2024-06-20 | Reviewed literature on cybersecurity measures in retail organizations | Identified additional sources supporting the importance of robust security measures |
12 | 2024-06-25 | Conducted interviews with cybersecurity experts in the retail industry | Faced challenges in scheduling interviews and formulating relevant questions but gained valuable insights |
13 | 2024-06-30 | Analyzed interview transcripts and synthesized key findings | Encountered difficulties in thematic analysis but eventually derived meaningful insights from interviews |
14 | 2024-07-05 | Incorporated feedback from the supervisor on the literature review section | Addressed gaps in literature coverage and strengthened arguments through additional citations |
15 | 2024-07-10 | Developed draft chapters for the dissertation | Faced challenges in structuring chapters and maintaining coherence but made significant progress |
16 | 2024-07-15 | Attended webinar on ethical considerations in cybersecurity research | Gained insights into ethical dilemmas and considerations in data collection and analysis |
17 | 2024-07-20 | Revised research methodology based on ethical guidelines | Ensured alignment with ethical principles and addressed potential biases in data collection |
18 | 2024-07-25 | Conducted peer review of colleague’s dissertation draft | Provided feedback on organization and clarity of arguments, received constructive criticism for own work |
19 | 2024-07-30 | Finalized dissertation draft and submitted to supervisor for review | Reflecting on the journey, recognized personal growth and development in research and academic writing |
20 | 2024-08-05 | Received feedback from supervisor and made final revisions | Incorporated suggestions for improving the clarity, coherence, and overall quality of the dissertation |
Part C: Project Proposal
3.1 Introduction
Project Title: Comparative Analysis of Cybersecurity Measures in Retail Giants: A Case Study of IKEA and Amazon
3.1.1 Background
The retail industry is leaning more on digital technologies to leverage their customers’ tour value, reduce operational costs, and make a profit. Rather than contribute to the smooth retail operation, the digital transformation process has opened retailers to many cyber threats, such as data breaches and ransomware, which compromise the retail system (Li and Liu, 2021). The intricate nature of the modern retail ecosystem is a comprehensive amalgamation of online platforms, payment schemes, and customer data; it has thus been a favorite among cybercriminals for hacking into exploitable loopholes in security systems (Mishra et al., 2022).
The significance of cybersecurity measures has been established, as they ensure the confidentiality of held information, instill trust among consumers, and ensure that business operations are running smoothly. Indeed, for this purpose, maximizing the awareness of the cybersecurity situation within the retail environment is a compulsory measure for organizations willing to prevent problems and safely keep their property (Li and Liu, 2021). This paper attempts to conduct a comparative cybersecurity analysis of two retail giants, IKEA and Amazon. This helps us know the impact of existing security measures, detect possible weak points in protection, and show a best practice to improve cyber resilience.
3.1.2 Aim
The overarching aim of this Project is to analyze and compare cybersecurity measures implemented by IKEA and Amazon to identify strengths, weaknesses, and areas for improvement.
3.1.3 Research Questions and SMART Objectives
Research Questions
- What key cybersecurity measures are implemented by IKEA and Amazon to protect their digital assets and customer data?
- How do the cybersecurity practices of IKEA and Amazon compare effectiveness, comprehensiveness, and adaptability?
- What are the main challenges and vulnerabilities faced by IKEA and Amazon in maintaining cybersecurity resilience, and how are these addressed?
SMART Objectives
- To conduct a comprehensive review of literature and industry reports to identify key cybersecurity measures and best practices relevant to the retail sector.
- To analyze publicly available information, including corporate reports, press releases, and cybersecurity disclosures, to assess IKEA and Amazon’s cybersecurity strategies and initiatives.
- To conduct interviews or surveys with cybersecurity experts and industry professionals to gain insights into the challenges and opportunities associated with cybersecurity in the retail industry.
- To compare and contrast the cybersecurity measures and practices of IKEA and Amazon, highlighting similarities, differences, strengths, and weaknesses.
- To provide recommendations for enhancing cybersecurity resilience in the retail sector based on the findings of the comparative analysis.
3.1.4 Research Scope
This research aims to analyze the cybersecurity practices and mechanisms adopted by several retail giants, like IKEA and Amazon, which are currently active across the globe. The markets to be covered will have a geographical reach from North America and Europe to Asia-Pacific (Mishra et al., 2022). The temporal element will cover recent events and trends, especially over the last five years. The industry sector will have a well-intended limit on the businesses it covers, such as online and physical stores.
3.2. Literature Review
3.2.1Introduction
As the retail business sector constantly implements digital technologies, the industry remains infected by various cyber threats. This section reviews the existing literature on cybersecurity in the retail sector, which provides critical ideas and findings on the weaknesses of current research.
3.2.2 Cyber Threat Landscape in Retail
George, Baskar, and Srikaanth (2024) contend that the commercial sector suffers from several mounting and different cyber-attacks: data breaches, ransomware attacks, and supply chain vulnerability. The threats significant to different industries, bearing in mind the number of personal details stored, are the issues that all retailers face. Data security is a significant problem for retailers, the primary victims. The digital commerce market is likelier to be a scale target than regular retail workplaces. Cybercriminals ‘ goal is to control customer data and other sensitive information.
The confronting nature of the intensifying speed and the advanced techniques of cybercriminals indicates that retailers must develop more solid cybersecurity and robust risk management strategies (George, Baskar, and Srikanth, 2024). A haphazard approach towards cybersecurity may lead to severe consequences involving operating costs, damaged images, and even fines by the government. Subsequently, every retail business should consider acquiring knowledge about the advancing cyber threat landscape to keep its assets secure and provide the same levels of trust consumers expect in the digitized marketplace.
3.2.3 Cybersecurity Measures and Practices
Many research works have shown that as cybersecurity is a regional phenomenon, retailers must defend themselves with several security measures. These measures comprise a spectrum of techniques ranging from encryption, firewalls, intrusion detection systems (IDS), and employee awareness training programs (Uchendu et al., 2021). Encryption is the primary barrier mechanism for turning readable data into unreadable data that the general public cannot read. The firewall unit serves as a shield, analyzing traffic coming and going on the network and stopping malicious actions and defensive assaults. Intrusion detection systems see themselves as wise guards, discovering and announcing to administrators the attempts of a security breach or any abnormal network activity.
On a positive note, these cybersecurity measures are primarily designed to play a more significant role in providing cyber resilience against cyber threats. Nevertheless, their level of effectiveness is also significantly affected by the factors of their implementation, configuration, and maintenance. According to the research, while preserving devices solely does not, it cannot ensure complete protection against threats like ransomware, which keep evolving (Uchendu et al., 2021). Additionally, the human component is paramount because employees are meant to be responsible for the overall implementation of security procedures and can quickly discover emergent issues. Hence, there is a currently prepared task to assess and gauge the effectiveness of cybersecurity procedures through comprehensive evaluation and measurement of the level of risks and organization assets. Research shows that it is essential (or on a need-to-know basis) to regularly conduct security audits, penetration testing, and vulnerability assessments to discover any weaknesses and solve them to strengthen the overall security posture (Taherdoost, 2022).
3.2.4 Impact of Cybersecurity Incidents
The effects of cybersecurity incidents experienced by retail businesses are complex and can result in negative repercussions that cut across different angles. Send feedback to the author. Another obvious outcome is a financial loss of money stolen due to cyber-attacks or compromised sensitive data, disrupting normal business operations (Perols and Murthy, 2020). In the long run, apart from immediate financial costs, customers’ trust and loyalty can experience deterioration due to these factors (impact) (Alharbi et al., 2021). Shoppers can gain the impression that compromised retailers are less secure and defect from these stores to places they consider more secure due to such behavior, leading to a loss of sales and declining market share.
Other than this, cybersecurity breaches frequently expose companies to legal implications as these can be fined or penalized by regulators for failing to meet data protection laws or adequately executing measures to protect customer data; it is worthy of note. Another legal liability that data processing may involve is when there are lawsuits filed by individuals who claim that there has been a breach of their privacy rights or that there has been negligence. In addition to the apparent side effects of cyber security incidents, things like brand equity and investor confidence have been damaged in a certain way (Perols and Murthy, 2020). There could be a scenario in which a business is a victim of a tarnished reputation, and all it takes to rebuild its image is years due to the monitoring from regulators, consumers, and its very own stakeholders (Alharbi et al., 2021). Consequently, it has become integral to understand the intertwined and complex aspects of cyber-attacks to sustain investment in cyber security and encourage a proactive mindset and quick action in handling cyber-attack incidents within retail businesses.
3.2.5 Regulatory Compliance and Standards
The retail business domain is precisely aligned with the regulation obliging the stringent principles of data protection and privacy to provide some shield security to customers’ information against cyber threats. Indeed, GDPR is an apt illustration of the E.U.’s action to “align national laws on data privacy and strengthen individuals’ appearance rights on personal data” (Taherdoost, 2022). Adherence to Data protection principles established under the GDPR regime, including data minimization, transparency, and accountability, requires retailers to develop robust data protection infrastructure and mechanisms to collect valid customer consent for any data processing activity (Bechara and Schuch, 2021).
Moreover, retail deals with vast legislations and standards restricted to it that are directed at improving security practices and combing with the developed threats. One of the standards is the Payment Card Industry Data Security Standard (PCI-DSS), which ensures a secure framework of information processing and management systems for organizations that handle cardholder information and believes in providing the solution to payment card fraud (Taherdoost, 2022). How an organization may comply with the PCI-DSS may, for instance, be taken through designing a secure network setting in the environment for the payment process, as well as the use of encryption and, at the same time, the regular assessment of system vulnerability. In the meantime, institutions should consider globally approved standards, such as the international standard ISO 27001, as the best security practices for developing the future cybersecurity state in the retail industry (Bechara and Schuch, 2021). A systemic approach to managing all information security risks is offered through ISO 27001, including risk assessment, implementation of security controls, and monitoring and continuous improvement.
3.2.6 Research Gap and Summary
Although retail cybersecurity is a widely acquired research interest, a significant and valuable scientific chasm still needs to be explored about the impartial comparison of cybersecurity measures among retail giants like IKEA and Amazon. The main focus of prior literature is more on single-case studies or generally on information security measures for retailing sectors, which fails to bridge immediate gaps by providing thorough comparative studies touching upon strategies and effectiveness of customer interest-protecting infrastructure of various retailers. This gap must be addressed because insights into identifying product and operational strengths, loopholes, and best cybersecurity practices can only be done across multiple retail contexts. It intends to fill this research gap by carrying out a comparative analysis to contribute to a profound comprehension of cybersecurity in retail, which offers clues to decision-makers, practitioners, and researchers concerning appropriate steps for cyber threat subduing and the sustainability of security.
3.3. Research Methodology and Planning
3.3.1 Research Design
The research design for analyzing the cyber security roles of IKEA and Amazon uses a mixed-methods approach, such that a combination of quantitative and qualitative methods will be employed to achieve a profound understanding of the research problems. Qualitative data techniques of mixed type, such as semi-structured interviews and focus group discussions, would be applied to determine the opinions and insight of the critical security number, I.T. officers, and members of management of IKEA and Amazon (Rezigalla, 2020). A particular emphasis will be on how different organizations have adopted a wide range of measures such as encryption, security breach prevention, constant certification of employees, response protocols for crises, and legal compliance. By utilizing qualitative data analysis methods like thematic or pattern analysis, cybersecurity practices’ narratives of weaknesses, strengths, and unique solutions in retail, both good and bad, will be identified. Therefore, a nuanced or in-depth comprehension of why these practices are being taken will be gathered.
Quantitative data collection would involve analyzing publicly available data, including cyber theft incident reports, financial declarations, and sections from regulatory filings (Rezigalla, 2020). Quantitative metrics such as incident frequency and severity, financial loss during cyber hacker attacks, and adherence to industry standards will be analyzed and compared between IKEA and Amazon. The quantitative analysis provides empirical evidence to support the qualitative findings of the lab research, thus enabling a comparison between the two rivals’ cybersecurity performance.
3.3.2 Research Approach
This research uses a comparative analysis approach to repeat the comparisons of the destination websites’ cybersecurity measures between IKEA and Amazon. This type of research enables a comprehensive evaluation of the cyber practices followed by most well-known retail companies (Mohajan and Mohajan, 2022). Based on the experience, it allows drawing lessons learned, which could be helpful in general. The equalizing analysis will involve both qualitative and quantitative manipulations to collect and analyze data from different places of compounding information like interviews, surveys, and external information. Anything from conducting interviews to quantitative studies will furnish a deep comprehension of the particular cybersecurity procedures and tactics each retailer uses, and a quantitative approach will then be used to back up the findings (Posada-Quintero and Chon, 2020). This research study follows a comparative approach aimed at discovering both the similarities and dissimilarities of cybersecurity practices between IKEA and Amazon.
3.3.3 Data Sources and Collection
The study will use many sources to acquire information on the cybersecurity decisions of IKEA and Amazon. The key informants will be recruited through semi-structured interviews, which will be conducted with the cyber security experts, I.T. personnel, and the senior management of the two organizations. These discussions will offer a better understanding of the particular cybersecurity strategies that each retailer is using, as well as their responsibilities and problems (Posada-Quintero and Chon, 2020). Furthermore, questionnaires might be used to get quantitive data on cybersecurity investments, incident response potential, and industry compliance standards. In addition to obtaining supplementary data from sources such as financial disclosures, regulatory filings, cybersecurity reports, and company publications, we will also use exploratory data analysis to find correlations to our model and anomalies.
3.3.4 Data Analysis
The data collected through these surveys will undergo the process of data analysis where logical and sensible inputs will be derived as findings and the comparison between IKEA and Amazon’s cybersecurity measures. Qualitative data consisting of interviews and survey responses will be processed using the thematic analysis approach to uncover the recurrence, distribution, and difference in cybersecurity practices. This qualitative analysis will pave the way for a deeper study of sensitive issues about cybersecurity, like organizational culture, power allocation, and the management of risks (Longpre et al., 2023). Quantitative data will be subjected to a specific statistical analysis to determine the differences in cybersecurity performance measures succeeded by the retail second companies. Statistical methods, including descriptive statistics, regression analyses, and hypothesis testing, will be utilized to gauge the frequency and severity of network attacks, damages and infringements, and adherence to regulatory standards.
3.3.5 Project Plans
Gantt Chart
Table 3: Gantt Chart Table
Task ID | Task Description | Duration | Start Date | End Date |
1 | Literature Review | 4 weeks | 01/06/2024 | 29/06/2024 |
2 | Data Collection | 6 weeks | 30/06/2024 | 10/08/2024 |
3 | Data Analysis | 5 weeks | 11/08/2024 | 14/09/2024 |
4 | Comparative Analysis | 4 weeks | 15/09/2024 | 10/10/2024 |
5 | Writing Draft Proposal | 3 weeks | 11/10/2024 | 31/10/2024 |
6 | Review and Revision | 2 weeks | 01/11/2024 | 14/11/2024 |
7 | Finalizing Proposal and Submission | 1 week | 15/11/2024 | 21/11/2024 |
Monitoring and Control Table
Table 4: Monitoring and Control Table
Task Description | Deliverables | Resources | Skills | Timeframe | Milestones | Methods | Costs |
Literature Review | Literature review report | Researcher | Research, Analysis | 4 weeks | Completion of literature review | Literature review | Researcher time, access to databases |
Data Collection | Collected interview transcripts, survey responses | Researcher, IT | Data collection | 6 weeks | Data collection completed | Interviews, surveys | Travel expenses for interviews, survey tools |
Data Analysis | Analyzed data sets | Researcher, IT | Data analysis | 5 weeks | Data analysis completed | Statistical analysis | Software licenses, statistical tools |
Comparative Analysis | Comparative analysis report | Researcher | Analysis | 4 weeks | Comparative analysis completed | Comparative analysis | Researcher time, access to databases |
Writing Draft Proposal | Draft proposal document | Researcher | Writing | 3 weeks | Draft proposal completed | Writing | Researcher time |
Review and Revision | Revised proposal document | Researcher | Review, Revision | 2 weeks | Revised proposal completed | Review, revision | Researcher time |
Finalizing Proposal and Submission | Final proposal document submitted | Researcher | Finalization | 1 week | Proposal submitted | Submission | Printing, binding, postage |
3.3.6 Risk Assessment and Management
The risk assessment has to be conducted by initiating a comprehensive risk assessment at the beginning to identify the threats and uncertainties that might lead to the Project getting started. Such risks include avoiding data loss, scope stability, tactical obstacles, and time limits. Implementing strategies to deal with these risks, which involve taking preventive measures in advance, is imperative (Gasmi et al., 2020). This consists of putting in place backup plans for unforeseen occasions, which will also continuously check progress against prearranged specifications, guaranteeing administrative transparency and efficient use of resources. Moreover, risk assessments should be redone frequently to keep current new risks found during the research process, thus making sure the Project remains on track and is resilient to disruptions.
3.4. Conclusions
To complete the critical analysis of the security measures in online retailers, IKEA and Amazon Company, it is necessary to focus on various professional, ethical, legal, social, and security factors involved in the research task. This process will involve being completely objective, unbiased, and accurate to the information throughout the research process among the professionals. This entails taking measures that ensure the projects are conducted accountable and adhere to the rules of the academy and best practices. Similarly, the researchers face the challenge of maintaining confidentiality and respecting the privacy of the people and organizations involved in the study.
In ethics, however, all research must begin by the researcher answering the question. This involves informed consent among participants, which has to be taken into account; possible harm or risk has to be treated cautiously, and a clear benefit of the research, which is in comparison with potential drawbacks, is taken into account. Ethical complications persist, and the correct, secure, and reliable data management approach is only sometimes available. From a legal point of view, the student must refer to the rules and regulations that also oversee data protection, privacy, and intellectual property. On the other hand, researchers must comply with the GDPR by handling the personal data involved in their research activities or the breach of copyrights or patents.
The societal aspects of the research need to consider the extensive consequence of cybersecurity measures on society, for instance, the range of social challenges in the form of fairness, access, and the digital divide. It is essential to scrutinize the conditions under which security measures will influence detergents or benefits according to socioeconomic class and to aim for equitable and inclusive results. In this case, the security aspect should be the first among the matters handled since all the private data and intellectual property, if leaked, will ruin the entire research altogether. In this case, the company must create a robust security system that secures the data from intruders, hackers, and cyber-attacks. Moreover, researchers need to evaluate the effect of their results on security organizations as a whole, including their safety concepts.
References
Alharbi, F., Alsulami, M., AL-Solami, A., Al-Otaibi, Y., Al-Osimi, M., Al-Qanor, F. and Al-Otaibi, K. (2021). The Impact of Cybersecurity Practices on Cyberattack Damage: The Perspective of Small Enterprises in Saudi Arabia. Sensors, 21(20), p.6901. doi: https://doi.org/10.3390/s21206901.
Bechara, F.R. and Schuch, S.B., 2021. Cybersecurity and global regulatory challenges. Journal of Financial Crime, 28(2), pp.359-374.
Gasmi, A., Noor, S., Tippairote, T., Dadar, M., Menzel, A. and Bjørklund, G. (2020). Individual risk management strategy and potential therapeutic options for the COVID-19 pandemic. Clinical Immunology (Orlando, Fla.), [online] 215. doi: https://doi.org/10.1016/j.clim.2020.108409.
George, D.A.S., Baskar, D.T. and Srikaanth, D.P.B. (2024). Cyber Threats to Critical Infrastructure: Assessing Vulnerabilities Across Key Sectors. Partners Universal International Innovation Journal, [online] 2(1), pp.51–75. doi: https://doi.org/10.5281/zenodo.10639463.
Li, Y. and Liu, Q. (2021). A comprehensive review of cyber-attacks and cyber security; emerging trends and recent developments. Energy Reports, [online] 7(7), pp.8176–8186. doi https://doi.org/10.1016/j.egyr.2021.08.126.
Longpre, S., Hou, L., Vu, T., Webson, A., Chung, H.W., Tay, Y., Zhou, D., Le, Q.V., Zoph, B., Wei, J. and Roberts, A. (2023). The Flan Collection: Designing Data and Methods for Effective Instruction Tuning. [online] proceedings.mlr.press. Available at: https://proceedings.mlr.press/v202/longpre23a.html.
Mishra, A., Alzoubi, Y.I., Gill, A.Q. and Anwar, M.J. (2022). Cybersecurity Enterprises Policies: a Comparative Study. Sensors, [online] 22(2), p.538. Available at: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8778887/.
Mohajan, D. and Mohajan, H.K. (2022). Constructivist Grounded Theory: A New Research Approach in Social Science. Research and Advances in Education, [online] 1(4), pp.8–16. Available at: https://www.paradigmpress.org/rae/article/view/256.
Perols, R. and Murthy, U.S. (2020). The Impact of Cybersecurity Risk Management Examinations and Cybersecurity Incidents on Investor Perceptions and Decisions. AUDITING: A Journal of Practice & Theory. Doi: https://doi.org/10.2308/ajpt-18-010.
Posada-Quintero, H.F. and Chon, K.H. (2020). Innovations in Electrodermal Activity Data Collection and Signal Processing: A Systematic Review. Sensors, 20(2), p.479. doi: https://doi.org/10.3390/s20020479.
Rezigalla, A.A. (2020). Observational study designs: Synopsis for selecting an appropriate study design. Cureus, [online] 12(1). Doi: https://doi.org/10.7759/cureus.6692.
Taherdoost, H. (2022). Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview. Electronics, [online] 11(14), p.2181. doi: https://doi.org/10.3390/electronics11142181.
Uchendu, B., Nurse, J.R.C., Bada, M. and Furnell, S. (2021). Developing a cyber security culture: Current practices and future needs. Computers & security, 109, p.102387. doi: https://doi.org/10.1016/j.cose.2021.102387.