[
Banciu, Doina, Rădoi, Mireille, Belloiu, Stefan. (2020). Information Security Awareness in Romanian Public Administration: An Exploratory Case Study. Studies in Informatics and Control, 29(1), 121-129. https://doi.org/10.24846/v29i1y202012.
]Search in Google Scholar
[
Diener, M., Bolz, T. (2023). Cloud Inspector: A Tool-Based Approach for Public Administrations to Establish Information Security Processes Towards Public Clouds. In Proceedings of the 9th International Conference on Information Systems Security and Privacy (ICISSP 2023) (pp. 543-551). DOI: 10.5220/0011694900003405.
]Search in Google Scholar
[
Diener. M., Bolz. T. (2024). Visualizing the Information Security Maturity Level of Public Cloud Services Used by Public Administrations. In Proceedings of the 14th International Conference on Cloud Computing and Services Science (pp. 192-203). DOI: 10.5220/0012637700003711.
]Search in Google Scholar
[
Durman, M., Durman, O., Drozhzhyn, D., Krylova, I., Gavrylechko, Y. (2025). Influence of Digital Technologies on Information Security in the Public Administration System. Journal of Theoretical and Applied Information Technology, 103(2), 400-411.
]Search in Google Scholar
[
Edyta Karolina Szczepaniuk, Hubert Szczepaniuk, Tomasz Rokicki, Bogdan Klepacki. (2020). Information security assessment in public administration. Computers & Security, 90, 101709. https://doi.org/10.1016/j.cose.2019.101709.
]Search in Google Scholar
[
Enaw, Ebot Ebot, Check, Njei. (2018). Information Systems Security Audits in Cameroon's Public Administration. ICEGOV '18: Proceedings of the 11th International Conference on Theory and Practice of Electronic Governance (pp. 312-317). https://doi.org/10.1145/3209415.3209425.
]Search in Google Scholar
[
Jakubek P., Guzonova V., Rudenko O., Zahurska-Antoniuk V., Filipova N. (2023) Management control in the system of ensuring the economic security of private companies and public institutions. Ad Alta: Journal of interdisciplinary research, 13(02), XXХV, 160-167. https://doi.org/10.33543/j.130235.160167 https://www.magnanimitas.cz/13-02-xxxv
]Search in Google Scholar
[
Jecheva, V., Nikolova, E. (2021). Information security awareness level evaluation among Bulgarian public and local administration employees. Mathematics and Education in Mathematics, 50, 209-214.
]Search in Google Scholar
[
Kryshtanovych, M., Lopatovskyi, V., Bondaruk, O., Datsii, N., Primush, R., & Dragan, I. (2024). Accounting, Analytical and Information Support for Law Enforcement Activity in Conditions of Ensuring Economic Security in Public Administration. Journal of Ecohumanism, 3(6), 751–759. https://doi.org/10.62754/joe.v3i6.4049.
]Search in Google Scholar
[
Lopes, Isabel Maria, Oliveira, Pedro. (2016). Evolution of the institutionalization of information systems security policies in Portuguese public administration. 2016 11th Iberian Conference on Information Systems and Technologies (CISTI). https://doi.org/10.1109/CISTI.2016.7521647.
]Search in Google Scholar
[
Marhasova, V., Rudenko, O., Popelo, O., Kosach, I., Sakun, O., Klymenko, T. (2024). Mechanisms of State Management of the Development of Digital Technologies in the National Security System. Journal of the University of Zulia, 15(42), 389-406. https://doi.org/10.46925//rdluz.42.22
]Search in Google Scholar
[
Nagy-Takács, V., Berényi, L. (2022). Information Security Management System Standards in Hungarian Public Administration. CEEeGov '22: Proceedings of the Central and Eastern European eDem and eGov Days (pp. 112-117). https://doi.org/10.1145/3551504.3551554.
]Search in Google Scholar
[
Rehbohm, T., Sandkuhl, K., Kemmerich, T. (2019). On Challenges of Cyber and Information Security Management in Federal Structures - The Example of German Public Administration. CEUR Workshop Proceeding, 244, 1-13.
]Search in Google Scholar
[
Salnikova, O., Marutian, R., Vereschak, O. (2023). Development of information and analytical procurement methodology of public administration in the sphere of providing civil control over the sector of security and defense of Ukraine. Eastern-European Journal of Enterprise Technologies, 1(3(121), 57–65. https://doi.org/10.15587/1729-4061.2023.274257.
]Search in Google Scholar