[
Al-Kahla, W., Shatnawi, A.S. and Taqieddin, E., 2021, May. A Taxonomy of Web Security Vulnerabilities. In2021 12th International Conference on Information and Communication Systems (ICICS) (pp. 424-429). IEEE.
]Search in Google Scholar
[
Becker, R., Thorogood, A., Ordish, J. and Beauvais, M.J., 2020. COVID-19 research: navigating the European general data protection regulation. Journal of Medical Internet Research, 22(8), p.e19799.
]Search in Google Scholar
[
Do, E.H. and Gadepally, V.N., 2020, May. Classifying anomalies for network security. In ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 2907-2911). IEEE.
]Search in Google Scholar
[
Enoch, S.Y., Hong, J.B., Ge, M. and Kim, D.S., 2020. Composite metrics for network security analysis. arXiv preprint arXiv:2007.03486.
]Search in Google Scholar
[
Eurostat, 2022, ICT security in enterprises, https://ec.europa.eu/eurostat/statistics-explained/index.php?title=ICT_security_in_enterprises&oldid=583136, accessed on 1 February 2024
]Search in Google Scholar
[
Fabbrini, F. and Celeste, E., 2020. The right to be forgotten in the digital age: the challenges of data protection beyond borders. German law journal, 21(S1), pp.55-65.
]Search in Google Scholar
[
Grassi, P.A., Fenton, J.L., Newton, E.M., Perlner, R.A., Regenscheid, A.R., Burr, W.E., Richer, J.P., Lefkovitz, N.B., Danker, J.M., Choong, Y.Y. and Greene, K., 2020. Digital identity guidelines: Authentication and lifecycle management [includes updates as of 03-02-2020].
]Search in Google Scholar
[
Hulshof, M. and Daneva, M., 2021, July. Benefits and Challenges in Information Security Certification–A Systematic Literature Review. In International Symposium on Business Modeling and Software Design (pp. 154-169). Springer, Cham.
]Search in Google Scholar
[
Marabathuni, V. M., & Gopejenko, V. (2021). Mobile Security: Analysis and Challenges of information. In The 19th International Scientific Conference Riga.
]Search in Google Scholar
[
Palanisamy, R., Norman, A.A. and Mat Kiah, M.L., 2020. BYOD policy compliance: Risks and strategies in organizations. Journal of Computer Information Systems, pp.1-12.
]Search in Google Scholar