[Ashford, W. (2017). Europe faces shortage of 350,000 cyber security professionals by 2022, available at: https://www.computerweekly.com/news/450420193/Europe-faces-shortage-of-350000-cyber-security-professionals-by-2022, accessed on: July 19, 2018.]Search in Google Scholar
[Burns, A., & Eltham, B. (2009). Twitter free Iran: An evaluation of Twitterʼs role in public diplomacy and information operations in Iranʼs 2009 election crisis.]Search in Google Scholar
[Bosman, J. (2017). The Storms Moved On. The Caribbean Islands Fear the Tourists Might, Too. available at: https://www.nytimes.com/2017/09/23/us/tourism-hurricane-economy-caribbean-islands.html, accessed on: July 19, 2018.]Search in Google Scholar
[Case, D. U. (2016). Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC).]Search in Google Scholar
[Clark, F. (2015). Generalities of the cybersecurity regulation in the members States of COMTELCA, available at: https://www.itu.int/en/ITU-D/Regional-Presence/Americas/Documents/EVENTS/2015/0910-PA-IXP/6%20Viernes%20SIT%20Clark%20Generalidades%20Regulaci%C3%B3n%20Ciberseguridad.pdf]Search in Google Scholar
[Dawson, M. (2017). Hyper-connectivity: Intricacies of national and international cyber securities. (Doctoral dissertation). London, UK: London Metropolitan University.]Search in Google Scholar
[Dawson, M. (2018). Applying a holistic cybersecurity framework for global IT organizations. Business Information Review, 35(2), 60-67.10.1177/0266382118773624]Search in Google Scholar
[Dawson, M., Wang, P., & Williams, K. (2018). The Role of CAE-CDE in Cybersecurity Education for Workforce Development. Information Technology-New Generations, 15th International Conference on Information Technology, 127-132.10.1007/978-3-319-77028-4_20]Search in Google Scholar
[Isa, M. (2017). Crime without borders, another scourge of economic security and peace in the DR, available at: http://hoy.com.do/ciberdelincuencia-delito-sin-fronteras-otro-azote-a-la-seguridad-economica-y-sosiego-en-rd/]Search in Google Scholar
[ITU. (2009a). ICT Applications and Cybersecurity Background Note to the 2009 Pacific ICT Ministerial Forum, available at: http://www.itu.int/ITU-D/asp/CMS/Events/2009/PacMinForum/doc/Background%20Note-Theme-4-ICT%20Apps%20&%20Cybersecurity.pdf]Search in Google Scholar
[ITU. (2009b). Cybercrime: A guide for developing countries, available at: https://www.itu.int/dms_pub/itu-d/oth/01/0B/D010B0000073301PDFS.pdf]Search in Google Scholar
[National Congress of the Dominican Republic. (2007). Law number 53 of 2007, on “High Technology Crimes and Offenses”. Santo Domingo.]Search in Google Scholar
[Pultarova, T. (2016). News Briefing: Cyber security-Ukraine grid hack is wake-up call for network operators. Engineering & Technology, 11(1), 12-13.10.1049/et.2016.0116]Search in Google Scholar
[Republica Digital. (2018). Ciberseguridad, available at: from https://republicadigital.gob.do/eje/ciberseguridad/, accessed on: July 21, 2018.]Search in Google Scholar
[Wootson, C. R., Jr. (2018). Itʼs time to stop laughing at Nigerian scammers – because theyʼre stealing billions of dollars, available at: from https://www.washingtonpost.com/news/business/wp/2018/06/12/its-time-to-stop-laughing-at-nigerian-scammers-because-theyre-stealing-billions-of-dollars/?noredirect=on&utm_term=.e64a26210213, accessed on: June 27, 2018.]Search in Google Scholar
[Yunes, L. (2017, June 12). Personal interview.]Search in Google Scholar