[
Ahola, M. (2022) The role of human error in successful Cybersecurity breaches, Usecure. [Online Document], 2022. Available: Usecure.com Online https://blog.usecure.io/the-role-of-human-error-in-successful-cyber-security-breaches [Accessed: January 30, 2022]
]Search in Google Scholar
[
Alcon J. (2016) 13% of the higher education sector has been infected with ransomware, Cyber Risk Analytics & Security Ratings, 13-Oct-2016. [Online]. Available: https://www.bitsighttech.com/blog/higher-education-infected-with-ransomware. [Accessed: 15-Aug-2022].
]Search in Google Scholar
[
Barati, M. & Yankson, B. (2022) Predicting the Occurrence of a Data Breach.International Journal of Information Management Data Insights, Volume 2, Issue 2, ISSN 2667-0968, https://doi.org/10.1016/j.jjimei.2022.100128.
]Search in Google Scholar
[
Blackborrow, J., Christakis, S. (2019) Complexity In Cybersecurity Report 2019 - How Reducing Complexity Leads To Better Security Outcomes. Tech. Rep. May, Forrester’s Security & Risk research group. 2019.
]Search in Google Scholar
[
Binghamton University. (2022.). Binghamton University computer and network policy (acceptable use). Binghamton University. Binghamton: N.Y. [Online Document], 2022. Available: ]. https://www.binghamton.edu/its/about/governance/policies/comp-net-usage-acceptable-use.html [Accessed: March 27, 2022 ]
]Search in Google Scholar
[
Coffey, J. (2021) Ameliorating Sources of Human Error in CyberSecurity: Technological and Human-Centered Approaches. Journal of Systemics, Cybernetics, and Informatics. [Online Document], 2021. Available: iiis.org Online https://www.iiis.org/CDs2017/CD2017Spring/papers/ZA253LY.pdf. [Accessed: August 27, 2022].
]Search in Google Scholar
[
Campbell, S. (2017) Cybersecurity in higher education: Problems and solutions, Toptal Insights Blog, 22-Dec-2017. [Online]. Available: https://www.toptal.com/insights/innovation/cybersecurity-in-higher-education. [Accessed: 05-Jul-2022].
]Search in Google Scholar
[
Demeyer, S. (2011),Research methods in computer science. 2011 27th IEEE International Conference on Software Maintenance (ICSM), Williamsburg, VI, 2011, pp. 600-600. doi: 10.1109/ICSM.2011.6080841.
]Search in Google Scholar
[
D’agostino, S. (2022) Ransomware Attacks Against Higher Ed Increase. insidehighered.com [Online Document], 2022. Available: insidehighered.com Online https://www.insidehighered.com/news/2022/07/22/ransomware-attacks-against-highered-increase [Accessed: March 15, 2022].
]Search in Google Scholar
[
de Heer, W, de Leeuw, E.D, Dillman, D.A, Diment, K. Dommeyer,C.J, Edwards, P., Fox, G. Fraze, S. Fricker, S., Fricker, R.D., Galesic, M. and Goritz, A. S, (2009) Factors affecting response rates of the web survey: A systematic review Computers in Human Behavior, 24-Nov-2009. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0747563209001708. [Accessed: 05 -Dec-2022].
]Search in Google Scholar
[
Evans, M., Maglaras, L.A., He, Y., and Janicke, H. (2016) Human behavior as an aspect of cybersecurity assurance, Security and Communication Networks, vol. 9, no. 17, pp. 4667–4679, 2016. https://doi.org/10.1002/sec.1657
]Search in Google Scholar
[
Hadlington, L.. (2017) Human factors in cybersecurity; examining the link between internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviors, Heliyon, vol. 3, no. 7, 2017. https://doi.org/10.1016/j.heliyon.2017.e00346
]Search in Google Scholar
[
Halevi, T. Lewis, J & Memon, N. (2013) Phishing, Personality Traits, and Facebook. http://arxiv.org/abs/1301.7643.
]Search in Google Scholar
[
Holt, T. (2016) Cybercrime through an interdisciplinary lens. Routledge Taylor & Francis Group. 2016. https://doi.org/10.4324/9781315618456.
]Search in Google Scholar
[
IBM. (2014) IBM Security Services 2014 Cyber Security Intelligence Index. IBM Corporation. [Online Document], 2014. Available: IBM.com Online https://www.ibm.com/downloads/cas/ZBZLY7KL [Accessed: March 5, 2022]
]Search in Google Scholar
[
IBM. (2019) Cost of a Data Breach Report 2019, IBM Security. [Online Document], 2019. Available: IBM.com Online [Accessed: August 5, 2022]
]Search in Google Scholar
[
IBM, (2022) IBM Report: Cost of a Data Breach Hits Record High During Pandemic. 2022. Available: newsroom Online https://newsroom.ibm.com/2021-07-28-IBM-Report-Cost-ofa-Data-Breach-Hits-Record-High-During-Pandemic [Accessed: August 15, 2022] [Accessed: Aug. 23, 2022]
]Search in Google Scholar
[
James, A., Winnefeld S., Kirchhoff, C., &Upton, D. (2015) Cybersecurity’s Human Factor: Lessons from the Pentagon. [Online Document], 2022. Available: HBR Online https://hbr.org/2015/09/cybersecuritys-human-factor-lessons-from-the-pentagon [Accessed: July 23, 2022]
]Search in Google Scholar
[
Keierleber, M. (2022) L.A. schools and the mystery of missing ransom note, IBM Corporation. [Online Document], 2022. Available: IBM.com Online https://www.the74million.org/article/la-schools-and-the-mystery-of-the-missing-ransom-note/ [Accessed: March 5, 2022]
]Search in Google Scholar
[
Khader, M., Karam, M., and Fares, H. (2021) Cybersecurity Awareness Framework for Academia, information, vol. 12, no. 10, p. 417, 2021. https://doi.org/10.3390/info12100417.
]Search in Google Scholar
[
Keeter, S., Kennedy, C., Dimock, M., Best, J. Craighill, P.(2006) Public Opinion Quarterly, Volume 70, Issue 5, 2006, Pages 759–779, https://doi.org/10.1093/poq/nfl035
]Search in Google Scholar
[
Marcelino, A. (2022) Intel Selects Check Point Quantum IoT Protect for RISC-V Platform. InfoSecurity. [Online Document], 2022. Available: InfoSecurity.com https://www.infosecurity-magazine.com/search/?q=Check%20Point [Accessed: April 5, 2022].
]Search in Google Scholar
[
NIST. (2022) Security and privacy controls for federal information systems and organizations. (U.S. Department of Commerce, Washington, D.C.), NIST Special Publication 800-53, Rev 4., [Online Document], 2022. Available: http://dx.doi.org/10.6028/NIST.SP.800-53r4 [Accessed: March 27, 2022].
]Search in Google Scholar
[
Nixon J., and McGuinness, B., (2013) Framing the human dimension in cybersecurity, ICST Transactions on Security and Safety, vol. 1, no. 2, 2013. https://doi.org/10.4108/trans.sesa.01-06.2013.e
]Search in Google Scholar
[
Nobles, C. (2018) Botching Human Factors in Cybersecurity in Business Organizations. Holistica. 9. 71-88. 10.2478/hjbpa-2018-0024.
]Search in Google Scholar
[
Niazi, M. A. (2019) Modeling and simulation of Complex Communication Networks. Stevenage, Herts, United Kingdom: The Institution of Engineering and Technology, 2019.
]Search in Google Scholar
[
Person, T., and Holt, T. (2016) Cybercrime through an interdisciplinary lens, Taylor & Francis, 21-Dec-2016. [Online]. Available: https://www.taylorfrancis.com/books/edit/10.4324/9781315618456/cybercrime-interdisciplinary-lens-thomas-holt. [Accessed: 05-Dec-2022].
]Search in Google Scholar
[
Privacy Rights Clearinghouse (2021), Data Breaches, Available: https://privacyrights.org/data-breaches [Accessed May 05, 2021
]Search in Google Scholar
[
The State University of New York. (2022) System-wide print resource use. (SUNY Document No. 6902). SUNY. New York: The NY [Online Document], 2022. Available: https://www.suny.edu/sunypp/documents.cfm?doc_id=891 [Accessed: March 27, 2022].
]Search in Google Scholar
[
The State University of New York. (2016). Information security policy. (SUNY Document No. 6900). SUNY. New York: N.Y. [Online Document], 2022. Available: https://www.suny.edu/sunypp/documents.cfm?doc_id=848 [Accessed: March 27, 2022].
]Search in Google Scholar
[
The State University of New York at Canton. (2022), Faculty Handbook, SUNY Canton. Canton: N.Y. [Online Document], 2022. Available: Canton.edu Online https://www.canton.edu/media/pdf/faculty_handbook.pdf [Accessed: January 17, 2022].
]Search in Google Scholar
[
The State University of New York. (2008). Information security guidelines: Campus programs & preserving confidentiality. (SUNY Document No. 6608). SUNY. New York: N.Y.
]Search in Google Scholar
[
University at Albany. (2012). Identity and access management. (Adopted Policy No. 5.1). University at Albany. Albany: N.Y. [Online Document], 2022. Available :. https://www.albany.edu/risk-management-compliance/policy/identity-and-access-management [Accessed: March 27, 2022 ]
]Search in Google Scholar
[
Visser, P. Krosnick, J. Marquette, J. & Curtin M. (2019) Mail surveys for election forecasting? An evaluation of the Columbus Dispatch poll. Public Opinion Quarterly, 60(2), 181–227. 2019
]Search in Google Scholar
[
Webster, M. (2022) Human error definition & meaning, Merriam-Webster, 2022. Available: Merriam-Webster Online https://www.merriam-webster.com/dictionary/human%20error [Accessed: March 27, 2022].
]Search in Google Scholar