[
Bederna, Z. and Rajnai, Z. (2022). Analysis of the cybersecurity ecosystem in the European Union. International Cybersecurity Law Review, 3. doi:https://doi.org/10.1365/s43439-022-00048-9.
]Search in Google Scholar
[
Benn, S., Abratt, R. and O’Leary, B. (2016). Defining and Identifying stakeholders: Views from Management and Stakeholders. South African Journal of Business Management, [online] 47(2), pp.1–11. doi: https://doi.org/10.4102/sajbm.v47i2.55.
]Search in Google Scholar
[
Bovaird, A.G. and Löffler, E. (2016). Public management and governance. London; New York: Routledge.
]Search in Google Scholar
[
Chassang, G. (2017). The impact of the eu general data protection regulation on scientific research. Ecancermedicalscience, 11. https://doi.org/10.3332/ecancer.2017.709
]Search in Google Scholar
[
Cloudflare (n.d.). What is a DDoS attack? [online] Cloudflare. Available at: https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/.
]Search in Google Scholar
[
Costa, E. and Pesci, C. (2016). Social impact measurement: why do stakeholders matter? Sustainability Accounting, Management and Policy Journal, 7(1), pp.1–47. doi:https://doi.org/10.1108/sampj-12-2014-0092.
]Search in Google Scholar
[
Cristea, L.M. (2020). Current security threats in the national and international context. JOURNAL OF ACCOUNTING AND MANAGEMENT INFORMATION SYSTEMS, 19(2), pp.351–378. doi:https://doi.org/10.24818/jamis.2020.02007.
]Search in Google Scholar
[
Dan Willis (2023). European Companies Face Data Security Challenges Amidst Rising Cyberattacks. [online] FinTech Global. Available at: https://fintech.global/2023/09/15/european-companies-face-data-security-challenges-amidst-rising-cyberattacks/.
]Search in Google Scholar
[
Djatsa, F. (2020). Threat perceptions, avoidance motivation and security behaviors correlations. Journal of Information Security, 11(01), 19-45. https://doi.org/10.4236/jis.2020.111002
]Search in Google Scholar
[
European Commission and Directorate-General for Migration and Home Affairs (2020). Europeans’ Attitudes Towards Cyber Security. [online] European Commission, European Comission, pp.1–268. Available at: https://op.europa.eu/en/publication-detail/-/publication/468848fa-49bb-11ea-8aa5-01aa75ed71a1 [Accessed 22 Feb. 2024].
]Search in Google Scholar
[
Hoofnagle, C., Sloot, B., & Borgesius, F. (2019). The european union general data protection regulation: what it is and what it means. Information & Communications Technology Law, 28(1), 65-98. https://doi.org/10.1080/13600834.2019.1573501
]Search in Google Scholar
[
Hudson, S. and Liu, Y. (2022). Mobile app users' privacy concerns: different heuristics for privacy assurance statements in the eu and china. Information Technology and People, 36(1), 245-262. https://doi.org/10.1108/itp-06-2021-0478
]Search in Google Scholar
[
International Press Institute (2024). New surge of DDoS attacks threatens media freedom in Europe. [online] International Press Institute. Available at: https://ipi.media/new-surge-ofddos-attacks-threatens-media-freedom-in-europe/ [Accessed 22 Feb. 2024].
]Search in Google Scholar
[
Lee, S.K., Sun, J., Jang, S. and Connelly, S. (2022). Misinformation of COVID-19 vaccines and vaccine hesitancy. Scientific Reports, [online] 12(1), pp.1–11. doi:https://doi.org/10.1038/s41598-022-17430-6.
]Search in Google Scholar
[
Li, R., Xiao, Y., Zhang, C., Song, T., & Hu, C. (2018). Cryptographic algorithms for privacy-preserving online applications. Mathematical Foundations of Computing, 1(4), 311-330. https://doi.org/10.3934/mfc.2018015
]Search in Google Scholar
[
Mee, P. and Chandrasekhar, C. (2021). Cybersecurity is too big for governments or firms to handle alone. [online] World Economic Forum. Available at: https://www.weforum.org/agenda/2021/05/cybersecurity-governments-business/?utm_content=04%2F05%2F2021+11%3A30&utm_medium=social_scheduler&utm_source=twitter&utm_term=Cybersecurity [Accessed 23 Feb. 2024].
]Search in Google Scholar
[
Rocha, Y.M., de Moura, G.A., Desidério, G.A., de Oliveira, C.H., Lourenço, F.D. and de Figueiredo Nicolete, L.D. (2021). The impact of fake news on social media and its influence on health during the COVID-19 pandemic: a systematic review. Journal of Public Health, [online] 1(10). doi: https://doi.org/10.1007/s10389-021-01658-z.
]Search in Google Scholar
[
Sharp (2023). Cyber threat concerns amongst European SMEs on the rise in last 12 months as over a third admit to breaches. [online] www.sharp.eu. Available at: https://www.sharp.eu/news-and-events/news/cyber-threat-concerns-amongst-european-smes-on-the-rise-in-last-12-months-as [Accessed 22 Feb. 2024].
]Search in Google Scholar
[
Tsoukalas, I. and Siozos, P. (2011). Privacy and anonymity in the information society – challenges for the european union. The Scientific World Journal, 11, 458-462. https://doi.org/10.1100/tsw.2011.46
]Search in Google Scholar
[
www.consilium.europa.eu. (n.d.). Top cyber threats in the EU. [online] Available at: https://www.consilium.europa.eu/en/infographics/cyber-threats-eu/:
]Search in Google Scholar