Cite

Alpcan, T., & Başar, T. (2010). Network security: A decision and Game-Theoretic approach. In Network Security: A Decision and Game-Theoretic Approach, available at: https://doi.org/10.1017/CBO978051176077810.1017/CBO9780511760778 Search in Google Scholar

Business Insider. (2018). Facebook just announced it was hacked, and almost 50 million users have been affected, available at: https://www.businessinsider.com.au/facebook-security-attack-affecting-50-million-users-2018-9 Search in Google Scholar

Business Insider. (2019). Facebook understood how dangerous the Trump-linked data firm Cambridge Analytica could be much earlier than it previously said. Here’s everything that’s happened up until now, available at: https://www.businessinsider.com/cambridge-analytica-a-guide-to-the-trump-linked-data-firm-that-harvested-50-million-facebook-profiles-2018-3 Search in Google Scholar

Chandler, A.D. (1962). Strategy and Structure: Chapters in the History of the American. MIT Press. Search in Google Scholar

CNBC. (2019, October 30). Facebook stock rises on better-than-expected revenue and earnings, available at: https://www.cnbc.com/2019/10/30/facebook-fb-q3-2019-earnings.html Search in Google Scholar

Das Magazin. (2016, December 3). Ich habe nur gezeigt, dass es die Bombe gibt, available at: https://www.dasmagazin.ch/2016/12/03/ich-habe-nur-gezeigt-dass-es-die-bombe-gibt/ Search in Google Scholar

Dawson, M., Bacius, R., Gouveia, L. B., & Vassilakos, A. (2021). Understanding the challenge of cybersecurity in critical infrastructure sectors. Land Forces Academy Review, Vol. 101, Issue 1, 69–75, available at: https://doi.org/10.2478/raft-2021-001110.2478/raft-2021-0011 Search in Google Scholar

European Parliament and of the Council. (2015). Directive (EU) 2015/2366 of the European Parliament and of the Council. Journal of the European Union. Search in Google Scholar

European Parliament and of the Council. (2016). Directive (EU) 2016/1148 of the European Parliament and of the Council. Journal of the European Union. Search in Google Scholar

Emmanuel Chukwudi, A. (2017). Game Theory Basics and Its Application in Cyber Security. Advances in Wireless Communications and Networks, available at: https://doi.org/10.11648/j.awcn.20170304.1310.11648/j.awcn.20170304.13 Search in Google Scholar

Ernst &Young. (2020). How does security evolve from bolted on to built-in?, available at: https://assets.ey.com/content/dam/ey-sites/ey-com/en_gl/topics/advisory/ey-global-information-security-survey-2020-report-single-pages.pdf Search in Google Scholar

European Commission. (2012). Tackling Crime in our Digital Age: Establishing a European Cybercrime Centre (COM/2012/0140 final). Search in Google Scholar

Facebook. (2019). Keeping Passwords Secure, available at: https://about.fb.com/news/2019/03/keeping-passwords-secure/, accessed on 10 august 2020. Search in Google Scholar

Facebook. (2020). Available at: https://about.fb.com/company-info/, accessed on 30 October 2020. Search in Google Scholar

Herath, T., Herath, H., & Bremser, W. G. (2010). Balanced Scorecard Implementation of Security Strategies: A Frameworkfor IT Security Performance Management. Information Systems Management, Vol. 27, Issue 1, 72–81, available at: https://doi.org/10.1080/1058053090345524710.1080/10580530903455247 Search in Google Scholar

ISO/IEC. (2013). ISO/IEC 27001:2013 Information technology – Security techniques – Information security management systems – Requirements. Search in Google Scholar

Kaplan, R.S., & Norton, D.P. (1992). The Balanced Scorecard-Measures that Drive Performance. Harvard Business Review. Search in Google Scholar

Manshaei, M.H., Zhu, Q., Alpcan, T., Basar, T., & Hubaux, J.P. (2013). Game theory meets network security and privacy. ACM Computing Surveys, available at: https://doi.org/10.1145/2480741.248074210.1145/2480741.2480742 Search in Google Scholar

Markets Insider. (2019). Facebook shares drop sharply after unearthed emails reportedly show Mark Zuckerberg is aware of “problematic privacy practices” (FB), available at: https://markets.businessinsider.com/news/stocks/facebook-stock-price-reaction-to-zuckerberg-reportedly-aware-privacy-issues-2019-6-1028274446 Search in Google Scholar

Omalaja, M.A., Eruola, O.A., & College, I. (2011). Strategic Management Theory : Concepts, Analysis and Critiques in Relation to Corporate Competitive Advantage from the Resource-based Philosophy. Economic Analysis. Search in Google Scholar

PCI Security Standards Council. (2018). Payment Card Industry (PCI) – Data Security Standard – Requirements and Security Assessment Procedures, available at: https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf Search in Google Scholar

European Parliament and of the Council. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council, Official Journal of the European Union. Search in Google Scholar

European Parliament and of the Council. (2014). Regulation (EU) No 910/2014 of the European Parliament and of the Council. Official Journal of the European Union. Search in Google Scholar

StatCounter. (2020). GlobalStats, available at: from https://gs.statcounter.com/, accessed on 27 October, 2020 Search in Google Scholar

Techcrunch. (2019, September 4). A huge database of Facebook users’ phone numbers found online, available at: https://techcrunch.com/2019/09/04/facebook-phone-numbers-exposed/ Search in Google Scholar

The Guardian. (2015, December 6). What are Facebook and other social media doing about Donald Trump?, available at: https://www.theguardian.com/technology/2015/dec/06/donald-trump-facebook-social-media-tv Search in Google Scholar

The Guardian. (2017). Watchdog to launch inquiry into misuse of data in politics, available at: https://www.theguardian.com/technology/2017/mar/04/cambridge-analytics-data-brexit-trump Search in Google Scholar

The Guardian. (2018). Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach, available at: https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election Search in Google Scholar

The Intercept. (2017). Facebook failed to protect 30 million users from having their data harvested by Trump campaign affiliate, available at: https://theintercept.com/2017/03/30/facebook-failed-to-protect-30-million-users-from-having-their-data-harvested-by-trump-campaign-affiliate/ Search in Google Scholar

The New York Times. (2016, November 20). Cambridge Analytica and the Secret Agenda of a Facebook Quiz, available at: https://www.nytimes.com/2016/11/20/opinion/cambridge-analytica-facebook-quiz.html Search in Google Scholar

The Verge. (2019, March 13). Facebook, Instagram, and WhatsApp are still down for some users around the world, available at: https://www.theverge.com/2019/3/13/18264092/facebook-instagram-down-partially-post-messages-profile-loading Search in Google Scholar

Van Grembergen, W. (2000). The balanced scorecard and IT governance. ISACA Journal. Search in Google Scholar

von Neumann, J., & Morgenstern, O. (2007). Theory of games and economic behavior. In Theory of Games and Economic Behavior. Princeton University Press, available at: https://doi.org/10.2307/201932710.2307/2019327 Search in Google Scholar

Wheeler, E. (2011). Security Risk Management. Syngress. Search in Google Scholar