[Axelrod, C.W., Bayuk, J.L., Schutzer D. (eds.), 2009. Enterprise Information, Security and Privacy, Artech House, Norwood.]Search in Google Scholar
[Brandis K. et. al., 2016, A process framework for information security management “International Jurnal of Information Systems and Project Management”, Vol 4, No 4.]Search in Google Scholar
[Deneen C. C., Ng E. M., Shroff R. H., 2011. Analysis of the technology acceptance model in examining students’ behavioural intention to use an eportfolio system “Australasian Jurnal of Educational Technology”, No 27(4).10.14742/ajet.940]Search in Google Scholar
[Durodolu, O., 2016. Technology Acceptance Model as a predictor of using information system’ to acquire information literacy skills “Library Philosophy and Practice”, November.]Search in Google Scholar
[Tallinn. Castelfranchi C., Falcone R., Marzo F., 2010. Trust and relational capital “Computational and Mathematical Organization Theory”, Vol 17, Issue 2, 2016.10.1007/s10588-011-9086-6]Search in Google Scholar
[Tutton J., 2010. Incident response and compliance: A case study of the recent attacks, Information, Security Technical Report 15.10.1016/j.istr.2011.02.001]Search in Google Scholar
[Żywiołek J., 2018. Monitoring of Information Security System Elements in the Metallurgical Enterprises, MATEC Web of Conferences, https://www.matec-conferences.org/articles/matecconf/pdf/2018/42/matecconf_qpi2018_01007.pdf.10.1051/matecconf/201818301007]Search in Google Scholar
[Syreyshchikova N. V., Pimenov D. Yu., Mikołajczyk T., Moldovan L., 2019. Information Safety Process Development According to ISO 27001 for an Industrial Enterprise, Procedia Manufacturing 32.10.1016/j.promfg.2019.02.215]Search in Google Scholar