[
Alpcan, T., & Başar, T. (2010). Network security: A decision and Game-Theoretic approach. In Network Security: A Decision and Game-Theoretic Approach, available at: https://doi.org/10.1017/CBO978051176077810.1017/CBO9780511760778
]Search in Google Scholar
[
Business Insider. (2018). Facebook just announced it was hacked, and almost 50 million users have been affected, available at: https://www.businessinsider.com.au/facebook-security-attack-affecting-50-million-users-2018-9
]Search in Google Scholar
[
Business Insider. (2019). Facebook understood how dangerous the Trump-linked data firm Cambridge Analytica could be much earlier than it previously said. Here’s everything that’s happened up until now, available at: https://www.businessinsider.com/cambridge-analytica-a-guide-to-the-trump-linked-data-firm-that-harvested-50-million-facebook-profiles-2018-3
]Search in Google Scholar
[
Chandler, A.D. (1962). Strategy and Structure: Chapters in the History of the American. MIT Press.
]Search in Google Scholar
[
CNBC. (2019, October 30). Facebook stock rises on better-than-expected revenue and earnings, available at: https://www.cnbc.com/2019/10/30/facebook-fb-q3-2019-earnings.html
]Search in Google Scholar
[
Das Magazin. (2016, December 3). Ich habe nur gezeigt, dass es die Bombe gibt, available at: https://www.dasmagazin.ch/2016/12/03/ich-habe-nur-gezeigt-dass-es-die-bombe-gibt/
]Search in Google Scholar
[
Dawson, M., Bacius, R., Gouveia, L. B., & Vassilakos, A. (2021). Understanding the challenge of cybersecurity in critical infrastructure sectors. Land Forces Academy Review, Vol. 101, Issue 1, 69–75, available at: https://doi.org/10.2478/raft-2021-001110.2478/raft-2021-0011
]Search in Google Scholar
[
European Parliament and of the Council. (2015). Directive (EU) 2015/2366 of the European Parliament and of the Council. Journal of the European Union.
]Search in Google Scholar
[
European Parliament and of the Council. (2016). Directive (EU) 2016/1148 of the European Parliament and of the Council. Journal of the European Union.
]Search in Google Scholar
[
Emmanuel Chukwudi, A. (2017). Game Theory Basics and Its Application in Cyber Security. Advances in Wireless Communications and Networks, available at: https://doi.org/10.11648/j.awcn.20170304.1310.11648/j.awcn.20170304.13
]Search in Google Scholar
[
Ernst &Young. (2020). How does security evolve from bolted on to built-in?, available at: https://assets.ey.com/content/dam/ey-sites/ey-com/en_gl/topics/advisory/ey-global-information-security-survey-2020-report-single-pages.pdf
]Search in Google Scholar
[
European Commission. (2012). Tackling Crime in our Digital Age: Establishing a European Cybercrime Centre (COM/2012/0140 final).
]Search in Google Scholar
[
Facebook. (2019). Keeping Passwords Secure, available at: https://about.fb.com/news/2019/03/keeping-passwords-secure/, accessed on 10 august 2020.
]Search in Google Scholar
[
Facebook. (2020). Available at: https://about.fb.com/company-info/, accessed on 30 October 2020.
]Search in Google Scholar
[
Herath, T., Herath, H., & Bremser, W. G. (2010). Balanced Scorecard Implementation of Security Strategies: A Frameworkfor IT Security Performance Management. Information Systems Management, Vol. 27, Issue 1, 72–81, available at: https://doi.org/10.1080/1058053090345524710.1080/10580530903455247
]Search in Google Scholar
[
ISO/IEC. (2013). ISO/IEC 27001:2013 Information technology – Security techniques – Information security management systems – Requirements.
]Search in Google Scholar
[
Kaplan, R.S., & Norton, D.P. (1992). The Balanced Scorecard-Measures that Drive Performance. Harvard Business Review.
]Search in Google Scholar
[
Manshaei, M.H., Zhu, Q., Alpcan, T., Basar, T., & Hubaux, J.P. (2013). Game theory meets network security and privacy. ACM Computing Surveys, available at: https://doi.org/10.1145/2480741.248074210.1145/2480741.2480742
]Search in Google Scholar
[
Markets Insider. (2019). Facebook shares drop sharply after unearthed emails reportedly show Mark Zuckerberg is aware of “problematic privacy practices” (FB), available at: https://markets.businessinsider.com/news/stocks/facebook-stock-price-reaction-to-zuckerberg-reportedly-aware-privacy-issues-2019-6-1028274446
]Search in Google Scholar
[
Omalaja, M.A., Eruola, O.A., & College, I. (2011). Strategic Management Theory : Concepts, Analysis and Critiques in Relation to Corporate Competitive Advantage from the Resource-based Philosophy. Economic Analysis.
]Search in Google Scholar
[
PCI Security Standards Council. (2018). Payment Card Industry (PCI) – Data Security Standard – Requirements and Security Assessment Procedures, available at: https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf
]Search in Google Scholar
[
European Parliament and of the Council. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council, Official Journal of the European Union.
]Search in Google Scholar
[
European Parliament and of the Council. (2014). Regulation (EU) No 910/2014 of the European Parliament and of the Council. Official Journal of the European Union.
]Search in Google Scholar
[
StatCounter. (2020). GlobalStats, available at: from https://gs.statcounter.com/, accessed on 27 October, 2020
]Search in Google Scholar
[
Techcrunch. (2019, September 4). A huge database of Facebook users’ phone numbers found online, available at: https://techcrunch.com/2019/09/04/facebook-phone-numbers-exposed/
]Search in Google Scholar
[
The Guardian. (2015, December 6). What are Facebook and other social media doing about Donald Trump?, available at: https://www.theguardian.com/technology/2015/dec/06/donald-trump-facebook-social-media-tv
]Search in Google Scholar
[
The Guardian. (2017). Watchdog to launch inquiry into misuse of data in politics, available at: https://www.theguardian.com/technology/2017/mar/04/cambridge-analytics-data-brexit-trump
]Search in Google Scholar
[
The Guardian. (2018). Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach, available at: https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election
]Search in Google Scholar
[
The Intercept. (2017). Facebook failed to protect 30 million users from having their data harvested by Trump campaign affiliate, available at: https://theintercept.com/2017/03/30/facebook-failed-to-protect-30-million-users-from-having-their-data-harvested-by-trump-campaign-affiliate/
]Search in Google Scholar
[
The New York Times. (2016, November 20). Cambridge Analytica and the Secret Agenda of a Facebook Quiz, available at: https://www.nytimes.com/2016/11/20/opinion/cambridge-analytica-facebook-quiz.html
]Search in Google Scholar
[
The Verge. (2019, March 13). Facebook, Instagram, and WhatsApp are still down for some users around the world, available at: https://www.theverge.com/2019/3/13/18264092/facebook-instagram-down-partially-post-messages-profile-loading
]Search in Google Scholar
[
Van Grembergen, W. (2000). The balanced scorecard and IT governance. ISACA Journal.
]Search in Google Scholar
[
von Neumann, J., & Morgenstern, O. (2007). Theory of games and economic behavior. In Theory of Games and Economic Behavior. Princeton University Press, available at: https://doi.org/10.2307/201932710.2307/2019327
]Search in Google Scholar
[
Wheeler, E. (2011). Security Risk Management. Syngress.
]Search in Google Scholar