[
[1] Craigen D., Diakun-Thibault N., Purse R. Defining Cybersecurity. Technol. Innov. Manag. Rev. October 2014; 4(10):13-21.
]Search in Google Scholar
[
[2] Klimburg A.(ed). National Cyber Security Framework Manual. Tallin: NATO CCDCOE Publication; 2012.
]Search in Google Scholar
[
[3] Tisdale S.M. Cybersecurity: Challenges from a systems, complexity, knowledge management and business intelligence perspective. IIS. 2015; 16(3):191-198.
]Search in Google Scholar
[
[4] Mittal Y.K., Roy S., Saxena M. Role of Knowledge Management in Enhancing Information Security. IJCSI. November 2010; 7(6):320-324.
]Search in Google Scholar
[
[5] Kingston J. Artificial Intelligence, Knowledge Management and Human Vulnerability. In: Griffiths P., editor. European Conference on the Impact of Artificial Intelligence and Robotics. Oxford: EM-Normandie Business School; 2019. 198-204.
]Search in Google Scholar
[
[6] Grimm M., Anderl R. Intellectual Property Protection and Secure Knowledge Management in Collaborative Systems Engineering. Procedia Comput. Sci. December 2013; 16:571-580.
]Search in Google Scholar
[
[7] Wen S.-F. An Empirical Study on Security Knowledge Sharing and Learning in Open Source Software Communities [Internet]. 1 October 2018 [6 February 2021]. Available from: https://www.mdpi.com/2073-431X/7/4/49.10.3390/computers7040049
]Search in Google Scholar
[
[8] Bertino E., Khan L.R., Sandhu R., Thuraisingham B. Secure Knowledge Management: Confidentiality, Trust, and Privacy. IEEE Trans. Syst. Man Cybern. A Syst. Hum. May 2006; 36(3):429-438.
]Search in Google Scholar
[
[9] Belsis P., Kokolakis S., Kiounouzis E. Information systems security from a knowledge management perspective, Inform. Manag. Comput. Secur. July 2005; 13(3):189-202.
]Search in Google Scholar
[
[10] Nazaridoust M., Bidgoli B. M., & Rezaeenoor J. Providing a Triangular Model for Gap Analysis. Case Study: Iran Khodro Company. IJCSI. January 2013; 10(1):627-638.
]Search in Google Scholar
[
[11] Nonaka I. The Knowledge-Creating Company. Harvard Business Review. July-August 2007. 162-170.
]Search in Google Scholar
[
[12] Badea-Mihalcea A. People and Machines: Dealing with Human Factor in Cyber-Security. In: Mihai I.C., Ciuchi C., Petrica G., Considerations on Challenges and Future Directions in Cybersecurity. Romanian Association for Information Security Assurance; 2019; 143-154.
]Search in Google Scholar
[
[13] Hepp A., Friemel T., & Breiter A. Digital traces in context. Int. J. Commun. January 2018; 12:439-449.
]Search in Google Scholar
[
[14] Becerra-Fernandez I. and Sabherwal R. Knowledge Management: Systems and Processes. New York: M.E. Sharpe; 2014.10.4324/9781315715117
]Search in Google Scholar
[
[15] Malik M., Patel T. Database Security – Attacks and Control Methods. IJIST. March 2016; 6(1):175-183.
]Search in Google Scholar
[
[16] Tworek K., Walecka-Jankowska K., Zgrzywa-Ziemak A. IT Reliability and Innovation in SMEs: Empirical Research. J. Manag. Bus. Adm. Cent. Eur. June 2019; 27(2):83-96.
]Search in Google Scholar