[
Albanese, C., & Lepido, D. (2018). Middle East Servers Targeted in Cyberattack Against Saipem. Available at: https://www.bloomberg.com/news/articles/2018-12-10/middle-east-servers-targeted-in-cyberattack-against-saipem, accessed on 21 December 2018.
]Search in Google Scholar
[
Al-Batati, S., & Gladstone, R. (2018). Saudis claim to intercept 7 missiles fired at cities from Yemen. The New York Times. Available at: https://www.nytimes.com/2018/03/25/world/middleeast/saudi-arabia-yemen-missile-houthi.html, accessed on 11 December 2021.
]Search in Google Scholar
[
Al Jazeera. (2021). Saudi forces intercept three ballistic missiles, blame Houthis. Houthis News Al Jazeera. Available at: https://www.aljazeera.com/news/2021/9/5/saudi-forces-intercept-three-ballistic-missiles-blame-houthis, accessed on 17 August 2021.
]Search in Google Scholar
[
Bronk, C., & Tikk-Ringas, E. (2013). The cyber attack on Saudi Aramco. Survival, Vol. 55, Issue 2, 81-96.10.1080/00396338.2013.784468
]Search in Google Scholar
[
Cisco. (2018). Cyber security threat and protection report 2018 – Cisco Middle East and Africa. Available at: https://www.cisco.com/c/m/en_qa/campaigns/security/cyber-threats-and-protection-2018-report/index.html, accessed on 08 August 2018.
]Search in Google Scholar
[
Dawson, M. (2018). Applying a holistic cybersecurity framework for global IT organizations. Business Information Review, Vol, 35, Issue 2, 60-67.10.1177/0266382118773624
]Search in Google Scholar
[
Haza, R. (2018). Crazy in love: Half of UAE online daters have experienced cyber attacks. Available at: https://www.thenational.ae/uae/crazy-in-love-half-of-uae-online-daters-have-experienced-cyber-attacks-1.704550, accessed on 14 October 2018.
]Search in Google Scholar
[
Ivanova, I. (2018). Saudi Arabia is America’s No. 1 weapons customer. Available at: https://www.cbsnews.com/news/saudi-arabia-is-the-top-buyer-of-u-s-weapons/, accessed on 20 December 2018.
]Search in Google Scholar
[
Jewkes, S. (2018). Saipem says Shamoon variant crippled hundreds of computers. Available at: https://www.reuters.com/article/us-cyber-shamoon/saipem-says-shamoon-variant-crippled-hundreds-of-computers-idUSKBN1OB2FA, accessed on 17 December 2018.
]Search in Google Scholar
[
Madrigal, A.C. (2018). When Is a Meme a Foreign-Influence Operation? Available at: https://www.theatlantic.com/technology/archive/2018/12/how-russian-operatives-targeted-black-americans/578437/, accessed on 20 December 2018.
]Search in Google Scholar
[
Miller, B., & Rowe, D. (2012, October). A survey SCADA of and critical infrastructure incidents. Proceedings of the 1st Annual conference on Research in information technology (pp. 51-56), ACM.10.1145/2380790.2380805
]Search in Google Scholar
[
Ministry of Cabinet Affairs and the Future. (n.d.). His Excellency Omar bin Sultan Al Olama. Available at: https://www.mocaf.gov.ae/en/about/our-leadership/his-excellency-omar-bin-sultan-al-olama, accessed on 20 December 2018.
]Search in Google Scholar
[
Ottis, R. (2008). Analysis of the 2007 cyber attacks against Estonia from the information warfare perspective. Proceedings of the 7th European Conference on Information Warfare (p. 163).
]Search in Google Scholar
[
Swaine, J. (2018). Russian propagandists targeted African Americans to influence 2016 US election. Available at: https://www.theguardian.com/us-news/2018/dec/17/russian-propagandists-targeted-african-americans-2016-election, accessed on 20 December 2018.
]Search in Google Scholar
[
Zarour, M., Alenezi, M., Dawson, M., & Alsmadi, I. (2020). Toward Effective Cybersecurity Education in Saudi Arabia. 17th International Conference on Information Technology – New Generations (ITNG 2020) (pp. 79-85). Cham: Springer.
]Search in Google Scholar