References
- Mazzei P. Another hacked Florida city pays a ransom, this time for $460,000. The New York Times; [ accessed 2019 Jun 27. https://www.nytimes.com/2019/06/27/us/lake-city-florida-ransom-cyberattack.html.
- Perlroth N. With new digital tools, even nonexperts can wage cyberattacks. The New York Times; 2017 May 13 [accessed 2019 Jun 27]. https://www.nytimes.com/2017/05/13/technology/hack-ransomware-scam-cyberattacks.html.
- Perlroth N. A cyberattack ‘the world isn’t ready for’. The New York Times; 2017 Jun 22 [accessed 2019 Jun 27]. https://www.nytimes.com/2017/06/22/technology/ransomware-attack-nsa-cyberweapons.html.
- Perlroth N, Scott M, Frenkel S. Cyberattack hits Ukraine then spreads internationally. The New York Times; 2017 Jun 27 [accessed 2019 Jun 27]. https://www.nytimes.com/2017/06/27/technology/ransomware-hackers.html.
- Whitman M, Mattord H. Principles of information security. Boston (MA): Cengage Learning; 2016.
- Ware W. Security controls for computer systems: report of defense science board task on computer security. Report No. 609-1. Santa Monica (CA): RAND Corporation; 1979 [accessed 2019 Dec 03]. Also available in print form. https://www.rand.org/pubs/reports/R609-1.html.
- Brancheau J, Wetherbe J. Key issues in information systems management. Mis Q. 1987;11(1):23–45. doi:https://doi.org/10.2307/248822.
- Center for Internet Security. CIS Controls; 2017 [accessed 2017 Aug 01]. https://www.cisecurity.org/controls/cis-controls-list/.
- Swanson M, Guttman B. Generally accepted principles and practices for securing information technology systems. Report No. SP 800-14. Gaithersburg (MD): National Institute of Standards and Technology (NIST); 1996 [accessed 2017 Aug 01]. https://csrc.nist.gov/publications/detail/sp/800-14/archive/1996-09-03.
- International Standards Organization. ISO 27000 series; [accessed 2017 Aug 01]. http://www.27000.org/index.htm.
- National Institute of Standards and Technology (NIST). Framework for improving critical infrastructure cybersecurity. version 1.1; 2018 Apr 16 [accessed 2019 Dec 03]. https://nvlpubs.nist.gov›nistpubs›CSWP›NIST.CSWP.04162018.pdf.
- Grant T. The 2016 Federal CIO Survey Report; 2016 Sept [accessed 2019 Dec 04]. https://www.grantthornton.com/-/media/content-page-files/public-sector/pdfs/surveys/2016/Federal-CIO-Survey.ashx.
- Elliot R, Young MO, Collins VD, Frawley D, Temares ML. Information security in higher education. CAUSE, The Association for the Management of Information Technology in Higher Education; 1991.
- Rezgui Y, Marks A. Information security awareness in higher education: an exploratory study. Secur. 2008;27(7):241–53. doi:https://doi.org/10.1016/j.cose.2008.07.008.
- Tout S, Sverdlik W, Lawver G. Cloud computing and its security in higher education. 2009 ISECON Conference Proceedings; 2009; Washington (DC): EDSIG; p. 2314.
- Oblinger DG, Hawkins BL. The myth about IT security. Educ Rev. 2006;41:14–15.
- Hilkert D, Benlian A, Sarstedt M, Hess T. Perceived software platform openness: the scale and its impact on developer satisfaction. ICIS 2011 Proceedings; 2011; Shanghai (China): Association of Information Systems (AIS); p. 1–20.
- National Center for Education Statistics. Data Tools – locators. National Center for Education Statistics; [ accessed 2017 Dec 12]. https://nces.ed.gov/datatools/.
- Bentler PM, Chou CP. Practical issues in structural modeling. Sociol Methods Res. 1987;16(1):78–117. doi:https://doi.org/10.1177/0049124187016001004.
- Vorhies DW, Morgan NA. Benchmarking marketing capabilities for sustainable competitve advantage. J Mark. 2005;69(1):80–94. doi:https://doi.org/10.1509/jmkg.69.1.80.55505.
- Marsh HW, Hau KT, Wen Z. In search of golden rules: comment on hypothesis-testing approaches to setting cutoff values for fit indexes and dangers in overgeneralizing Hu and Bentler’s (1999) findings. Struct Equation Model. 2004;11(3):320–41. doi:https://doi.org/10.1207/s15328007sem1103_2.
- Hu LT, Bentler PM. Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives. Struct Equation Model. 1999;6(1):1–55. doi:https://doi.org/10.1080/10705519909540118.
- Baron RM, Kenny DA. The moderator-mediator variable distinction in social pyschological research: conceptual, strategic, and statistical considerations. J Pers Social Pyschol. 1986;51(6):1173. doi:https://doi.org/10.1037/0022-3514.51.6.1173.