References
- Abbasi, A., Zahedi, F., Zeng, D., Chen, Y., Chen, H. C., & Nunamaker, J. F. (2015). Enhancing predictive analytics for anti-phishing by exploiting website genre information. Journal of Management Information Systems, 31(4), 109–157. https://doi.org/10.1080/07421222.2014.1001260
- Apte, U., Sankar, C. S., Thakur, M., & Turner, J. E. (1990). Reusability-based strategy for development of information-systems - implementation experience of a bank. MIS Quarterly, 14(4), 421–433. https://doi.org/10.2307/249791
- Banker, R. D., & Kauffman, R. J. (1991). Reuse and productivity in integrated computer-aided software engineering - an empirical-study. MIS Quarterly, 15(3), 375–401. https://doi.org/10.2307/249649
- Belding, G. (2020). Cost of non-compliance: 8 largest data breach fines and penalties. Retrieved June 8, 2022, from https://resources.infosecinstitute.com/topic/cost-of-non-compliance-8-largest-data-breach-fines-and-penalties/
- Chen, Y., Ramamurthy, K., & Wen, K.-W. (2015). Impacts of comprehensive information security programs on information security culture. Journal of Computer Information Systems, 55(3), 11–19. https://doi.org/10.1080/08874417.2015.11645767
- Cranor, L. F. (2008). A framework for reasoning about the human in the loop. Proceedings of the Conference on Usability, Psychology, and Security, Berkeley, CA.
- Deloitte. (2020). The state of compliance survey 2020 edition. Retrieved June 10, 2022, from https://www2.deloitte.com/content/dam/Deloitte/au/Documents/audit/22012021-state-of-Compliance-Survey-Publication-5.pdf
- Dong, W., Liao, S. Y., & Zhang, Z. J. (2018). Leveraging financial social media data for corporate fraud detection. Journal of Management Information Systems, 35(2), 461–487. https://doi.org/10.1080/07421222.2018.1451954
- Frenz, C. M., & Diaz, C. (2017). Anti-ransomwareguide. owasp.org
- HHS. (2020).Retrieved June 10, 2022, from https://www.hhs.gov/hipaa/for-professionals/security/index.html#:~:text=The%20HIPAA%20Security%20Rule%20establishes,maintained%20by%20a%20covered%20entity
- Hoehle, H., Venkatesh, V., Brown, S. A., Tepper, B. J., & Kude, T. (2022). Impact of customer compensation strategies on outcomes and the mediating role of justice perceptions: A longitudinal study of target’s data breach. MIS Quarterly, 46(1). https://doi.org/10.25300/MISQ/2022/14740
- NIST. (2018) Framework for improving critical infrastructure cybersecurity. Retrieved June 10, 2022, from https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
- NIST. (2022). Cyber resiliency. Retrieved August 16, 2022, from https://csrc.nist.gov/glossary/term/cyber_resiliency
- PCI. (2022) Payment card industry data security standard requirements and testing procedures version 4.0. Retrieved June 10, 2022, from https://listings.pcisecuritystandards.org/documents/PCI-DSS-v4_0.pdf
- Ponemon.(2017, December). The true cost of compliance with data protection regulations. Retrieved May 2, 2018, from http://dynamic.globalscape.com/files/Whitepaper-The-True-Cost-of-Compliance-with-Data-Protection-Regulations.pdf
- Untangle. (2019). smb IT security report. Retrieved August 8, 2022, from https://www.untangle.com/2019-smb-it-security-report/