REFERENCES
Alshaikh, M. (2020). Developing cybersecurity culture to influence employee behavior: A practice perspective. Computers & Security, 98, 102003. https://doi.org/10.1016/j.cose.2020.102003
America is Under Cyber Attack: Why Urgent Action is Needed, 112–85, 112th Congress, Second (2012). https://www.govinfo.gov/content/pkg/CHRG112hhrg77380/html/CHRG-112hhrg77380.htm
Andres, R. (2017, December 21). Cyber gray space deterrence. *PRISM | National Defense University.* http://cco.ndu.edu/News/Article/1401927/cybergray-space-deterrence/ |
Aon. (2020). 2020 Cyber Security Risk Report. https://www.aon.com/getmedia/8496a44a-7006-40ad-81a2-111aa15cc237/Aon-2020-Cyber-Security-Risk-Report-vDigital-SECURE.pdf
Armerding, T. (2019, January 10). *GAO cybersecurity report confirms major government gaps | Synopsys.* Software Integrity Blog. https://www.synopsys.com/blogs/software-security/gao-cybersecurity-report/ |
Ashford, W. (2017, August 25). Security professionals name top causes of breaches. ComputerWeekly.Com. https://www.computerweekly.com/news/450425184/Security-professionalsname-top-causes-of-breaches
Balozian, P., & Leidner, D. (2017). Review of IS security policy compliance: toward the building blocks of an IS Security Theory. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 48(3), 11–43. https://doi.org/10.1145/3130515.3130518
Bandura, A. (1978). The self system in reciprocal determinism. American Psychologist, 33(4), 344–358. https://doi.org/10.1037/0003-066X.33.4.344
Bandura, A. (1997). Self-efficacy: The exercise of control (pp. ix, 604). W H Freeman/Times Books/ Henry Holt & Co.
Barlow, J., Warkentin, M., Ormond, D., & Dennis, A. (2018). Don’t even think about it! The effects of antineutralization, informational, and normative communication on information security compliance. Journal of the Association for Information Systems, 19(8). https://aisel.aisnet.org/jais/vol19/iss8/3
Bauer, S., & Bernroider, E. W. N. (2017). From information security awareness to reasoned compliant action: Analyzing information security policy compliance in a large banking organization. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 48(3), 44–68. https://doi.org/10.1145/3130515.3130519
Benbasat, I., Cavusoglu, H., & Bulgurcu, B. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523. https://doi.org/10.2307/25750690
Bicchieri, C., Dimant, E., Gaechter, S., & Nosenzo, D. (2021). Social proximity and the erosion of norm compliance (SSRN Scholarly Paper ID 3355028). Social Science Research Network. https://doi.org/10.2139/ssrn.3355028
Bowen, A. S. (2021). Russian Cyber Units. Congressional Research Service. https://crsreports.congress.gov/product/pdf/IF/IF11718
Cancian, M. F. (2019, October 15). U.S. Military Forces in FY 2020: Army. U.S. Military Forces in FY 2020: Army. https://www.csis.org/analysis/us-militaryforces-fy-2020-army
Center for Internet Security. (n.d.). Cybersecurity Spotlight—Cyber Threat Actors. CIS. Retrieved February 25, 2021, from https://www.cisecurity.org/spotlight/cybersecurity-spotlight-cyber-threatactors/
Cluley, G. (2021, February 18). North Korean hackers charged by US in relation to attacks. The State of Security. https://www.tripwire.com/state-ofsecurity/featured/us-charges-north-korean-hackers-wannacry-sony-picturesattack/
Connell, M., & Vogler, S. (2017). Russia’s Approach to Cyber Warfare. Center for Naval Analyses. https://apps.dtic.mil/sti/pdfs/AD1032208.pdf
Cyberedge Group. (2021). 2021 Cyberthreat Defense Report. https://www.isc2.org//-/media/ISC2/Research/Cyberthreat-DefenseReport/2021/CyberEdge-2021-CDR-Report-v10–ISC2-Edition.ashx
Da Veiga, A., Astakhova, L. V., Botha, A., & Herselman, M. (2020). Defining organisational information security culture—Perspectives from academia and industry. Computers & Security, 92, 101713. https://doi.org/10.1016/j.cose.2020.101713
D’Arcy, J., & Lowry, P. (2019). Cognitive-affective drivers of employees’ daily compliance with information security policies: A multilevel, longitudinal study. Information Systems Journal, 29, 43–69. https://doi.org/10.1111/isj.12173
Datta, P. (2021). Hannibal at the gates: Cyberwarfare & the Solarwinds sunburst hack. Journal of Information Technology Teaching Cases, 204388692199312. https://doi.org/10.1177/2043886921993126
Donahue, S. E. (2011). Assessing the impact that organizational culture has on enterprise information security incidents. https://www.semanticscholar.org/paper/Assessing-the-impact thatorganizational-cultureonDonahue/d9cac5132a3b0b518f56d94d96f7aada660745eb
Donalds, C., & Osei-Bryson, K.-M. (2020). Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents. International Journal of Information Management, 51, 102056. https://doi.org/10.1016/j.ijinfomgt.2019.102056
Eggers, S. (2021). A novel approach for analyzing the nuclear supply chain cyber-attack surface. Nuclear Engineering and Technology, 53(3), 879–887. https://doi.org/10.1016/j.net.2020.08.021
European Union Agency for Network and Information Security. (2018). Cyber Security Culture in organisations. https://doi.org/10.2824/10543
Executive Office of the President. (2018). Classification Guidance. https://ustr.gov/sites/default/files/foia/Classification%20Guidance.pdf
Executive Office of the President of the United States. (n.d.). Federal information Security Modernization Act of 2014: Annual Report to Congress. https://www.whitehouse.gov/wp-content/uploads/2020/05/2019-FISMARMAs.pdf
Federal Bureau of Investigation. (2021). IC3 Releases 2020 Internet Crime Report [Press Release]. Federal Bureau of Investigation. https://www.fbi.gov/news/pressrel/press-releases/fbi-releases-the-internetcrime-complaint-center-2020-internet-crime-report-including-covid-19-scamstatistics
Fessler, P., & Martin, M. (2017, June 18). Russians believed to have used spearphishing in election hacking. NPR.Org. https://www.npr.org/2017/06/18/533438850/russians-believed-to-have-usedspear-phishing-in-election-hacking
Franks, J. (n.d.). Urgent Actions Needed to Address Federal Cybersecurity Challenges. https://www.gao.gov/podcast/urgent-actions-needed-addressfederal-cybersecurity-challenges
Fruhlinger, J. (2020, February 12). The OPM hack explained: Bad security practices meet China’s Captain America. CSO Online https://www.csoonline.com/article/3318238/the-opm-hack-explained-badsecurity-practices-meet-chinas-captain-america.html
Gcaza, N., & Solms, R. von. (2017). Cybersecurity Culture: An ill-defined problem.* Information Security Education for a Global Digital Society*, 98–109. https://doi.org/10.1007/978-3-319-58553-6_9
Gootman, S. (2016). OPM hack: The most dangerous threat to the Federal Government today. Journal of Applied Security Research, 11(4), 517–525. https://doi.org/10.1080/19361610.2016.1211876
Graham, S. (2020). An attributional theory of motivation. Contemporary Educational Psychology, 61, 101861. https://doi.org/10.1016/j.cedpsych.2020.101861
Haith, A. M., & Krakauer, J. W. (2018). The multiple effects of practice: Skill, habit and reduced cognitive load. Current Opinion in Behavioral Sciences, 20, 196–201. https://doi.org/10.1016/j.cobeha.2018.01.015
Howard, D. (2018). Development of the Cybersecurity Attitudes Scale and Modeling Cybersecurity Behavior and its Antecedents. Graduate Theses and Dissertations. https://scholarcommons.usf.edu/etd/7306
Huang, K., & Pearlson, K. (2019, January 8). For what technology can’t fix: Building a model of organizational cybersecurity culture. https://doi.org/10.24251/HICSS.2019.769
Huseyin, M. (2019, July 17). Why humans are the weakest link in cybersecurity | The Association of Corporate Treasurers https://www.treasurers.org/hub/treasurer-magazine/why-humans-arethe%E2%80%93weakest-link-in-cybersecurity |
Jennings, J., & Nagel, J. C. (2020). Federal Workforce Statistics Sources: OPM and OMB. 1–11. Congressional Research Service.
Kiener-manu, katharina. (2019). Cybercrime. //www.unodc.org
Kierkegaard, S. M. (2005). Cracking down on cybercrime global response: The cybercrime convention. Communications of the IIMA, 5(1), 9.
Koohang, A., Anderson, J., Nord, J. H., & Paliszkiewicz, J. (2020). Building an awareness-centered information security policy compliance model. Industrial Management & Data Systems, 120(1), 231–247. https://doi.org/10.1108/IMDS-07-2019-0412
Kweon, E., Lee, H., Chai, S., & Yoo, K. (2019). The utility of information security training and education on cybersecurity incidents: An empirical evidence. Information Systems Frontiers. https://doi.org/10.1007/s10796-019-09977-z
Latto, N. (2020, December 19). What is Cybercrime and How Can You Prevent It? https://www.avast.com/c-cybercrime
Lederer, E. M. (2021, February 9). UN experts: North Korea using cyber attacks to update nukes. AP NEWS. https://apnews.com/article/technology-globaltrade-nuclear-weapons-north-korea-coronavirus-pandemic19f536cac4a84780f54a3279ef707b33
Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity
behavior. International Journal of Information Management, 45, 13–24. https://doi.org/10.1016/j.ijinfomgt.2018.10.017
Macak, M., Kruzikova, A., Daubner, L., & Bühnová, B. (2020). Simulation games platform for unintentional perpetrator attack vector identification. In Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops (pp. 222–229). Association for Computing Machinery. https://dl.acm.org/doi/abs/10.1145/3387940.3391475
Michael, C., & Sammons, J. (2017). Chapter 5. Cybercrime. In The Basics of Cyber Safety (pp. 87–116). Joe Hayton. https://learning.oreilly.com/library/view/the-basicsof/9780124166394/xhtml/chp005.xhtml
Milkovich, D. (2020, December 23). 15 Alarming Cyber Security Facts and Stats. Cybint. http://www.cybintsolutions.com/cyber-security-facts-stats/
Monteith, S., Bauer, M., Alda, M., Geddes, J., Whybrow, P. C., & Glenn, T. (2021). Increasing cybercrime since the pandemic: concerns for psychiatry. Current Psychiatry Reports, 23(4), 18. https://doi.org/10.1007/s11920-021-01228-w
Muhire, B., & Ayyagari, R. (2019). Employee Compliance to Information Security in Retail Stores. Communications of the IIMA, 16(4). https://scholarworks.lib.csusb.edu/ciima/vol16/iss4/2
Musto, J. (2020, October 21). NSA warns Pentagon about Chinese government hackers. FOXBusiness; Fox Business. https://www.foxbusiness.com/technology/nsa-advisory-warns-defensedepartment-about-chinese-government-hackers
Office of Information Security. (2021, March 25). North Korea Cyber Activity. https://www.hhs.gov/sites/default/files/dprk-cyber-espionage.pdf
Office of Personnel Management. (n.d.). Federally Mandated Training—Training and Development Policy Wiki. U.S. Office of Personnel Management. Retrieved May 4, 2021, https://www.opm.gov/wiki/training/FederallyMandated-Training.ashx
Office of the Director of National Intelligence. (2021). Annual Threat Assessment of the US Intelligence Community. https://www.dni.gov/files/ODNI/documents/assessments/ATA-2021-Unclassified-Report.pdf
Office of the Secretary of Defense. (2015). Department of Defense Cybersecurity Culture and Compliance Initiative. https://dod.defense.gov/Portals/1/Documents/pubs/OSD011517-15-RESFinal.pdf
Olejarz, J. M. (2015, July 27). Why Cybersecurity Is So Difficult to Get Right. Harvard Business Review. https://hbr.org/2015/07/why-cybersecurity-is-sodifficult-to-get-right
Petric, Dr. G., Eriksen, A.-C., Huisman, J., Smothers, R. L., & Carpenter, P. (n.d.). Measure to Improve. KnowBe4, Inc. https://www.knowbe4.com/hubfs/Security-Culture-Report.pdf
Pfleeger, S. L., & Caputo, D. D. (2012). Leveraging behavioral science to mitigate cyber security risk. Computers & Security, 31(4), 597–611. https://doi.org/10.1016/j.cose.2011.12.010
Pollock, T. (2017, October 20). Reducing human error in cyber security using the Human Factors Analysis Classification System (HFACS). 2017 KSU Conference on Cybersecurity Education, Research and Practice. https://www.researchgate.net/publication/321278165_Reducing_human_error_in_cyber_security_using_the_Human_Factors_Analysis_Classification_System_HFACS
ProofPoint. (2019). Protecting People 2019. https://www.proofpoint.com/sites/default/files/gtd-pfpt-us-tr-protecting-people2019.pdf
Reinheimer, B., Aldag, L., Mayer, P., Mossano, M., Duezguen, R., Bettina Lofthouse, Tatiana von Landesberger, & Melanie Volkamer. (2020). An investigation of phishing awareness and education over time: When and how to best remind users. 27.
Roberts, S. A. (2021). Exploring the relationships between user cybersecurity knowledge, cybersecurity and cybercrime attitudes, and online risky behaviors. Northcentral University, ProQuest Dissertations Publishing. https://www.proquest.com/docview/2506630550/BFE64010521C479BPQ/1
Sanger, D. E., & Perlroth, N. (2020, April 15). U.S. accuses North Korea of cyberattacks, a sign that deterrence is failing. The New York Times. https://www.nytimes.com/2020/04/15/world/asia/north-korea-cyber.html
Scarfone, K., & Souppaya, M. (2009). Guide to Enterprise Password Management (NIST Special Publication (SP) 800-118 (Retired Draft)). National Institute of Standards and Technology. https://csrc.nist.gov/publications/detail/sp/800-118/archive/2009-04-21
Schneier, B. (2000). Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Edition (15th Anniversary Edition). John Wiley & Sons, Inc. https://learning.oreilly.com/library/view/secrets-and-lies/9781119092438/
Schunk, D. H., & DiBenedetto, M. K. (2020). Motivation and social cognitive theory. Contemporary Educational Psychology, 60, 101832. https://doi.org/10.1016/j.cedpsych.2019.101832
Sen, R. (2018). Challenges to cybersecurity: current state of affairs. Communications of the Association for Information Systems, 43, 22–44. https://doi.org/10.17705/1CAIS.04302
Sobers, R. (2020, September 8). Government Hacking Exploits, Examples and Prevention Tips. Inside Out Security. https://www.varonis.com/blog/government-hacking-exploits/
SolarWinds. (2020). SolarWinds Public Sector Cybersecurity Survey Report 2020: IT Complexity, Insider Threats, and an Abundance of Privileged Users Plague Public Sector Cyber Readiness (p. 43). https://www.solarwinds.com/resources/survey/solarwinds-public-sectorcybersecurity-survey-report-2020
Steves, M. P., Greene, K. K., & Theofanos, M. F. (2019). A Phish Scale: Rating Human Phishing Message Detection Difficulty. Proceedings 2019 Workshop on Usable Security. Workshop on Usable Security, San Diego, CA. https://doi.org/10.14722/usec.2019.23028
Temple-Raston, D. (2021, April 16). A “Worst Nightmare” Cyberattack: The Untold Story Of The SolarWinds Hack. NPR.Org. https://www.npr.org/2021/04/16/985439655/a-worst-nightmare-cyberattackthe-untold-story-of-the-solarwinds-hack
United States Department of Agriculture. (2019). Improper Usage of USDA’s Information Technology Resources. https://www.usda.gov/sites/default/files/50501-0020-12.pdf
United States Department of Justice. (2021, February 17). Three North Korean Military Hackers Indicted in Wide-Ranging Scheme to Commit Cyberattacks and Financial Crimes Across the Globe. https://www.justice.gov/opa/pr/threenorth-korean-military-hackers-indicted-wide-ranging-scheme-commitcyberattacks-and
United States Department of State. (2019). DS Report on Security Incidents Related to Potentially Classified Emails sent to Former Secretary of State Clinton’s Private Email Server.
United States Government Accountability Office. (2021, March 24). High-Risk Series: Federal Government Needs to Urgently Pursue Critical Actions to Address Major Cybersecurity Challenges. https://www.gao.gov/products/gao21-288
Veiga, A. (2016). Comparing the information security culture of employees who had read the information security policy and those who had not: Illustrated through an empirical study. Information and Computer Security, 24, 139– 151. https://doi.org/10.1108/ICS-12-2015-0048
Whitaker, B. (2021, February 14). Unprecedented Russian SolarWinds hack that infiltrated federal government likely still happening. CBS. https://www.paramountplus.com/shows/60_minutes/video/BJMDBl_P14QPGckrQzu9n3yMRUEzNZMc/unprecedented-russian-solarwinds-hack-thatinfiltrated-federal-government-likely-still-happening/
Wood, R., & Bandura, A. (1989). Social Cognitive Theory of organizational management. Academy of Management Review, 14, 361–384. https://doi.org/10.5465/AMR.1989.4279067
Table of Contents
- CHAPTER ONE - INTRODUCTION
- CHAPTER TWO - CYBERCRIME IN GOVERNMENTS
- CHAPTER THREE - METHODOLOGY
- CHAPTER FOUR - RESULTS
- CHAPTER FIVE - DISCUSSION
- REFERENCES