[1] Sharif, M. H. U., & Mohammed, M. A. (2022). A literature review of financial losses statistics for cyber security and future trend. World Journal of Advanced Research and Reviews, 15(1), 138-156. https://doi.org/10.30574/wjarr.2022.15.1.0573
[2] Sun, N., Ding, M., Jiang, J., Xu, W., Mo, X., Tai, Y., & Zhang, J. (2023). Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new
perspectives. IEEE Communications Surveys & Tutorials,1-1. https://doi.org/10.1109/comst.2023.3273282
[3] Dhayanidhi, G. (2022). Research on IoT Threats & Implementation of AI/ML to Address Emerging Cybersecurity Issues in IoT with Cloud Computing. file:///C:/Users/user/Downloads/1b076ecd-286f-4020-b1da-490b6f088036.pdf
[4] Kalla, D., Samaah, F., Kuraku, S. & Smith, N. Phishing Detection Implementation Using Databricks and Artificial Intelligence. SSRN Electronic Journal 185, doi: 10.2139/ssrn.4452780 (2023).
[5] Bhuyan, S. S., Kabir, U. Y., Escareno, J. M., Ector, K., Palakodeti, S., Wyant, D., Kumar, S., Levy, M., Kedia, S., Dasgupta, D., & Dobalian, A. (2020). Transforming healthcare cybersecurity from reactive to proactive: Current status and future recommendations. Journal of Medical Systems, 44(5). https://doi.org/10.1007/s10916-019-1507-y
[6] Xu, S. (2020). The cybersecurity dynamics way of thinking and landscape. Proceedings of the 7th ACM Workshop on Moving Target Defense. https://doi.org/10.1145/3411496.3421225
[7] Kuraku, S., & Kalla, D. (2023). Impact of phishing on users with different online browsing hours and spending habits. International Journal of Advanced Research in Computer and Communication Engineering, 12(10), 34–41. https://doi.org/10.17148/IJARCCE.2023.121005
[8] Lee, C., & Ahmed, G. (2021). Improving IoT privacy, data protection and security concerns. International Journal of Technology, Innovation and Management
(IJTIM), 1(1),18-33. https://doi.org/10.54489/ijtim.v1i1.12
[9] Benz, M., & Chatterjee, D. (2020). Calculated risk? A cybersecurity evaluation tool for SMEs. Business Horizons, 63(4), 531-540. https://doi.org/10.1016/j.bushor.2020.03.010
[10] Selvan, C. A. J. A., & Fonceca, C. M. (2023). Cyber security culture in an IT company: An empirical study. https://www.researchgate.net/profile/Clayton- Fonceca/publication/370059163_Cyber_security_culture_in_an_IT_company_An_empirical_study/links/643cc5df2eca706c8b64b5a6/Cyber-security-culture-in-an-IT-company- An-empirical-study.pdf
[11] Branley-Bell, D., Coventry, L., & Sillence, E. (2021). Promoting cybersecurity culture change in
healthcare. The 14th PErvasive Technologies Related to Assistive Environments Conference. https://doi.org/10.1145/3453892.3461622
[12] Kuraku, S., and Kalla, D. (2020). Emotet Malware—A Banking Credentials Stealer. Iosr
J. Comput. Eng, 22, 31-41. https://doi.org/10.9790/0661-2204023140
[13] McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., & Pattinson, M. (2017).Individual Differences and Information Security Awareness. Computers in HumanBehavior, 69, 151-156.
(PDF) A Reliable Measure of Information Security Awareness and the Identification of Bias in Responses. Available from: https://www.researchgate.net/publication/321349520_A_Reliable_Measure_of_Information_Security_Awareness_and_the_Identification_of_Bias_in_Responses [accessed Nov 17 2023].
[14] Corradini, I. (2020). Building a cybersecurity culture. Studies in Systems, Decision and Control, 63-86. https://doi.org/10.1007/978-3-030-43999-6_4