References
[1]. Anderson, L. M., Shinn, C., Fullilove, M. T., Scrimshaw,
S. C., Fielding, J. E., Normand, J., ... & Task Force on Community Preventive Services. (2003). The effectiveness
of early childhood development programs: A systematic
review. American Journal of Preventive Medicine, 24(3),
32-46. https://doi.org/10.1016/S0749-3797(02)00655-4
[2]. Babiker, M. H. (2005). Climate change policy, market
structure, and carbon leakage. Journal of International
Economics, 65(2), 421-445. https://doi.org/10.1016/j.jinteco.2004.01.003
[3]. Benjelloun, F. Z., & Lahcen, A. A. (2019). Big data
security: challenges, recommendations and solutions. In
Web Services: Concepts, Methodologies, Tools, and
Applications (pp. 25-38). IGI Global. https://doi.org/10.4018/978-1-5225-7501-6.ch003
[4]. Borgesius, F. J. Z., Möller, J., Kruikemeier, S., Fathaigh,
R. Ó., Irion, K., Dobber, T., ... & De Vreese, C. (2018).
Online political microtargeting: Promises and threats for
democracy. Utrecht Law Review, 14(1), 82-96. http://doi.org/10.18352/ulr.420
[5]. Bouchard Jr, T. J., & Hare, M. (1970). Size,
performance, and potential in brainstorming groups.
Journal of Applied Psychology, 54(1p1), 51-55. https://doi.org/10.1037/h0028621
[6]. Budak, C., Agrawal, D., & El Abbadi, A. (2011).
Structural trend analysis for online social networks.
Proceedings of the VLDB Endowment, 4(10), 646-656.
https://doi.org/10.14778/2021017.2021022
[7]. Cadwalladr, C., & Graham-Harrison, E. (2018).
Revealed: 50 million Facebook profiles harvested for
Cambridge Analytica in major data breach. The
Guardian, 17, 1-6.
[8]. Cant, M. A. (2011). The role of threats in animal
cooperation. Proceedings of the Royal Society B:
Biological Sciences, 278(1703), 170-178. https://doi.org/10.1098/rspb.2010.1241
[9]. Carson, J. V., & Politte, H. (2021). Implicit bias within
public reporting: A virtual reality experiment examining
“suspicious” activity. Crime & Delinquency, 67(12), 2135-2162. https://doi.org/10.1177/0011128720981897
[10]. Cerutti, D. T. (1989). Discrimination theory of rule
governed behavior. Journal of the Experimental Analysis
of Behavior, 51(2), 259-276. https://doi.org/10.1 901/jeab. 1989.51-259
[11]. Chae, H., Shahzad, A., Irfan, M., Lee, H., & Lee, M.
(2015). Industrial control systems vulnerabilities and
security issues and future enhancements. Advanced
Science and Technology Letters, 95, 144-148. https://doi.org/10.14257/astl.2015.95.27
[12]. Chauhan, P. S., & Kshetri, N. (2021). 2021 state of the
practice in data privacy and security. Computer, 54(8),
125-132. https://doi.org/10.1109/MC.2021.3083916
[13]. Chen, D., & Zhao, H. (2012, March). Data security
and privacy protection issues in cloud computing. In
2012, International Conference on Computer Science
and Electronics Engineering (Vol. 1, pp. 647-651). IEEE.
https://doi.org/10.1109/ICCSEE.2012.193
[14]. Cho, H., Ippolito, D., & Yu, Y. W. (2020). Contact
tracing mobile apps for COVID-19: Privacy considerations
and related trade-offs. arXiv preprint arXiv:2003.11511.
https://doi.org/10.48550/arXiv.2003.11511
[15]. Chou, D. C., & Chou, A. Y. (2009). Integrating
change management and change auditing into
information technology consulting practice. International
Journal of Information Systems and Change
Management, 4(1), 15-41.
[16]. Colwill, C. J., Todd, M. C., Fielder, G. P., & Natanson,
C. (2001). Information assurance. BT Technology Journal,
19(3), 107-114.
[17]. De Marco, A., Rafele, C., & Thaheem, M. J. (2016).
Dynamic management of risk contingency in complex
design-build projects. Journal of Construction
Engineering and Management, 142(2), 1-10. https://doi.org/10.1061/(ASCE)CO.1943-7862.0001052
[18]. Doelitzscher, F., Reich, C., Knahl, M., & Clarke, N.
(2013). Understanding cloud audits. In Privacy and
Security for Cloud Computing (pp. 125-163). Springer,
London. https://doi.org/10.1007/978-1-4471-4189-1_4
[19]. Drevin, L., Kruger, H. A., & Steyn, T. (2007). Valuefocused
assessment of ICT security awareness in an
academic environment. Computers & Security, 26(1), 36-43. https://doi.org/10.1016/j.cose.2006.10.006
[20]. Dunn Cavelty, M. (2014). Breaking the cyber-security
dilemma: Aligning security needs and removing
vulnerabilities. Science and Engineering Ethics, 20(3),
701-715. https://doi.org/10.1007/s11948-014-9551-y
[21]. Eames, K. T., & Keeling, M. J. (2003). Contact tracing
and disease control. Proceedings of the Royal Society of
London. Series B: Biological Sciences, 270(1533), 2565-2571. https://doi.org/10.1098/rspb.2003.2554
[22]. Eduljee, G. H. (2000). Trends in risk assessment and
risk management. Science of the Total Environment,
249(1-3), 13-23. https://doi.org/10.1016/S0048-9697(99)00507-0
[23]. Eling, K., & Herstatt, C. (2017). Managing the front
end of innovation—Less fuzzy, yet still not fully understood.
Journal of Product Innovation Management, 34(6), 864-874. https://doi.org/10.1111/jpim.12415
[24]. Elsawah, H. K., Elsokary, M. A., Abdallah, M. S., &
ElShafie, A. H. (2021). Efficacy and safety of remdesivir in
hospitalized Covid 19 patients: systematic review and
meta analysis including network meta analysis. Reviews in
Medical Virology, 31(4), e2187. https://doi.org/10.1002/rmv.2187
[25]. Elsinger, H., Lehar, A., & Summer, M. (2006). Risk
assessment for banking systems. Management Science,
52(9), 1301-1314. https://doi.org/10.1287/mnsc.1060.0531
[26]. Erickson, G. M., & Brochu, C. A. (1999). How the
'terror crocodile'grew so big. Nature, 398(6724), 205-206.
https://doi.org/10.1038/18343
[27]. Fan, X., Fan, K., Wang, Y., & Zhou, R. (2015, August).
Overview of cyber-security of industrial control system. In
2015, International Conference on Cyber Security of
Smart Cities, Industrial Control System and
Communications (SSIC) (pp. 1-7). IEEE. https://doi.org/10.1109/SSIC.2015. 7245324
[28]. Forte, D. (2004). MyDoom & Co. is there really a
problem?. Network Security, 2004(3), 14. https://doi.org/10.1016/S1353-4858(04)00052-2
[29]. Grobauer, B., Walloschek, T., & Stocker, E. (2010).
Understanding cloud computing vulnerabilities. IEEE
Security & Privacy, 9(2), 50-57. https://doi.org/10.1109/MSP.2010.115
[30]. Guan, Y., Shao, J., Wei, G., & Xie, M. (2018). Data
security and privacy in fog computing. IEEE Network,
32(5), 106-111. https://doi.org/10.1109/MNET.2018.1700250
[31]. Hammad, M., Bagheri, H., & Malek, S. (2017, April).
Determination and enforcement of least-privilege
architecture in android. In 2017, IEEE International
Conference on Software Architecture (ICSA) (pp. 59-68).
IEEE. https://doi.org/10.1109/ICSA.2017.18
[32]. Hammad, M., Bagheri, H., & Malek, S. (2019).
DelDroid: an automated approach for determination
and enforcement of least-privilege architecture in
android. Journal of Systems and Software, 149, 83-100.
https://doi.org/10.1016/j.jss.2018.11.049
[33]. Harrell, M. N. (2017). Synergistic security: A work
system case study of the target breach. Journal of
Cybersecurity Education, Research and Practice,
2017(2), 4.
[34]. Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal,
P., & Sikdar, B. (2019). A survey on IoT security: Application
areas, security threats, and solution architectures. IEEE
Access, 7, 82721-82743. https://doi.org/10.1109/ACCESS.2019.2924045
[35]. Hosseinian-Far, A., Ramachandran, M., & Slack, C.
L. (2018). Emerging trends in cloud computing, big data,
fog computing, IoT and smart living. Technology for Smart
Futures, 29-40. https://doi.org/10.1007/978-3-319-60137-3_2
[36]. Hyams, J., Markowitz, J., Otley, A., Rosh, J., Mack, D.,
Bousvaros, A., ... & Pediatric Inflammatory Bowel Disease
Collaborative Research Group. (2005). Evaluation of the
pediatric crohn disease activity index: a prospective
multicentre experience. Journal of Pediatric
Gastroenterology and Nutrition, 41(4), 416-421. https://doi.org/10.1097/01.mpg.0000183350.46795.42
[37]. Jalali, M. S., Landman, A., & Gordon, W. J. (2021).
Telemedicine, privacy, and information security in the
age of COVID-19. Journal of the American Medical
Informatics Association, 28(3), 671-672. https://doi.org/10.1093/jamia/ocaa310
[38]. Josephson, C. B., & Wiebe, S. (2021). Precision
Medicine: Academic dreaming or clinical reality?.
Epilepsia, 62, 78-89. https://doi.org/10.1111/epi.16739
[39]. Kaaniche, N., & Laurent, M. (2017). Data security
and privacy preservation in cloud storage environments
based on cryptographic mechanisms. Computer
Communications, 111, 120-141. https://doi.org/10.1016/j.comcom.2017.07.006
[40]. Kim, S. H., Kim, N. U., & Chung, T. M. (2013, December).
Attribute relationship evaluation methodology for big
data security. In 2013, International Conference on IT
Convergence and Security (ICITCS) (pp. 1-4). IEEE. https://doi.org/10.1109/ICITCS.2013.6717808
[41]. Korff, D., & Brown, I. (2013). The use of the Internet &
related services, private life & data protection: trends &
technologies, threats & implications. Council of Europe, TPD
(2013), 7, (pp. 42).
[42]. Krebs, P., & Duncan, D. T. (2015). Health app use
among US mobile phone owners: a national survey. JMIR
mHealth and uHealth, 3(4), e4924. https://doi.org/10.2196/mhealth.4924
[43]. Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring
data security issues and solutions in cloud computing.
Procedia Computer Science, 125, 691-697. https://doi.org/10.1016/j.procs.2017.12.089
[44]. Kuyoro, S. O., Ibikunle, F., & Awodele, O. (2011).
Cloud computing security issues and challenges.
International Journal of Computer Networks (IJCN), 3(5),
247-255.
[45]. Kuzmanović, M., Ginebreda, A., Petrović, M., &
Barceló, D. (2015). Risk assessment based prioritization of
200 organic micropollutants in 4 Iberian rivers. Science of
the Total Environment, 503, 289-299. https://doi.org/10.1016/j.scitotenv.2014.06.056
[46]. Langkafel, P. (2014). 1 Intro Big Data for Healthcare?.
Big Data in Medical Science and Healthcare
Management, 20, 1-3. https://doi.org/10.1515/9783110445749
[47]. Lee, Y. W., Pipino, L., Strong, D. M., & Wang, R. Y.
(2004). Process-embedded data integrity. Journal of
Database Management (JDM), 15(1), 87-103. https://doi. org/10.4018/jdm.2004010104
[48]. Leung, Y., Fung, T., Mi, J. S., & Wu, W. Z. (2007). A
rough set approach to the discovery of classification rules
in spatial data. International Journal of Geographical
Information Science, 21(9), 1033-1058. https://doi.org/10.1080/13658810601169915
[49]. Li, M., Lou, W., & Ren, K. (2010). Data security and
privacy in wireless body area networks. IEEE Wireless
Communications, 17(1), 51-58. https://doi.org/10.1109/MWC.2010.5416350
[50]. Mansfield-Devine, S. (2016). Data protection:
prepare now or risk disaster. Computer Fraud & Security,
2016(12), 5-12. https://doi.org/10.1016/S1361-3723(16)30098-7
[51]. Mantelero, A., & Vaciago, G. (2022). Reconciling
Data Protection and Cybersecurity: An Operational
Approach for Business Sector. In Privacy and Data
Protection in Software Services (pp. 97-110). Springer,
Singapore. https://doi.org/10.1007/978-981-16-3049-1_9
[52]. Maqousi, A., Balikhina, T., & Mackay, M. (2013). An
effective method for information security awareness
raising initiatives. International Journal of Computer
Science & Information Technology, 5(2), 63.
[53]. Masrom, M., & Rahimly, A. (2015). Overview of data
security issues in hospital information systems. Pacific Asia
Journal of the Association for Information Systems, 7(4), 5.
https://doi.org/10.17705/1pais.07404
[54]. Matturdi, B., Zhou, X., Li, S., & Lin, F. (2014). Big Data
security and privacy: A review. China Communications,
11(14), 135-145. https://doi.org/10.1109/CC.2014.7085614
[55]. Matturdi, B., Zhou, X., Li, S., & Lin, F. (2014). Big Data
security and privacy: A review. China Communications,
11(14), 135-145. https://doi.org/10.1109/CC.2014.7085614
[56]. Matturdi, B., Zhou, X., Li, S., & Lin, F. (2014). Big Data
security and privacy: A review. China Communications,
11(14), 135-145. https://doi.org/10.1109/CC.2014.7085614
[57]. Moreno, J., Serrano, M. A., & Fernández-Medina, E.
(2016). Main issues in big data security. Future Internet, 8(3), 44. https://doi.org/10.3390/fi8030044
[58]. Munar, A. M. (2012). Social media strategies and
destination management. Scandinavian Journal of
Hospitality and Tourism, 12(2), 101-120. https://doi.org/10.1080/15022250.2012.679047
[59]. Omar, H. A., Lu, N., & Zhuang, W. (2016). Wireless
access technologies for vehicular network safety
applications. IEEE Network, 30(4), 22-26. https://doi.org/10.1109/MNET.2016.7513860
[60]. Opderbeck, D. W. (2015). Cybersecurity, data
breaches, and the economic loss doctrine in the
payment card industry. Md. L. Rev., 75, 935.
[61]. Pandey, N., & Pal, A. (2020). Impact of digital surge
during Covid-19 pandemic: A viewpoint on research and
practice. International Journal of Information
Management, 55, 102171. https://doi.org/10.1016/j.ijinfomgt.2020.102171
[62]. Parakh, A., & Kak, S. (2011). Space efficient secret
sharing for implicit data security. Information Sciences,
181(2), 335-341. https://doi.org/10.1016/j.ins.2010.09.013
[63]. Reddy, G. N., & Reddy, G. J. (2014). A study of cyber
security challenges and its emerging trends on latest
technologies. arXiv preprint arXiv:1402.1842. https://doi.org/10.48550/arXiv.1402.1842
[64]. Rizomiliotis, P., Rekleitis, E., & Gritzalis, S. (2009).
Security analysis of the Song-Mitchell authentication
protocol for low-cost RFID tags. IEEE Communications
Letters, 13(4), 274-276. https://doi.org/10.1109/LCOMM.2009.082117
[65]. Salkovskis, P. M., & Forrester, E. (2002). Responsibility.
In Cognitive approaches to obsessions and compulsions
(pp. 45-61). Pergamon. https://doi.org/10.1016/B978-008043410-0/50005-2
[66]. Sandhu, R. S., & Samarati, P. (1994). Access control:
principle and practice. IEEE Communications Magazine,
32(9), 40-48. https://doi.org/10.1109/35.312842
[67]. Sandhu, R. S., & Samarati, P. (1994). Access control:
principle and practice. IEEE Communications Magazine,
32(9), 40-48. https://doi.org/10.1109/35.312842
[68]. Sandling, M., & Chandler, K. L. (2021). Exploring America in the 2000s: New Millennium, New US Grades 6-8. Routledge. https://doi.org/10.4324/9781003235118
[69]. Sapienza, A., Bessi, A., Damodaran, S., Shakarian,
P., Lerman, K., & Ferrara, E. (2017, November). Early
warnings of cyber threats in online discussions. In 2017,
IEEE International Conference on Data Mining Workshops
(ICDMW) (pp. 667-674). IEEE. https://doi.org/10.1109/ICDMW.2017.94
[70]. Shen, J., Shen, J., Chen, X., Huang, X., & Susilo, W.
(2017). An efficient public auditing protocol with novel
dynamic structure for cloud data. IEEE Transactions on
Information Forensics and Security, 12(10), 2402-2415.
https://doi.org/10.1109/TIFS.2017.2705620
[71]. Shyur, H. J. (2008). A quantitative model for aviation
safety risk assessment. Computers & Industrial
Engineering, 54(1), 34-44. https://doi.org/10.1016/j.cie.2007.06.032
[72]. Smid, M. E., & Branstad, D. K. (1988). Data
encryption standard: Past and future. Proceedings of the
IEEE, 76(5), 550-559. https://doi.org/10.1109/5.4441
[73]. Storey, K. (1995). The language of threats.
International Journal of Speech, Language and the Law,
2(1), 74-80. https://doi.org/10.1558/ijsll.v2i1.74
[74]. Sun, Y., Zhang, J., Xiong, Y., & Zhu, G. (2014). Data
security and privacy in cloud computing. International
Journal of Distributed Sensor Networks, 10(7), 190903.
https://doi.org/10.1155/2014/190903
[75]. Tavani, H. T., & Moor, J. H. (2001). Privacy protection,
control of information, and privacy-enhancing
technologies. ACM Sigcas Computers and Society, 31(1),
6-11. https://doi.org/10.1145/572277.572278
[76]. Taylor, J., & Gibson, L. K. (2017). Digitisation, digital
interaction and social media: embedded barriers to
democratic heritage. International Journal of Heritage
Studies, 23(5), 408-420. https://doi.org/10.1080/13527258.2016.1171245
[77]. Trautman, L. J., & Ormerod, P. C. (2016). Corporate
directors' and officers' cybersecurity standard of care: The
Yahoo data breach. American University Law Review, 66,
(pp. 1231).
[78]. Weaver, S. C., & Reisen, W. K. (2010). Present and
future arboviral threats. Antiviral Research, 85(2), 328-345. https://doi.org/10.1016/j.antiviral.2009.10.008
[79]. Wen-bin, Y. Y. X. Y., & Zhao, C. H. E. N. (2010). Review
of disaster backup and recovery technology of
information system. Journal of Beijing University of Posts
and Telecommunications, 33(2), 1-6. https://doi.org/10.13190/jbupt.201002.1.yangyx
[80]. Xu, Y., Cui, W., & Peinado, M. (2015, May).
Controlled-channel attacks: Deterministic side channels
for untrusted operating systems. In 2015, IEEE Symposium
on Security and Privacy (pp. 640-656). IEEE. https://doi.org/10.1109/ SP.2015.45
[81]. Yu, S., Wang, C., Ren, K., & Lou, W. (2010, March).
Achieving secure, scalable, and fine-grained data
access control in cloud computing. In 2010, Proceedings
IEEE INFOCOM (pp. 1-9). IEEE. https://doi.org/10.1109/INFCOM.2010.5462174
[82]. Zhang, X., Du, H. T., Chen, J. Q., Lin, Y., & Zeng, L. J.
(2011, May). Ensure data security in cloud storage. In
2011, International Conference on Network Computing
and Information Security (Vol. 1, pp. 284-287). IEEE.
https://doi.org/10.1109/NCIS.2011.64
[83]. Zhang, Y., Li, Z. J., & He, D. Q. (2005). A survey on
disaster backup and recovery techniques [j]. Computer
Engineering & Science, 2, 37.