Guerrero, V. L. (2024). Cyber Threats, Cyber Risks, and Cybersecurity Responses: Modeling Whole-Of-Nation Strategy Implementation for American Organizations and Citizens (Doctoral dissertation, Clemson University).
[1](Ebot, A. (2024). Technology Acceptance Model for Adopting Cybersecurity Technology in Small and Medium Business/Enterprise: A Generic Qualitative Study (Doctoral dissertation, Capella University).
[1](Gualtier, K. A. (2015). Information operations under international law: A Delphi study into the legal standing of cyber warfare (Doctoral dissertation, Walden University).
[1]) Moore, M. C. (2014). Development and implementation of government cybersecurity policies and practices for national security and cybercrime (Doctoral dissertation, Walden University).
[1](Griffiths, J. L. (2016). Cyber security as an emerging challenge to South African national security (Master's thesis, University of Pretoria (South Africa)).
[1]) Miranda, R. M. D. F. C. (2016). Cyber Warfare in the Context of International Criminal Law (Master's thesis, Universidade Catolica Portuguesa (Portugal)).
[1]) Sithole, T. (2024). Impact of Brics cybersecurity regulation on the South African cybersecurity legal landscape (Master's thesis, University of Johannesburg (South Africa)).
[1]) Shawe, R. (2024). Exploring the Global Impact of Domestic Cyberterrorism on Cybersecurity (Doctoral dissertation, Capitol Technology University).pp 25-26.
[1]) Smith, A. M. (2024). Federal Organizations Mitigation of Cybersecurity Risks Due to Employees' Use of Social Media During Work Hours: A Systematic Review (Doctoral dissertation, University of Maryland University College).
[1](Parra, W. (2022). Deterring Ransomware Through Cyber Legislation (Master's thesis, Utica University).
[1]) Chundu, B., Masamha, T., & Sifile, O. (2025). Cyber-security governance framework pillars for Zimbabwean local authorities. Cogent Social Sciences, 11(1), 2453094.
[1]) Clanton, E. L. (2024). Least Developed Countries’ Digital Access: A Survey of Sustainable Development Goal 9 and Cyber Diplomacy (Doctoral dissertation, Marymount University).
[1](Ifeanyi-Ajufo, N. (2023). Cyber governance in Africa: at the crossroads of politics, sovereignty and cooperation. Policy Design and Practice, 6(2), 146–159. https://doi.org/10.1080/25741292.2023.2199960.
[1]) Barber, I. A., & Kumar, S. (2023). Learning from the ground up: lessons from civil society engagement in addressing the human rights implications of cybercrime legislation. Journal of Cyber Policy, 1–18. https://doi.org/10.1080/23738871.2023.2240331
[1](Yan, Z. (2022). The Dual Foundation of Cybersecurity Legislation. Social Sciences in China, 43(3), 4-20.
[1](Broeders, D., De Busser, E., Cristiano, F., & Tropina, T. (2022). Revisiting past cyber operations in light of new cyber norms and interpretations of international law: inching towards lines in the sand?. Journal of Cyber Policy, 7(1), 97-135.
[1](Mačák, K. (2021). Unblurring the lines: military cyber operations and international law. Journal of Cyber Policy, 6(3), 411-428.
[1](Akoto, W. (2022). Accountability and cyber conflict: examining institutional constraints on the use of cyber proxies. Conflict Management and Peace Science, 39(3), 311-332.
[1]) Ebert, H. (2020). Hacked IT superpower: how India secures its cyberspace as a rising digital democracy. India Review, 19(4), 376–413. https://doi.org/10.1080/14736489.2020.1797317
[1]) Adams, J. (2020). Legal Boundaries of The Cyberspace: Privacy of E-Commerce Transactions in The International Law (Doctoral dissertation, University of Essex).
[1]) Dunn Cavelty, M. (2018). Europe's cyber-power. European politics and society, 19(3), 304-320.
[1]) Shawe, R. (2024). Exploring the Global Impact of Domestic Cyberterrorism on Cybersecurity (Doctoral dissertation, Capitol Technology University).
-Qadri, Nour El-Hoda. (2023) aljarimat alsiybiraniat waliat mukafahatiha-muajahat tahadiyat al'amn alsiybirani. almajalat aljazayiriat lilhuquq waleulum alsiyasiat 8(1), 321-337..
[1]) Abbas, Z., Khan, R., Khan, M. Z., & Imran, M. (2023). Cyber Laws and Media Censorship in Pakistan: An Investigation of Governmental Tactics to Curtail Freedom of Expression and Right to Privacy. Journal of Creative Communications, 09732586231206913.
[1]) Barber, I. A., & Kumar, S. (2023). Learning from the ground up: lessons from civil society engagement in addressing the human rights implications of cybercrime legislation. Journal of Cyber Policy, 1-18.
[1]) Masduki. (2022). Cyber-troops, digital attacks, and media freedom in Indonesia. Asian Journal of Communication, 32(3), 218-233.
-Zenati, Mohamed. (2022). 'athar aljarayim alsubraniat ealaa alhuriyaat alfardia (aljazayir namudhaja). almajalat alafriqiat lildirasat alqanuniat walsiyasiati, 6(1), 43-62.
[1](Shandler, R., Gross, M. L., & Canetti, D. (2021). A fragile public preference for cyber strikes: Evidence from survey experiments in the United States, United Kingdom, and Israel. Contemporary Security Policy, 42(2), 135-162.
[1](McCurdy, M. (2020). The evolution and legislative response to Nigerian cybercrime (Master's thesis, Utica College).
[1]) Masood, U. H. B. (2017). Countering Cyber Attacks in Malaysian Law: Assessing the Concept of Cyber Attacks and the Countermeasures (Doctoral dissertation, University of Leeds).
[1]) Barclay, C. (2017). Cybercrime and legislation: a critical reflection on the Cybercrimes Act, 2015 of Jamaica. Commonwealth Law Bulletin, 43(1), 77-107.
[1]) White, J. K. (2017). Impact of protection motivation theory and general deterrence theory on the behavioral intention to implement and misuse active cyber defense (Order No. 10622990). Available from ProQuest Dissertations & Theses Global. (1957432791). Retrieved from https://www.proquest.com/dissertations-theses/impact-protection-motivation-theory-general/docview/1957432791/se-2
[1](ing Li, Li Xu, Wu He (2022) he effects of antecedents and mediating factors on cybersecurity protection behavior,Computers in Human Behavior Reports, Volume 5, https://doi.org/10.1016/j.chbr.2021.100165.
[1]) Towbin, R. S. (2019). A protection motivation theory approach to healthcare cybersecurity: A multiple case study (Order No. 13809084). Available from ProQuest Dissertations & Theses Global; Publicly Available Content Database. (2207492982). Retrieved from https://www.proquest.com/dissertations-theses/protection-motivation-theory-approach-healthcare/docview/2207492982/se-2
[1](Sulaiman, N. S., Fauzi, M. A., Hussain, S., & Wider, W. (2022). Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks. Information, 13(9), 413. https://doi.org/10.3390/info13090413
[1]) Shawe, R. (2024) op. cit, p15.
[1]) Sithole, T. (2024). Impact of Brics cybersecurity regulation on the South African cybersecurity legal landscape (Master's thesis, University of Johannesburg (South Africa)).
[1]) MacInnes, J., (2020). Exploratory Data Analysis, In P. Atkinson, S. Delamont, A. Cernat, J.W. Sakshaug, & R.A. Williams (Eds.), SAGE Research Methods Foundations. https://doi.org/10.4135/9781526421036889602
[1](Atatsi, E. K. (2024). Exploring the use of internships to build practical experience for emerging cybersecurity professionals in order to meet industry work experience requirements (Order No. 31146741). Available from ProQuest Dissertations & Theses Global. (3037345737). Retrieved from https://www.proquest.com/dissertations-theses/exploring-use-internships-build-practical/docview/3037345737/se-2