NISTIR 8229; p. 39). US Department of Commerce,
National Institute of Standards and Technology.
https://nvlpubs.nist.gov/nistpubs/ir/2018/NIST.IR.822
9.pdf
Cavelty, M. D. (2010). Cyber-Security. In The Routledge
Handbook of New Security Studies (1st ed., p. 328).
Routledge.
Conkova, M. (2013). Analysis of Perceptions of
Conventional and E-Learning Education in Corporate
Training. Journal of Competitiveness, 5(4), 73–97.
https://doi.org/10.7441/joc.2013.04.05
Craigen, D., Diakun-Thibault, N., & Purse, R. (2014).
Defining Cybersecurity. Technology Innovation
Management Review, 4(10), 13–21.
Cupiał, M., Szeląg-Sikora, A., Sikora, J., Rorat, J., &
Niemiec, M. (2018). Information technology tools in
corporate knowledge management. Ekonomia i Prawo.
Economics and Law, 17(1), 5–15.
DYNAMO project. (2024, May 9). Dynamic Resilience
Assessment Method including combined Business
Continuity Management and Cyber Threat Intelligence
solution for Critical Sectors’. https://horizon-
dynamo.eu/wp-content/uploads/2023/01/DYNAMO_
Leaflet_web.pdf
ECHO project. (2021). E-EWS and E-FCR demonstration
surveys (Deliverable D8.2; p. 25). European
Commission. https://echonetwork.eu/wp-
content/uploads/2022/03/ECHO-D8.2-E-EWS-and-E-
FCR-demonstration-surveys_v1.0.pdf
Fitch Solutions. (2021). South Africa Autos Report
(Country Industry Reports Q4; p. 1). Fitch Solutions.
https://store.fitchsolutions.com/autos/south-africa-
autos-report
Frisk, I., Tikanmäki, I., & Ruoslahti, H. (2022). Piloting the
ECHO E-skills and Training Toolkit. Information &
Security: An International Journal, 53(2), 163–175.
https://doi.org/10.11610/isij.5311
Ghafur, S., Graß, E., Jennings, N., & Darzi, A. (2019). The
challenges of cybersecurity in health care: The UK
National Health Service as a case study. The Lancet
Digital Health, 1(1), e10–e12. https://doi.org/10.1016/
S2589-7500(19)30005-6
Hytönen, E., Rajamäki, J., & Ruoslahti, H. (2023).
Managing Variable Cyber Environments with
Organizational Foresight and Resilience Thinking.
International Conference on Cyber Warfare and
Security, 18, 162–170. https://doi.org/10.34190/
iccws.18.1.979
Hytönen, E., & Ruoslahti, H. (2023). A Lens to Examine
Communication Through Business Continuity
Management. In D. Verčič, A. T. Verčič, & K.
Sriramesh (Eds.), Public Relations and Sustainability
(pp. 205–216). University of Ljubljana: Faculty of
Social Sciences. https://www.bledcom.com/
Im, T., Porumbescu, G., & Lee, H. (2013). ICT as a Buffer
to Change. Public Performance & Management
Review, 36(3), 436–455.
https://doi.org/10.2753/PMR1530-9576360303
Isidro-Filho, A., Guimarães, T. de A., Perin, M. G., &
Leung, R. C. (2013). Workplace learning strategies and
professional competencies in innovation contexts in
Brazilian hospitals. BAR - Brazilian Administration
Review, 10(2), 121–134. https://doi.org/10.1590/
S1807-76922013000200002
Kilani, Y. (2020). Cyber-security effect on organizational
internal process: Mediating role of technological
infrastructure. Problems and Perspectives in
Management, 18, 449–460. https://doi.org/10.21511/
ppm.18(1).2020.39
Limnéll, J., Majewski, K., & Salminen, M. (2014).
Kyberturvallisuus. Docendo.
Linkov, I., Bridges, T., Creutzig, F., Decker, J., Fox-Lent,
C., Kröger, W., Lambert, J. H., Levermann, A.,
Montreuil, B., & Nathwani, J. (2014). Changing the
resilience paradigm. Nature Climate Change, 4(6),
407–409.
Linkov, I., Eisenberg, D. A., Plourde, K., Seager, T. P.,
Allen, J., & Kott, A. (2013). Resilience metrics for
cyber systems. Environment Systems and Decisions, 33,
471–476.
Luoma-aho, V., & Vos, M. (2010). Towards a more
dynamic stakeholder model: Acknowledging multiple
issue arenas. Corporate Communications: An
International Journal, 15(3), 315–331.
https://doi.org/10.1108/13563281011068159
MARISA Project. (2017). MARISA Grant Agreement
number 740698. European Commission.
Matveeva, A. (2006). Early Warning and Early Response:
Conceptual and Empirical Dilemmas (Issue Paper 1; p.
66). European Centre for Conflict Prevention
/International Secretariat of the Global Partnership for
the Prevention of Armed Conflict.
https://gppac.net/files/2018-12/Early%20Warning
%20and%20Early%20Response.pdf
Michel, M. C. K., & King, M. C. (2019). Cyber Influence
of Human Behavior: Personal and National Security,
Privacy, and Fraud Awareness to Prevent Harm. 2019
IEEE International Symposium on Technology and
Society (ISTAS), 1–7.
https://doi.org/10.1109/ISTAS48451.2019.8938009
Mohammed, S. (2015). An Introduction to Digital Crimes.
International Journal in Foundations of Computer
Science & Technology, 5(3), 13–24.
https://doi.org/10.5121/ijfcst.2015.5302
Muthuppalaniappan, M., & Stevenson, K. (2020).
Healthcare Cyber-Attacks and the COVID-19
Pandemic: An Urgent Threat to Global Health.
International Journal for Quality in Health Care, 33(1),
1–4. https://doi.org/10.1093/intqhc/mzaa117
National Cyber Security Centre. (2016). Common Cyber
Attacks: Reducing the Impact. Crown Copyright.
https://www.ncsc.gov.uk/guidance/white-
papers/common-cyber-attacks-reducing-impact
O’Rourke, T. D., & Briggs, T. R. (2007). Critical
Infrastructure, Interdependencies, and Resilience. The
Bridge, 22–29.
Payne, B. K. (2020). Defining Cybercrime. In T. J. Holt &
A. M. Bossler (Eds.), The Palgrave Handbook of
International Cybercrime and Cyberdeviance (pp. 3–
KMIS 2024 - 16th International Conference on Knowledge Management and Information Systems
354