DOI

Paper Title

10.21058/gjecs.2024.91001

AWARENESS, TRUST, AND ADOPTION OF BLOCKCHAIN TECHNOLOGY AND CRYPTOCURRENCY AMONG BLOCKCHAIN COMMUNITIES

Author Name

Volume No., Issue No., Year, & Page No.

Jackie Chong Cheong Sin

Vol. 9, No. 1, March 2024, pp. 1-17

Abstract:

Blockchain technology and cryptocurrency are attracting increasing attention from consumers, investors, investment industry and regulators. Cryptocurrency has great potential to be used for transaction or investment in the future. However, level of awareness of the blockchain technology and cryptocurrency is still at infant stage, specifically in developing countries. Thus, this study aims to investigate the level of awareness, trust and adoption of blockchain technology among blockchain community. Quantitative approach was adopted in this study where a new questionnaire was developed in the first phase to measure the level of awareness, adoption, and trust of blockchain technology applications among blockchain communities. The resulting questionnaire consists of items on respondents’ demographic, their awareness, trust, and adoption of FinTech particularly on blockchain technology and cryptocurrency. In the second phase, a pilot study was conducted to validated the new questionnaire from 304 respondents. Nevertheless, the majority of respondents are confident and trust that the blockchain technology can offer a stable and secure platform, which gives positive impact on the application of the technology. Empirical results provide significant insights into the development of the blockchain technology industry in the country.

Keywords:

Blockchain Communities, Cryptocurrency, Technology Adoption, Awareness, Trust, Bitcoin

Full Text:

References:

  1. Iansiti, Marco; Lakhani, Karim R. (January 2017). "The Truth About Blockchain". Harvard Business Review. Harvard University. Archived from the original on 18 January 2017. Retrieved 17 January 2017. The technology at the heart of bitcoin and other virtual currencies, blockchain is an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way.
  2. Raval, Siraj (2016). Decentralized Applications: Harnessing Bitcoin's Blockchain Technology. O'Reilly Media, Inc. pp. 1–2. ISBN 978-1-4919-2452-5.
  3. Park, Sehyun; Im, Seongwon; Seol, Youhwan; Paek, Jeongyeup (2019). "Nodes in the Bitcoin Network: Comparative Measurement Study and Survey". IEEE Access. 7: 57009–57022. doi:10.1109/ACCESS.2019.2914098. S2CID 155106629.
  4. Hern, Alex (17 January 2018). "Bitcoin's energy usage is huge – we can't afford to ignore it". The Guardian. Archived from the original on 23 January 2018. Retrieved 23 January 2018.
  5. Baraniuk, Chris (3 July 2019). "Bitcoin's global energy use 'equals Switzerland'". BBC News. Retrieved 2 February 2020.
  6. "Blind Signatures for Untraceable Payments" (PDF). Archived from the original (PDF) on 18 December 2014. Retrieved 26 October 2014.
  7. "Untraceable Electronic Cash" (PDF). Archived (PDF) from the original on 3 September 2011. Retrieved 10 October 2012.
  8. Pitta, Julie. "Requiem for a Bright Idea". Forbes. Archived from the original on 30 August 2017. Retrieved 11 January 2018.
  9. "How To Make A Mint: The Cryptography of Anonymous Electronic Cash". groups.csail.mit.edu. Archived from the original on 26 October 2017. Retrieved 11 January 2018.
  10. Law, Laurie; Sabett, Susan; Solinas, Jerry (11 January 1997). "How to Make a Mint: The Cryptography of Anonymous Electronic Cash". American University Law Review. 46 (4). Archived from the original on 12 January 2018. Retrieved 11 January 2018.
  11. "Bitcoin: The Cryptoanarchists' Answer to Cash". IEEE Spectrum. Around the same time, Nick Szabo, a computer scientist who now blogs about law and the history of money, was one of the first to imagine a new digital currency from the ground up. Although many consider his scheme, which he calls "bit gold", to be a precursor to Bitcoin
  12. Jerry Brito and Andrea Castillo (2013). "Bitcoin: A Primer for Policymakers" (PDF). Mercatus Center. George Mason University. Archived (PDF) from the original on 21 September 2013. Retrieved 22 October 2013.
  13. Bitcoin developer chats about regulation, open source, and the elusive Satoshi Nakamoto Archived 3 October 2014 at the Wayback Machine, PCWorld, 26 May 2013
  14. Wary of Bitcoin? A guide to some other cryptocurrencies Archived 16 January 2014 at the Wayback Machine, ars technica, 26 May 2013
  15. "UK launches initiative to explore potential of virtual currencies". The UK News. Archived from the original on 10 November 2014. Retrieved 8 August 2014.
  16. "UK regulatory approach to cryptoassets and stablecoins: Consultation and call for evidence" (PDF). HM Treasury. Retrieved 1 October 2021.
  17. "Cuba's central bank now recognizes cryptocurrencies such as bitcoin". CNBC. 27 August 2021.
  18. Morris, David Z. (15 May 2016). "Leaderless, Blockchain-Based Venture Capital Fund Raises $100 Million, And Counting". Fortune. Archived from the original on 21 May 2016. Retrieved 23 May 2016.
  19. Popper, Nathan (21 May 2016). "A Venture Fund With Plenty of Virtual Capital, but No Capitalist". The New York Times. Archived from the original on 22 May 2016. Retrieved 23 May 2016.
  20. "Blockchains: The great chain of being sure about things". The Economist. 31 October 2015. Archived from the original on 3 July 2016. Retrieved 18 June 2016. The technology behind bitcoin lets people who do not know or trust each other build a dependable ledger. This has implications far beyond the crypto currency.
  21. Narayanan, Arvind; Bonneau, Joseph; Felten, Edward; Miller, Andrew; Goldfeder, Steven (2016). Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton: Princeton University Press. ISBN 978-0-691-17169-2.
  22. Iansiti, Marco; Lakhani, Karim R. (January 2017). "The Truth About Blockchain". Harvard Business Review. Harvard University. Archived from the original on 18 January 2017. Retrieved 17 January 2017. The technology at the heart of bitcoin and other virtual currencies, blockchain is an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way.
  23. "The World's Oldest Blockchain Has Been Hiding in the New York Times Since 1995". www.vice.com. Retrieved 9 October 2021.
  24. "Blockchain may finally disrupt payments from Micropayments to credit cards to SWIFT". dailyfintech.com. 10 February 2018. Archived from the original on 27 September 2018. Retrieved 18 November 2018.
  25. Hampton, Nikolai (5 September 2016). "Understanding the blockchain hype: Why much of it is nothing more than snake oil and spin". Computerworld. Archived from the original on 6 September 2016. Retrieved 5 September 2016.
  26. Bakos, Yannis; Halaburda, Hanna; Mueller-Bloch, Christoph (February 2021). "When Permissioned Blockchains Deliver More Decentralization Than Permissionless". Communications of the ACM. 64 (2): 20–22. doi:10.1145/3442371. S2CID 231704491.
  27. Sherman, Alan T.; Javani, Farid; Zhang, Haibin; Golaszewski, Enis (January 2019). "On the Origins and Variations of Blockchain Technologies". IEEE Security Privacy. 17 (1): 72–77. arXiv:1810.06130. doi:10.1109/MSEC.2019.2893730. ISSN 1558-4046. S2CID 53114747.
  28. Haber, Stuart; Stornetta, W. Scott (January 1991). "How to time-stamp a digital document". Journal of Cryptology. 3 (2): 99–111. CiteSeerX 10.1.1.46.8740. doi:10.1007/bf00196791. S2CID 14363020.
  29. Bayer, Dave; Haber, Stuart; Stornetta, W. Scott (March 1992). Improving the Efficiency and Reliability of Digital Time-Stamping. Sequences. Vol. 2. pp. 329–334. CiteSeerX 10.1.1.71.4891. doi:10.1007/978-1-4613-9323-8_24. ISBN 978-1-4613-9325-2.
  30. Chen, Huashan; Pendleton, Marcus; Njilla, Laurent; Xu, Shouhuai (12 June 2020). "A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses". ACM Computing Surveys. 53 (3): 3–4. arXiv:1908.04507. doi:10.1145/3391195. ISSN 0360-0300. S2CID 199551841.
  31. Brito, Jerry; Castillo, Andrea (2013). Bitcoin: A Primer for Policymakers (PDF) (Report). Fairfax, VA: Mercatus Center, George Mason University. Archived (PDF) from the original on 21 September 2013. Retrieved 22 October 2013.
  32. Raval, Siraj (2016). Decentralized Applications: Harnessing Bitcoin's Blockchain Technology...
  33. Y. A. Baker El-Ebiary et al., "Blockchain as a decentralized communication tool for sustainable development," 2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), 2021, pp. 127-133, doi: 10.1109/ICSCEE50312.2021.9497910.
  34. Y. A. Baker El-Ebiary et al., "Track Home Maintenance Business Centers with GPS Technology in the IR 4.0 Era," 2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), 2021, pp. 134-138, doi: 10.1109/ICSCEE50312.2021.9498070.
  35. S. I. Ahmad Saany et al., "Exploitation of a Technique in Arranging an Islamic Funeral," 2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), 2021, pp. 1-8, doi: 10.1109/ICSCEE50312.2021.9498224.
  36. J. A. Jusoh et al., "Track Student Attendance at a Time of the COVID-19 Pandemic Using Location-Finding Technology," 2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), 2021, pp. 147-152, doi: 10.1109/ICSCEE50312.2021.9498043.
  37. Y. A. Baker El-Ebiary et al., "E-Government and E-Commerce Issues in Malaysia," 2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), 2021, pp. 153-158, doi: 10.1109/ICSCEE50312.2021.9498092.
  38. Y. A. B. El-Ebiary et al., "Determinants of Customer Purchase Intention Using Zalora Mobile Commerce Application," 2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), 2021, pp. 159-163, doi: 10.1109/ICSCEE50312.2021.9497995.
  39. S. Bamansoor et al., "Efficient Online Shopping Platforms in Southeast Asia," 2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), 2021, pp. 164-168, doi: 10.1109/ICSCEE50312.2021.9497901.
  40. S. Bamansoor et al., "Evaluation of Chinese Electronic Enterprise from Business and Customers Perspectives," 2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), 2021, pp. 169-174, doi: 10.1109/ICSCEE50312.2021.9498093.
  41. A. Altrad et al., "Amazon in Business to Customers and Overcoming Obstacles," 2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), 2021, pp. 175-179, doi: 10.1109/ICSCEE50312.2021.9498129.
  42. Y. A. Baker El-Ebiary et al., "Mobile Commerce and its Apps - Opportunities and Threats in Malaysia," 2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), 2021, pp. 180-185, doi: 10.1109/ICSCEE50312.2021.9498228.
  43. M. B. Mohamad et al., "Enterprise Problems and Proposed Solutions Using the Concept of E-Commerce," 2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), 2021, pp. 186-192, doi: 10.1109/ICSCEE50312.2021.9498197.
  44. P. R. Pathmanathan et al., "The Benefit and Impact of E-Commerce in Tourism Enterprises," 2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), 2021, pp. 193-198, doi: 10.1109/ICSCEE50312.2021.9497947.
  45. K. Aseh et al., "The Future of E-Commerce in the Publishing Industry," 2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE), 2021, pp. 199-205, doi: 10.1109/ICSCEE50312.2021.9498175.

DOI

Paper Title

10.21058/gjecs.2024.91002

Exploring Mobile Cloud Computing: Integrating Mobile and Cloud Technologies for Future Research Directions

Author Name

Volume No., Issue No., Year, & Page No.

Kumari Pragya Prayesi

Vol. 9, No. 1, March 2024, pp. 1-8

Abstract:

Mobile Cloud Computing (MCC) is a technology that integrates mobile computing and cloud computing, providing users with the ability to access cloud services and resources from their mobile devices. MCC has gained significant attention in the IT industry since its inception in 2009, and its development is still in the early stages. Therefore, a thorough understanding of MCC is essential for identifying future research directions. The background of MCC can be traced back to mobile computing and cloud computing. Mobile computing involves the use of mobile devices, such as smartphones and tablets, to access information and services. On the other hand, cloud computing provides on-demand access to a shared pool of configurable computing resources, such as servers, storage, and applications.

Keywords:

Mobile Cloud Computing; Mobile Computing; Cloud Computing; Research Directions

Full Text:

References:

  1. M. Cooney. (2011, Oct) Gartner: The top 10 strategic technology trends for 2012. [Online]. Available: http://www.networkworld.com/ news/2011/101811-gartner-technology-trends-252100.html
  2. Mobile cloud computing subscribers to total nearly one billion by 2014. [Online]. Available: http://www.abiresearch.com/press/ 1484 (2009, Sept)
  3. C. Hewitt, “Orgs for scalable, robust, privacy-friendly client cloud computing,” Internet Computing, IEEE, vol. 12, no. 5, pp. 96–99, 2008.
  4. R. Buyya, C. Yeo, and S. Venugopal, “Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities,” in High Performance Computing and Communications, 2008. HPCC’08. 10th IEEE International Conference on. IEEE, 2008, pp. 5–13.
  5. Kumar, Keshav, Amanpreet Kaur, Bishwajeet Pandey, and S. N. Panda. "Low power UART design using different nanometer technology based FPGA." In 2018 8th International Conference on Communication Systems and Network Technologies (CSNT), pp. 1-3. IEEE, 2018.
  6. S. Shankar, “Amazon elastic compute cloud,” 2009.
  7. A. Zahariev, “Google app engine,” Helsinki University of Technology, 2009.
  8. ShapeShapeJ. McCarthy. (1961) Speech given to celebrate mits centennial. [Online]. Available: http://en.wikipedia.org/wiki/John McCarthy (computer scientist)
  9. ShapeShape(2009) The customer relationship management (crm). [Online]. Avail- able: http://en.wikipedia.org/wiki/Customer relationship management
  10. B. Rochwerger, D. Breitgand, E. Levy, A. Galis, K. Nagin, I. Llorente,
  11. R. Montero, Y. Wolfsthal, E. Elmroth, J. Ca´ceres et al., “The reservoir model and architecture for open federated cloud computing,” IBM Journal of Research and Development, vol. 53, no. 4, pp. 1–11, 2009.
  12. G. Boss, P. Malladi, D. Quan, L. Legregni, and H. Hall, “Cloud computing,” IBM white paper, Version, vol. 1, 2007.
  13. Kumar, Keshav, Shivani Malhotra, Rubina Dutta, and Amit Kumar. "Design of thermal-aware and power-efficient LFSR on different nanometer technology FPGA for green communication." In 2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT), pp. 236-240. IEEE, 2021.
  14. B. Marrapese. (2010, Dec.) Google ceo: a few years later, the mobile phone becomes a super computer. [Online]. Available: http://www.itnews-blog.com/it/21320.html
  15. S. Chetan, G. Kumar, K. Dinesh, K. Mathew, and M. Abhimanyu, “Cloud computing for mobile world,” available at chetan. ueuo. com.
  16. B. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti, “Clonecloud: Elastic execution between mobile device and cloud,” in Proceedings of the sixth conference on Computer systems. ACM, 2011, pp. 301–314.
  17. X. Zhang, A. Kunjithapatham, S. Jeong, and S. Gibbs, “Towards an elastic application model for augmenting the computing capabilities of mobile devices with cloud computing,” Mobile Networks and Applica- tions, vol. 16, no. 3, pp. 270–284, 2011.
  18. Y. Lu, S. Li, and H. Shen, “Virtualized screen: A third element for cloud-mobile convergence,” Multimedia, IEEE, vol. 18, no. 2, pp. 4–11, 2011.
  19. I. Giurgiu, O. Riva, D. Juric, I. Krivulev, and G. Alonso, “Calling the cloud: Enabling mobile phones as interfaces to cloud applications,” in Proceedings of the ACM/IFIP/USENIX 10th international conference on Middleware. Springer-Verlag, 2009, pp. 83–102.
  20. Kumar, Keshav, Shabeer Ahmad, Bishwajeet Pandey, Amit K. Pandit, and Deepa Singh. "Power Efficient Frequency Scaled and ThermalAware Control Unit Design on FPGA." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 8, no. 9 Special Issue 2 (2019): 530-533.
  21. S. Jeong, X. Zhang, A. Kunjithapatham, and S. Gibbs, “Towards an elastic application model for augmenting computing capabilities of mobile platforms,” Mobile Wireless Middleware, Operating Systems, and Applications, pp. 161–174, 2010.
  22. Prayesi, Kumari Pragya, et al. "Implementation of an Advanced Health-Monitoring System Capable of Real-Time Analysis and Alerting.", Engineering Proceedings, 62.1 (2024): 16.
  23. M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, “The case for vm-based cloudlets in mobile computing,” Pervasive Computing, IEEE, vol. 8, no. 4, pp. 14–23, 2009.
  24. E. Marinelli, “Hyrax: cloud computing on mobile devices using mapre- duce,” DTIC Document, Tech. Rep., 2009.

DOI

Paper Title

10.21058/gjecs.2024.92001

NATIONAL CYBERSECURITY STRATEGY, OPPORTUNITIES AND OBJECTIVES

Author Name

Volume No., Issue No., Year, & Page No.

Waheeb Abu-ulbeh

Vol. 9, No. 2, September 2024, pp. 1-25

Abstract:

The world has witnessed rapid progress in modern technologies, making technical systems an essential element in all areas of life for individuals and the work of institutions—a means of protection and countering cyber risks. The cybersecurity initiatives in Palestine are still timid. The Ministry of Communications and Information Technology launched the Internet Security and Safety Initiative. The initiative dealt with allocating time in schools to talk about the initiative and raise awareness about the safe use of the Internet. It is known that the Global Cybersecurity Index (GCI), which was issued for the first time in 2015, helps countries identify areas for improvement in the field of cybersecurity, which in turn leads to an increase in the general level of cybersecurity around the world, and Palestine ranked first. “122” internationally and “15” Arabs, in its latest edition. In order to confront current and emerging cybersecurity threats, and to identify areas for improvement in cybersecurity, the State of Palestine needs to expedite drawing up a comprehensive national strategy. National Cybersecurity Strategies are the main documents for nation-states to establish strategic principles, guidelines, and objectives and, in some cases, specific measures in order to mitigate risks associated with cybersecurity and support the confidence of the Palestinian citizen. This paper discusses the importance and challenges of having a Palestinian cybersecurity strategy by improving cooperation measures, capacity building measures, organizational, technical, and legal measures in order to achieve the vision of a “safe Palestinian cyberspace as part of the Arab cyberspace”.

Keywords:

Cyberspace, Cybersecurity, Global Cybersecurity Index (GCI), Cyber risks, Cybersecurity strategy.

Full Text:

References:

  1. Sari Ghadban Ghaidan and Muhammad Munther Jalal Al-Rubaie: Cybersecurity and International Confrontation Policies, Journal of Strategic and Military Studies, issued by the Arab Democratic Center, Volume 2, Issue 9, December 2020.
  2. Sheikha Hassani Al-Zahrain: International Cooperation in Confronting Cyber Attacks, Sharjah University Journal, Volume 17, Issue 1, June 2020.
  3. Abdul Wahid Al-Baydiri, Cybersecurity Strategy: A Case Study of Morocco, Journal of Strategic and Military Studies, Issue 11, Arab Democratic Center for Strategic, Political and Economic Studies, Germany - Berlin, First Edition 2021.
  4. Dr. Musa: Cybersecurity is a national security issue (mtit.gov.ps), 2018, https://www.mtit.gov.ps/index.php/c_home/showNew/2118
  5. Cabinet Resolution No. (16) of 2015 on the internal regulations of the Palestinian Computer Emergency Response Team - Qanon website (qanon.ps), 2015, http://qanon.ps/news.php?action=view&id=22749
  6. It is no longer a secret: Palestine needs Cyber Hygiene - Community Media Center (cmcgaza.ps), 2022, https://cmcgaza.ps/ar/?p=5010
  7. The Palestinian Strategy for Cybersecurity, Cyber Unemployment and the Employment Path (maannews.net), 2022, https://www.maannews.net/articles/2064517.html
  8. Definition of Cybersecurity Safety And its checklist (kaspersky.com), 2021, https://me.kaspersky.com/resource-center/preemptive-safety/cyber-hygiene-habits
  9. The Cabinet decides to establish the National Cybersecurity Authority and assigns a government team to prepare for it | PNN, 2022, https://pnn.ps/news/666105
  10. Plenipotentiary Conferences (itu.int), 2018, https://www.itu.int/en/history/Pages/PlenipotentiaryConferences.aspx?conf=4.444#:~:text=29%20October%20to%2016%20November%202018%20%2D%20Dubai%2C%20United%20Arab%20Emirates&text=ITU's%2020th%20Plenipotentiary%20Conference%20(PP,2300%20participants%20from%20180%20countries
  11. Final Documents of the Plenipotentiary Conference (Dubai, 2018) (itu.int), 2018, https://search.itu.int/history/HistoryDigitalCollectionDocLibrary/4.444.43.ar.400.pdf
  12. Arabic_GOAT.pdf (cybilportal.org), 2021, https://cybilportal.org/wp-content/uploads/2021/12/Arabic_GOAT.pdf
  13. 512525A.pdf (itu.int), 2022, https://www.itu.int/en/ITU-D/Cybersecurity/Documents/GCIv5/512525A.pdf
  14. International Telecommunication Union (ITU), World Bank, Commonwealth Secretariat (ComSec), Commonwealth Telecommunications Organization (CTO), and NATO Cooperative Centre of Excellence for Cyber Defence (COE CCD NATO) 2020. A Guide to Developing a National Cybersecurity Strategy Cyber - A strategic commitment to cybersecurity. The Guide - NCS guide, 2020, https://ncsguide.org/the-guide/
  15. jiu_rep_2021_3_arabic.pdf (unjiu.org), 2021, https://www.unjiu.org/sites/www.unjiu.org/files/jiu_rep_2021_3_arabic.pdf
  16. Cybersecurity and Combating Cybercrime in the Arab Region Policy Recommendations (unescwa.org), 2015, https://archive.unescwa.org/sites/www.unescwa.org/files/publications/files/policy-recommendations-cybersafety-arab-region-arabic.pdf
  17. America and the Cyber Strategy (annabaa.org), 2018, https://annabaa.org/arabic/informatics/17712
  18. How the Strategy Failed “Defending Forward” in Protecting America from Cyber Attacks? | Politics News | Al Jazeera Net (aljazeera.net), 2020, https://www.aljazeera.net/politics/2020/12/19/%D9%83%D9%8A%D9%81-%D9%81%D8%B4%D9%84%D8%AA-%D8%A5%D8%B3%D8%AA%D8%B1%D8%A7%D8%AA%D9%8A%D8%AC%D9%8A%D8%A9-%D8%A7%D9%84%D8%AF%D9%81%D8%A7%D8%B9-%D9%84%D9%84%D8%A3%D9%85%D8%A7%D9%85-%D9%81%D9%8A
  19. “Cybersecurity” is among the most prominent items of the strategy Russia's New National Security - RT Arabic, 2021, https://arabic.rt.com/russia/1248067-%D8%A7%D8%B3%D8%AA%D8%B1%D8%A7%D8%AA%D9%8A%D8%AC%D9%8A%D8%A9-%D8%A3%D9%85%D9%86-%D9%82%D9%88%D9%85%D9%8A-%D8%B1%D9%88%D8%B3%D9%8A%D8%A9-%D8%A3%D9%85%D9%86-%D9%85%D8%B9%D9%84%D9%88%D9%85%D8%A7%D8%AA/#
  20. ARCC-AR-LAYOUT(N)-A-1.pdf, 2021, https://arcc.om/files/ARCC-AR-LAYOUT(N)-A-1.pdf
  21. Arab Regional Cybersecurity Center (arcc.om), 2022, https://arcc.om/
  22. What is Cyber Hygiene and Why is It Important? (techtarget.com), 2022, https://www.techtarget.com/searchsecurity/definition/cyber-hygiene
  23. Cyber Hygiene: Definition & Best Practices | Okta, 2022, https://www.okta.com/identity-101/cyber-hygiene/
  24. Decree of the President of the Russian Federation dated 02.07.2021 No. 400 ∙ Official publication of legal acts ∙ Official Internet portal of legal inf. (pravo.gov.ru) 2021, publication.pravo.gov.ru/Document/View/0001202107030001?index=1&rangeSize=1
  25. National Cyber Security Strategy 2016 to 2021 - GOV.UK (www.gov.uk), 2016, https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021
  26. Summary of the 2018 National Defense Strategy, 2018, https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf
  27. White House Releases First National Cyber Strategy in 15 Years > Joint Chiefs of Staff > News Display (jcs.mil), 2018, https://www.jcs.mil/Media/News/News-Display/Article/1643010/white-house-releases-first-national-cyber-strategy-in-15-years/
  28. UnitedStates_2015_Final_2015_DoD_CYBER_STRATEGY_for_web.pdf (itu.int), 2015, https://www.itu.int/en/ITU-D/Cybersecurity/Documents/National_Strategies_Repository/UnitedStates_2015_Final_2015_DoD_CYBER_STRATEGY_for_web.pdf
  29. Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure (itu.int), 2009, https://www.itu.int/en/ITU-D/Cybersecurity/Documents/National_Strategies_Repository/UnitedStates_2009_Cyberspace_Policy_Review_final_0.pdf
  30. 01_letter-toc.qxd (itu.int), 2003, https://www.itu.int/en/ITU-D/Cybersecurity/Documents/National_Strategies_Repository/UnitedStates_2003_cyberspace_strategy.pdf
  31. ITU Publications, 2021, https://www.itu.int/epublications/publication/D-STR-GCI.01-2021-HTM-E.
  32. National Cybersecurity Strategies Repository (itu.int), 2022, https://www.itu.int/en/ITU-D/Cybersecurity/Pages/National-Strategies-repository.aspx
  33. Chart: A Minute on the Internet in 2021 | Statista, 2021, https://www.statista.com/chart/25443/estimated-amount-of-data-created-on-the-internet-in-one-minute/
  34. https://www3.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2022.pdf, 2022
  35. Full list (coe.int), 2001, https://www.coe.int/en/web/conventions/full-list?module=signatures-by-treaty&treatynum=185