[1] Y. Li. and Q. Liu, “A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments”,
Energy Reports. vol. 1, no. 7, pp. 8176-8186, 2021, doi:
https://doi.org/10.1016/j.egyr.2021.08.126
[4] AI. Al-Alawi. and AS. Al-Bassam, “Assessing The Factors of Cybersecurity Awareness in the Banking Sector”,
Arab Gulf Journal of Scientific Research. vol. 37, no. 4, pp. 17-32, 2019, doi:
https://doi.org/10.51758/AGJSR-04-2019-0014
[5] K. W. HOE, "Culture and cyber security: How cultural tightness-looseness moderates the effects of threat and coping appraisals on mobile cyber hygiene," Doctoral dissertation, Singapore Management University, 2021. [Online]. Available:
https://ink.library.smu.edu.sg/etd_coll/357/
[6] M. Sahraei., M. valavi., B. bayat. and A. Taraghi, “Provide a native model of cyber monitoring, monitoring and alerting based on the ooda cycle”,
National Security, vol. 10, no. 37, pp. 473-512, 2020. [Online]. Available:
https://ns.sndu.ac.ir/article_1118.html (in Persian).
[7] F. Tavakoli., M. Mortazavi. and M. Keshavarztork, “Determining Strategic Factors Affecting the Prevention of Cybercrime with Fuzzy Delphi Approach”,
Journal of Social Order, vol. 12, no. 4, pp.113-140, 2021. [Online]. Available:
http://sopra.jrl.police.ir/article_95455.html (in Persian).
[8] I. Progoulakis., N. Nikitakos., P. Rohmeyer., B. Bunin., D. Dalaklis., S. Karamperidis, “Perspectives on cyber security for offshore oil and gas assets”,
Journal of Marine Science and Engineering. vol. 9, no. 2, pp.112, 2021, doi:
https://doi.org/10.3390/jmse9020112.
[9] D. Papatsaroucha., Y. Nikoloudakis., I. Kefaloukos., E. Pallis., E. Markakis, “A Survey on Human and Personality Vulnerability Assessment in Cyber-security: Challenges, Approaches, and Open Issues”,
arXiv preprint arXiv:2106.09986, 2021. doi:
https://doi.org/10.48550/arXiv.2106.09986
[10] B. Uchendu., JR. Nurse., M. Bada., S. Furnell, “Developing a cybersecurity culture: Current practices and future needs”, Computers & Security. vol. 1, no. 109, pp. 102387, 2021, doi:
https://doi.org/10.1016/j.cose.2021.102387
[11] A. Georgiadou., S. Mouzakitis. and D. Askounis, “Working from home during COVID-19 crisis: a cyber security culture assessment survey”,
Security Journal, vol. 35, no. 2, pp. 1-20, 2021, doi:
https://doi.org/10.1057/s41284-021-00286-2
[12] A. Georgiadou, S. Mouzakitis, and D. Askounis, "Detecting Insider Threat via a Cyber-Security Culture Framework,"
Journal of Computer Information Systems, vol. 62, no. 4, pp. 706-716, 2022/07/04 2022, doi:
https://doi.org/10.1080/08874417.2021.1903367.
[13] P.R. Trim, Y.I. Lee. “The global cyber security model: counteracting cyberattacks through a resilient partnership arrangement”,
Big Data and Cognitive Computing, vol. 5, no. 3, pp. 32, 2021, doi:
https://doi.org/10.3390/bdcc5030032.
[15] T.A. Nguyen., K. Koblandin., S. Suleymanova and V. Volokh, “Effects of ‘Digital’Country’s Information Security on Political Stability”,
Journal of Cyber Security and Mobility, vol. 12, no. 1, pp. 29-52, 2022, doi:
https://doi.org/10.13052/jcsm2245-1439.1112.
[16] A. Tolah., S.M. Furnell. and M. Papadaki, “An Empirical Analysis of the Information Security Culture Key Factors Framework”,
Computers & Security, vol. 108, pp. 102354, 2021, doi:
https://doi.org/10.1016/j.cose.2021.102354.
[17] S. Heydari., M. Barzegar., A. Mohammad Davoudi, “Factor structure analysis of the scale "Evaluation of cyber security culture and awareness" (case study: bank branch employees in Ahvaz city)”,
Psychological Methods and Models Quarterly, vol. 14, no. 51, pp. 113-126, 2023,
https://doi.org/10.30495/jpmm.2023.31055.3716. (In Persian)
[18] M. Ahmadi deh Ghutbuddini, E. khodai, V. Farzad, A. Moghadamzadeh and M. Kabiri, “Applying Bi-factor Multidimensional Item-response Theory Model for Dimensionality and Differential Items Functioning Analysis on Testlet-Based Tests”, Quarterly of Educational Measurement, vol. 7, no. 28, pp. 121-153, 2017, doi:
https://doi.org/10.22054/jem.2017.22168.1541, (In Persian).
[19] F. M. Lord, Applications of Item-Response Theory, translated by A. Delavar. and J. Yunesi, 2011. Tehran, Roshd Publications, 2011. (In Persian)
[20] Z. Jafari, “Cyber security”, In Proc. 7
th national conference of new ideas in technology and engineering, 2021. [Online]. Available:
https://civilica.com/doc/1239064 (In Persian)
[21] MR. Eyvazi and MM. Dadashi Chekan, “Types of threats in the cyberspace and solutions to deal with them”, In Proc. second national cyber defense conference, 2019. [Online]. Available:
https://civilica.com/doc/903617 (In Persian)
[22] N. A. A. Md Azmi, A. P. Teoh, A. Vafaei-Zadeh, and H. Hanifah, "Predicting information security culture among employees of telecommunication companies in an emerging market,"
Information & Computer Security, vol. 29, no. 5, pp. 866-882, 2021, doi:
https://doi.org/10.1108/ICS-02-2021-0020
[23] S. Hasan, M. Ali, S. Kurnia and R. Thurasamy, “Evaluating the cyber security readiness of organizations and its influence on performance”,
Journal of Information Security and Applications, vol. 58, pp. 102726, 2021, doi:
https://doi.org/10.1016/j.jisa.2020.102726.
[24] A. Georgiadou., S. Mouzakitis., D. Askounis, “Designing a cyber-security culture assessment survey targeting critical infrastructures during covid-19 crisis”,
International Journal of Network Security & Its Applications (IJNSA) vol. 13, no. 1, pp. 33-50, 2021. [Online]. Available:
https://ssrn.com/abstract=3787197
[25] K. Arbanas, M. Spremic, and N. Zajdela Hrustek, “Holistic framework for evaluating and improving information security culture”,
Aslib Journal of Information Management, Vol. 73 No. 5, pp. 699-719, 2021, doi:
https://doi.org/10.1108/AJIM-02-2021-0037
[26] H. Kaviani, N. Mirsepasi and G. Me'marzadeh Tehran, “A Pattern for Strategic Development of Human Resources in the Field of Cyber Security of the Armed Forces of Islamic Republic of Iran”,
Defence Studies, vol. 18, no. 1, pp. 37-66, 2020. [Online]. Available:
https://ds.sndu.ac.ir/article_1008.html?lang=en (In Persian)
[27] Sh. Vahedi and T. Hajipoor, “Study of psychometric Properties of College Self-Efficacy Inventory among college students using confirmatory factor analysis (CFA) and Item Response Theory- (IRT)”,
Quarterly of Educational Measurement, vol. 4, no. 16, pp. 173-192, 2014. [Online]. Available:
https://jem.atu.ac.ir/article_328.html (In Persian)