1. Abdul Molok, N. N., Ahmad, A., & Chang, S. (2010). Understanding the factors of information leakage through online social networking to safeguard organizational information, 1-17.
2. Abdul Molok, N. N., Chang, S., & Ahmad, A. (2013). Disclosure of organizational information on social media: Perspectives from security managers, PACIS 2013 Proceedings. 108.
3. Anand, K. S., & Goyal, M. (2009). Strategic information management under leakage in a supply chain. Management Science, 55(3), 438-452. [
DOI:10.1287/mnsc.1080.0930]
4. Bloodgood, J. M., & Chen, A. N. (2021). Preventing organizational knowledge leakage: the influence of knowledge seekers' awareness, motivation and capability. Journal of Knowledge Management, 1-32. [
DOI:10.1108/JKM-12-2020-0894]
5. Bouke, M. A., Abdullah, A., Udzir, N. I., & Samian, N. (2024). Overcoming the Challenges of Data Lack, Leakage, and Dimensionality in Intrusion Detection Systems: A Comprehensive Review. Journal of Communication and Information Systems, 39(1).
https://doi.org/10.14209/jcis.2024.3 [
DOI:10.14209/jcis.2024.3.]
6. Cappellozza, A., de Moraes, G. H. S. M., Perez, G., & Simões, A. L. (2021). Antecedent factors of violation of information security rules. RAUSP Management Journal, 2531-0488. [
DOI:10.1108/RAUSP-02-2021-0022]
7. Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5), e1211. [
DOI:10.1002/widm.1211]
8. Dolezel, D., Beauvais, B., Stigler Granados, P., Fulton, L., & Kruse, C. S. (2023). Effects of Internal and External Factors on Hospital Data Breaches: Quantitative Study. Journal of Medical Internet Research, 25, e51471. doi: 10.2196/51471
Greitzer, F. L., Strozer, J. R., Cohen, S., Moore, A. P., Mundie, D., & Cowley, J. (2014). Analysis of unintentional insider threats deriving from social engineering exploits. In 2014 IEEE Security and Privacy Workshops, 236-250.
https://doi.org/10.1109/SPW.2014.39 [
DOI:10.2196/51471]
9. Greitzer, F. L., Strozer, J., Cohen, S., Bergey, J., Cowley, J., Moore, A., & Mundie, D. (2014). Unintentional insider threat: contributing factors, observables, and mitigation strategies. In 2014 47th Hawaii International Conference on System Sciences (pp. 2025-2034). IEEE. [
DOI:10.1109/HICSS.2014.256]
10. Hadasch, F., Mueller, B., & Maedche, A. (2012). Exploring Antecedent Environmental and Organizational Factors to User-Caused Information Leaks: A Qualitative Study, 127.
11. Jašari, A. (2015). Information systems at the airport. PROCEEDING BOOK, 8. Retrieved from: https://icesos.ibu.edu.ba/wp-content/uploads/2019/02/PROCEEDING-BOOK_V41.10.2015-min.pdf#page=8
12. Kim, S.-H., Kim, N.-U., & Chung, T.-M. (2015). Study on sensitive information leakage vulnerability modeling. Kybernetes, 44(1), 77-88. [
DOI:10.1108/K-05-2014-0106]
13. Li, J., Xiao, W., & Zhang, C. (2023). Data security crisis in universities: identification of key factors affecting data breach incidents. Humanities and Social Sciences Communications, 10(1), 1-18. Retrieved from: [
DOI:10.1057/s41599-023-01757-0]
14. Madnick, S. E. (2023). The Continued Threat to Personal Data: Key Factors Behind the 2023 Increase.
15. Martel, N., & Seneviratne, P. N. (1990). Analysis of factors influencing quality of service in passenger terminal buildings. Transportation Research Record, (1273).
16. Mughal, Y. H. (2021). Impact of Supply Chain Information Integration on Operational Performance of Pharmaceutical Firms: Mediating Role of Information Leakage. Journal of Pharmaceutical Research International, 33(41B), 69-78. [
DOI:10.9734/jpri/2021/v33i41B32346]
17. Negahdar, E., pourghahramani, B., & Beigi, J. (2023). Criminal Policy making in Cyber Security Violations and Social Prevention Approaches. Iranian Journal of Public Policy, 9(2), 97-114. doi: 10.22059/jppolicy.2023.93610
18. Purnell, J. (2012). Information technology systems at Airports: A Primer (Vol. 59). Transportation Research Board.
19. Rauscher, F., Kogler, A., Juffinger, J., & Gruss, D. (2024, February). IdleLeak: Exploiting Idle State Side Effects for Information Leakage. In Network and Distributed System Security (NDSS) Symposium 2024. Retrieved from: https://www.ndss-symposium.org/wp-content/uploads/2024-78-paper.pdf. [
DOI:10.14722/ndss.2024.24078]
20. Rogers, Z., Benjamin, V., & Gopalakrishnan, M. (2018). Cyber security in supply chains: Understanding threats and potential security practices. Report. Center for Advanced Procurement Strategy, Tempe, AZ.
21. Ritala, P., Olander, H., Michailova, S., & Husted, K. (2015). Knowledge sharing, knowledge leaking and relative innovation performance: An empirical study. Technovation, 35, 22-31. [
DOI:10.1016/j.technovation.2014.07.011]
22. Sadeghi, A., Razaghi, H. & Ahmadi, S. (2023). Determining the factors affecting users' privacy in the Instagram social network. Paya Shahr, 5: 1-23. https://civilica.com/doc/1891414
23. Schultz, M., Schulz, C., & Fricke, H. (2007, December). Enhanced information flow and guidance in airport terminals using best passenger's visual perception. In Eurocontrol INO Workshop.
Tan, K. H., Wong, W. P., & Chung, L. (2016). Information and knowledge leakage in supply chain. Information Systems Frontiers, 18(3), 621-638. [
DOI:10.1007/s10796-015-9553-6]
24. Tran, T. T. H., Childerhouse, P., & Deakins, E. (2016). Supply chain information sharing: challenges and risk mitigation strategies. Journal of Manufacturing Technology Management, 27(8), 1102-1126. [
DOI:10.1108/JMTM-03-2016-0033]
25. van der Kleij, R., Wijn, R., & Hof, T. (2020). An application and empirical test of the Capability Opportunity Motivation-Behaviour model to data leakage prevention in financial organizations. Computers & Security, 97, 101970. [
DOI:10.1016/j.cose.2020.101970]
26. Wong, W. P., Tan, K. H., Chuah, S. H. W., Tseng, M. L., Wong, K. Y., & Ahmad, S. (2020). Information sharing and the bane of information leakage: a multigroup analysis of contract versus noncontract. Journal of Enterprise Information Management. [
DOI:10.1108/JEIM-11-2019-0368]
27. Wong, W. P., Tan, K. H., Govindan, K., Li, D., & Kumar, A. (2021). A conceptual framework for information-leakage-resilience. Annals of Operations Research, 1-21. [
DOI:10.1007/s10479-021-04219-5]
28. Wong, W. P., Tan, H. C., Tan, K. H., & Tseng, M. L. (2019). Human factors in information leakage: mitigation strategies for information sharing integrity. Industrial Management & Data Systems, 119(6), 1242-1267. [
DOI:10.1108/IMDS-12-2018-0546]
29. Wong, W.P., Tan, H.C., Tan, K.H., & Tseng, M. (2020). Human factors in information leakage: mitigation strategies for information sharing integrity. Ind. Manag. Data Syst., 119, 1242-1267. www.dictionary.cambridge.org. [
DOI:10.1108/IMDS-12-2018-0546]