You are on page 1of 4

References

2019. Cybersecurity Skills Development in the EU. https://www.enisa.europa.eu/


publications/the-status-of-cyber-security-education-in-the-european-union

Al-Mohannadi H, Awan IU, Al Hamar J, Al Hamar Y, Shah M and Musa AS (2018)


Understanding Awareness of Cyber Security Threat Among IT Employees. The IEEE 6th
International Conference on Future Internet of Things and Cloud Workshops, FiCloudW
2018, 6-8 August, Barcelona, Spain.

Adhie, R.P., Hutama, Y., Ahmar, A.S. and Setiawan, M.I., 2018. Implementation
cryptography data encryption standard (DES) and triple data encryption standard (3DES)
method in communication system based near field communication (NFC). In Journal of
Physics: Conference Series (Vol. 954, No. 1, p. 012009). IOP Publishing.

Abukari, A.M. and Bankas, E.K., 2020. Some cyber security hygienic protocols for
teleworkers in COVID-19 pandemic period and beyond. International Journal of Scientific &
Engineering Research, 11(4), pp.1401-1407.

Alexandra Sava, J., 2022. TCS annual revenue 2013-2022 | Statista. [online] Statista.
Available at: <https://www.statista.com/statistics/759883/india-tcs-annual-revenue/
#:~:text=Tata%20Consultancy%20Services%20(TCS)%20achieved,doubled%20that
%20from%20the%20FY2013.> [Accessed 15 September 2022].

Bada, M. and Nurse, J.R., 2020. The social and psychological impact of cyberattacks.
In Emerging cyber threats and cognitive vulnerabilities (pp. 73-92). Academic Press.

Business-standard.com. 2022. Cyber crime to cost economies $10 trn by 2025: Microsoft


India official. [online] Available at: <https://www.business-standard.com/article/economy-
policy/cyber-crime-to-cost-economies-10-trn-by-2025-microsoft-india-official-
122031201080_1.html> [Accessed 15 September 2022].

Clydeco.com. 2021. Cybercrime – are your employees a threat to operational security? :


Clyde & Co. [online] Available at:
<https://www.clydeco.com/en/insights/2021/08/cybercrime-are-your-employees-a-threat-to-
operatio> [Accessed 13 September 2022].

[1]
Connolly, M., 2012. Creating a Campus Based Community Emergency Response Team
(CERT). Community College Journal of Research and Practice, 36(6), pp.448-452.

Dasgupta, P. and Collins, J., 2019. A Survey of Game Theoretic Approaches for Adversarial
Machine Learning in Cybersecurity Tasks. AI Magazine, 40(2), pp.31-43.

Diesch, R., Pfaff, M. and Krcmar, H., 2020. A comprehensive model of information security
factors for decision-makers. Computers &amp; Security, 92, p.101747.

DNA India. 2017. Irdai asks insurers to appoint data security officer by April 30. [online]
Available at: <http://www.dnaindia.com/money/report-irdai-asks-insurers-to-appoint-data-
securityofficer-by-apr-30-2391043> [Accessed 15 September 2022].

Dutt, V., Ahn, Y.S. and Gonzalez, C., 2013. Cyber situation awareness: modeling detection
of cyber attacks with instance-based learning theory. Human Factors, 55(3), pp.605-618.

Dawson, J. and Thomson, R., 2018. The future cybersecurity workforce: going beyond
technical skills for successful cyber performance. Frontiers in psychology, 9, p.744.

Fadilpasic, S., 2016. Running old operating systems means risking a lot, says Duo Security.
[online] ITProPortal. Available at: <https://www.itproportal.com/news/running-old-
operating-systems-means-risking-a-lot-says-duo-security/> [Accessed 13 September 2022].

Gao, H.Y., Hu, A.H., Shen, W.Q. and Jiang, Z.X., 2019. Group consensus of multi-agent
systems subjected to cyber-attacks. Chinese Physics B, 28(6), p.060501.

Gill, P., 2019. TCS was hacked for its clients by China’s cyber spy campaign: Report.
[online] Business Insider. Available at: <https://www.businessinsider.in/tcs-hacked-and-data-
leaked-to-chinas-operation-cloud-hopper/articleshow/69969506.cms#:~:text=The%20Indian
%20IT%20giant%2C%20Tata,access%20to%20their%20client's%20networks.> [Accessed
13 September 2022].

GOV.UK. 2016. New figures show large numbers of businesses and charities suffer at least
one cyber attack in the past year. [online] Available at:
<https://www.gov.uk/government/news/new-figures-show-large-numbers-of-businesses-and-
charities-suffer-at-least-one-cyber-attack-in-the-past-year> [Accessed 13 September 2022].

Joshi, R., Goel, R. and Garg, S., 2019. A Study on Customers’ Perception on Adoption of
Digital Banking in Indian Banking Sector. SSRN Electronic Journal.

[2]
Kryvinska, N., Strauss, C., Collini‐Nocker, B. and Zinterhof, P., 2011 . Enterprise network
maintaining mobility–architectural model of services delivery. International Journal of
Pervasive Computing and Communications.

Kesharwani, S., Sarkar, M.P. and Oberoi, S., 2019. Cyber security in India: threats and
challenges. Cybernomics, 1(2), pp.32-34.

Kshetri, N., 2016. Cybercrime and cybersecurity in India: causes, consequences and
implications for the future. Crime, Law and Social Change, 66(3), pp.313-338.

Lawrence, J., 2013. Cyber crime – employees have become one of the biggest risks to a
business. [online] HRZone. Available at: <https://www.hrzone.com/perform/business/cyber-
crime-employees-have-become-one-of-the-biggest-risks-to-a-business> [Accessed 13
September 2022].

Moneylife. 2022. TCS restores its website after hackers put it up for sale. [online] Available
at: <https://www.moneylife.in/article/tcs-restores-its-website-after-hackers-put-it-up-for-
sale/3593.html> [Accessed 13 September 2022].

Mahdavifar, S. and Ghorbani, A., 2019. Application of deep learning to cybersecurity: A


survey. Neurocomputing, 347, pp.149-176.

Mint. 2022. In a significant milestone, TCS now has more than 2 lakh women employees.
[online] Available at: <https://www.livemint.com/companies/news/in-a-significant-
milestone-tcs-women-workforce-tops-2-lakh-11642002463684.html> [Accessed 15
September 2022].

Phadnis, S., 2022. Talent Shortage A Challenge For Mnc Tech Centres: Ey | India Business
News - Times of India. [online] The Times of India. Available at:
<https://timesofindia.indiatimes.com/business/india-business/talent-shortage-a-challenge-for-
mnc-tech-centres-ey/articleshow/89735165.cms> [Accessed 15 September 2022].

Paoli, L., Visschers, J. and Verstraete, C., 2018. The impact of cybercrime on businesses: A
novel conceptual framework and its application to Belgium. Crime, Law and Social
Change, 70(4), pp.397-420.

Rastogi, N.I.T.A.N.K. and Trivedi, M.K., 2016. PESTLE technique–a tool to identify
external risks in construction projects. International Research Journal of Engineering and
Technology (IRJET), 3(1), pp.384-388.

[3]
Süzen, A.A., 2020. A Risk-Assessment of Cyber Attacks and Defense Strategies in Industry
4.0 Ecosystem. International Journal of Computer Network & Information Security, 12(1).

Team, E., 2021. Cyber-attacks can lead to employees getting fired: Here's how - My Siccura
- Private and Secure Digital Life. [online] My Siccura - Private and Secure Digital Life.
Available at: <https://siccura.com/cyber-attacks-can-lead-to-employees-getting-fired-heres-
how/> [Accessed 13 September 2022].

Tata Consultancy Services, 2020. TCS Annual Report 2019-20. TCS Annual Report. [online]
Mumbai: Tata Consultancy Services. Available at:
<https://www.tcs.com/content/dam/tcs/investor-relations/financial-statements/2019-20/ar/
annual-report-2019-2020.pdf> [Accessed 5 September 2022].

TCS, 2022. TCS Integrated Annual Report FY 2021-2022. TCS Integrated Annual Report.
[online] Mumbai: TCS. Available at: <https://www.tcs.com/content/dam/tcs/investor-
relations/financial-statements/2021-22/ar/annual-report-2021-2022.pdf> [Accessed 5
September 2022].

Ursillo, S. and Arnold, C., 2019. Cybersecurity Is Critical for all Organizations – Large and
Small. [online] IFAC. Available at: <https://www.ifac.org/knowledge-gateway/preparing-
future-ready-professionals/discussion/cybersecurity-critical-all-organizations-large-and-
small> [Accessed 13 September 2022].

Williams, P.A. and Woodward, A.J., 2015. Cybersecurity vulnerabilities in medical devices:
a complex environment and multifaceted problem. Medical Devices (Auckland, NZ), 8,
p.305.

Yeboah-Boateng, E.O., 2013. Cyber-Security Challenges with SMEs in Developing


Economies: Issues of Confidentiality, Integrity & Availability (CIA). Institut for Elektroniske
Systemer, Aalborg Universitet.

[4]

You might also like