//-->
Understanding Cybersecurity Law in Data Sovereignty and Digital Governance : An Overview from a Legal Perspective
Lukings, Melissa, (2022)
Information systems sourcing strategies and organizational cybersecurity breaches
Li, He, (2024)
Information security outsourcing in a resource-sharing environment : the impacts of attack modes
Gao, Xing, (2024)