References
Al-Khouri, A. M. (2012). Emerging Markets and Digital Economy. International Journal of Innovation in the Digital Economy, 3(2), 57-69. doi: 10.4018/jide.2012040105
Assante, M. J., & Tobey, D. H. (2011). Enhancing the Cybersecurity Workforce. IT Professional, 13(1), 12-15.
Baller, S., Dutta, S., & Lanvin, B. (2016). The Global Information Technology Report 2016: Innovation in the Digital Economy. Geneva: World Economic Forum.
Campbell, R. (2017). Bitcoin Wallet Blockchain Partners Imperial College London to Launch Research Lab [Press release]. Retrieved from https://www.cryptocoinsnews.com/bitcoin-wallet-blockchain-partners-imperial-college-london-launch-research-lab/
Chakravorti, B. (2016). Where the Digital Economy is Moving Fastest. Harvard Business Review: Harvard Business School.
Council, N. R. (2013). Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making. Washington DC: The Nation-al Academic Press.
Cybersecurity, C. o. E. N. (2016). Report on Securing and Growing the Digital Economy. NIST.
Elkhannoubi, H., & Belaissaoui, M. (2015). Fundamental Pi llars for an Effective Cybersecurity Strategy.Paper Presented at the Computer Systems and Applications (AICCSA).
Finland. (2013). Finland's Cyber Security Strategy: Secretariat of the Security Committee.
Fourie, L., Pang, S., Kingston, T., Hettema, H., Sarrafzadeh, H., & Watters, P. (2014). The Global Cyber Security Workforce: An Ongoing Human Capital Crisis.Paper presented at the Global Business and Technology Association Conference.
Hathaway, M. E. (2013). Cyber Readiness Index 1.0. Great Falls, VA: Hathaway Global Strategies LLC.
Hemmatfar, M., Salehi, M., & Bayat, M. (2010). Competitive Advantages and Strategic Information Systems. International Journal of Busi-ness and Management, 5(7), 158-169.
Hoffman, L. J., Burley, D. L., & Toregas, C. (2011). Holistically Building the Cybersecurity Workforce. IEEE Security & Privacy, 10(2), 33-39.
Hsu, T. (2017). Alibaba’s Singles Day Sales Hit New Record of $25.3 Billion.New York Times. Retrieved from https://www.nytimes.com/2017/11/10/business/alibaba-singles-day.html
ISACA. (2017). State of Cyber Security 2017: Part 2: ISACA.
ISC2. (2017). 2017 Global Information Security Workforce Stduy: ISC2.
Knickrehm, M., Berthon, B., & Daugherty, P. (2016). Digital Disruption: The Growth Multiplier. Accenture Strategy.
Lee, T. (2014). Five years of Bitcoin in One Post [Press release]. Retrieved from https://www.washingtonpost.com/news/the-switch/wp/2014/01/03/five-years-of-bitcoin-in-one-post/?utm_term=.5dae8e6c1465
Lehto, M. (2013). The Ways, Means and Ends in Cyber Security Strategies.Paper presented at the 12th European Conference on Information Warfare and Security, Finland.
Lin, G. (2009). Higher Education Research Methodology-LIterature Method. INternational Education Studies, 2(4), 179-181.
Luiijf, E., & Besseling, K. (2013). Nineteen National Cyber Security Strategies. International Journal of Critical Infrastructure, 9.
Luxembourg. (2015). National Cybersecurity Strategy II. 23.
McAfee. (2014). Net losses: Estimating the Global Cost of Cybercrime.
Morgan, S. (2017). Top 5 Cybersecurity Facts, Figures and Statistics for 2017. CSO.
Mullen, J., & Wattles, J. (2017). Bitcoin Was $800 a Year Ago. Now It's $16,000.CNN. Retrieved from http://money.cnn.com/2017/12/06/investing/bitcoin-rally-hits-14000/index.html
Mulligan, C. (2017). Cybersecurity: Cornerstone of the Digital Economy. Imperial College Business School London.
NATO. (2013). National Cyber Security Strategy Guidelines.Tallinn, Estonia.
Newhouse, W., Keith, S., Scribner, B., & Witte, G. (2017). National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework: NIST.
Norway. (2012). Cyber Security Strategy for Norway. 32.
Paulsen, C., McDuffle, E., Newhouse, W., & Toth, P. (2012). NICE: Creating a Cybersecurity Workforce and Aware Public. IEEE Security & Privacy, 10(3), 76-79.
Rees, T. (2017). Bitcoin Touches over $16,000 but Most Institutional Investors Believe Iit Is an Unsustainable Bubble.The Telegraph. Re-trieved from http://www.telegraph.co.uk/business/2017/12/07/bitcoin-soars-towards-15000-ladbrokes-coral-shares-jump-gvc/
Romanosky, S. (2016). Examining the Costs and Causes of Cyber Incidents. Journal of Cybersecurity, tyw001. doi: 10.1093/cybsec/tyw001.
Schwab, K. (2016). Fourth Industrial Revolution
Shafqat, N., & Masood, A. (2016). Comparative Analysis of Various National Cyber Security Strategies. International Journal of Computer Science and Information Security, 14(1), 129-146.
Singapore. (2016). Singapore's Cybersecurity Strategy. 27.
Switzerland. (2012). National Strategy for the Protection of Switzerland against Cyber Risks. 42.
Symantec. (2014). 2014 Internet Security Threat Report.
Symantec. (2016). 2016 Internet Security Threat Report (Vol. 21).
Symantec. (2017). 2017 Internet Security Threat Report (Vol. 22).
Teoh, C. S., & Mahmood, A. K. (2017). National Cyber Security Strategies for Digital Economy.Paper presented at the Research and Inno-vation in Information Systems(ICRIIS).UK.
Government. (2016). National Cyber Security Strategy 2016-2021.
US, D. (2015). The Department of Defense Cyber Strategy.
WEF, W. E. F.-. (2017). The Global Risks Report 2017. Geneva: World Economic Forum.