References
[1]. Curtis, P., & Carey, M. (2012). Risk Assessment in Practice. Retrieved from
http://www.coso.org/documents/COSOAnncsOnlineSurvy2GainInpt4Updt2IntrnlCntrlInt
gratdFrmwrk%20-%20for%20merge_files/COSOERM%
[2]. Deller, R (2017). Influences from Cyberspace and terrorism on social and cultural perspectives
of IT influencers. European Journal of Cross-cultural Competence and Management, 4
(3/4), 294-315.
[3]. Espionage Act (1917). Espionage Act of June 15, 1917, c.30, 40 Stat. 217, 50 U.S.C. & 31. As
amended. Washington DC: Supreme Court
[4]. Fagade, T., Konstantinos, M. & Theo, T. (2018). Towards effective cybersecurity resource
allocation: The Monte Carlo Predictive Modeling Approach. International Journal of
Critical Infrastructures, 13(2/3), 152-167.
[5]. Gentile, M.C. (1996). Managerial Excellence through Diversity. Prospect Heights, Illinois;
Wavelength Press
[6]. Giaglis, G.M.; Paul, R.J. (2012). It's Time to Engineer Re-engineering: Investigating the
Potential of Simulation Modelling for Business Process Redesign. In Scholz-Reiter, B.;
[7]. Stickel, E.(Eds), Business Process. New York: Springer Science & Business Media. pp.
313-329
[8]. Hallikas, J., Karvonen, I., Pulkkinen, U.,Virolainen, V. M., & T uominen, M. (2004). Risk
management processes in supplier networks. International Journal of Production
Economics, 90(1), 47-58.
[9]. Investopedia (2018). Monte Carlo Simulation Accessed 05/16/18
https://www.investopedia.com/terms/m/montecarlosimulation.asp#ixzz5FeGh0IZ3
[10]. Mupepi, M.G. (2014). Can the Division of Labor Be Re-Engineered to Advance Organizational
Dynamism? Sage Open
[11]. Mupepi, M., Modak, A., Motwani, J. & Mupepi, S. (2017). Shielding the Corporation's Raison
d'etre: Talent Management in Ubiquitous Value Creation Systems. In M. Mupepi (Ed.),
Effective Talent Management Strategies for Organizational Success (pp. 121-133).
Hershey, PA: IGI Global.
[12]. Mupepi, G. M., Essila, J., Opoku Mensah, A., & Mupepi, S. C. (2017). Asking questions:
Applying survey techniques in building successful enterprise. International Journal of
Systems and service-oriented engineering, 7 (4), 44-55. Hershey, PA: IGI Global.
[13]. Nonaka, I., Toyama, R., & Konno, N. (2000). SECI, Ba and leadership: a unified model of
dynamic knowledge creation. Long range planning, 33(1), 5-34.
[14]. Palmer, C. & Shenoi, S. (2009). Critical Infrastructure Protection III: Third IFIP WG 11.10
International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised
Selected in Information and Communication Technology 9th Edition. New York:
Springer
[15]. Parker, H. (2012). Knowledge acquisition and leakage in inter-firm relationships involving new
technology-based firms. Management Decision, 50(9), 1618-1633.
[16]. Rogerson, A. (1969). Millions Now Living Will Never Die. London, UK; ISBN 0-09-455940-6
[17]. Seeley, M. S. (1986). An evaluation of organizational development studies using the MyersBriggs
Type Indicator in the Arlington County, Virginia Fire Department. New York:
New School for Social Research.
[18]. Soliman, F. (2014). Learning Models for Innovation in Organizations: Examining roles of
knowledge Transfer and Human Resources Management. Hershey, PA; IGI Global
Premier Reference Source
[19]. Sperling, M. (2015). There's a Difference Between: "Confidential and Proprietary Information"
and a Trade Secret Accessed 05/13/2018
thttps://www.lexisnexis.com/legalnewsroom/corporate/b/business/archive/2015/07/07/the
re-39-s-a-difference-between-quot-confidential-and-proprietary-information-quot-and-atrade-secret.aspx
[20]. TechTarget (2018). Industrial Espionage. Accessed 5/15/18
https://whatis.techtarget.com/definition/industrial-espionage
[21]. Thakur, D. (2018). Cryptography - What is Cryptography? Accessed 5/13/18
http://ecomputernotes.com/computernetworkingnotes/security/cryptography
[22]. Tsang, H. W. C, Wing, B, L. & Tsui, E. (2016). Risk Assessment Model: A Construct-ApplyControl
Cycle Approach. International Journal of Knowledge and Systems Science. 7 (3),
1-18.
[23]. Williams, T. (1993). Risk-management infrastructures. International Journal of Project
Management, 11(1), 5-10.
[24]. Zhi, H. (1995). Risk management for overseas construction projects. International Journal of
Project Management, 13(4), 231-237.