
Revista Científica Ciencia y Método | Vol.01 | Núm.04 | Oct – Nov | 2023 | www.revistacym.com pág. 43
Vicente Maldonado. Journal of Economic and Social Science Research, 2(1),
31–43. https://doi.org/10.55813/gaea/jessr/v2/n1/45
Gartner. (2023). Gartner Forecasts Hybrid Work Will Be the Norm by 2025.
Gartner. (2023). Market Guide for Single-Vendor SASE. Gartner Inc.
https://www.gartner.com/document/4001031
Hadlington, L. (2021). Human factors in cybersecurity: Examining the link between
Internet addiction, impulsivity, attitudes towards cybersecurity, and risky
cybersecurity behaviours. Heliyon, 7(1), e05962.
IBM Security. (2023). Cost of a Data Breach Report 2023. IBM Corporation.
https://www.ibm.com/reports/data-breach
ISACA. (2022). State of Cybersecurity 2022: Global Update on Workforce Efforts,
Resources and Cyberoperations.
Kindervag, J. (2021). Zero Trust: A paradigm shift in cybersecurity. Forrester
Research.
Kraemer-Mbula, E., Tijssen, R., Wallace, M. L., & McLean, R. (Eds.). (2019).
Transforming Research Excellence: New Ideas from the Global South. African
Minds. http://library.oapen.org/handle/20.500.12657/23441
Pal, A., & Pandey, R. (2021). Cloud Access Security Broker: Key Enabler for Enterprise
Cloud Security. Procedia Computer Science, 192, 4482–4491.
Parsons, K., Calic, D., Pattinson, M., Butavicius, M., & McCormac, A. (2017). The
human aspects of information security questionnaire (HAIS-Q): Two further
validation studies. Computers & Security, 66, 40–51.
https://doi.org/10.1016/j.cose.2017.01.004
PwC. (2022). 2022 Global Digital Trust Insights Survey. PricewaterhouseCoopers.
https://www.pwc.com/gx/en/issues/cybersecurity/digital-trust-insights.html
Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero Trust Architecture
(NIST SP 800-207). National Institute of Standards and Technology.
https://doi.org/10.6028/NIST.SP.800-207
Shen, H., Liu, X., & Liu, Y. (2023). Zero Trust Architecture and Access Control Strategy
in Remote Work Environments. Journal of Cyber Security Technology, 7(2), 95–
112.
Tang, J., Wu, Q., & Li, Y. (2022). Cloud-Based Security Models for Remote Workforce:
Evaluating the Effectiveness of SASE and EDR. Computers & Security, 118,
102739.
Verizon. (2023). Data Breach Investigations Report (DBIR) 2023. Verizon Enterprise.
https://www.verizon.com/business/resources/reports/dbir/
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security.
Computers & Security, 38, 97–102. https://doi.org/10.1016/j.cose.2013.04.004