1. Adhikari, K., & Panda, R. K. (2018). Users’ Information Privacy Concerns and Privacy Protection Behaviors in Social Networks. Journal of Global Marketing, 31(2), 96–110.
2. Afandi, I. A., Kusyanti, A., & Wardani, N. H. (2017). Analisis hubungan kesadaran keamanan, privasi informasi, dan perilaku keamanan pada para pengguna media sosial Line. Jurnal Pengembangan Teknologi Informasi Dan Ilmu Komputer E-ISSN, 2548, 964X.
3. Alavi, M., & Joachimsthaler, E. A. (1992). Revisiting DSS Implementation Research: A Meta-Analysis of The Literature and Suggestions for Researchers. MIS Quarterly, 95–116.
4. Alqahtani, M., & Braun, R. (2021). Reviewing Influence of UTAUT2 Factors on Cyber Security Compliance: A Literature Review. Journal of Information Assurance & Cyber Security.
5. Chin, W. W. (1998). The Partial Least Squares Approach to Structural Equation Modeling. Modern Methods for Business Research, 295(2), 295–336.
6. Chris, N., Susanti, T., Donglas, N., Yantson, C., & Vincent. (2021). Pengaruh Kesadaran Keamanan Informasi dan Privasi Jaringan Sosial Terhadap Perilaku Perlindungan Privasi pada Para Pengguna Jaringan Sosial. Jurnal Ilmu Komunikasi, 7(2), 170–184.
7. Elkhannoubi, H. B., & Belaissaoui, M. (2016). User’s Behavior Influence on Cyber security Strategy Ef-fectiveness. International Journal of Ad-Vanced Engineering Research and Sci-Ence (IJAERS), 3(10), 188–196.
8. Frost, & Sullivan. (2018). Ancaman Keamanan Siber Menyebabkan Kerugian Ekonomi Bagi Organisasi di Indonesia Sebesar US$34.2 Miliar. Microsoft News. https://news.microsoft.com/id- id/2018/05/24/ancaman-keamanan-siber-menyebabkan- kerugian-ekonomi-bagi-organisasi- di-indonesia-sebesar-us34-2-miliar/
9. Gartner. (2021a). How to Decide Between Google Workspace and Microsoft 365. https://www.gartner.com/en/documents/4004331
10. Gartner. (2021b). The Digital Workplace: Delivering a More Productive, Secure and Engaging Environment for Employees. Https://Www.Gartner.Com/Smarterwithgartner/the-Digital-Workplace-Delivering-a-More-Productive-Secure-and-Engaging-Environment-for-Employees/. https://www.gartner.com/smarterwithgartner/the-digital-workplace-delivering-a-more-productive-secure-and-engaging-environment-for-employees/
11. Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in Online Shopping: An Integrated Model. MIS Quarterly, 51–90.
12. Ghozali, I. (2014). SEM Metode Alternatif Dengan Menggunakan Partial Least Squares (PLS). Semarang: Badan Penerbit Universitas Diponegoro.
13. Ginanjar, Y. (2022). Strategi Indonesia Membentuk Cyber Security Dalam Menghadapi Ancaman Cyber Crime Melalui Badan Siber dan Sandi Negara. Dinamika Global: Jurnal Ilmu Hubungan Internasional, 7(02), 295–316.
14. Hair, J., Sarstedt, M., Hopkins, L., & Kuppelwieser, G. V. (2014). Partial Least Squares Structural Equation Modeling (PLS-SEM) An Emerging Tool in Business Research. European Business Review, 26(2), 106–121.
15. Hair, J., Sarstedt, M., Matthews, L. M., & Ringle, C. M. (2016). Identifying and Treating Unobserved Heterogeneity with FIMIX-PLS: Part I–Method. European Business Review, 28(1), 63–76.
16. IDSIRTII BSSN. (2022). Monitoring Keamanan Siber 2020-2022. https://bssn.go.id/monitoring-keamanan-siber/
17. Kemenparekraf. (2014). Subsektor Ekonomi Kreatif. Kementerian Pariwisata & Ekonomi Kreatif. https://kemenparekraf.go.id/layanan/Subsektor-Ekonomi-Kreatif
18. Kemenparekraf. (2020). Infografis Data Statistik Indikator Makro Pariwisata & Ekonomi Kreatif. https://bankdata.kemenparekraf.go.id/upload/document_satker/5baa176056e524cfaa5086f5d69b2747.pdf
19. Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.
20. Maresky, J. (2019, December 10). Instant Observability into Cloud Threats with CloudGuard IaaS and Google Cloud Packet Mirroring. Check Point. https://blog.checkpoint.com/2019/ 12/10/cloudguard-iaas-integrates-with-google-cloud-packet-mirroring/
21. Marsh, E., Vallejos, E. P., & Spence, A. (2022). The Digital Workplace and Its Dark Side: An Integrative Review. Computers in Human Behavior, 128, 107118.
22. McAfee. (2020). McAfee Released Threat Report on Cloud Adoption by Work from Home Segment. https://smestreet.in/technology/mcafee-released-threat-report-on-cloud-adoption-by-work-from-home-segment/
23. Mohamed, N., & Ahmad, I. H. (2012). Information Privacy Concerns, Antecedents and Privacy Measure Use in Social Networking Sites: Evidence from Malaysia. Computers in Human Behavior, 28(6), 2366–2375. https://doi.org/j.chb.2012.07.008
24. Palmer, I., Dunford, R., & Buchanan, D. (2016). EBOOK: Managing Organizational Change: A Multiple Perspectives Approach (ISE). McGraw Hill.
25. Republika. (2023, January 23). Keamanan Siber di Ruang Digital Indonesia. Republika.Id. https://republika.id/posts/36717/keamanan-siber-di-ruang-digital-indonesia
26. Sedana, I. G. N. (2009). Penerapan model UTAUT Untuk Memahami Penerimaan dan Penggunaan Learning Management System Studi Kasus: Experential E-Learning of Sanata Dharma University. Jurnal Sistem Informasi, 5(2), 114–120.
27. Teebken, M., & Hess, T. (2021). Privacy in A Digitized Workplace: Towards an Understanding of Employee Privacy Concerns.
28. Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User Acceptance of Information Technology: Toward a Unified View. MIS Quarterly, 425–478.
29. Yamane, T. (1973). Statistics: An introductory analysis (Third Edition). Harper & Row.