1. اسمعیلی، مریم؛ کفشیان اهر، هاجر. (1398). به اشتراکگذاری اطلاعات، نشت اطلاعات و تحریف اطلاعات در یک زنجیره تأمین غیرمتمرکز با یک تولیدکننده و دو خردهفروش رقیب. نشریه پژوهش¬های مهندسی صنایع در سیستم¬های تولید، 7(14)، 13-27.
2. حسن¬نیا، محمد حسین؛ دهقانی، مهدی. (1392). بررسی روشهای نشت اطلاعات و راهکارهای جلوگیری از آن. فصلنامه پدافند غیرعامل، 4(4)، 1-12.
3. صادقی، امیرعباس؛ رزاقی، حمید و احمدی، ثریا. (1402). تعیین مقوله¬های موثر بر نقض حریم خصوصی کاربران در شبکه اجتماعی اینستاگرام. پایاشهر، 5: 57.
4. طالش، عاطفه؛ فراهی، احمد. (1395). بررسی روش های پیشگیری از نشت اطلاعات. کنفرانس بین¬المللی پژوهش در علوم و مهندسی، 1-8.
5. لشگری، سیامک؛ احمدی آبکناری، فاطمه. (1398). توسعه و دسته¬بندی قوانین حفظ حریم خصوصی کاربران در شبکه¬های اجتماعی بر حسب نوع نشت اطلاعات، کنفرانس ملی آینده پژوهی، مدیریت و توسعه پایدار، تهران، 1-13.
6. نگهدار، ایرج؛ پورقهرمانی، بابک و بیگی، جمال. (1402). سیاستگذاری جنایی در نقض امنیت سایبری و رهیافت¬های پیشگیری اجتماعی. فصلنامه سیاستگذاری عمومی، 9(2) 96- 114.
7. References
8. Abdul Molok, N. N., Ahmad, A., & Chang, S. (2010). Understanding the factors of information leakage through online social networking to safeguard organizational information, 1-17.
9. Abdul Molok, N. N., Chang, S., & Ahmad, A. (2013). Disclosure of organizational information on social media: Perspectives from security managers, PACIS 2013 Proceedings. 108.
10. Anand, K. S., & Goyal, M. (2009). Strategic information management under leakage in a supply chain. Management Science, 55(3), 438-452. [
DOI:10.1287/mnsc.1080.0930]
11. Bloodgood, J. M., & Chen, A. N. (2021). Preventing organizational knowledge leakage: the influence of knowledge seekers' awareness, motivation and capability. Journal of Knowledge Management, 1-32. [
DOI:10.1108/JKM-12-2020-0894]
12. Bouke, M. A., Abdullah, A., Udzir, N. I., & Samian, N. (2024). Overcoming the Challenges of Data Lack, Leakage, and Dimensionality in Intrusion Detection Systems: A Comprehensive Review. Journal of Communication and Information Systems, 39(1).
https://doi.org/10.14209/jcis.2024.3 [
DOI:10.14209/jcis.2024.3.]
13. Cappellozza, A., de Moraes, G. H. S. M., Perez, G., & Simões, A. L. (2021). Antecedent factors of violation of information security rules. RAUSP Management Journal, 2531-0488. [
DOI:10.1108/RAUSP-02-2021-0022]
14. Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5), e1211. [
DOI:10.1002/widm.1211]
15. Dolezel, D., Beauvais, B., Stigler Granados, P., Fulton, L., & Kruse, C. S. (2023). Effects of Internal and External Factors on Hospital Data Breaches: Quantitative Study. Journal of Medical Internet Research, 25, e51471. doi: 10.2196/51471 [
DOI:10.2196/51471]
16. Esmaeili, M. & Kafshian Ahar, H. (2019). Information sharing, information leakage and information distortion in a decentralized supply chain with one manufacturer and two competing retailers. Journal of Industrial engineering Research in Production Systems. 7(14): 13-27. Doi: 10.22084/ier.2019.14110.1642. (Persian)
17. Greitzer, F. L., Strozer, J. R., Cohen, S., Moore, A. P., Mundie, D., & Cowley, J. (2014). Analysis of unintentional insider threats deriving from social engineering exploits. In 2014 IEEE Security and Privacy Workshops, 236-250. [
DOI:10.1109/SPW.2014.39]
18. Greitzer, F. L., Strozer, J., Cohen, S., Bergey, J., Cowley, J., Moore, A., & Mundie, D. (2014). Unintentional insider threat: contributing factors, observables, and mitigation strategies. In 2014 47th Hawaii International Conference on System Sciences (pp. 2025-2034). IEEE. [
DOI:10.1109/HICSS.2014.256]
19. Hadasch, F., Mueller, B., & Maedche, A. (2012). Exploring Antecedent Environmental and Organizational Factors to User-Caused Information Leaks: A Qualitative Study, 127.
20. Hasan Nia, M. H. & Dehghani, M. (2013). Examining the methods of information compromise and its countermeasures techniques. Inactive Defense Magazine, 4(4): 1-12. (Persian).
21. Jašari, A. (2015). Information systems at the airport. PROCEEDING BOOK, 8. Retrieved from: https://icesos.ibu.edu.ba/wp-content/uploads/2019/02/PROCEEDING-BOOK_V41.10.2015-min.pdf#page=8
22. Kim, S.-H., Kim, N.-U., & Chung, T.-M. (2015). Study on sensitive information leakage vulnerability modeling. Kybernetes, 44(1), 77-88. [
DOI:10.1108/K-05-2014-0106]
23. Lashghari, S. & Ahmadi Abkenari, F. (2019). Development and classification of user privacy rules in social networks according to the type of information leakage. National Conference on Future Studies, Management and Sustainable Development. Ghazvin (November 2019), Imam Khomeini International University. (Persian)
24. Li, J., Xiao, W., & Zhang, C. (2023). Data security crisis in universities: identification of key factors affecting data breach incidents. Humanities and Social Sciences Communications, 10(1), 1-18. Retrieved from: [
DOI:10.1057/s41599-023-01757-0]
25. Madnick, S. E. (2023). The Continued Threat to Personal Data: Key Factors Behind the 2023 Increase.
26. Martel, N., & Seneviratne, P. N. (1990). Analysis of factors influencing quality of service in passenger terminal buildings. Transportation Research Record, (1273).
27. Mughal, Y. H. (2021). Impact of Supply Chain Information Integration on Operational Performance of Pharmaceutical Firms: Mediating Role of Information Leakage. Journal of Pharmaceutical Research International, 33(41B), 69-78. [
DOI:10.9734/jpri/2021/v33i41B32346]
28. Negahdar, E., pourghahramani, B., & Beigi, J. (2023). Criminal Policy making in Cyber Security Violations and Social Prevention Approaches. Iranian Journal of Public Policy, 9(2), 97-114. doi: 10.22059/jppolicy.2023.93610
29. Purnell, J. (2012). Information technology systems at Airports: A Primer (Vol. 59). Transportation Research Board.
30. Rauscher, F., Kogler, A., Juffinger, J., & Gruss, D. (2024, February). IdleLeak: Exploiting Idle State Side Effects for Information Leakage. In Network and Distributed System Security (NDSS) Symposium 2024. Retrieved from: https://www.ndss-symposium.org/wp-content/uploads/2024-78-paper.pdf. [
DOI:10.14722/ndss.2024.24078]
31. Rogers, Z., Benjamin, V., & Gopalakrishnan, M. (2018). Cyber security in supply chains: Understanding threats and potential security practices. Report. Center for Advanced Procurement Strategy, Tempe, AZ.
32. Ritala, P., Olander, H., Michailova, S., & Husted, K. (2015). Knowledge sharing, knowledge leaking and relative innovation performance: An empirical study. Technovation, 35, 22-31. [
DOI:10.1016/j.technovation.2014.07.011]
33. Sadeghi, A., Razaghi, H. & Ahmadi, S. (2023). Determining the factors affecting users' privacy in the Instagram social network. Paya Shahr, 5: 1-23. https://civilica.com/doc/1891414
34. Schultz, M., Schulz, C., & Fricke, H. (2007, December). Enhanced information flow and guidance in airport terminals using best passenger's visual perception. In Eurocontrol INO Workshop.
35. Talesh, A. & Farahi, A. (2016). Investigating methods to prevent information leakage. In: International Congress on Engineerin Innovation & Technology Development (ICEITD). Tabriz (19 May 2016) Tabriz University. (Persian)
36. Tan, K. H., Wong, W. P., & Chung, L. (2016). Information and knowledge leakage in supply chain. Information Systems Frontiers, 18(3), 621-638. [
DOI:10.1007/s10796-015-9553-6]
37. Tran, T. T. H., Childerhouse, P., & Deakins, E. (2016). Supply chain information sharing: challenges and risk mitigation strategies. Journal of Manufacturing Technology Management, 27(8), 1102-1126. [
DOI:10.1108/JMTM-03-2016-0033]
38. van der Kleij, R., Wijn, R., & Hof, T. (2020). An application and empirical test of the Capability Opportunity Motivation-Behaviour model to data leakage prevention in financial organizations. Computers & Security, 97, 101970. [
DOI:10.1016/j.cose.2020.101970]
39. Wong, W. P., Tan, K. H., Chuah, S. H. W., Tseng, M. L., Wong, K. Y., & Ahmad, S. (2020). Information sharing and the bane of information leakage: a multigroup analysis of contract versus noncontract. Journal of Enterprise Information Management. [
DOI:10.1108/JEIM-11-2019-0368]
40. Wong, W. P., Tan, K. H., Govindan, K., Li, D., & Kumar, A. (2021). A conceptual framework for information-leakage-resilience. Annals of Operations Research, 1-21. [
DOI:10.1007/s10479-021-04219-5]
41. Wong, W. P., Tan, H. C., Tan, K. H., & Tseng, M. L. (2019). Human factors in information leakage: mitigation strategies for information sharing integrity. Industrial Management & Data Systems, 119(6), 1242-1267. [
DOI:10.1108/IMDS-12-2018-0546]
42. Wong, W.P., Tan, H.C., Tan, K.H., & Tseng, M. (2020). Human factors in information leakage: mitigation strategies for information sharing integrity. Ind. Manag. Data Syst., 119, 1242-1267. www.dictionary.cambridge.org. [
DOI:10.1108/IMDS-12-2018-0546]