Perugini, M. L. L., & Solano, A. C. (2021). Normal and Maladaptive Personality Traits as Predictors of Motives for Social Media Use and Its Effects on Well-Being. Psychological Reports, 124(3), 1070–1092.

Jemielniak, D., & Krempovych, Y. (2021). An analysis of AstraZeneca COVID-19 vaccine misinformation and fear-mongering on Twitter. Public Health (Elsevier), 200, 4–6

Zimmerman, M. S. (2021). Health information-seeking behavior in the time of COVID-19: information horizons methodology to decipher source path during a global pandemic. Journal of Documentation, 77(6), 1248–1264

KŁOPOTEK, M. (2017). THE ADVANTAGES AND DISADVANTAGES OF REMOTE 2 WORKING FROM THE PERSPECTIVE OF YOUNG EMPLOYEES. Scientific Quarterly “Organization and Management”, 4(40), 39–49

Sloane, A. (2001). Infrastructure issues for internet broadcasting to home-based users. Computers and Networks in the Age of Globalization, 221–230

King, T., & Bannon, E. (2002). At What Cost? The Price That Working Students Pay For A College Education, 1–47

Mehrtak, M., Alinaghi, S. A. S., Pour, M. M., Noori, T., Karimi, A., Shamsabadi, A., Heydari, M., Barzegary, A., Mirzapour, P., Soleymanzadeh, M., Vahedi, F., Mehraeen, E., & Dadras, O. (2021). Security challenges and solutions using healthcare cloud computing. Journal of Medicine & Life, 14(4), 448–461

Bicca Charczuk, S. (2020). Ensuring Transference on Remote Learning: teaching in pandemic times. Educação e Realidade, 45(4), 1–20

Gulliver, R., Fahmi, M., & Abramson, D. (2021). Technical considerations when implementing digital infrastructure for social policy. Australian Journal of Social Issues (John Wiley & Sons, Inc.), 56(2), 269–287

Tanczer, L. M., Deibert, R. J., Bigo, D., Franklin, M. I., Melgaço, L., Lyon, D., Kazansky, B., & Milan, S. (2020). Online Surveillance, Censorship, and Encryption in Academia. International Studies Perspectives, 21(1), 1–36

Shahriar, H., Zhang, C., Dunn, S., Bronte, R., Sahlan, A., & Tarmissi, K. (2019). Mobile anti-phishing: Approaches and challenges. Information Security Journal: A Global Perspective, 28(6), 178–193

Tabrizchi, H., & Kuchaki Rafsanjani, M. (2020). A survey on security challenges in cloud computing: Issues, threats, and solutions. The Journal of Supercomputing, 76(12), 9493–9532

Rudman, R., & Bruwer, R. (2016, February 1). Defining web 3.0: Opportunities and challenges. The Electronic Library. Retrieved November 9, 2021, from https://www.emerald.com/insight/content/doi/10.1108/EL-08-2014-0140/full/html.