Evaluation of the Effectiveness of Risk Assessment and Security Fatigue Visualization Model for Internal E-Crime
暂无分享,去创建一个
Kazuhiko Ohkubo | Atsushi Kanai | Shigeaki Tanimoto | Takashi Hatashima | Hitoshi Fuji | Keita Nagai | Asami Kishi | Hikaru Uekusa | S. Tanimoto | Atsushi Kanai | H. Uekusa | H. Fuji | Keita Nagai | T. Hatashima | K. Ohkubo | Asami Kishi
[1] Vijay H. Kothari,et al. Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users , 2016, WSF@SOUPS.
[2] Lawrence E. Cohen,et al. Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .
[3] Kat Krol,et al. Applying Cognitive Control Modes to Identify Security Fatigue Hotspots , 2016, WSF@SOUPS.
[4] Atsushi Kanai,et al. A Concept Proposal on Modeling of Security Fatigue Level , 2017, 2017 5th Intl Conf on Applied Computing and Information Technology/4th Intl Conf on Computational Science/Intelligence and Applied Informatics/2nd Intl Conf on Big Data, Cloud Computing, Data Science (ACIT-CSII-BCD).
[5] Steven Furnell,et al. Recognising and addressing ‘security fatigue’ , 2009 .
[6] Gary McGraw. Security Fatigue? Shift Your Paradigm , 2014, Computer.
[7] D. Cressey. Other people's money , 1953 .
[8] Mary Frances Theofanos,et al. Security Fatigue , 2016, IT Professional.
[9] David Hillson,et al. Use a Risk Breakdown Structure (RBS) to Understand Your Risks , 2002 .