The Role of Trust and Co-partnership in the Societal Digital Security Culture Approach
暂无分享,去创建一个
Alfredo De Santis | Aniello Castiglione | Antonio Colella | A. D. Santis | Aniello Castiglione | Antonio Colella
[1] Sheila Rosenblum,et al. Stability and Change , 1981, Environment, Development, and Public Policy.
[2] Chun Wie Choo. Information management for the intelligent organization (2nd ed.): the art of scanning the environment , 1999 .
[3] Albert L. Lederer,et al. Key predictors of the implementation of strategic information systems plans , 2003, DATB.
[4] Eugene Schultz. Security training and awareness - fitting a square peg in a round hole , 2004, Comput. Secur..
[5] Giuseppe Cattaneo,et al. FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).
[6] Kregg Aytes,et al. Computer Security and Risky Computing Practices: A Rational Choice Perspective , 2004, J. Organ. End User Comput..
[7] David A. Mundie,et al. Insider Threat Defined: Discovering the Prototypical Case , 2014, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[8] Effy Oz,et al. Organizational Commitment and Ethical Behavior: An Empirical Study of Information System Professionals , 2001 .
[9] S. Rosenblum,et al. Stability and Change: Innovation in an Educational Context , 1981 .
[10] S. Wiedenbeck,et al. Human Factors and Information Security , 2004 .
[11] Blaise Cronin,et al. Information Management for the Intelligent Organization: the Art of Scanning the Environment , 1997, Inf. Process. Manag..
[12] Yang-Im Lee. Strategic transformational management in the context of inter-organizational and intra-organizational partnership development , 2009 .
[13] Antonio Colella,et al. Security Paradigm in Ubiquitous Computing , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[14] Yang-Im Lee,et al. A security framework for protecting business, government and society from cyber attacks , 2010, 2010 5th International Conference on System of Systems Engineering.
[15] Ken Doughty. Implementing enterprise security: a case study , 2003, Comput. Secur..
[16] Mahadev Satyanarayanan,et al. Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..
[17] Bharat K. Bhargava,et al. A Case for Societal Digital Security Culture , 2013, SEC.
[18] Dieter Gollmann,et al. From Insider Threats to Business Processes that are Secure-by-Design , 2011, 2011 Third International Conference on Intelligent Networking and Collaborative Systems.
[19] Aniello Castiglione,et al. Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel , 2012, CD-ARES.
[21] Dieter Gollmann,et al. Guest Editorial: Emerging Trends in Research for Insider Threat Detection , 2014, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..