An Investigation Of Organizational Information Security Risk Analysis
暂无分享,去创建一个
F. Nelson Ford | R. Kelly Rainer | Thomas E. Marshall | T. E. Marshall | Zack Jourdan | R. K. Rainer | F. Ford | Zack Jourdan
[1] Lawrence Bodin,et al. Evaluating information security investments using the analytic hierarchy process , 2005, CACM.
[2] Michael E. Whitman. Enemy at the gate: threats to information security , 2003, CACM.
[3] Huseyin Cavusoglu,et al. Model for Evaluating , 2022 .
[4] Loren Paul Rees,et al. Necessary measures: metric-driven information security risk assessment and decision making , 2007, CACM.
[5] Efraim Turban,et al. Introduction to Information Systems: Supporting and Transforming Business Wiley Plus Stand-alone , 2007 .
[6] Herbert J. Mattord,et al. Principles of Information Security , 2004 .
[7] Terry Anthony Byrd,et al. Defense Mechanisms of Biological Cells: A Framework for Network Security Thinking , 2003, Commun. Assoc. Inf. Syst..
[8] M. Whitman,et al. Management Of Information Security , 2004 .
[9] William L. Simon,et al. The Art of Deception: Controlling the Human Element of Security , 2001 .
[10] R. Weiss. Learning from strangers : the art and method of qualitative interview studies , 1995 .
[11] Susan Greener,et al. Business Research Methods , 2008 .
[12] T. Scandura,et al. Research Methodology In Management: Current Practices, Trends, And Implications For Future Research , 2000 .