Development of cyber information security education and training system
暂无分享,去创建一个
Sungeon Hong | Ki-Chan Kim | Sang-Young Oh | Bong-hyun Kim | Sungeon Hong | Bong-hyun Kim | Sang-Young Oh | Ki-Chan Kim
[1] Jae-Beom Lee,et al. A Development of Comprehensive Framework for Continuous Information Security , 2012 .
[2] JaeYong Park,et al. An Analysis on Training Curriculum for Educating Information Security Experts , 2012 .
[3] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[4] Influencing Factors for Compliance Intention of Information Security Policy , 2011 .
[5] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[6] Houston H. Carr,et al. Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..
[7] Stephen F. Burnett,et al. Computer security training and education: a needs analysis , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[8] Rahul Roy,et al. Dynamics of organizational information security , 2003 .
[9] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[10] Young U. Ryu,et al. Self-efficacy in information security: Its influence on end users' information security practice behavior , 2009, Comput. Secur..
[11] James C. Wetherbe,et al. Key Issues in Information Systems Management: 1994-95 SIM Delphi Results , 1996, MIS Q..
[12] 박선영,et al. 정보보안 정책 준수 의도에 대한 영향요인 , 2011 .
[13] Dong Seong Kim,et al. INTRUSION DETECTION SYSTEM , 2013 .