Cyber-Warfare Threatens Corporations: Expansion into Commercial Environments
暂无分享,去创建一个
[1] Omar El Sawy,et al. The Four Tigers of Global E-Business Infrastructure: Strategies and Implications for Emerging Economies , 2003, Commun. Assoc. Inf. Syst..
[2] Moshe Zviran,et al. Password Security: An Empirical Study , 1999, J. Manag. Inf. Syst..
[3] Paul J. Bolt,et al. Information warfare across the Taiwan strait , 2004 .
[4] Charles C. Wood,et al. Information Security Policies Made Easy , 1994 .
[5] Amitava Dutta,et al. Management's Role in Information Security in a Cyber Economy , 2002 .
[6] Jonathan Rosenoer,et al. Safeguarding Your Critical Business Information , 2002 .
[7] Derek S. Reveron,et al. China's Use of Perception Management , 2003 .
[8] Ashish Garg,et al. The Financial Impact of IT Security Breaches: What Do Investors Think? , 2003, Inf. Secur. J. A Glob. Perspect..
[9] Peter G. Neumann. Identity-related misuse , 1997, CACM.
[10] Mark N. Frolick. A New Webmaster's Guide to Firewalls and Security , 2003, Inf. Syst. Manag..
[11] Michael Grüninger,et al. Introduction , 2002, CACM.
[12] Detmar W. Straub,et al. Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..
[13] Winn Schwartau. Information Warfare , 1996, Encyclopedia of Public Administration and Public Policy, Third Edition.
[14] Thomas Peltier,et al. Information Technology: Code of Practice for Information Security Management , 2001 .
[15] B. Cronin. Information warfare: peering inside Pandora’s postmodern box , 2001 .
[16] Ephraim R. McLean,et al. Key Issues for IT Executives , 2004, MIS Q. Executive.
[17] D. Denning. Activism, Hacktivism, and Cyberterrorism: the Internet As a Tool for Influencing Foreign Policy , 2001 .
[18] Rita Marcella,et al. Managing in the Next Society , 2003, J. Documentation.
[19] Robert D Austin,et al. The myth of secure computing. , 2003, Harvard business review.
[20] T. Neff,et al. Survival of the Fittest , 1997 .
[21] Philip N. James. Education and training. Key to a competitive IS strategy , 1992 .
[22] Peter Svensson,et al. Al-Jazeera Site Experiences Hack Attack , 2003 .
[23] Morgan O apos,et al. Cyber-extortion evolves , 2004 .
[24] Martin P. Loeb,et al. CSI/FBI Computer Crime and Security Survey , 2004 .
[25] Carl J. Pacini,et al. What your firm should know about identity theft , 2004 .
[26] Gerald L. Kovacich,et al. Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages: Chapter 1, Part 2 , 2002, Inf. Secur. J. A Glob. Perspect..
[27] Tom Stafford,et al. Spyware: The Ghost in the Machine , 2004, Commun. Assoc. Inf. Syst..
[28] J Girvin,et al. Education and training , 2016, Elderly care.
[29] Janice C. Sipior,et al. The Ethical and Legal Concerns of Spyware , 2005, Inf. Syst. Manag..
[30] R. Panko. Corporate Computer and Network Security , 2003 .
[31] Alan D. Campen,et al. Cyberwar 2.0: Myths, Mysteries and Reality , 1998 .
[32] Dinesh Sequeira. INTRUSION PREVENTION SYSTEMS - SECURITY'S SILVER BULLET? , 2002 .
[33] Anne Powell,et al. Information Systems Management , 1997 .
[34] 日本規格協会. 情報技術 : 情報セキュリティ管理実施基準 : 国際規格 : ISO/IEC 17799 = Information technology : code of practice for infromation security management : international standard : ISO/IEC 17799 , 2000 .
[35] Philip Calvert. Strategic Warfare in Cyberspace , 2002 .
[36] Ken M. Shaurette,et al. Security Infrastructure: Basics of Intrusion Detection Systems , 2000 .
[37] Tim Porter. Information warfare - Your company needs you! , 1996, Comput. Secur..
[38] C. Stoll. The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .
[39] Kevin D. Mitnick. Are You the Weak Link , 2003 .
[40] D. Parker. Crime by computer , 1976 .
[41] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[42] Blaise Cronin,et al. Information Warfare: Its Application in Military and Civilian Contexts , 1999, Inf. Soc..
[43] Kallol Kumar Bagchi,et al. An Analysis of the Growth of Computer and Internet Security Breaches , 2003, Commun. Assoc. Inf. Syst..
[44] William Hutchinson. Concepts in information warfare , 2002 .