暂无分享,去创建一个
[1] Muhammad Salman Khan,et al. A Cognitive and Concurrent Cyber Kill Chain Model , 2018, Computer and Network Security Essentials.
[2] InduShobha N. Chengalur-Smith,et al. An overview of social engineering malware: Trends, tactics, and implications , 2010 .
[3] Norman F. Schneidewind. Metrics for mitigating cybersecurity threats to networks , 2010, IEEE Internet Computing.
[4] Dawn M. Cappelli,et al. Combating the Insider Cyber Threat , 2008, IEEE Security & Privacy.
[5] Sean W. Smith,et al. Never Mind Pearl Harbor--What about a Cyber Love Canal? , 2015, IEEE Security & Privacy.
[6] Dimitrios Buhalis. Information Technology for Small and Medium-Sized Tourism Enterprises: Adaptation and Benefits , 1999, J. Inf. Technol. Tour..
[7] D. Byman. Al-Qaeda as an Adversary: Do We Understand Our Enemy? , 2003 .
[8] T. Holt,et al. An Assessment of the Current State of Cybercrime Scholarship , 2014 .
[9] Kevin Macnish,et al. Ethics in cybersecurity research and practice , 2020, Technology in Society.
[10] Thomas A. Hemphill,et al. Financial data breaches in the U.S. retail economy: Restoring confidence in information technology security standards , 2016 .
[11] Ronald Prescott Loui,et al. How to Survive a Cyber Pearl Harbor , 2016, Computer.
[12] M. C. Hudson. To Play the Hegemon: Fifty Years of US Policy toward the Middle East , 1996 .
[13] Sean Lawson,et al. Cyber Pearl Harbor: Analogy, fear, and the framing of cyber security threats in the United States, 1991-2016 , 2019, First Monday.
[14] T Saric,et al. Improving Performance in Diabetes Care: Benefits of Information Technology Enabled Diabetes Management. , 2014, Value in health : the journal of the International Society for Pharmacoeconomics and Outcomes Research.
[15] Patricia A. H. Williams,et al. Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem , 2015, Medical devices.
[16] David Kahn. Pearl Harbor and the Inadequacy of Cryptanalysis , 1991, Cryptologia.
[17] Sakir Sezer,et al. STRIDE-based threat modeling for cyber-physical systems , 2017, 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe).
[18] William J. Chopik,et al. The Benefits of Social Technology Use Among Older Adults Are Mediated by Reduced Loneliness , 2016, Cyberpsychology Behav. Soc. Netw..
[19] R. Jervis. Mutual Assured Destruction , 2002 .
[20] The Cyber Pearl Harbor , 2017 .
[21] Timothy R. Hill,et al. Risk knowledge and concern as influences of purchase intention for internet of things devices , 2020 .
[22] Lillian Ablon,et al. Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information , 2016 .
[23] Janice Light,et al. The iPad and Mobile Technology Revolution: Benefits and Challenges for Individuals who require Augmentative and Alternative Communication , 2013, Augmentative and alternative communication.
[24] T. Nam,et al. Understanding the gap between perceived threats to and preparedness for cybersecurity , 2019, Technology in Society.
[25] Lillian Ablon,et al. Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits , 2017 .
[26] Michael E. Lesk,et al. Privacy and Cybersecurity: The Next 100 Years , 2012, Proceedings of the IEEE.
[27] Jonghwa Park,et al. The role of privacy fatigue in online privacy behavior , 2018, Comput. Hum. Behav..
[28] D. Blumenthal,et al. The benefits of health information technology: a review of the recent literature shows predominantly positive results. , 2011, Health affairs.
[29] Carlo Perrotta,et al. Do school-level factors influence the educational benefits of digital technology? A critical analysis of teachers' perceptions , 2013, Br. J. Educ. Technol..
[30] F. Whittaker,et al. The costs and benefits of technology-enabled, home-based cardiac rehabilitation measured in a randomised controlled trial , 2014, Journal of telemedicine and telecare.
[31] A. Hourani. Europe and the Middle East , 1980 .
[32] J. Straub. Mutual assured destruction in information, influence and cyber warfare: Comparing, contrasting and combining relevant scenarios , 2019, Technology in Society.
[33] J. Mueller,et al. Pearl Harbor: Military Inconvenience, Political Disaster , 1991 .
[34] James Kinross,et al. Effective cybersecurity is fundamental to patient safety , 2017, British Medical Journal.
[35] Jeremy Straub,et al. Modeling Attack, Defense and Threat Trees and the Cyber Kill Chain, ATT&CK and STRIDE Frameworks as Blackboard Architecture Networks , 2020, 2020 IEEE International Conference on Smart Cloud (SmartCloud).
[36] T. Stevens. Cyber Security and the Politics of Time , 2015 .
[37] Li Hu-sheng. Research on new model of the emergency management phase theory , 2010 .
[38] R. Atkinson,et al. Digital Quality of Life: Understanding the Personal and Social Benefits of the Information Technology Revolution , 2008 .
[39] R. Still,et al. Europe and the Middle East , 2013 .