Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy
暂无分享,去创建一个
[1] Elmarie Kritzinger,et al. Cyber security for home users: A new way of protection through awareness enforcement , 2010, Comput. Secur..
[2] Susan W. Brenner,et al. Cyberthreats: The Emerging Fault Lines of the Nation State , 2009 .
[3] Johannes M. Bauer,et al. Cybersecurity: Stakeholder incentives, externalities, and policy options , 2009 .
[4] Lilian Edwards,et al. Information Security and Cybercrime , 2009 .
[5] Kim-Kwang Raymond Choo. High tech criminal threats to the national information infrastructure , 2010, Inf. Secur. Tech. Rep..
[6] Jensen J. Zhao,et al. Opportunities and threats: A security assessment of state e-government websites , 2010, Gov. Inf. Q..
[7] M. J. Williams,et al. (In)Security Studies, Reflexive Modernization and the Risk Society , 2008 .
[8] H Roberts,et al. Risk Society: Towards a New Modernity , 1994 .
[9] Ian Brown,et al. Reducing Systemic Cybersecurity Risk , 2011 .
[10] Johannes M. Bauer,et al. The Role of Internet Service Providers in Botnet Mitigation an Empirical Analysis Based on Spam Data , 2010, WEIS.
[11] B. B. Gupta,et al. Defending against Distributed Denial of Service Attacks: Issues and Challenges , 2009, Inf. Secur. J. A Glob. Perspect..
[12] H. Raghav Rao,et al. Firms' information security investment decisions: Stock market evidence of investors' behavior , 2011, Decis. Support Syst..