An Ontology for a National Cyber-Security Culture Environment
暂无分享,去创建一个
[1] Rossouw von Solms,et al. From information security to cyber security , 2013, Comput. Secur..
[2] Stephanie Teufel,et al. Information security culture - from analysis to change , 2003, South Afr. Comput. J..
[3] Soon Ae Chun,et al. A Bootstrapping Approach for Developing a Cyber-security Ontology Using Textbook Index Terms , 2013, 2013 International Conference on Availability, Reliability and Security.
[4] Stefan Fenz,et al. Formalizing information security knowledge , 2009, ASIACCS '09.
[5] Shari Lawrence Pfleeger,et al. Leveraging behavioral science to mitigate cyber security risk , 2012, Comput. Secur..
[6] Steven Furnell,et al. Security beliefs and barriers for novice Internet users , 2008, Comput. Secur..
[7] Thomas R. Gruber,et al. A translation approach to portable ontology specifications , 1993, Knowl. Acquis..
[8] Saudi Arabia,et al. Information Security Awareness and Culture , 2012 .
[9] Stefan Fenz,et al. Ontological Mapping of Information Security Best-Practice Guidelines , 2009, BIS.
[10] Marcus K. Rogers,et al. A cyber forensics ontology: Creating a new approach to studying cyber forensics , 2006, Digit. Investig..
[11] Innocentia Dlamini,et al. Framework for an African Policy Towards Creating Cyber Security Awareness , 2011 .
[12] Louise Leenen,et al. Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward , 2012, HCC.
[13] Jan H. P. Eloff,et al. Information security culture - validation of an assessment instrument , 2007 .
[14] Z. Dlamini,et al. Cyber security awareness initiatives in South Africa: a synergy approach , 2012 .
[15] N. F. Noy,et al. Ontology Development 101: A Guide to Creating Your First Ontology , 2001 .
[16] E. Schein. Organizational Culture and Leadership , 1991 .
[17] Tom Ritchey,et al. General Morphological Analysis (GMA) , 2011 .
[18] Roseline Obada Moses-Òkè,et al. Cyber Capacity without Cyber Security: A Case Study of Nigeria’s National Policy for Information Technology (NPFIT) , 2012 .
[19] Solange Ghernouti-Hélie,et al. A National Strategy for an Effective Cybersecurity Approach and Culture , 2010, 2010 International Conference on Availability, Reliability and Security.
[20] Johan Van Niekerk,et al. E-mail Security awareness at Nelson Mandela Metropolitan University (Registrar's Division) , 2009, ISSA.
[21] Rossouw von Solms,et al. Information security culture: A management perspective , 2010, Comput. Secur..
[22] Rossouw von Solms,et al. A conceptual framework for cyber-security awareness and education in SA , 2014, South Afr. Comput. J..