Author:
Govender S. G.,Kritzinger E.,Loock M.
Publisher
Springer International Publishing
Reference30 articles.
1. Safa, N.S., Maple, C., Watson, T., Von Solms, R.: Motivation and opportunity based model to reduce information security insider threats in organisations. J. Inf. Secur. Appl. 40, 247–257 (2018).
https://doi.org/10.1016/j.jisa.2017.11.001
2. Mukherjee, S.: Overview of the importance of corporate security in business. SSRN Electron. J. (2019).
https://doi.org/10.2139/ssrn.3415960
3. Lecture Notes in Computer Science;G Dhillon,2018
4. Lord, N.: The history of data breaches.
https://digitalguardian.com/blog/history-data-breaches
. Last Accessed 07 Oct 2019
5. Winder, D.: Data breaches expose 4.1 billion records in first six months of 2019.
https://www.forbes.com/sites/daveywinder/2019/08/20/data-breaches-expose-41-billion-records-in-first-six-months-of-2019/#7fe19849bd54
. Last Accessed 07 Oct 2019
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献