Publisher
Springer International Publishing
Reference24 articles.
1. Standard, I.: ISO/IEC 27002 - Code of practice for information security management (2005)
2. Goel, S., Chengalur-Smith, I.N.: Metrics for characterizing the form of security policies. J. Strateg. Inf. Syst. 19, 281–295 (2010). https://doi.org/10.1016/j.jsis.2010.10.002
3. Weidman, J., Grossklags, J.: What’s in your policy? An analysis of the current state of information security policies in academic institutions. In: 26th European Conference on Information Systems: Beyond Digitization – Facets of Socio-Technical Change, ECIS 2018, pp. 1–16 (2018)
4. Laszka, A., Farhang, S., Grossklags, J., On the Economics of Ransomware. Lecture Notes in Computer Science (including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10575 LNCS, pp. 397–417 (2017). https://doi.org/10.1007/978-3-319-68711-7_21
5. Verizon: 2021 data breach investigations report. Verizon Bus. J. (2021). https://doi.org/10.1057/s41280-018-0097-z
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Encouraging Organisational Information Security Incident Reporting;Proceedings of the 2023 European Symposium on Usable Security;2023-10-16