Publisher
Springer International Publishing
Reference21 articles.
1. Benbasat, I., Goldstein, D.K., Mead, M.: The case research strategy in studies of information systems. MIS Q. 11(3), 369–386 (1987)
2. Bernard, R.: Information lifecycle security risk assessment: a tool for closing security gaps. Comput. Secur. 26(1), 26–30 (2007)
3. Cassini, J.A., Medlin, B.D., Adriana, R.: Laws and regulations dealing with information security and privacy: an investigative study. Int. J. Inf. Secur. Priv. (IJISP) 2(2), 70–82 (2008)
4. Clarke, N., Li, F., Furnell, S.: A novel privacy preserving user identification approach for network traffic. Comput. Secur. 70(Supplement C), 335–350 (2017)
5. FFIEC Cybersecurity Assessment Tool. https://www.ffiec.gov/pdf/cybersecurity/FFIEC_CAT_May_2017_All_Documents_Combined.pdf. Accessed 14 Oct 2020
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献