Author:
Tryfonas T.,Kiountouzis E.
Reference21 articles.
1. Anderson, R.J. (1993), “Why cryptosystems fail”, Communications of the ACM, 37(11), pp 32–44.
2. Barnard, L. and von Solms, R. (2000), “A Formalized Approach to the Effective Selection and Evaluation of Information Security Controls”, Computers & Security, Vol 19 No 2,pp. 185–194.
3. Baskerville, R. (1993), “Information Systems Security Design Methods: Implications for Information Systems Development”, ACM Computing Surveys, Vol. 25, No. 4, pp. 375–414.
4. Brownsword, L., Oberndorf, T. and Sledge C.A. (2000), “Developing New Processes for COTS-Based Systems”, IEEE Software, July/August, pp. 48–55.
5. Checkland, P. (1981), Systems thinking, systems practice, Wiley Publications.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献