Author:
Govender S.G.,Kritzinger E.,Loock M.
Publisher
Springer Science and Business Media LLC
Subject
Management Science and Operations Research,Computer Science Applications,Hardware and Architecture
Reference30 articles.
1. Saf NS, Maple C, Watson T, Von Solms R (2018) Motivation and opportunity based model to reduce information security insider threats in organisations. J Inf Secur Appl 40:247–257. https://doi.org/10.1016/j.jisa.2017.11.001
2. Mukherjee S (2019) Overview of the importance of corporate security in business. SSRN Electron J. https://doi.org/10.2139/ssrn.3415960
3. Dhillon, G., Torkzadeh, G., Chang, J.: Strategic planning for IS security: designing objectives. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics). pp. 285–299. Springer Verlag (2018). https://doi.org/10.1007/978-3-319-91800-6_19.
4. Lord, N.: The history of data breaches, https://digitalguardian.com/blog/history-data-breaches, .
5. Winder, D.: Data breaches expose 4.1 billion records in first six months of 2019, https://www.forbes.com/sites/daveywinder/2019/08/20/data-breaches-expose-41-billion-records-in-first-six-months-of-2019/#7fe19849bd54, .
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献