Author:
Arta Yudhi,Hanafiah Anggi,Syafitri Nesi,Setiawan Panji Rachmat,Gustianda Yudhistira Hadi
Publisher
Springer Nature Singapore
Reference20 articles.
1. Gashi L, Luma A, Aliu A (2022) A comprehensive review of cybersecurity perspective for wireless sensor networks. In: 2022 international symposium on multidisciplinary studies and innovative technologies (ISMSIT), pp 392–395
2. Cains MG, Flora L, Taber D, King Z, Henshel DS (2022) Defining cyber security and cyber security risk within a multidisciplinary context using expert elicitation. Risk Anal 42(8):1643–1669
3. Yeboah-Boateng EO (2013) Cyber-security challenges with SMEs in developing economies: issues of confidentiality, integrity & availability (CIA). Institut for Elektroniske Systemer, Aalborg Universitet
4. Moynihan GP (1993) An executive information system: planning for post-implementation at NASA. J Syst Manag 44(7):8
5. Arta Y, Ilhan M, Hanafiah A (2021) Analisis Kebutuhan Keamanan Informasi Menggunakan Metode SQUARE Pada Aplikasi HRIS Studi Kasus: PT. XYZ. CogITo Smart J 7(1):61–73