Author:
Abbas Haider,Magnusson Christer,Yngstrom Louise,Hemani Ahmed
Subject
Library and Information Sciences,Management Science and Operations Research,Business and International Management,Management Information Systems
Reference17 articles.
1. Abbas, H., Yngström, L. and Hemani, A. (2008), “Security evaluation of IT products: bridging the gap between common criteria (CC) and real option thinking”,Proceedings of the World Congress on Engineering and Computer Science 2008, San Francisco, CA, USA, 22‐24 October, pp. 530‐3.
2. Abbas, H., Magnusson, C., Yngström, L. and Hemani, A. (2010), “A structured approach for internalizing externalities caused by IT security mechanisms”,Proceedings of the IEEE International Workshop on Education Technology and Computer Science, Wuhan, China, 6‐7 March.
3. Abbas, H., Yngström, L. and Hemani, A. (2009a), “Adaptability infrastructure for bridging IT security evaluation and options theory”,Proceedings of the 2nd IEEE/ACM International Conference on Security of Information and Networks (SIN 2009), Gazimagusa, 6‐10 October, pp. 39‐45.
4. Abbas, H., Yngström, L. and Hemani, A. (2009c), “Option based evaluation: security evaluation of IT products based on options theory”,Proceedings of IEEE Eastern European Regional Conference on the Engineering of Computer Based Systems, Novi Sad, Serbia, 7‐8 September, pp. 134‐41.
5. Cavoukian, A. (2009), “Privacy as a negative externality the solution: privacy by design”,Proceedings of Workshop on the Economics of Information Security, London, UK.
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献