Author:
Yaghmaei Emad,van de Poel Ibo,Christen Markus,Gordijn Bert,Kleine Nadine,Loi Michele,Morgan Gwenyth,Weber Karsten
Reference245 articles.
1. A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds;Assad Abbas;IEEE Journal of Biomedical and Health Informatics,2014
2. Data Breach on the Critical Information Infrastructures: Lessons from the Wikileaks;Abdul Ghani Azmi;Proceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic,2012
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Modelling the ethical priorities influencing decision-making in cybersecurity contexts;Organizational Cybersecurity Journal: Practice, Process and People;2023-05-24
2. Study of the Need for Effective Cyber Security Trainings in India;Data Management, Analytics and Innovation;2023
3. Ethical Approaches to Cybersecurity;The Oxford Handbook of Digital Ethics;2022-03-18
4. Ethical Considerations in Maritime Cybersecurity Research;TransNav, the International Journal on Marine Navigation and Safety of Sea Transportation;2022
5. Cybersecurity of Critical Infrastructure;The International Library of Ethics, Law and Technology;2020