Author:
Stanton Jeffrey M.,Stam Kathryn R.,Mastrangelo Paul,Jolton Jeffrey
Subject
Law,General Computer Science
Reference21 articles.
1. Securing the U.S. defense information infrastructure;Anderson,1999
2. Potential determinants of heavier Internet usage;Armstrong;International Journal of Human–Computer Studies,2000
3. Violation of safeguards by trusted personnel and understanding related information security concerns;Dhillon;Computers and Security,2001
4. Information system security management in the new millennium;Dhillon;Communications of the ACM,2000
5. Global information security survey;Ernst,2002
Cited by
376 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献