Subject
Law,General Computer Science
Reference95 articles.
1. Security events and vulnerability data for cybersecurity risk estimation;Allodi;Risk Anal.,2017
2. Australian Government. 2016. Australia's cyber security strategy. https://cybersecuritystrategy.homeaffairs.gov.au/sites/all/themes/cybersecurity/img/PMC-Cyber-Strategy.pdf (Accessed 05/01/2019).
3. Cybersecurity for Hospitals and Healthcare Facilities: a Guide to Detection and Prevention;Ayala,2016
4. The affect heuristic and the attractiveness of simple gambles;Bateman;J. Behav. Deci. Mak.,2007
5. Are risk or benefit perceptions more important for public acceptance of innovative food technologies: A meta-analysis;Bearth;Trends in Food Science & Technology,2016
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献