Author:
Oshri Ilan,Kotlarsky Julia,Hirsch Corey
Subject
Law,General Computer Science
Reference11 articles.
1. The myth of secure computing;Austin;Harvard Business Review,2003
2. Farahmand F, Navathe SB, et al., Managing vulnerabilities of information systems to security incidents. The 5th international conference on electronic commerce ICEC03 Pittsburgh, PA, USA; 2003.
3. Computer infectors: prevention, detection, and recovery;Joseph;Information and Management,1992
4. Security threats to Internet: a Korean multi-industry investigation;Jung;Information and Management,2001
5. Why there aren't more information security research studies;Kotulic;Information and Management,2004