Funder
University of Newcastle Australia
Subject
Law,General Computer Science
Reference88 articles.
1. Acar, Y., Backes, M., Fahl, S., Kim, D., Mazurek, M.L., & Stransky, C. (2016). You get where you're looking for: the impact of information sources on code security. In IEEE Symposium on Security and Privacy (pp. 289–305). San Jose, CA.
2. Auction fever! How time pressure and social competition affect bidders’ arousal and bids in retail auctions;Adam;Journal of Retailing,2015
3. Information security strategies: towards an organizational multi-strategy perspective;Ahmad;J Intell Manuf,2014
4. Amoroso, E. (2018). Orange Book Compliance: cyber security safeguards. Retrieved July 25, 2019, from https://www.coursera.org/lecture/cyber-attack-countermeasures/orange-book-compliance.-Obu1F.
5. Anttila, J., & Kajava, J. (2009). Haste in knowledge-intensive work: a major threat to information security management in business environments. In International Conference on Availability, Reliability and Security (pp. 732–737). Fukuoka, JP.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献