1. R.M. Redlich, M.A. Nemzow, Digital information infrastructure and method for security designated data and with granular data stores: US, US9734169 [P] (2017)
2. Z. Han, S. Huang, H. Li, et al., Risk assessment of digital library information security: A case study [J]. Electron. Libr. 34(3), 471–487 (2016)
3. Zhou C, Guo Y, Huang W, et al. Information security defense method of electric power control system based on digital watermark[C]// International Conference on Materials Engineering, Manufacturing Technology and Control. 2016
4. E. Chisanga, E.K. Ngassam, Towards a conceptual framework for information security digital divide[C]// Ist-Africa week conference. IEEE, 1–8 (2017)
5. T. Caulfield, C. Ioannidis, D. Pym, Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper). In International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg (2016), pp. 271-279