Publisher
Springer Science and Business Media LLC
Subject
Law,Strategy and Management,Safety Research
Reference17 articles.
1. Bottom, N.R., and R.R. Gallati. 1984. Industrial espionage: Intelligence techniques and countermeasures. Oxford: Butterworth.
2. Cabinet Office/Detica. 2011. The cost of cyber crime. Retrieved from
https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/60942/THE-COST-OF-CYBER-CRIME-SUMMARY-FINAL.pdf
. Accessed 19 Aug 2019.
3. Cornwall, H. 1991. The industrial espionage handbook, 95–98. London: Century.
4. Gheyas, I.A., and A.E. Abdallah. 2016. Detection and prediction of insider threats to cyber security: A systematic literature review and meta-analysis. Big Data Analytics 1(1): 6.
5. Goel, S., K. Williams, and E. Dincelli. 2017. Got phished? Internet security and human vulnerability. Journal of the Association for Information Systems 18(1): 22.
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献