Publisher
Springer Science and Business Media LLC
Subject
Law,Strategy and Management,Safety Research
Reference64 articles.
1. Adekanye, Michael O., and Shawon S. M. Rahman. 2019. The Effect of Information Technology Using Enterprise Security Risk Management. International Journal of Network Security & Its Applications 10 (5): 13–23.
2. Achtaich, A., R. Mazo, N. Souissi, C. Salinesi, and O. Roudies. 2019. Management Capabilities for Mobile and IoT Devices: An Evaluation Framework. International Journal of Engineering and Advanced Technology 8 (6): 420–430. https://doi.org/10.35940/ijeat.E7822.088619.
3. Aleem, Azeem, Alison Wakefield, and Mark Button. 2013. Addressing the Weakest Link: Implementing Converged Security. Security Journal 26 (3): 236–248. https://doi.org/10.1057/sj.2013.14.
4. Allen, B., and R. Loyear. 2017. Enterprise Security Risk Management: Concepts and Applications, 4. Brooksfield: Rothstein Publishing.
5. Allen, B., T. Kelly, R. Loyear, A. Poole, A. Awojulu, A. Kmetetz, M. Rakotomavo, Z. Wang, H. Xu, M. Xu, and H. Yuan. 2018. Security Risk Governance: A Critical Component to Managing Security Risk. The Journal of Applied Business and Economics 20 (1): 132–146.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献