共 60 条
[2]
Akpan I.J., 2022, Journal of Small Business & Entrepreneurship, V34, P123, DOI [10.1080/08276331.2020.1820185, DOI 10.1080/08276331.2020.1820185]
[3]
Al-Qirim N.A., 2003, Journal of Information Technology Cases and Applications, V5, P32
[4]
Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of Recent Evidence
[J].
2020 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA 2020),
2020,
[6]
Antunes M, 2021, J CYBERSECUR PRIV, V1, P219, DOI 10.3390/jcp1020012
[8]
Attaran M., 2019, Journal of Small Business and Entrepreneurship, V31, P495, DOI [10.1080/08276331.2018.1466850, DOI 10.1080/08276331.2018.1466850]
[9]
Bada A., 2019, arXiv
[10]
Bada M., 2019, Information & Computer Security