共 64 条
- [1] Agrawal Vivek, 2017, 2017 IEEE 4th International Conference on Cyber-Security and Cloud Computing (CSCloud), P264, DOI 10.1109/CSCloud.2017.13
- [3] ALDhanhani MJ., 2021, TURKISH J COMPUTER M, V12, P714
- [4] Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance [J]. APPLIED SCIENCES-BASEL, 2021, 11 (08):
- [5] Amiruddin A., 2021, P 3 INT C INF MULT C
- [6] [Anonymous], 2011, Managing Information Security Risk
- [7] Azmi Riza, 2018, Journal of Cyber Policy, V3, P258, DOI 10.1080/23738871.2018.1520271
- [8] Scheduling Under Uncertainty for Industry 4.0 and 5.0 [J]. IEEE ACCESS, 2022, 10 : 74977 - 75017
- [9] Bawono M.W.A., 2021, ACMIT P, V7, P31, DOI [10.33555/acmit.v7i1.105, DOI 10.33555/ACMIT.V7I1.105]
- [10] Burritt R., 2016, Asian J. Sustain. Social Respon., V1, P23, DOI [10.1186/s41180-016-0007-y, DOI 10.1186/S41180-016-0007-Y]