共 64 条
[1]
Agrawal Vivek, 2017, 2017 IEEE 4th International Conference on Cyber-Security and Cloud Computing (CSCloud), P264, DOI 10.1109/CSCloud.2017.13
[3]
ALDhanhani M. J., 2021, Turkish Journal of Computer and Mathematics Education, V12, P714
[4]
Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance
[J].
APPLIED SCIENCES-BASEL,
2021, 11 (08)
[5]
Amiruddin A., 2021, P 3 INT C INF MULT C
[6]
[Anonymous], 2011, Managing Information Security Risk
[7]
[Anonymous], 2012, Guide for Conducting Risk Assessments
[8]
Azmi Riza, 2018, Journal of Cyber Policy, V3, P258, DOI [10.1080/23738871.2018.1520271, 10.1080/23738871.2018.1520271]
[10]
Bawono MWA, 2021, ACMIT Proceedings, V7, P31, DOI [10.33555/acmit.v7i1.105, 10.33555/acmit.v7i1.105, DOI 10.33555/ACMIT.V7I1.105]