共 21 条
[1]
[Anonymous], 2018, GUARD
[2]
Baskerville R, 2004, MIS QUART, V28, P329
[3]
Baskerville R. L., 1999, COMMUNICATIONS AIS, V2, P19, DOI DOI 10.17705/1CAIS.00219
[4]
Broadbent M., 1996, Proceedings of the Seventeenth International Conference on Information Systems, P174
[5]
Bulgurcu B, 2010, MIS QUART, V34, P523
[6]
Carroll JM, 2005, LECT NOTES COMPUT SC, V3081, P43
[7]
Cassetto O., 2019, 8 ELEMENTS INFORM SE
[9]
HAN J, 2017, COMPUT SECUR, V66, P52, DOI DOI 10.1016/J.COSE.2016.12.016
[10]
Understanding Data Breach: A Visualization Aspect
[J].
WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2018),
2018, 10874
:883-892