共 50 条
[41]
Automating Information Security Policy Compliance Checking
[J].
PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT),
2018,
[43]
A Generic Framework for Information Security Policy Development
[J].
2017 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI),
2017,
:320-325
[44]
DEVELOPMENT OF INFORMATION SECURITY POLICY FOR SMART EDUCATION
[J].
12TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE (INTED),
2018,
:8276-8280
[48]
An Information Security Policy Development Life Cycle
[J].
PROCEEDINGS OF THE SOUTH AFRICAN INFORMATION SECURITY MULTI-CONFERENCE,
2010,
:165-176
[49]
Behavioral Approach to Information Security Policy Compliance
[J].
AMCIS 2017 PROCEEDINGS,
2017,
[50]
Evaluation of the Adoption of an Information Systems Security Policy
[J].
2015 10TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI),
2015,