共 30 条
[1]
Abazi B., 2019, NOVEL APPROACH RISK
[2]
[Anonymous], 2013, Global Journal of Flexible Systems Management, DOI [DOI 10.1007/S40171-013-0047-4, 10.1007/s40171-013-0047-4]
[3]
Becker J., 2010, Maturity Models in IS Research, ECIS 2010, Proceedings
[4]
Burgeois D. T., 2014, INFORM SYSTEMS BUSIN
[5]
Businge J., 2010, EVOL IWPSE 10, P63, DOI [10.1145/1862372.1862389, DOI 10.1145/1862372.1862389]
[6]
De Groot J., 2019, The History of Data Breaches
[7]
Diver S., 2007, Information Security Policy - A Development Guide for Large and Small Companies
[8]
Dzazali Suhazimah, 2012, Journal of Systems and Information Technology, V14, P23, DOI 10.1108/13287261211221128
[10]
An Information Security Maturity Evaluation Mode
[J].
INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING 2011,
2011, 24
:335-339