共 120 条
- [91] Raiu C, 2012, COMPUT FRAUD SECUR, P5, DOI 10.1016/S1361-3723(12)70051-9
- [92] Richardson R, 2015, INF SECUR, V17, P26
- [93] Riley M., 2017, BLOOMBERG BUSINESSWE
- [94] Ring T, 2013, COMPUT FRAUD SECUR, P5
- [95] Safrie W, 2004, NY TIMES
- [96] SBIC. Security for Business Innovation Council, 2011, 0711 SBIC CISO RPT
- [97] Scott J., 2015, Strategic Studies Quarterly, V9, P60
- [98] Scully Tim, 2011, J Bus Contin Emer Plan, V5, P195
- [99] Shedden Piya, 2011, VINE, V41, P152, DOI 10.1108/03055721111134790
- [100] Asset Identification in Information Security Risk Assessment: A Business Practice Approach [J]. COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2016, 39 : 297 - 320