共 37 条
[1]
Pearson S., Benameur A., Privacy, security and trust issues arising from cloud computing, 2010 IEEE Second International Conference on Cloud Computing Technology and Science. IEEE, pp. 693-702, (2010)
[2]
van Kleek M., Liccardi I., Binns R., Zhao J., Weitzner D.J., Shadbolt N., Better the devil you know: Exposing the data sharing practices of smart phone apps, Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 5208-5220, (2017)
[3]
Schwerin S., Blockchain and privacy protection in the case of the European general data protection regulation (GDPR): a Delphi study, J Br Blockchain Asso, 1, 1, (2018)
[4]
Pandit H.J., O'Sullivan D., Lewis D., GDPR data interoperability model, 23Rd EURAS Annual Standardisation Conference, (2018)
[5]
Kappelman L., Johnson V., Torres R., Maurer C., McLean E., A study of information systems issues, practices, and leadership in Europe, Eur J Inf Syst, 28, 1, pp. 26-42, (2019)
[6]
Rajendran D.P.D., Rangaraja P.S., An e-ADR (Elaborated action design research) approach towards game-based learning in cybersecurity incident detection and handling, Proceedings of the 53Rd Hawaii International Conference on System Sciences, (2020)
[7]
Khan N.A., Brohi S.N., Zaman N., Ten Deadly Cyber Security Threats Amid COVID-19 Pandemic, (2020)
[8]
Over 1/3 of Professionals are Worried Zoom Compromised Their Information, (2020)
[9]
Hu M., Cambridge Analytica’s black box, Big Data Soc, 7, 2, (2020)
[10]
Senarath A., Arachchilage N.A., Why developers cannot embed privacy into software systems? An empirical investigation, Proceedings of the 22Nd International Conference on Evaluation and Assessment in Software Engineering, pp. 211-216, (2018)