共 50 条
- [21] AUDIT AND INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION [J]. SBORNIK Z MEZINARODNI VEDECKE KONFERENCE ZNALOSTI PRO TRZNI PRAXI 2012: VYZNAM ZNALOSTI V AKTUALNI FAZI EKONOMICKEHO CYKLU, 2012, : 49 - 52
- [22] The New Aspects for the Instantaneous Information Security Audit [J]. PROCEEDINGS OF THE 2016 IEEE CONFERENCE ON QUALITY MANAGEMENT, TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&MQ&IS), 2016,
- [23] The Simple Information Security Audit Process: SISAP [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (06): : 189 - 198
- [24] A model of Anshin about the information security [J]. PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 305 - 314
- [25] Hash Functions and Information Theoretic Security [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (12): : 3401 - 3403
- [26] Deriving the Relationship between Organizational Culture and Information Security Culture [J]. VISION 2020: INNOVATION, DEVELOPMENT SUSTAINABILITY, AND ECONOMIC GROWTH, VOLS 1-3, 2013, : 926 - 932
- [27] A Review on Information, Information Security and Security Processes [J]. JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2006, 9 (03): : 165 - 174
- [29] USER PERCEPTIONS OF INFORMATION SECURITY: A MULTINATIONAL PERSPECTIVE [J]. ICERI2016: 9TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION, 2016, : 4257 - 4257
- [30] The effect of disfluency on consumer perceptions of information security [J]. Marketing Letters, 2016, 27 : 525 - 535