共 50 条
- [32] Obstacles to optimal policy implementation in developing countries THIRD WORLD PLANNING REVIEW, 1996, 18 (01): : 79 - 106
- [33] Design and implementation of a campus computer ethics policy INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY, 1995, 5 (04): : 31 - &
- [34] Use of honeynets in computer security education Fourth Annual ACIS International Conference on Computer and Information Science, Proceedings, 2005, : 320 - 325
- [35] Identifying Gaps in IT Retail Information Security Policy Implementation Processes Towards developing a secure IT enterprise built on trust 2015 SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CYBER FORENSICS (INFOSEC), 2015, : 126 - 133
- [37] Organizational Security Policy and Management during Covid-19 SOUTHEASTCON 2021, 2021, : 528 - 531
- [40] Enemies within: Redefining the insider threat in organizational security policy Security Journal, 2013, 26 : 107 - 124