Automotive information security: A threat with an end?

被引:0
|
作者
Burton, S. [1 ]
Ebert, Chr. [1 ]
Amsler, K.-J. [1 ]
Lederer, D. [1 ]
机构
[1] Vector Consulting Services GmbH, Stuttgart
来源
VDI Berichte | 2007年 / 2000期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:497 / 508
相关论文
共 50 条
  • [31] The health information system security threat lifecycle: An informatics theory
    Fernando, Juanita I.
    Dawson, Linda L.
    INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2009, 78 (12) : 815 - 826
  • [32] A Test of Structured Threat Descriptions for Information Security Risk Assessments
    Karlzen, Henrik
    Bengtsson, Johan
    Hallberg, Jonas
    ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 469 - 476
  • [33] Is the Biggest Security Threat to Medical Information Simply a Lack of Understanding?
    Williams, Patricia A. H.
    HEALTH INFORMATICS: THE TRANSFORMATIVE POWER OF INNOVATION, 2011, 168 : 179 - 187
  • [34] Cybercrime as a leading threat to information security in the countries with transitional economy
    Syomych, Mykola
    Markina, Iryna
    Diachkov, Dmytro
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON SOCIAL, ECONOMIC AND ACADEMIC LEADERSHIP (ICSEAL 2018), 2018, 217 : 342 - 350
  • [35] The effects of knowledge mechanisms on employees' information security threat construal
    Mady, Ashraf
    Gupta, Saurabh
    Warkentin, Merrill
    INFORMATION SYSTEMS JOURNAL, 2023, 33 (04) : 790 - 841
  • [36] Information security insider threat visualization: Theft of intellectual property
    Zaytsev, A.S.
    Malyuk, A.A.
    Scientific Visualization, 2015, 7 (03): : 53 - 68
  • [37] "No point worrying" - The role of threat devaluation in information security behavior
    Thompson, Nik
    McGill, Tanya
    Narula, Nidhi
    COMPUTERS & SECURITY, 2024, 143
  • [38] Spies for hire and information peddlers: A new threat to security in Africa?
    Hutton, Lauren
    AFRICAN SECURITY REVIEW, 2008, 17 (04) : 184 - 190
  • [39] Behavioral and policy issues in information systems security: the insider threat
    Warkentin, Merrill
    Willison, Robert
    EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2009, 18 (02) : 101 - 105
  • [40] Confronting Information Security's Elephant, the Unintentional Insider Threat
    Canham, Matthew
    Posey, Clay
    Bockelman, Patricia S.
    AUGMENTED COGNITION. HUMAN COGNITION AND BEHAVIOR, AC 2020, PT II, 2020, 12197 : 316 - 334