共 50 条
- [21] LIABILITY AND THE INCENTIVE TO OBTAIN INFORMATION ABOUT RISK [J]. JOURNAL OF LEGAL STUDIES, 1992, 21 (02): : 259 - 270
- [22] Risk Perception and Acceptance of Information Technology Application Based on Numerical Simulation [J]. 2016 INTERNATIONAL CONFERENCE ON SMART CITY AND SYSTEMS ENGINEERING (ICSCSE), 2016, : 277 - 280
- [23] The Application of OCTAVE in Tobacco Company's Information Security Risk Evaluation [J]. AEIT 2012: 2012 2ND INTERNATIONAL CONFERENCE ON AEROSPACE ENGINEERING AND INFORMATION TECHNOLOGY, VOL 1, 2012, : 132 - 137
- [24] Application of the Analytic Network Process in Risk Assessment for Information Systems Security [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON COOPERATION AND PROMOTION OF INFORMATION RESOURCES IN SCIENCE AND TECHNOLOGY(COINFO 10), 2010, : 285 - 289
- [26] Fuzzy Application With Expert System for Conducting Information Security Risk Analysis [J]. PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 33 - 41
- [27] Analysis of Information Security Risk and Application Security of Cloud Computing from the Aspect of Hierarchical Protection [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 : 1521 - 1526
- [29] Alignment of misuse cases with security risk management [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1397 - +
- [30] Income Security and the Perception of Disability Risk [J]. CONTEMPORARY ECONOMICS, 2021, 15 (04) : 499 - 510