Fight security breaches

被引:0
|
作者
Coombes, P
机构
来源
ELECTRONICS WORLD | 2005年 / 111卷 / 1829期
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
引用
收藏
页码:47 / 47
页数:1
相关论文
共 50 条
  • [21] Disclosure of security breaches becomes Californian law
    不详
    COMPUTERS & SECURITY, 2003, 22 (01) : 5 - 5
  • [22] Law requires that Californians be notified of security breaches
    不详
    COMPUTERS & SECURITY, 2003, 22 (03) : 185 - 185
  • [23] Earnings Management in Firms with Data Security Breaches
    Xu, Howard
    Guo, Savannah
    Haislip, Jacob Z.
    Pinsker, Robert E.
    JOURNAL OF INFORMATION SYSTEMS, 2019, 33 (03) : 267 - 284
  • [24] RECENT CYBER SECURITY BREACHES AND PREVENTIVE MEASURES
    Rao, N. Thirupathi
    Bhattacharyya, Debnath
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2019, 13 (04): : 117 - 126
  • [25] Modelling and analysing cognitive causes of security breaches
    Rimvydas Rukšėnas
    Paul Curzon
    Ann Blandford
    Innovations in Systems and Software Engineering, 2008, 4 (2) : 143 - 160
  • [26] Market Price Effects of Data Security Breaches
    Morse, Edward A.
    Raval, Vasant
    Wingender, John R., Jr.
    INFORMATION SECURITY JOURNAL, 2011, 20 (06): : 263 - 273
  • [27] Avoid security breaches with the right tools and practices
    Mannion, Patrick, 1600, Hearst Business Communications (60):
  • [28] Security Breaches in the Healthcare Domain: A Spatiotemporal Analysis
    Al Kinoon, Mohammed
    Omar, Marwan
    Mohaisen, Manar
    Mohaisen, David
    COMPUTATIONAL DATA AND SOCIAL NETWORKS, CSONET 2021, 2021, 13116 : 171 - 183
  • [29] Understanding the full cost of cyber security breaches
    Furnell S.
    Heyburn H.
    Whitehead A.
    Shah J.N.
    Computer Fraud and Security, 2020, 2020 (12): : 6 - 12
  • [30] Users' perceptions about mobile security breaches
    Stiakakis, Emmanouil
    Georgiadis, Christos K.
    Andronoudi, Anna
    INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2016, 14 (04) : 857 - 882