共 50 条
- [43] A security policy model for clinical information systems [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 30 - 43
- [44] Security Policy Integration Method for Information Systems [J]. 2009 FIRST ASIAN CONFERENCE ON INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2009, : 220 - 225
- [45] THE POLICY INFORMATION AS A DETERMINANT OF SECURITY IN THE SUPPLY CHAIN [J]. CARPATHIAN LOGISTICS CONGRESS (CLC' 2016), 2017, : 77 - 81
- [46] Design of a LDAP schema based on network security policy information model for storing security policy [J]. SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 373 - 377
- [47] The Impact of Challenge Information Security Stress on Information Security Policy Compliance: The Mediating Roles of Emotions [J]. PSYCHOLOGY RESEARCH AND BEHAVIOR MANAGEMENT, 2022, 15 : 1177 - 1191
- [48] Reducing fraud in organizations through information security policy compliance: An information security controls perspective [J]. Computers and Security, 2024, 144
- [49] Limitations of the Information Security Management System Assessment Approaches in the Context of Information Security Policy Assessment [J]. WMSCI 2010: 14TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV (POST-CONFERENCE EDITION), 2010, : 148 - 150
- [50] The Contribution of Military Members in Creating a Transparent Security Policy: the Case of Poland [J]. ROMANIAN JOURNAL OF POLITICAL SCIENCE, 2016, 16 (01): : 163 - 190