–DOX
发表于 2025-3-23 12:41:49
http://reply.papertrans.cn/43/4290/428968/428968_11.png
过份艳丽
发表于 2025-3-23 17:42:12
Towards a Risk Assessment Matrix for Information Security Workaroundstion security workarounds and an accompanying Information Security Workaround Risk Index. Using the tools proposed in this paper, information security officers can respond appropriately to information security workarounds and, where necessary, make modifications to their information security policie
cruise
发表于 2025-3-23 21:46:30
A Conceptual Information Security Culture Framework for Higher Learning Institutions
疲惫的老马
发表于 2025-3-23 23:18:31
http://reply.papertrans.cn/43/4290/428968/428968_14.png
VOK
发表于 2025-3-24 02:34:15
http://reply.papertrans.cn/43/4290/428968/428968_15.png
HEPA-filter
发表于 2025-3-24 07:57:15
http://reply.papertrans.cn/43/4290/428968/428968_16.png
prolate
发表于 2025-3-24 12:54:40
Dirk P. Snyman,Gunther R. Drevin,Hennie A. Kruger,Lynette Drevin,Johann Allers
愤怒历史
发表于 2025-3-24 17:28:37
http://reply.papertrans.cn/43/4290/428968/428968_18.png
Fluctuate
发表于 2025-3-24 19:34:24
http://reply.papertrans.cn/43/4290/428968/428968_19.png
争吵加
发表于 2025-3-25 01:36:10
Exploring Experiences of Using SETA in Nordic Municipalitiesurity incidents. Security Education, Training, and Awareness (SETA) is described by practitioners and researchers as the most important tool for improving cybersecurity behavior and has been for several decades. Further, there are several ways to work with SETA found in academic literature and a lot