–DOX 发表于 2025-3-23 12:41:49
http://reply.papertrans.cn/43/4290/428968/428968_11.png过份艳丽 发表于 2025-3-23 17:42:12
Towards a Risk Assessment Matrix for Information Security Workaroundstion security workarounds and an accompanying Information Security Workaround Risk Index. Using the tools proposed in this paper, information security officers can respond appropriately to information security workarounds and, where necessary, make modifications to their information security policiecruise 发表于 2025-3-23 21:46:30
A Conceptual Information Security Culture Framework for Higher Learning Institutions疲惫的老马 发表于 2025-3-23 23:18:31
http://reply.papertrans.cn/43/4290/428968/428968_14.pngVOK 发表于 2025-3-24 02:34:15
http://reply.papertrans.cn/43/4290/428968/428968_15.pngHEPA-filter 发表于 2025-3-24 07:57:15
http://reply.papertrans.cn/43/4290/428968/428968_16.pngprolate 发表于 2025-3-24 12:54:40
Dirk P. Snyman,Gunther R. Drevin,Hennie A. Kruger,Lynette Drevin,Johann Allers愤怒历史 发表于 2025-3-24 17:28:37
http://reply.papertrans.cn/43/4290/428968/428968_18.pngFluctuate 发表于 2025-3-24 19:34:24
http://reply.papertrans.cn/43/4290/428968/428968_19.png争吵加 发表于 2025-3-25 01:36:10
Exploring Experiences of Using SETA in Nordic Municipalitiesurity incidents. Security Education, Training, and Awareness (SETA) is described by practitioners and researchers as the most important tool for improving cybersecurity behavior and has been for several decades. Further, there are several ways to work with SETA found in academic literature and a lot