–DOX 发表于 2025-3-23 12:41:49

http://reply.papertrans.cn/43/4290/428968/428968_11.png

过份艳丽 发表于 2025-3-23 17:42:12

Towards a Risk Assessment Matrix for Information Security Workaroundstion security workarounds and an accompanying Information Security Workaround Risk Index. Using the tools proposed in this paper, information security officers can respond appropriately to information security workarounds and, where necessary, make modifications to their information security policie

cruise 发表于 2025-3-23 21:46:30

A Conceptual Information Security Culture Framework for Higher Learning Institutions

疲惫的老马 发表于 2025-3-23 23:18:31

http://reply.papertrans.cn/43/4290/428968/428968_14.png

VOK 发表于 2025-3-24 02:34:15

http://reply.papertrans.cn/43/4290/428968/428968_15.png

HEPA-filter 发表于 2025-3-24 07:57:15

http://reply.papertrans.cn/43/4290/428968/428968_16.png

prolate 发表于 2025-3-24 12:54:40

Dirk P. Snyman,Gunther R. Drevin,Hennie A. Kruger,Lynette Drevin,Johann Allers

愤怒历史 发表于 2025-3-24 17:28:37

http://reply.papertrans.cn/43/4290/428968/428968_18.png

Fluctuate 发表于 2025-3-24 19:34:24

http://reply.papertrans.cn/43/4290/428968/428968_19.png

争吵加 发表于 2025-3-25 01:36:10

Exploring Experiences of Using SETA in Nordic Municipalitiesurity incidents. Security Education, Training, and Awareness (SETA) is described by practitioners and researchers as the most important tool for improving cybersecurity behavior and has been for several decades. Further, there are several ways to work with SETA found in academic literature and a lot
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Human Aspects of Information Security and Assurance; 15th IFIP WG 11.12 I Steven Furnell,Nathan Clarke Conference proceedings 2021 IFIP Int