Understanding security compliant behavior: A case study
AJ Stephens - 2017 - search.proquest.com
Ensuring the integrity and management of information security is among the most critical
responsibilities within academic organizations. The protection of information grows in …
responsibilities within academic organizations. The protection of information grows in …
The Dark Side of Social Networking Sites: Understanding Phishing Risks within the Industrial Supply Industry
S Dohle - 2018 - search.proquest.com
Facebook and LinkedIn, with over 620 million social groupings have become a popular
place for business, employees and individuals to create private groups, exchange …
place for business, employees and individuals to create private groups, exchange …
[PDF][PDF] EVALUATION OF SECURITY IN SOFTWARE ARCHITECTURE USING COMBINATION OF ATAM AND STRIDE
PD IBNUGRAHA, S RIDI FERDIANA… - Journal of Theoretical and …, 2015 - jatit.org
In this time, security is important thing that must be included when develop software because
it has large effect on continuity of software and business. Therefore, security evaluation is …
it has large effect on continuity of software and business. Therefore, security evaluation is …