Accès libre

Safety at the Workplace – Selected Issues of Personal Data Safety

À propos de cet article

Citez

Algarni, A.M., Malaiya, Y.K., 2016. A Consolidated Approach for Estimation of Data Security Breach Costs. Proceedings of 2016 2nd International Conference on Information Management (ICIM2016), IEEE. Search in Google Scholar

Ando, R., Shima, S., Takemura, T., 2016. Analysis of Privacy and Security Affecting the Intention of Use in Personal Data Collection in an IoT Environment. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, Volume E 99D, Issue 8, 1974-1981. DOI: 10.1587/transinf.2015INI0002 Search in Google Scholar

Bishop, M., 2003. What is computer security? IEEE Security and Privacy, Volume 1, Issue 1, 67-69. DOI: 10.1109/MSECP.2003.1176998 Search in Google Scholar

Bishop, M., Frincke, D.A., 2005. Teaching secure programming. IEEE Security and Privacy, Volume 3, Issue 5, 54-56. Search in Google Scholar

da Veiga, A., Martins, N., 2015. Improving the information security culture through monitoring and implementation actions illustrated through a case study. Computers & Security 49, 162-176. DOI: 10.1016/j.cose.2014.12.006 Search in Google Scholar

Denning, D.A., 1982. Cryptograpy and data security, Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 3-4. Search in Google Scholar

Jowit, T., IT Security Spending To Reach £50bn, But Human Error Is Still Main Cause Of Data Loss. http://www.silicon.co.uk Search in Google Scholar

Liu, Y., 2015. Privacy Protection Method in the Era of Cloud Computing and Big Data. International Conference on Engineering Technology and Application (ICETA 2015), MATEC Web of Conferences, Volume 22, 1-4. DOI: 10.1051/matecconf/20152201041 Search in Google Scholar

Misa, T.J., Computer Security Discourse at RAND, SDC, and NSA (1958-1970). IEEE Annals of the History of Computing, Volume 38, Issue 4, 12-25. DOI: 10.1109/MAHC.2016.48 Search in Google Scholar

Rocha, F. W., Antonsen, E., Ekstedt, M., 2014. Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture. Computers&Security, Vol. 43, 90-110. DOI: 10.1016/j.cose.2014.03.004 Search in Google Scholar

https://www.gemalto.com/press/Pages/First-Half-2017-Breach-Level-Index-Report-Identity-Theft-and-Poor-Internal-Security-Practices-Take-a-Toll.aspx Search in Google Scholar

https://www.cybercom.com/pl/Poland/security/security-blog-pl/ile-kosztuje-wyciek-danych--10-znanych-przypadkow Search in Google Scholar

https://www.breachlevelindex.com/assets/Breach-Level-Index-Report-2017-Gemalto.pdf Search in Google Scholar