INFORMAZIONI SU QUESTO ARTICOLO

Cita

Axelrod, C.W., Bayuk, J.L., Schutzer D. (eds.), 2009. Enterprise Information, Security and Privacy, Artech House, Norwood.Search in Google Scholar

Brandis K. et. al., 2016, A process framework for information security management “International Jurnal of Information Systems and Project Management”, Vol 4, No 4.Search in Google Scholar

Deneen C. C., Ng E. M., Shroff R. H., 2011. Analysis of the technology acceptance model in examining students’ behavioural intention to use an eportfolio system “Australasian Jurnal of Educational Technology”, No 27(4).10.14742/ajet.940Search in Google Scholar

Durodolu, O., 2016. Technology Acceptance Model as a predictor of using information system’ to acquire information literacy skills “Library Philosophy and Practice”, November.Search in Google Scholar

Tallinn. Castelfranchi C., Falcone R., Marzo F., 2010. Trust and relational capital “Computational and Mathematical Organization Theory”, Vol 17, Issue 2, 2016.10.1007/s10588-011-9086-6Search in Google Scholar

Tutton J., 2010. Incident response and compliance: A case study of the recent attacks, Information, Security Technical Report 15.10.1016/j.istr.2011.02.001Search in Google Scholar

Żywiołek J., 2018. Monitoring of Information Security System Elements in the Metallurgical Enterprises, MATEC Web of Conferences, https://www.matec-conferences.org/articles/matecconf/pdf/2018/42/matecconf_qpi2018_01007.pdf.10.1051/matecconf/201818301007Search in Google Scholar

Syreyshchikova N. V., Pimenov D. Yu., Mikołajczyk T., Moldovan L., 2019. Information Safety Process Development According to ISO 27001 for an Industrial Enterprise, Procedia Manufacturing 32.10.1016/j.promfg.2019.02.215Search in Google Scholar