Zacytuj

Aiello, C. (2018, March 30). Under Armour says data breach affected about 150 million MyFitnessPal accounts. Retrieved September 27, 2018, from https://www.cnbc.com/2018/03/29/under-armour-stock-falls-after-company-admits-data-breach.htmlSearch in Google Scholar

Abagail, A. (2015, August). Design and Validation of Information Security Culture Framework. Computers in Human Behavior, 49, pp. 567-575.10.1016/j.chb.2015.03.054Search in Google Scholar

Basu, E. (2015). Forbes Welcome. Forbes.com. Retrieved 28 December 2016, from http://www.forbes.com/sites/ericbasu/2015/10/26/cybersecurity-lessons-learned-from-the-ashley-madison-hack/#4539c09aed99Search in Google Scholar

Chaeikar, S., Jafari, M., Therdoost, H., & Kar, N. (2012). Definitions and Criteria of CIA Security Triangle in Electronic Voting System. International Journal of Advanced Computer Science and Information Technology, 1(1), 14-24. doi:2296-1739Search in Google Scholar

Coty, S. (2014). The eBay breach explained. www.scmagazine.com. Retrieved 28 December 2016, from https://www.scmagazine.com/the-ebay-breach-explained/article/537762/2/Search in Google Scholar

Doell, L. (2012). 10 Essential Cybersecurity Measures. OPEN Forum. Retrieved 28 December 2016, from https://www.americanexpress.com/us/small-business/openforum/articles/10-essential-cybersecurity-measures/Search in Google Scholar

Goud, N. (2018, March 30). Over 150 million users of MyFitnessPal affected by Cyber Attack. Retrieved September 27, 2018, from https://www.cybersecurity-insiders.com/over-150-million-users-of-myfitnesspal-affected-by-cyber-attack/Search in Google Scholar

Gomes, R., & Rebeiro, J. (2009). The Main Benefits of COBIT in a High Public Educational Institution - A Case Study. Pacific Asia Conference on Information Systems, 1-11. Retrieved from http://aisel.aisnet.org/pacis2009/88Search in Google Scholar

Haviluddin, H., Anthony, P., & Alfred, R. (2012). The Utilization of COBIT Framework Within It Governance: A Study of Literature. The 2nd ACIKITA International Conference on Science and Technology (AICST), 1-8. doi:10.13140/2.1.3616.4160Search in Google Scholar

McGee, M. (2018, June 1). Lawsuit Filed in Wake of Under Armour Data Breach. Retrieved September 27, 2018, from https://www.bankinfosecurity.com/lawsuit-filed-in-wake-under-armour-data-breach-a-11051Search in Google Scholar

Omari, L. (2016). It Governance Evaluation: Adapting and Adopting The COBIT Framework for Public Sector Organizations (Ph.D.). The Queensland University of Technology.Search in Google Scholar

Pagliery, J. (2015). The inside story of the biggest hack in history. CNNMoney. Retrieved 28 December 2016, from http://money.cnn.com/2015/08/05/technology/aramco-hack/Search in Google Scholar

PECB. (2018). ISO/IEC 27002:2013 Information Technology - Security Techniques Code of Practice for Information Security Controls.Search in Google Scholar

Rigby, J. (2015). Cybersecurity and Risk Management: Lead from the C-suite. Legacy.alixpartners.com. Retrieved 28 December 2016, from http://legacy.alixpartners.com/en/Publications/AllArticles/tabid/635/articleType/ArticleView/artcleId/1929/Cybersecurity-and-Risk-Management-Lead-from-the-C-suite.aspx#sthash.VyxzTPDI.dpbsSearch in Google Scholar

Schlarman, S. (2007, Feb). Selecting An IT Control Framework. EDPACS, pp. 11-17. Retrieved from http://search.proquest.com.ezproxy.trident.edu:2048/docview/234907576?pqorigsite=summon10.1080/07366980601148030Search in Google Scholar

U.S. Department of Commerce. (2018, November). Cybersecurity. Retrieved from https://www.nist.gov/topics/cybersecuritySearch in Google Scholar

Von Solms, R. (1998). Information security management (1): why information security is so important. Information Management & Computer Security, 6(4), 174-177. doi:10.1108/eum000000000453310.1108/EUM0000000004533Search in Google Scholar

White, S. (2017, December). What is COBIT? A framework for alignment and governance. Retrieved from https://www.cio.com/article/3243684/methodology-frameworks/what-is-cobit-a-framework-for-alignment-and-governance.htmlSearch in Google Scholar

eISSN:
2067-9785
Język:
Angielski
Częstotliwość wydawania:
3 razy w roku
Dziedziny czasopisma:
Business and Economics, Political Economics, other, Business Management, Social Sciences, Sociology