Zacytuj

Al-Kahla, W., Shatnawi, A.S. and Taqieddin, E., 2021, May. A Taxonomy of Web Security Vulnerabilities. In2021 12th International Conference on Information and Communication Systems (ICICS) (pp. 424-429). IEEE. Search in Google Scholar

Becker, R., Thorogood, A., Ordish, J. and Beauvais, M.J., 2020. COVID-19 research: navigating the European general data protection regulation. Journal of Medical Internet Research, 22(8), p.e19799. Search in Google Scholar

Do, E.H. and Gadepally, V.N., 2020, May. Classifying anomalies for network security. In ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 2907-2911). IEEE. Search in Google Scholar

Enoch, S.Y., Hong, J.B., Ge, M. and Kim, D.S., 2020. Composite metrics for network security analysis. arXiv preprint arXiv:2007.03486. Search in Google Scholar

Eurostat, 2022, ICT security in enterprises, https://ec.europa.eu/eurostat/statistics-explained/index.php?title=ICT_security_in_enterprises&oldid=583136, accessed on 1 February 2024 Search in Google Scholar

Fabbrini, F. and Celeste, E., 2020. The right to be forgotten in the digital age: the challenges of data protection beyond borders. German law journal, 21(S1), pp.55-65. Search in Google Scholar

Grassi, P.A., Fenton, J.L., Newton, E.M., Perlner, R.A., Regenscheid, A.R., Burr, W.E., Richer, J.P., Lefkovitz, N.B., Danker, J.M., Choong, Y.Y. and Greene, K., 2020. Digital identity guidelines: Authentication and lifecycle management [includes updates as of 03-02-2020]. Search in Google Scholar

Hulshof, M. and Daneva, M., 2021, July. Benefits and Challenges in Information Security Certification–A Systematic Literature Review. In International Symposium on Business Modeling and Software Design (pp. 154-169). Springer, Cham. Search in Google Scholar

Marabathuni, V. M., & Gopejenko, V. (2021). Mobile Security: Analysis and Challenges of information. In The 19th International Scientific Conference Riga. Search in Google Scholar

Palanisamy, R., Norman, A.A. and Mat Kiah, M.L., 2020. BYOD policy compliance: Risks and strategies in organizations. Journal of Computer Information Systems, pp.1-12. Search in Google Scholar

eISSN:
2558-9652
Język:
Angielski