메뉴 건너뛰기




Volumn 32, Issue 2, 2015, Pages 108-117

'Cyber Gurus': A rhetorical analysis of the language of cybersecurity specialists and the implications for security policy and critical infrastructure protection

Author keywords

Availability heuristic; Critical infrastructure; Cybersecurity; Management gurus; Rhetoric; Risk perception

Indexed keywords


EID: 84928771409     PISSN: 0740624X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.giq.2015.02.001     Document Type: Article
Times cited : (30)

References (100)
  • 1
    • 77949571258 scopus 로고    scopus 로고
    • Enhancing performance through public sector networks: Mobilizing human capital in communities of practice
    • Agranoff R. Enhancing performance through public sector networks: Mobilizing human capital in communities of practice. Public Performance & Management Review 2008, March 01, 31(3):320-347.
    • (2008) Public Performance & Management Review , vol.31 , Issue.3 , pp. 320-347
    • Agranoff, R.1
  • 2
    • 70350633126 scopus 로고    scopus 로고
    • On the cultural locus of management theory industry: Perspectives from autocommunication
    • Ahonen A., Kallio T. On the cultural locus of management theory industry: Perspectives from autocommunication. Management and Organizational History 2009, January 01, 4(4):427-443.
    • (2009) Management and Organizational History , vol.4 , Issue.4 , pp. 427-443
    • Ahonen, A.1    Kallio, T.2
  • 3
    • 0028604447 scopus 로고
    • A psychological study of the inverse relationship between perceived risk and perceived benefit
    • Alhakami A.S., Slovic P. A psychological study of the inverse relationship between perceived risk and perceived benefit. Risk Analysis 1994, January 01, 14(6):1085-1096.
    • (1994) Risk Analysis , vol.14 , Issue.6 , pp. 1085-1096
    • Alhakami, A.S.1    Slovic, P.2
  • 6
    • 85007030343 scopus 로고    scopus 로고
    • Attorney-General's Department Trusted Information Sharing Network 2003, Government of Australia, (Retrieved from http://www.tisn.gov.au/Pages/default.aspx).
    • (2003) Government of Australia
  • 7
    • 84928770822 scopus 로고    scopus 로고
    • Skating on stilts: Why we aren't stopping tomorrow's terrorism
    • Hoover Institution at Leland Stanford Junior University, Stanford, CA
    • Baker S. Skating on stilts: Why we aren't stopping tomorrow's terrorism. Hoover Institution Press Publication no. 591 2010, Hoover Institution at Leland Stanford Junior University, Stanford, CA.
    • (2010) Hoover Institution Press Publication no. 591
    • Baker, S.1
  • 8
    • 70349671112 scopus 로고    scopus 로고
    • A characterization of trust, and its consequences
    • Barbalet J. A characterization of trust, and its consequences. Theory and Society 2009, January 01, 38(4):367-382.
    • (2009) Theory and Society , vol.38 , Issue.4 , pp. 367-382
    • Barbalet, J.1
  • 9
    • 0346685762 scopus 로고    scopus 로고
    • The invincible character of management consulting rhetoric: How one blends incommensurates while keeping them apart
    • Berglund J., Werr A. The invincible character of management consulting rhetoric: How one blends incommensurates while keeping them apart. Organization 2000, January 01, 7(4):633-655.
    • (2000) Organization , vol.7 , Issue.4 , pp. 633-655
    • Berglund, J.1    Werr, A.2
  • 10
    • 77953568642 scopus 로고    scopus 로고
    • Using ICTs to create a culture of transparency: E-government and social media as openness and anti-corruption tools for societies
    • Bertot J.C., Jaeger P.T., Grimes J.M. Using ICTs to create a culture of transparency: E-government and social media as openness and anti-corruption tools for societies. Government Information Quarterly 2010, July 01, 27(3):264-271.
    • (2010) Government Information Quarterly , vol.27 , Issue.3 , pp. 264-271
    • Bertot, J.C.1    Jaeger, P.T.2    Grimes, J.M.3
  • 11
    • 23844538579 scopus 로고    scopus 로고
    • The availability heuristic: A critical examination
    • Oxford University Press, Oxford, P. Sedlmeier, T. Betsch (Eds.)
    • Betsch T., Pohl D. The availability heuristic: A critical examination. Etc.-Frequency processing and cognition 2002, 109-119. Oxford University Press, Oxford. P. Sedlmeier, T. Betsch (Eds.).
    • (2002) Etc.-Frequency processing and cognition , pp. 109-119
    • Betsch, T.1    Pohl, D.2
  • 13
    • 84928769646 scopus 로고    scopus 로고
    • It's time to take cybersecurity seriously
    • Retrieved from
    • Busseri T. It's time to take cybersecurity seriously. Wired Magazine 2012, March 12, (Retrieved from http://www.wired.com/2012/03/opinion-busseri-cybersecurity/).
    • (2012) Wired Magazine
    • Busseri, T.1
  • 15
    • 77950782070 scopus 로고    scopus 로고
    • Cyber-terror-Looming threat or phantom menace? The framing of the US cyber-threat debate
    • Cavelty M.D. Cyber-terror-Looming threat or phantom menace? The framing of the US cyber-threat debate. Journal of Information Technology & Politics 2007, March 01, 4:1.
    • (2007) Journal of Information Technology & Politics , vol.4 , pp. 1
    • Cavelty, M.D.1
  • 16
    • 84928758639 scopus 로고    scopus 로고
    • Centre for the Protection of National Infrastructure
    • Government of the United Kingdom. Retrieved.
    • Centre for the Protection of National Infrastructure. (2006). CPNI. Government of the United Kingdom. Retrieved. http://www.cpni.gov.uk/.
    • (2006)
  • 17
    • 0011975239 scopus 로고    scopus 로고
    • The management guru as organizational witchdoctor
    • Clark T., Salaman G. The management guru as organizational witchdoctor. Organization 1996, January 01, 3(1):85-107.
    • (1996) Organization , vol.3 , Issue.1 , pp. 85-107
    • Clark, T.1    Salaman, G.2
  • 18
    • 85007036975 scopus 로고    scopus 로고
    • Cyber attacks can spark real wars
    • Clarke R. Cyber attacks can spark real wars. The Wall Street Journal 2012, Retrieved from: http://www.wsj.com/articles/SB10001424052970204883304577219543897943980.
    • (2012) The Wall Street Journal
    • Clarke, R.1
  • 22
    • 85007045092 scopus 로고    scopus 로고
    • Intellectual capital and e-collaboration: The hidden cost of the status quo
    • Conabree D. Intellectual capital and e-collaboration: The hidden cost of the status quo. FMI Journal 2011, 23(1):11-12.
    • (2011) FMI Journal , vol.23 , Issue.1 , pp. 11-12
    • Conabree, D.1
  • 23
    • 85007129959 scopus 로고    scopus 로고
    • Cyber guards or soldiers: Which do we need most?
    • Coughlin C. Cyber guards or soldiers: Which do we need most?. The Daily Telegraph 2010, October14, (Retrieved from: http://www.telegraph.co.uk/comment/columnists/concoughlin/8063120/Cyber-guards-or-soldiers-which-do-we-need-most.html).
    • (2010) The Daily Telegraph
    • Coughlin, C.1
  • 24
    • 20844436170 scopus 로고    scopus 로고
    • Fighting terrorism, making war: Critical insights in the management of information and intelligence
    • Dearstyne B.W. Fighting terrorism, making war: Critical insights in the management of information and intelligence. Government Information Quarterly 2005, January 01, 22(2):170-186.
    • (2005) Government Information Quarterly , vol.22 , Issue.2 , pp. 170-186
    • Dearstyne, B.W.1
  • 26
    • 84928765921 scopus 로고    scopus 로고
    • Edelman Insights
    • Edelman Edelman trust barometer 2013: Annual global study Canadian findings
    • Edelman Edelman trust barometer 2013: Annual global study: Canadian findings 2013, Edelman Insights, (Retrieved from: http://www.slideshare.net/EdelmanInsights/canada-results-2013-edelman-trust-barometer).
    • (2013)
  • 29
    • 0001516010 scopus 로고
    • Recent attribution research in consumer behavior: A review and new directions
    • Folkes V.S. Recent attribution research in consumer behavior: A review and new directions. Journal of Consumer Research 1988, March 01, 14(4):548-565.
    • (1988) Journal of Consumer Research , vol.14 , Issue.4 , pp. 548-565
    • Folkes, V.S.1
  • 32
    • 78650445843 scopus 로고    scopus 로고
    • Cross-cultural differences in risk perceptions of disasters
    • Gierlach E., Belsher B.E., Beutler L.E. Cross-cultural differences in risk perceptions of disasters. Risk Analysis 2010, January 01, 30(10):1539-1549.
    • (2010) Risk Analysis , vol.30 , Issue.10 , pp. 1539-1549
    • Gierlach, E.1    Belsher, B.E.2    Beutler, L.E.3
  • 33
    • 85007144968 scopus 로고    scopus 로고
    • Hire the hackers!
    • Glenny M. Hire the hackers!. TED Talks 2011, July, (Retrieved from http://www.ted.com/talks/misha_glenny_hire_the_hackers.html).
    • (2011) TED Talks
    • Glenny, M.1
  • 34
    • 85007045081 scopus 로고    scopus 로고
    • Canada's weakling Web defenses
    • Glenny M. Canada's weakling Web defenses. The Globe and Mail 2011, May 18, (Retrieved from http://www.theglobeandmail.com/globe-debate/canadas-weakling-web-defences/article580145/).
    • (2011) The Globe and Mail
    • Glenny, M.1
  • 35
    • 77956175270 scopus 로고    scopus 로고
    • National Security Directive declassification
    • Gordon V. National Security Directive declassification. Government Information Quarterly 2010, October 01, 27(4):322-328.
    • (2010) Government Information Quarterly , vol.27 , Issue.4 , pp. 322-328
    • Gordon, V.1
  • 36
    • 71649085630 scopus 로고    scopus 로고
    • Digital disaster, cyber security, and the Copenhagen school
    • Hansen L., Nissenbaum H. Digital disaster, cyber security, and the Copenhagen school. International Studies Quarterly 2009, December 01, 53(4):1155-1175.
    • (2009) International Studies Quarterly , vol.53 , Issue.4 , pp. 1155-1175
    • Hansen, L.1    Nissenbaum, H.2
  • 37
    • 34547499412 scopus 로고    scopus 로고
    • Polity Press, Cambridge
    • Hardin R. Trust 2006, Polity Press, Cambridge.
    • (2006) Trust
    • Hardin, R.1
  • 38
    • 85044814578 scopus 로고    scopus 로고
    • The cybersecurity triad: Government, private sector partners, and the engaged cybersecurity citizen
    • Harknett R.J., Stever J.A. The cybersecurity triad: Government, private sector partners, and the engaged cybersecurity citizen. Journal of Homeland Security and Emergency Management 2009, November 30, 6:1.
    • (2009) Journal of Homeland Security and Emergency Management , vol.6 , pp. 1
    • Harknett, R.J.1    Stever, J.A.2
  • 45
    • 84859251157 scopus 로고    scopus 로고
    • Understanding management gurus and historical narratives: The benefits of a historic turn in management and organization studies
    • Keulen S., Kroeze R. Understanding management gurus and historical narratives: The benefits of a historic turn in management and organization studies. Management and Organizational History 2012, May 01, 7(2):171-189.
    • (2012) Management and Organizational History , vol.7 , Issue.2 , pp. 171-189
    • Keulen, S.1    Kroeze, R.2
  • 46
    • 0005584387 scopus 로고    scopus 로고
    • Rhetoric and myth in management fashion
    • Kieser A. Rhetoric and myth in management fashion. Organization 1997, February 01, 4(1):49-74.
    • (1997) Organization , vol.4 , Issue.1 , pp. 49-74
    • Kieser, A.1
  • 47
    • 79952081157 scopus 로고    scopus 로고
    • Accountability in governance networks: An assessment of public, private, and nonprofit emergency management practices following Hurricane Katrina
    • Koliba C.J., Mills R.M., Zia A. Accountability in governance networks: An assessment of public, private, and nonprofit emergency management practices following Hurricane Katrina. Public Administration Review 2011, March 01, 71(2):210-220.
    • (2011) Public Administration Review , vol.71 , Issue.2 , pp. 210-220
    • Koliba, C.J.1    Mills, R.M.2    Zia, A.3
  • 49
    • 85044808163 scopus 로고    scopus 로고
    • Committed to protection? Partnerships in critical infrastructure protection
    • Koski C. Committed to protection? Partnerships in critical infrastructure protection. Journal of Homeland Security and Emergency Management 2011, January 01, 8:1.
    • (2011) Journal of Homeland Security and Emergency Management , vol.8 , pp. 1
    • Koski, C.1
  • 50
    • 23144435923 scopus 로고    scopus 로고
    • Trust and distrust in organizations: emerging perspectives, enduring questions
    • Kramer R.M. Trust and distrust in organizations: emerging perspectives, enduring questions. Annual Review of Psychology 1999, January 01, 50:569-598.
    • (1999) Annual Review of Psychology , vol.50 , pp. 569-598
    • Kramer, R.M.1
  • 51
    • 78649783634 scopus 로고    scopus 로고
    • Communicating risks: Examining hazard and outrage in multiple contexts
    • Lachlan K., Spence P.R. Communicating risks: Examining hazard and outrage in multiple contexts. Risk Analysis 2010, January 01, 30(12):1872-1886.
    • (2010) Risk Analysis , vol.30 , Issue.12 , pp. 1872-1886
    • Lachlan, K.1    Spence, P.R.2
  • 53
    • 0035373510 scopus 로고    scopus 로고
    • Developing fully functional E-government: A four stage model
    • Layne K., Lee J. Developing fully functional E-government: A four stage model. Government Information Quarterly 2001, April 01, 18(2):122-136.
    • (2001) Government Information Quarterly , vol.18 , Issue.2 , pp. 122-136
    • Layne, K.1    Lee, J.2
  • 54
    • 18544361959 scopus 로고    scopus 로고
    • Cyber terror: Missing in action
    • Lewis J. Cyber terror: Missing in action. Knowledge, Technology, and, Policy 2003, June 01, 16(2):34-41.
    • (2003) Knowledge, Technology, and, Policy , vol.16 , Issue.2 , pp. 34-41
    • Lewis, J.1
  • 55
    • 85007047413 scopus 로고    scopus 로고
    • The threat is real and must be stopped
    • Lieberman J. The threat is real and must be stopped. The New York Times 2012, October 17, (Retrieved from: http://www.nytimes.com/roomfordebate/2012/10/17/should-industry-face-more-cybersecurity-mandates/the-cyber-threat-is-real-and-must-be-stopped-by-business-and-government).
    • (2012) The New York Times
    • Lieberman, J.1
  • 56
    • 84860869335 scopus 로고    scopus 로고
    • How to make decisions in an uncertain world: Heuristics, biases, and risk perception
    • Maldonato M., Dell'Orco S. How to make decisions in an uncertain world: Heuristics, biases, and risk perception. World Futures 2011, November 01, 67(8):569-577.
    • (2011) World Futures , vol.67 , Issue.8 , pp. 569-577
    • Maldonato, M.1    Dell'Orco, S.2
  • 57
    • 85007045137 scopus 로고    scopus 로고
    • Cybersecurity requires a multi-layered approach
    • Mather L. Cybersecurity requires a multi-layered approach. Info Security Magazine 2011, April 21., (Retrieved from: http://www.infosecurity-magazine.com/opinions/comment-cybersecurity-requires-a-multi-layered/).
    • (2011) Info Security Magazine
    • Mather, L.1
  • 59
    • 0003705137 scopus 로고
    • Harvard University Press, Cambridge, MA
    • Moore M. Creating public value 1995, Harvard University Press, Cambridge, MA.
    • (1995) Creating public value
    • Moore, M.1
  • 61
    • 0038269850 scopus 로고    scopus 로고
    • The Balanced Scorecard: What is the score? A rhetorical analysis of the Balanced Scorecard
    • Nørreklit H. The Balanced Scorecard: What is the score? A rhetorical analysis of the Balanced Scorecard. Accounting, Organizations and Society 2003, August 01, 28(6):591-619.
    • (2003) Accounting, Organizations and Society , vol.28 , Issue.6 , pp. 591-619
    • Nørreklit, H.1
  • 64
    • 84873732807 scopus 로고    scopus 로고
    • How do people judge risks: Availability heuristic, affect heuristic, or both?
    • Pachur T., Hertwig R., Steinmann F. How do people judge risks: Availability heuristic, affect heuristic, or both?. Journal of Experimental Psychology: Applied 2012, September 01, 18(3):314-330.
    • (2012) Journal of Experimental Psychology: Applied , vol.18 , Issue.3 , pp. 314-330
    • Pachur, T.1    Hertwig, R.2    Steinmann, F.3
  • 65
    • 77953614890 scopus 로고    scopus 로고
    • Identifying the security risks associated with governmental use of cloud computing
    • Paquette S., Jaeger P.T., Wilson S.C. Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly 2010, July 01, 27(3):245-253.
    • (2010) Government Information Quarterly , vol.27 , Issue.3 , pp. 245-253
    • Paquette, S.1    Jaeger, P.T.2    Wilson, S.C.3
  • 66
    • 48849104169 scopus 로고    scopus 로고
    • Responding to crises and disasters: The role of risk attitudes and risk perceptions
    • Pennings J.M.E., Grossman D.B. Responding to crises and disasters: The role of risk attitudes and risk perceptions. Disasters 2008, September 01, 32(3):434-448.
    • (2008) Disasters , vol.32 , Issue.3 , pp. 434-448
    • Pennings, J.M.E.1    Grossman, D.B.2
  • 67
    • 0001579697 scopus 로고
    • Risk aversion in the small and in the large
    • Pratt J.W. Risk aversion in the small and in the large. Econometrica 1964, January 01, 32:122-136.
    • (1964) Econometrica , vol.32 , pp. 122-136
    • Pratt, J.W.1
  • 68
    • 84928767419 scopus 로고    scopus 로고
    • Her Majesty the Queen in Right of Canada
    • Ottawa, (Retrieved from
    • Public Safety Canada National Strategy for Critical Infrastructure 2009, Her Majesty the Queen in Right of Canada, Ottawa, (Retrieved from http://www.publicsafety.gc.ca/prg/ns/ci/_fl/ntnl-eng.pdf).
    • (2009) National Strategy for Critical Infrastructure
  • 69
    • 85007136794 scopus 로고    scopus 로고
    • Seven questions for Michael Chertoff
    • Quigley K. Seven questions for Michael Chertoff. The CIP Exchange 2009, Spring, 2009:1-2.
    • (2009) The CIP Exchange , vol.2009 , pp. 1-2
    • Quigley, K.1
  • 70
    • 84875593339 scopus 로고    scopus 로고
    • 'Man plans, God laughs': Canada's national strategy for protecting critical infrastructure
    • Quigley K. 'Man plans, God laughs': Canada's national strategy for protecting critical infrastructure. Canadian Public Administration 2013, March 01, 56(1):142-164.
    • (2013) Canadian Public Administration , vol.56 , Issue.1 , pp. 142-164
    • Quigley, K.1
  • 72
    • 84928771559 scopus 로고    scopus 로고
    • Contextual issues that influence the risk regulation regime of the transportation sector
    • School of Public Administration, Dalhousie University, Halifax, NS
    • Quigley K., Mills B. Contextual issues that influence the risk regulation regime of the transportation sector. Kanishka Project Contribution Program - Understanding and Responding to Terrorist Threats to Critical Infrastructure 2014, February 1, School of Public Administration, Dalhousie University, Halifax, NS, (Retrieved from http://cip.management.dal.ca/?page_id=280).
    • (2014) Kanishka Project Contribution Program - Understanding and Responding to Terrorist Threats to Critical Infrastructure
    • Quigley, K.1    Mills, B.2
  • 73
    • 10644238912 scopus 로고    scopus 로고
    • Homeland security and information sharing: Federal policy considerations
    • Relyea H.C. Homeland security and information sharing: Federal policy considerations. Government Information Quarterly 2004, January 01, 21(4):420-438.
    • (2004) Government Information Quarterly , vol.21 , Issue.4 , pp. 420-438
    • Relyea, H.C.1
  • 74
    • 77955549318 scopus 로고    scopus 로고
    • White paper on risk governance: Toward an integrative framework
    • Springer, Dordrecht, O. Renn, K. Walker (Eds.)
    • Renn O. White paper on risk governance: Toward an integrative framework. Global risk governance: Concept and practice using the IRGC framework 2008, Springer, Dordrecht. O. Renn, K. Walker (Eds.).
    • (2008) Global risk governance: Concept and practice using the IRGC framework
    • Renn, O.1
  • 77
    • 79957907533 scopus 로고    scopus 로고
    • From fashion to virus: An alternative theory of organizations' handling of management ideas
    • Røvik K. From fashion to virus: An alternative theory of organizations' handling of management ideas. Organization Studies 2011, January 01, 32(5):631-653.
    • (2011) Organization Studies , vol.32 , Issue.5 , pp. 631-653
    • Røvik, K.1
  • 78
    • 84893471988 scopus 로고    scopus 로고
    • Social Media's Democratic Paradox: Lessons from Canada
    • Roy J. Social Media's Democratic Paradox: Lessons from Canada. European Journal of ePractice 2012, 16:5-15.
    • (2012) European Journal of ePractice , vol.16 , pp. 5-15
    • Roy, J.1
  • 79
    • 85007040719 scopus 로고    scopus 로고
    • All your devices can be hacked
    • Rubin A. All your devices can be hacked. TED Talks 2011, October, (Retrieved on-line from: http://www.ted.com/talks/avi_rubin_all_your_devices_can_be_hacked.html).
    • (2011) TED Talks
    • Rubin, A.1
  • 81
    • 84992999034 scopus 로고    scopus 로고
    • Transformational government: What is the shape of things to come?
    • Sharif A.M. Transformational government: What is the shape of things to come?. Transforming Government: People, Process and Policy 2008, 2(1):71-75.
    • (2008) Transforming Government: People, Process and Policy , vol.2 , Issue.1 , pp. 71-75
    • Sharif, A.M.1
  • 83
    • 0342322905 scopus 로고    scopus 로고
    • Factors in risk perception
    • Sjöberg L. Factors in risk perception. Risk Analysis 2000, January 01, 20(1):1-12.
    • (2000) Risk Analysis , vol.20 , Issue.1 , pp. 1-12
    • Sjöberg, L.1
  • 84
    • 0023324565 scopus 로고
    • Perception of risk
    • Slovic P. Perception of risk. Science 1987, January 01, 236(4799):280-285.
    • (1987) Science , vol.236 , Issue.4799 , pp. 280-285
    • Slovic, P.1
  • 89
    • 0014684374 scopus 로고
    • Social benefit versus technological risk
    • Starr C. Social benefit versus technological risk. Science 1969, January 01, 165(3899):1232-1238.
    • (1969) Science , vol.165 , Issue.3899 , pp. 1232-1238
    • Starr, C.1
  • 90
    • 34247095107 scopus 로고    scopus 로고
    • Cyber terrorism: A clear and present danger, the sum of all fears, breaking point or patriot games?
    • Stohl M. Cyber terrorism: A clear and present danger, the sum of all fears, breaking point or patriot games?. Crime, Law and Social Change 2007, April 10, 46:223-238.
    • (2007) Crime, Law and Social Change , vol.46 , pp. 223-238
    • Stohl, M.1
  • 91
    • 33645096235 scopus 로고    scopus 로고
    • The information gulag: Rethinking openness in times of national danger
    • Strickland L.S. The information gulag: Rethinking openness in times of national danger. Government Information Quarterly 2005, January 01, 22(4):546-572.
    • (2005) Government Information Quarterly , vol.22 , Issue.4 , pp. 546-572
    • Strickland, L.S.1
  • 92
    • 0037786760 scopus 로고    scopus 로고
    • Terrorism and probability neglect
    • Sunstein C.R. Terrorism and probability neglect. Journal of Risk and Uncertainty 2003, January 01, 26(2-3):121-136.
    • (2003) Journal of Risk and Uncertainty , vol.26 , Issue.2-3 , pp. 121-136
    • Sunstein, C.R.1
  • 94
    • 33947492042 scopus 로고    scopus 로고
    • Harvard University Press, Cambridge, MA
    • Sunstein C. Worst case scenarios 2009, Harvard University Press, Cambridge, MA.
    • (2009) Worst case scenarios
    • Sunstein, C.1
  • 95
    • 34247529903 scopus 로고
    • Availability: A heuristic for judging frequency and probability
    • Tversky A., Kahneman D. Availability: A heuristic for judging frequency and probability. Cognitive Psychology 1973, 5(1):207-233.
    • (1973) Cognitive Psychology , vol.5 , Issue.1 , pp. 207-233
    • Tversky, A.1    Kahneman, D.2
  • 98
    • 84885188079 scopus 로고    scopus 로고
    • From information security to cyber security
    • Von Solms R., Van Niekerk J. From information security to cyber security. Computers and Security 2013, May 13, 38:97-102.
    • (2013) Computers and Security , vol.38 , pp. 97-102
    • Von Solms, R.1    Van Niekerk, J.2
  • 100
    • 0000505675 scopus 로고
    • On the failure to eliminate hypotheses in a conceptual task
    • Wason P.C. On the failure to eliminate hypotheses in a conceptual task. Quarterly Journal of Experimental Psychology 1960, July 01, 12(3):129-140.
    • (1960) Quarterly Journal of Experimental Psychology , vol.12 , Issue.3 , pp. 129-140
    • Wason, P.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.