-
2
-
-
84901508798
-
After Snowden: Rethinking the impact of surveillance
-
Bauman Z., Bigo D., Esteves P., Guild E., Jabri V., Lyon D., Walker R.B.J. After Snowden: Rethinking the impact of surveillance. International Political Sociology 2014, 8(2):121-144.
-
(2014)
International Political Sociology
, vol.8
, Issue.2
, pp. 121-144
-
-
Bauman, Z.1
Bigo, D.2
Esteves, P.3
Guild, E.4
Jabri, V.5
Lyon, D.6
Walker, R.B.J.7
-
3
-
-
84973396895
-
-
Accessed June 30, 2011
-
Bloomberg Business Human errors fuel hacking as test shows nothing stops idiocy Accessed June 30, 2011. http://www.bloomberg.com/news/articles/2011-06-27/human-errors-fuel-hacking-as-test-shows-nothing-prevents-idiocy.
-
Human errors fuel hacking as test shows nothing stops idiocy
-
-
-
5
-
-
84973380224
-
-
Accessed April 1, 2013
-
Common Vulnerabilities and Exposures, MITRE Heartbleed Accessed April 1, 2013. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160.
-
Heartbleed
-
-
-
6
-
-
84973380229
-
Net losses: Estimating the global cost of cybercrime
-
Intel Security McAfee, Santa Clara, CA
-
CSIS and McAfee Net losses: Estimating the global cost of cybercrime. Washington, DC: Center for strategic and international studies 2014, Intel Security McAfee, Santa Clara, CA.
-
(2014)
Washington, DC: Center for strategic and international studies
-
-
-
7
-
-
84973361311
-
-
Deloitte LLP Services, London, (Accessed April 1, 2015
-
Deloitte Tech Trends 2012: Elevate IT for digital business; a federal perspective 2012, Deloitte LLP Services, London, (Accessed April 1, 2015. http://www2.deloitte.com/content/dam/Deloitte/us/Documents/technology/us-cons-tech-trends-2012.pdf).
-
(2012)
Tech Trends 2012: Elevate IT for digital business; a federal perspective
-
-
-
8
-
-
84880517828
-
Social software and national security: and Initial net assessment
-
National Defense University, Washington, DC
-
Drapeau M., Wells L. Social software and national security: and Initial net assessment. Center for technology and national security policy 2009, National Defense University, Washington, DC.
-
(2009)
Center for technology and national security policy
-
-
Drapeau, M.1
Wells, L.2
-
9
-
-
3042592753
-
Guarding the castle keep: Teaching with the fortress metaphor
-
Frincke D.A., Bishop M. Guarding the castle keep: Teaching with the fortress metaphor. IEEE Security and Privacy 2004, 2(3):69-72.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.3
, pp. 69-72
-
-
Frincke, D.A.1
Bishop, M.2
-
14
-
-
77952425731
-
Millenials and the world of work: An organization and management perspective
-
Hershatter A., Epstein M. Millenials and the world of work: An organization and management perspective. Journal of Business and Psychology 2010, 25(2):211-223.
-
(2010)
Journal of Business and Psychology
, vol.25
, Issue.2
, pp. 211-223
-
-
Hershatter, A.1
Epstein, M.2
-
17
-
-
78650555127
-
Believing the blogs of war? How blog users compare on credibility and characteristics in 2003 and 2007
-
Johnson T.J., Kaye B.K. Believing the blogs of war? How blog users compare on credibility and characteristics in 2003 and 2007. Media, War & Conflict 2010, 3(3):315-333.
-
(2010)
Media, War & Conflict
, vol.3
, Issue.3
, pp. 315-333
-
-
Johnson, T.J.1
Kaye, B.K.2
-
18
-
-
70549087455
-
Metaphors for cyber security
-
Sandia National Laboratories, Albuquerque, NM
-
Karas T.H., Moore J.H., Parrott L.K. Metaphors for cyber security. SANDIA report SAND2008-5381 2008, Sandia National Laboratories, Albuquerque, NM.
-
(2008)
SANDIA report SAND2008-5381
-
-
Karas, T.H.1
Moore, J.H.2
Parrott, L.K.3
-
19
-
-
77957058996
-
The communication of meaning and the structuration of exceptions: Giddens' 'structuration theory' and Luhmann's 'self-organization'
-
Leydesdorff L. The communication of meaning and the structuration of exceptions: Giddens' 'structuration theory' and Luhmann's 'self-organization'. Journal of the American Society for Information Science and Technology 2010, 61(10):2138-2150.
-
(2010)
Journal of the American Society for Information Science and Technology
, vol.61
, Issue.10
, pp. 2138-2150
-
-
Leydesdorff, L.1
-
22
-
-
77952427281
-
Millennials in the workplace: A communication perspective on Millennials' organizational relationships and performance
-
Myers K.K., Sadaghiani K. Millennials in the workplace: A communication perspective on Millennials' organizational relationships and performance. Journal of Business and Psychology 2010, 25(2):225-238.
-
(2010)
Journal of Business and Psychology
, vol.25
, Issue.2
, pp. 225-238
-
-
Myers, K.K.1
Sadaghiani, K.2
-
26
-
-
77953581037
-
-
Available at
-
Pew Research Center The future of the internet Available at. http://pewinternet.org.
-
The future of the internet
-
-
-
27
-
-
84859899433
-
Cyber-security and risk management in an interoperable world: An examination of governmental action in North America
-
Quigley K., Roy J. Cyber-security and risk management in an interoperable world: An examination of governmental action in North America. Social Science Computer Review 2012, 30(1):83-94.
-
(2012)
Social Science Computer Review
, vol.30
, Issue.1
, pp. 83-94
-
-
Quigley, K.1
Roy, J.2
-
28
-
-
0030086382
-
Role-based access control models
-
Sandhu R.S., Coyne E.J., Feinstein H.L., Youman C.E. Role-based access control models. IEEE Computer 1996, 29(2):38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
29
-
-
80052042216
-
-
Census, 2008, Minister of Industry, Ottawa, Catalogue no. 97-562-X
-
Statistics Canada Canada's Ethnocultural Mosaic 2006, Census, 2008, Minister of Industry, Ottawa, Catalogue no. 97-562-X.
-
(2006)
Canada's Ethnocultural Mosaic
-
-
-
34
-
-
84880297907
-
-
Routledge, Abingdon
-
Zedner L. Security 2009, Routledge, Abingdon.
-
(2009)
Security
-
-
Zedner, L.1
|