-
1
-
-
84899102995
-
Cyber-physical security challenges in manufacturing systems
-
L. Wells, J. Camelio, C. Williams, J. White, "Cyber-physical security challenges in manufacturing systems", Manufacturing Letters, 2(2), 74-77.
-
Manufacturing Letters
, vol.2
, Issue.2
, pp. 74-77
-
-
Wells, L.1
Camelio, J.2
Williams, C.3
White, J.4
-
2
-
-
70349619163
-
Industrial wireless sensor networks: Challenges, design principles, technical approaches
-
Oct.
-
V. C. Gungor, C. P. Hancke, "Industrial Wireless Sensor Networks: Challenges, Design Principles, Technical Approaches, " IEEE Trans . Ind. Electron., vol. 56, no. 10, pp.4258-4265, Oct. 2009
-
(2009)
IEEE Trans . Ind. Electron.
, vol.56
, Issue.10
, pp. 4258-4265
-
-
Gungor, V.C.1
Hancke, C.P.2
-
3
-
-
84934877750
-
Finnish cyber security strategy, implementation
-
Springer International Publishing
-
A. Sillanpiiii, H. Roivainen, M. Lehto. "Finnish Cyber Security Strategy, Implementation, " in Cyber Security: Analytics, Technology, Automation. Springer International Publishing, 2015, pp. 129-144.
-
(2015)
Cyber Security: Analytics, Technology, Automation
, pp. 129-144
-
-
Sillanpiiii, A.1
Roivainen, H.2
Lehto, M.3
-
5
-
-
85010945188
-
-
Cyberthreat Defense Report, North America Europe [Online] Available
-
Cyberthreat Defense Report, North America, Europe. (2015) CyberEdge Group. [Online]. Available: http://www.cyberedge. com/2015-cdr
-
(2015)
Cyber Edge Group
-
-
-
6
-
-
84904093397
-
-
Center for Strategic, International Studies, Washington DC [Online]. Available
-
J. Lewis and S. Baker. (2013). The economic impact of cybercrime, cyber espionage. Center for Strategic, International Studies, Washington, DC, 103-117. [Online]. Available: http://csis.orglfiles/publicationl60396rptcybercrime-cost0713jh40.pdf
-
(2013)
The Economic Impact of Cybercrime, Cyber Espionage
, pp. 103-117
-
-
Lewis, J.1
Baker, S.2
-
8
-
-
85010982675
-
-
Tivi Jan 22 [Online] Avaiiabie:
-
Tivi. (2016, Jan 22). Sonera paljasti verkkovikansa sy'yn. [Online]. A v ai I ab Ie: http://www.tivi. fi/rss/sonera-palj asti-verkkov ikansa-syyn-6247311
-
(2016)
Sonera Paljasti Verkkovikansa sy'Yn
-
-
-
13
-
-
85011003287
-
-
National Defense Industrial Association May 5 A White Paper prepared by National Defense Industrial Association's Manufacturing Division, Cyber Division. [Online]. Available
-
National Defense Industrial Association. (2014, May 5). Cybersecurity for Advanced Manufacturing. A White Paper prepared by National Defense Industrial Association's Manufacturing Division, Cyber Division. [Online]. Available: http://www.ndia. orgiPolicy/LegislativeandFederallssuesUpdate/Docume nts/Cyber for Manufacturing-White Paper 5 May 14. pdf
-
(2014)
Cybersecurity for Advanced Manufacturing
-
-
-
14
-
-
85010941053
-
Cyber-attacks on ERP systems. An analysis of the current threat landscape
-
M. Nunez. (2012). "Cyber-attacks on ERP systems. An analysis of the current threat landscape", in Datenschutz und Datensicherheit, Vol. 36(9) pp 653-656.
-
(2012)
Datenschutz und Datensicherheit
, vol.36
, Issue.9
, pp. 653-656
-
-
Nunez, M.1
-
16
-
-
84952912469
-
-
Bundesamt fOr Sicherheit in der Informationstechnik (BSI) [Online]. Available
-
Bundesamt fOr Sicherheit in der Informationstechnik (BSI). (2014). Die Lage der IT-Sicherheit in Deutschland 2014. [Online]. Available: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSIIPublikationen ILageberichte/Lagebericht20 14. pdf?-blob=publicationF ile
-
(2014)
Die Lage der IT-Sicherheit in Deutschland 2014
-
-
-
19
-
-
34147104834
-
Enterprise size matters: Objectives, constraints of ERP adoption
-
S. Laukkanen, S. Sarpola, P. Hallikainen. Enterprise size matters: objectives, constraints of ERP adoption. Journal of Enterprise Information Management, Vol. 20 (3), 319-334.
-
Journal of Enterprise Information Management
, vol.20
, Issue.3
, pp. 319-334
-
-
Laukkanen, S.1
Sarpola, S.2
Hallikainen, P.3
-
20
-
-
26044434660
-
Achievement assessment for enterprise resource planning (ERP) system implementations based on critical success factors (CSFs)
-
18 November
-
A. Y.T. Sun, A. Yazdani, J. D. Overend. Achievement assessment for enterprise resource planning (ERP) system implementations based on critical success factors (CSFs). International Journal of Production Economics, Volume 98, Issue 2, 18 November 2005, Pages 189-203.
-
(2005)
International Journal of Production Economics
, vol.98
, Issue.2
, pp. 189-203
-
-
Sun, A.Y.T.1
Yazdani, A.2
Overend, J.D.3
-
21
-
-
85010945216
-
-
Dec. 17 [Online]. Available
-
A. Deitze. (2013, Dec. 17) The Challengeso Cintroducing ERP in SMEs. [Online]. Available: http://www.rolandberger.com/medialnewsI20 13-12-17-rbsc-newsChallenges-oCintroducing-ERP in SMEs.html
-
(2013)
The Challengeso Cintroducing ERP in SMEs
-
-
Deitze, A.1
-
23
-
-
84857359642
-
Unrealistic optimism on information security management
-
H. S. Rhee, Y. U. Ryu, C. T. Kim. "Unrealistic optimism on information security management, " in Computers & Security, 2012, vol. 31.2, pp. 221-232.
-
(2012)
Computers & Security
, vol.31
, Issue.2
, pp. 221-232
-
-
Rhee, H.S.1
Ryu, Y.U.2
Kim, C.T.3
-
25
-
-
84925656546
-
Improving the information security culture through monitoring, implementation actions illustrated through a case study
-
A. Da Veiga, N. Martins. "Improving the information security culture through monitoring, implementation actions illustrated through a case study, " in Computers & Security, 201S, vol. 49, 162-176.
-
(2015)
Computers & Security
, vol.49
, pp. 162-176
-
-
Da Veiga, A.1
Martins, N.2
-
30
-
-
84945326308
-
-
Kesko [Online] Available
-
Kesko. "Information security policy". [Online]. Available: http://www. kesko.fi/en/company/policies-and-principles/information-securitypolicyl
-
Information Security Policy
-
-
-
31
-
-
84945326308
-
-
Harvard University [Online] Available
-
Harvard University, "Information Security Policy". [Online]. Available: http://policy.security.harvard.edul
-
Information Security Policy
-
-
-
32
-
-
85010958134
-
-
ISO 27000 Standards
-
ISO 27000 Standards, 2013.
-
(2013)
-
-
|