Keywords: نقض امنیت; Data breaches; Security breaches; Cyber security; Data protection; Network and information security; Cloud computing; Data security breaches;
مقالات ISI نقض امنیت (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: نقض امنیت; Snowden's revelations; Security breaches; Stock return; Security breach announcements; Event study; Privacy disclosure;
Keywords: نقض امنیت; Information security; Security breaches; Stock market; Literature review; Event study;
The relation between information security events and firm market value, empirical evidence on recent disclosures: An extension of the GLZ study
Keywords: نقض امنیت; Security breaches; Stock return; Security breach announcements; Event study
Estimating the market impact of security breach announcements on firm values
Keywords: نقض امنیت; Security breaches; Event-study methodology; Risk analysis; Information assurance; Market valuation; Information security
The information security policy unpacked: A critical study of the content of university policies
Keywords: نقض امنیت; Information security policies; Security breaches; Policy content; Higher education sector
Information security: The moving target
Keywords: نقض امنیت; Information security; Information security topics; Information security trends; Security breaches; Security journals
Information sharing among firms and cyber attacks
Keywords: نقض امنیت; Cyber war; Conflict; Contest success function; Security investment; Information sharing; Security breaches; Interdependence; Social planner; Social welfare; Budget control
Aligning the information security policy with the strategic information systems plan
Keywords: نقض امنیت; Strategic information systems planning; Information security policy; Security breaches; Alignment; Information security management; Information security policy components
Income, interdependence, and substitution effects affecting incentives for security investment
Keywords: نقض امنیت; Cyber war; Conflict; Contest success function; Security technology investment; Security breaches; Income; Interdependence; Substitution
A modeling and simulation methodology for analyzing ATM network vulnerabilities
Keywords: نقض امنیت; ATM network; Vulnerabilities; Security breaches; Threat scenarios; Catastrophic failures;