Have a personal or library account? Click to login
Safety at the Workplace – Selected Issues of Personal Data Safety Cover

Safety at the Workplace – Selected Issues of Personal Data Safety

Open Access
|Mar 2019

References

  1. Algarni, A.M., Malaiya, Y.K., 2016. A Consolidated Approach for Estimation of Data Security Breach Costs. Proceedings of 2016 2nd International Conference on Information Management (ICIM2016), IEEE.
  2. Ando, R., Shima, S., Takemura, T., 2016. Analysis of Privacy and Security Affecting the Intention of Use in Personal Data Collection in an IoT Environment. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, Volume E 99D, Issue 8, 1974-1981. DOI: 10.1587/transinf.2015INI0002
  3. Bishop, M., 2003. What is computer security? IEEE Security and Privacy, Volume 1, Issue 1, 67-69. DOI: 10.1109/MSECP.2003.1176998
  4. Bishop, M., Frincke, D.A., 2005. Teaching secure programming. IEEE Security and Privacy, Volume 3, Issue 5, 54-56.
  5. da Veiga, A., Martins, N., 2015. Improving the information security culture through monitoring and implementation actions illustrated through a case study. Computers & Security 49, 162-176. DOI: 10.1016/j.cose.2014.12.006
  6. Denning, D.A., 1982. Cryptograpy and data security, Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 3-4.
  7. Jowit, T., IT Security Spending To Reach £50bn, But Human Error Is Still Main Cause Of Data Loss. http://www.silicon.co.uk
  8. Liu, Y., 2015. Privacy Protection Method in the Era of Cloud Computing and Big Data. International Conference on Engineering Technology and Application (ICETA 2015), MATEC Web of Conferences, Volume 22, 1-4. DOI: 10.1051/matecconf/20152201041
  9. Misa, T.J., Computer Security Discourse at RAND, SDC, and NSA (1958-1970). IEEE Annals of the History of Computing, Volume 38, Issue 4, 12-25. DOI: 10.1109/MAHC.2016.48
  10. Rocha, F. W., Antonsen, E., Ekstedt, M., 2014. Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture. Computers&Security, Vol. 43, 90-110. DOI: 10.1016/j.cose.2014.03.004
  11. https://www.gemalto.com/press/Pages/First-Half-2017-Breach-Level-Index-Report-Identity-Theft-and-Poor-Internal-Security-Practices-Take-a-Toll.aspx
  12. https://www.cybercom.com/pl/Poland/security/security-blog-pl/ile-kosztuje-wyciek-danych--10-znanych-przypadkow
  13. https://www.breachlevelindex.com/assets/Breach-Level-Index-Report-2017-Gemalto.pdf
Language: English
Page range: 226 - 233
Submitted on: Nov 18, 2018
|
Accepted on: Dec 29, 2018
|
Published on: Mar 28, 2019
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2019 Grzegorz Chmielarz, published by Quality and Production Managers Association
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.