has been cited by the following article(s):
[1]
|
Cybersecurity Enterprises Policies: A Comparative Study
Sensors,
2022
DOI:10.3390/s22020538
|
|
|
[2]
|
Information Security Risk Management Model for Big Data
Advances in Multimedia,
2022
DOI:10.1155/2022/3383251
|
|
|
[3]
|
Attributes impacting cybersecurity policy development: An evidence from seven nations
Computers & Security,
2022
DOI:10.1016/j.cose.2022.102820
|
|
|