Changes

Jump to navigation Jump to search
707 bytes added ,  11:14, 31 July 2018
Line 12: Line 12:  
*Dorothy Elizabeth Robling Denning
 
*Dorothy Elizabeth Robling Denning
 
==Seminal articles==
 
==Seminal articles==
*Denning, D. E. R. (1999). Information warfare and security (8th ed.). MA, USA: ACM Press Books.
+
*Denning, D. E. (1999). Information warfare and security (8th ed.). MA, USA: ACM Press Books.
 
==Originating area==
 
==Originating area==
 
*Computer science
 
*Computer science
Line 18: Line 18:  
*Organisation
 
*Organisation
 
==Links to WWW sites describing theory==
 
==Links to WWW sites describing theory==
*
+
*N/A
 
==Links from this theory to other theories==
 
==Links from this theory to other theories==
*
+
*N/A
 
==IS articles that use the theory==
 
==IS articles that use the theory==
*
+
*Brumley, L., Kopp, C., & Korb, K. B. (2012). Cutting Through the Tangled Web: An Information-Theoretic Perspective on Information Warfare. Air Power Australia Analyses, 9(2), 1.
 +
*Dollens, J. T. (2002). Computer System Self-Defense Through Object Self/Non-Self Recognition (Doctoral dissertation, Nova Southeastern University).
 +
*Horne, C. A., Ahmad, A., & Maynard, S. B. (2016). A theory on information security. Paper presented at the The 27th Australasian Conference on Information Systems, Wollongong, Australia.
 +
*Thompson P., Cybenko G., Giani A. (2004) Cognitive Hacking. In: Camp L.J., Lewis S. (eds) Economics of Information Security. Advances in Information Security, vol 12. Springer, Boston, MA.
 
==External links==
 
==External links==
 
*https://en.wikipedia.org/wiki/Dorothy_E._Denning
 
*https://en.wikipedia.org/wiki/Dorothy_E._Denning

Navigation menu