Line 12: |
Line 12: |
| *Dorothy Elizabeth Robling Denning | | *Dorothy Elizabeth Robling Denning |
| ==Seminal articles== | | ==Seminal articles== |
− | *Denning, D. E. R. (1999). Information warfare and security (8th ed.). MA, USA: ACM Press Books. | + | *Denning, D. E. (1999). Information warfare and security (8th ed.). MA, USA: ACM Press Books. |
| ==Originating area== | | ==Originating area== |
| *Computer science | | *Computer science |
Line 18: |
Line 18: |
| *Organisation | | *Organisation |
| ==Links to WWW sites describing theory== | | ==Links to WWW sites describing theory== |
− | * | + | *N/A |
| ==Links from this theory to other theories== | | ==Links from this theory to other theories== |
− | * | + | *N/A |
| ==IS articles that use the theory== | | ==IS articles that use the theory== |
− | * | + | *Brumley, L., Kopp, C., & Korb, K. B. (2012). Cutting Through the Tangled Web: An Information-Theoretic Perspective on Information Warfare. Air Power Australia Analyses, 9(2), 1. |
| + | *Dollens, J. T. (2002). Computer System Self-Defense Through Object Self/Non-Self Recognition (Doctoral dissertation, Nova Southeastern University). |
| + | *Horne, C. A., Ahmad, A., & Maynard, S. B. (2016). A theory on information security. Paper presented at the The 27th Australasian Conference on Information Systems, Wollongong, Australia. |
| + | *Thompson P., Cybenko G., Giani A. (2004) Cognitive Hacking. In: Camp L.J., Lewis S. (eds) Economics of Information Security. Advances in Information Security, vol 12. Springer, Boston, MA. |
| ==External links== | | ==External links== |
| *https://en.wikipedia.org/wiki/Dorothy_E._Denning | | *https://en.wikipedia.org/wiki/Dorothy_E._Denning |