Changes

Jump to navigation Jump to search
1,008 bytes removed ,  11:14, 31 July 2018
Line 12: Line 12:  
*Dorothy Elizabeth Robling Denning
 
*Dorothy Elizabeth Robling Denning
 
==Seminal articles==
 
==Seminal articles==
*Denning, D. E. R. (1999). Information warfare and security (8th ed.). MA, USA: ACM Press Books.
+
*Denning, D. E. (1999). Information warfare and security (8th ed.). MA, USA: ACM Press Books.
 
==Originating area==
 
==Originating area==
 
*Computer science
 
*Computer science
Line 22: Line 22:  
*N/A
 
*N/A
 
==IS articles that use the theory==
 
==IS articles that use the theory==
*Belkhouja, T., Du, X., Mohamed, A., Al-Ali, A. K., & Guizani, M. (2018). Symmetric Encryption Relying on Chaotic Henon System for Secure Hardware-Friendly Wireless Communication of Implantable Medical Systems. Journal of Sensor and Actuator Networks, 7(2), 21.
+
*Brumley, L., Kopp, C., & Korb, K. B. (2012). Cutting Through the Tangled Web: An Information-Theoretic Perspective on Information Warfare. Air Power Australia Analyses, 9(2), 1.
*Caforio, G., & Nuciari, M. (2018). Conclusion: Themes and Issues of the Sociology of the Military. In Handbook of the Sociology of the Military (pp. 615-650). Springer, Cham.
+
*Dollens, J. T. (2002). Computer System Self-Defense Through Object Self/Non-Self Recognition (Doctoral dissertation, Nova Southeastern University).
*Cullen, F. T. (2017). Terrorism and the Internet: Resistance in the Information Age. In Technology and Terrorism (pp. 125-154). Routledge.
+
*Horne, C. A., Ahmad, A., & Maynard, S. B. (2016). A theory on information security. Paper presented at the The 27th Australasian Conference on Information Systems, Wollongong, Australia.
*Lin, T. C., Hsu, J. S. C., Wang, Y. C., & Wu, S. (2018). Examining the antecedents of employee unauthorized computer access. Journal of Statistics and Management Systems, 21(3), 493-517.
+
*Thompson P., Cybenko G., Giani A. (2004) Cognitive Hacking. In: Camp L.J., Lewis S. (eds) Economics of Information Security. Advances in Information Security, vol 12. Springer, Boston, MA.
*Loui, R., & Hope, W. (2017, November). Information Warfare Amplified by Cyberwarfare and Hacking the National Knowledge Infrastructure. In Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence & Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), 2017 IEEE 15th Intl (pp. 280-283). IEEE.
  −
*Onibere, M., Ahmad, A., & Maynard, S. (2017, July). The Chief Information Security Officer and the Five Dimensions of a Strategist. the Pacific Asia Conference on Information Systems, Langkawi, Malaysia.
  −
*Petrenko, S. (2018). The Relevance of the Early Warning of Cyber-attacks. In Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation (pp. 1-60). Springer, Cham.
  −
*Valeriano, B., & Maness, R. C. (2018). Cyber Strategy: The Evolving Character of Power and Coercion. Oxford University Press.
   
==External links==
 
==External links==
 
*https://en.wikipedia.org/wiki/Dorothy_E._Denning
 
*https://en.wikipedia.org/wiki/Dorothy_E._Denning

Navigation menu