Остання редакція: 2018-10-31
Ключові файли
Посилання
References
1. Rezgui, Yacine, and Adam Marks. (2010). "Information security awareness in higher education: An exploratory study." Computers & Security 27.7 (2008): pp. 241–253.
2. Sultan, Nabil. "Cloud computing for education: A new dawn?." International Journal of Information Management 30.2, pp. 109–116.
3. Schneider, Fred B. (2013). "Cybersecurity education in universities." IEEE Security & Privacy 11.4, pp. 3–4.
4. Conklin, Art. "Cyber defense competitions and information security education: An active learning solution for a capstone course." The System Sciences, 2006. HICSS'06. Proceedings of the 39th Annual Hawaii International Conference on. Vol. 9. IEEE, 2006.
5. Schuett, Maria, and M. Rahman. (2011). "Information Security Synthesis in Online Universities." The arXiv preprint arXiv:1111.1771.
6. Gordon, L. A., Loeb, M. P., Zhou, L. (2016). Investing in Cybersecurity: Insights from The Gordon-Loeb Model, Journal of Information Security, 7(02), the PP. 49. DOI: 10.4236/jis.2016.72004.
7. Goztepe, K. (2012). Designing Fuzzy Rule Based Expert System for Cyber Security, International Journal of Information Security Science, 1(1), pp. 13–19.
8. Akhmetov, B., Lakhno, V., Boiko, Y., Mishchenko, A. (2017). Designing a decision support system for the weakly formalized problems in the provision of cybersecurity, Eastern-European Journal of Enterprise Technologies, 1(2(85)), pp. 4–15.
9. Lakhno, V., Boiko, Y., Mishchenko, A., Kozlovskii, V., Pupchenko, O. (2017). Development of the intelligent decision-making support system to manage cyber protection at the object of informatization, Eastern-European Journal of Enterprise Technologies, 2/9 (86), pp. 53–61.
10. Mariusz, N., Benton, M. (2017). Cybersecurity Cost of Quality: Managing the Costs of Cybersecurity Risk Management [El. resource] Available at: https://arxiv.org/ftp/arxiv/papers/1707/1707.02653.pdf
11. Lakhno V., Malyukov V., Gerasymchuk N. et al. (2017). Development of the decision making support system to control a procedure of financial investment, Eastern-European Journal of Enterprise Technologies. Vol. 6, No. 3. pp. 24–41.
12. Akhmetov B. et al. (2017). Designing a decision support system for the weakly formalized problems in the provision of cybersecurity. Eastern-European Journal of Eenterprise Technologies. No. 1 (2). pp. 4–15.
13. Jalali, M., Siegel, M., Madnick, S. (2017). Decision Making and biases in Cybersecurity Capability Development: Evidence from a Simulation Game Experiment [Electronic resource] Available at: https://arxiv.org/ftp/arxiv/papers/1707/1707.01031.pdf.
14. Radziwill, N., Benton, M. (2017). Cybersecurity Cost of Quality: Managing the Costs of Cybersecurity Risk Management [Electronic resource] Available at: https://arxiv.org/ftp/arxiv/papers/1707/1707.02653.pdf
15. Gordon, L. A., Loeb, M. P., Lucyshyn, W., & Zhou, L. (2015). The impact of information sharing on cybersecurity underinvestment: a real options perspective. Journal of Accounting and Public Policy, 34(5), 509-519.
16. Fielder, A., Konig, S., Panaousis, E., Schauer, S., & Rass, S. (2017). Uncertainty in Cyber Security Investments. arXiv preprint arXiv:1712.05893.
17. Cavusoglu H., Mishra B., Raghunathan S. A model for evaluating IT security investments, Communications of the ACM, 2004, Vol. 47, No. 7, 87–92.
18. Fielder A., Panaousis E., Malacaria P. et al. Decision support approaches for cyber security investment, Decision Support Systems, 2016, Vol. 86, 13–23.
19. Isaacs, R. (1999). Differential games: a mathematical theory with applications to warfare and pursuit, control and optimization. Courier Corporation.
20. Berik Akhmetov, Valeriy Lakhno, Bakhytzhan Akhmetov, Yuri Myakuhin, Asselkhan Adranova, Lazat Kydyralina. Models and algorithms of vector optimization in selecting security measures for higher education institution's information learning environment // Lecture Notes in Artificial Intelligence, Springer, 2018, september, Prague. (In the press)