Este módulo es un recurso para los catedráticos 

 

Lecturas principales

 

Las siguientes lecturas son (en su mayoría de código abierto) lecturas requeridas que deben ser completadas antes de tomar una clase basada en este Módulo:

  • Adams, Anne, Martina Angela Sasse, and Peter Lunt. (1997). Making passwords secure and usable. In: People and Computers XII - Proc. of the 7th International Conference on Human-Computer Interaction (HCI'97), Springer.
  • Arora, Ashish, Anand Nandkumar, and Rahul Telang. (2006). Does information security attack frequency increase with vulnerability disclosure? An empirical analysis. Information Systems Frontiers, Vol. 8 (5), 350-362.
  • Beebe, Nicole Lang and V. Srinivasan Rao. (2005). Using Situational Crime Prevention Theory to Explain the Effectiveness of Information Systems Security. Proceedings of the 2005 SoftWars Conference, Las Vegas, NV, Dec 2005.
  • Collins, J. D., Vincenzo A. Sainato, and David N. Khey. (2011). Organizational Data Breaches 2005-2010: Applying SCP to the Healthcare and Education Sectors. International Journal of Cyber Criminology Vol. 5(1), 794-810.
  • Cornish, Derek B., & Clarke, R. V. G. (2003). Opportunities, precipitators, and criminal decisions: A reply to Wortley's critique of situational crime prevention. In: Martha J. Smith and Derek B. Cornish (Guest Eds.). Theory for practice in situational crime. Willan.
  • Dali, Alex and Christopher Lajtha. (2012). ISO 31000 Risk Management - "The Gold Standard." EDPACS, Vol. 45(5), 1-8.
  • Eloff, M. M. and J. H. P. Eloff. (2002). Human Computer Interaction: An Information Security Perspectives. In: M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi and Heba K. Aslan. Security in the Information Society: Visions and perspectives. Springer.
  • ENISA. (2017). Hardware Threat Landscape and Good Practice Guide , Version 1.
  • Luko, Stephen N. (2013). Risk Management Terminology. Quality Engineering, Vol. 25 (3), 292-297.
  • NIST. (2018). Framework for Improving Critical Infrastructure Cybersecurity . National Institute of Standards and Technology.
  • UNODC. (2010). Handbook on the crime prevention guidelines: Making them work .
 
Siguiente: Lecturas avanzadas
Volver al inicio