CINXE.COM

Information security - Wikipedia

<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Information security - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy", "wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"27981dd3-8ff7-4460-a6b3-98371d82bfc9","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Information_security","wgTitle":"Information security","wgCurRevisionId":1259072286,"wgRevisionId":1259072286,"wgArticleId":15036,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["CS1 maint: DOI inactive as of November 2024","Webarchive template wayback links","Wikipedia articles needing page number citations from January 2023","Articles with short description","Short description is different from Wikidata","Use mdy dates from November 2023","Articles to be merged from November 2024","All articles to be merged","All articles with unsourced statements","Articles with unsourced statements from June 2021", "Articles with unsourced statements from November 2023","Commons category link from Wikidata","Data security","Security","Crime prevention","National security","Cryptography","Information governance"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"Information_security","wgRelevantArticleId":15036,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":200000,"wgRelatedArticlesCompat":[],"wgCentralAuthMobileDomain": false,"wgEditSubmitButtonLabelPublish":true,"wgULSPosition":"interlanguage","wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true,"wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q189900","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false};RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles":"ready","ext.wikimediamessages.styles":"ready","ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready", "wikibase.client.init":"ready","ext.wikimediaBadges":"ready"};RLPAGEMODULES=["ext.cite.ux-enhancements","mediawiki.page.media","ext.scribunto.logs","site","mediawiki.page.ready","jquery.makeCollapsible","mediawiki.toc","skins.vector.js","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.growthExperiments.SuggestedEditSession","wikibase.sidebar.tracking"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=ext.cite.styles%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediaBadges%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&amp;only=styles&amp;skin=vector-2022"> <script async="" src="/w/load.php?lang=en&amp;modules=startup&amp;only=scripts&amp;raw=1&amp;skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=site.styles&amp;only=styles&amp;skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.4"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="Information security - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/Information_security"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Information_security&amp;action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Information_security"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&amp;feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="//login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Information_security rootpage-Information_security skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page&#039;s font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&amp;utm_medium=sidebar&amp;utm_campaign=C13_en.wikipedia.org&amp;uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&amp;returnto=Information+security" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&amp;returnto=Information+security" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&amp;utm_medium=sidebar&amp;utm_campaign=C13_en.wikipedia.org&amp;uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&amp;returnto=Information+security" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&amp;returnto=Information+security" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-Standards" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Standards"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>Standards</span> </div> </a> <ul id="toc-Standards-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Threats" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Threats"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Threats</span> </div> </a> <ul id="toc-Threats-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-History" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#History"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>History</span> </div> </a> <ul id="toc-History-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Security_Goals" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Security_Goals"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>Security Goals</span> </div> </a> <button aria-controls="toc-Security_Goals-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Security Goals subsection</span> </button> <ul id="toc-Security_Goals-sublist" class="vector-toc-list"> <li id="toc-CIA_triad" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#CIA_triad"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1</span> <span>CIA triad</span> </div> </a> <ul id="toc-CIA_triad-sublist" class="vector-toc-list"> <li id="toc-Confidentiality" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Confidentiality"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1.1</span> <span>Confidentiality</span> </div> </a> <ul id="toc-Confidentiality-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Integrity" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Integrity"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1.2</span> <span>Integrity</span> </div> </a> <ul id="toc-Integrity-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Availability" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Availability"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1.3</span> <span>Availability</span> </div> </a> <ul id="toc-Availability-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Additional_security_goals" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Additional_security_goals"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.2</span> <span>Additional security goals</span> </div> </a> <ul id="toc-Additional_security_goals-sublist" class="vector-toc-list"> <li id="toc-Non-repudiation" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Non-repudiation"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.2.1</span> <span>Non-repudiation</span> </div> </a> <ul id="toc-Non-repudiation-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Other_Models" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Other_Models"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.3</span> <span>Other Models</span> </div> </a> <ul id="toc-Other_Models-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Risk_management" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Risk_management"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>Risk management</span> </div> </a> <button aria-controls="toc-Risk_management-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Risk management subsection</span> </button> <ul id="toc-Risk_management-sublist" class="vector-toc-list"> <li id="toc-Security_controls" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Security_controls"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.1</span> <span>Security controls</span> </div> </a> <ul id="toc-Security_controls-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Defense_in_depth" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Defense_in_depth"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>Defense in depth</span> </div> </a> <ul id="toc-Defense_in_depth-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Classification" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Classification"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>Classification</span> </div> </a> <ul id="toc-Classification-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Access_control" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Access_control"> <div class="vector-toc-text"> <span class="vector-toc-numb">8</span> <span>Access control</span> </div> </a> <button aria-controls="toc-Access_control-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Access control subsection</span> </button> <ul id="toc-Access_control-sublist" class="vector-toc-list"> <li id="toc-Identification" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Identification"> <div class="vector-toc-text"> <span class="vector-toc-numb">8.1</span> <span>Identification</span> </div> </a> <ul id="toc-Identification-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Authentication" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Authentication"> <div class="vector-toc-text"> <span class="vector-toc-numb">8.2</span> <span>Authentication</span> </div> </a> <ul id="toc-Authentication-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Authorization" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Authorization"> <div class="vector-toc-text"> <span class="vector-toc-numb">8.3</span> <span>Authorization</span> </div> </a> <ul id="toc-Authorization-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Cryptography" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Cryptography"> <div class="vector-toc-text"> <span class="vector-toc-numb">9</span> <span>Cryptography</span> </div> </a> <ul id="toc-Cryptography-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Process" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Process"> <div class="vector-toc-text"> <span class="vector-toc-numb">10</span> <span>Process</span> </div> </a> <button aria-controls="toc-Process-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Process subsection</span> </button> <ul id="toc-Process-sublist" class="vector-toc-list"> <li id="toc-Incident_response_plans" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Incident_response_plans"> <div class="vector-toc-text"> <span class="vector-toc-numb">10.1</span> <span>Incident response plans</span> </div> </a> <ul id="toc-Incident_response_plans-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Change_management" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Change_management"> <div class="vector-toc-text"> <span class="vector-toc-numb">10.2</span> <span>Change management</span> </div> </a> <ul id="toc-Change_management-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Business_continuity" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Business_continuity"> <div class="vector-toc-text"> <span class="vector-toc-numb">11</span> <span>Business continuity</span> </div> </a> <ul id="toc-Business_continuity-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Laws_and_regulations" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Laws_and_regulations"> <div class="vector-toc-text"> <span class="vector-toc-numb">12</span> <span>Laws and regulations</span> </div> </a> <ul id="toc-Laws_and_regulations-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Culture" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Culture"> <div class="vector-toc-text"> <span class="vector-toc-numb">13</span> <span>Culture</span> </div> </a> <ul id="toc-Culture-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Other_defintions" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Other_defintions"> <div class="vector-toc-text"> <span class="vector-toc-numb">14</span> <span>Other defintions</span> </div> </a> <ul id="toc-Other_defintions-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">15</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">16</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Bibliography" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Bibliography"> <div class="vector-toc-text"> <span class="vector-toc-numb">17</span> <span>Bibliography</span> </div> </a> <ul id="toc-Bibliography-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Further_reading" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Further_reading"> <div class="vector-toc-text"> <span class="vector-toc-numb">18</span> <span>Further reading</span> </div> </a> <ul id="toc-Further_reading-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-External_links" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#External_links"> <div class="vector-toc-text"> <span class="vector-toc-numb">19</span> <span>External links</span> </div> </a> <ul id="toc-External_links-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Information security</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 49 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-49" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">49 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-ar mw-list-item"><a href="https://ar.wikipedia.org/wiki/%D8%A3%D9%85%D9%86_%D8%A7%D9%84%D9%85%D8%B9%D9%84%D9%88%D9%85%D8%A7%D8%AA" title="أمن المعلومات – Arabic" lang="ar" hreflang="ar" data-title="أمن المعلومات" data-language-autonym="العربية" data-language-local-name="Arabic" class="interlanguage-link-target"><span>العربية</span></a></li><li class="interlanguage-link interwiki-ast mw-list-item"><a href="https://ast.wikipedia.org/wiki/Segurid%C3%A1_de_la_informaci%C3%B3n" title="Seguridá de la información – Asturian" lang="ast" hreflang="ast" data-title="Seguridá de la información" data-language-autonym="Asturianu" data-language-local-name="Asturian" class="interlanguage-link-target"><span>Asturianu</span></a></li><li class="interlanguage-link interwiki-az mw-list-item"><a href="https://az.wikipedia.org/wiki/%C4%B0nformasiya_t%C9%99hl%C3%BCk%C9%99sizliyi" title="İnformasiya təhlükəsizliyi – Azerbaijani" lang="az" hreflang="az" data-title="İnformasiya təhlükəsizliyi" data-language-autonym="Azərbaycanca" data-language-local-name="Azerbaijani" class="interlanguage-link-target"><span>Azərbaycanca</span></a></li><li class="interlanguage-link interwiki-bn mw-list-item"><a href="https://bn.wikipedia.org/wiki/%E0%A6%A4%E0%A6%A5%E0%A7%8D%E0%A6%AF_%E0%A6%A8%E0%A6%BF%E0%A6%B0%E0%A6%BE%E0%A6%AA%E0%A6%A4%E0%A7%8D%E0%A6%A4%E0%A6%BE" title="তথ্য নিরাপত্তা – Bangla" lang="bn" hreflang="bn" data-title="তথ্য নিরাপত্তা" data-language-autonym="বাংলা" data-language-local-name="Bangla" class="interlanguage-link-target"><span>বাংলা</span></a></li><li class="interlanguage-link interwiki-bg mw-list-item"><a href="https://bg.wikipedia.org/wiki/%D0%98%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D0%B8%D0%BE%D0%BD%D0%BD%D0%B0_%D1%81%D0%B8%D0%B3%D1%83%D1%80%D0%BD%D0%BE%D1%81%D1%82" title="Информационна сигурност – Bulgarian" lang="bg" hreflang="bg" data-title="Информационна сигурност" data-language-autonym="Български" data-language-local-name="Bulgarian" class="interlanguage-link-target"><span>Български</span></a></li><li class="interlanguage-link interwiki-ca mw-list-item"><a href="https://ca.wikipedia.org/wiki/Seguretat_de_la_informaci%C3%B3" title="Seguretat de la informació – Catalan" lang="ca" hreflang="ca" data-title="Seguretat de la informació" data-language-autonym="Català" data-language-local-name="Catalan" class="interlanguage-link-target"><span>Català</span></a></li><li class="interlanguage-link interwiki-cs mw-list-item"><a href="https://cs.wikipedia.org/wiki/Informa%C4%8Dn%C3%AD_bezpe%C4%8Dnost" title="Informační bezpečnost – Czech" lang="cs" hreflang="cs" data-title="Informační bezpečnost" data-language-autonym="Čeština" data-language-local-name="Czech" class="interlanguage-link-target"><span>Čeština</span></a></li><li class="interlanguage-link interwiki-da mw-list-item"><a href="https://da.wikipedia.org/wiki/Informationssikkerhed" title="Informationssikkerhed – Danish" lang="da" hreflang="da" data-title="Informationssikkerhed" data-language-autonym="Dansk" data-language-local-name="Danish" class="interlanguage-link-target"><span>Dansk</span></a></li><li class="interlanguage-link interwiki-de mw-list-item"><a href="https://de.wikipedia.org/wiki/Informationssicherheit" title="Informationssicherheit – German" lang="de" hreflang="de" data-title="Informationssicherheit" data-language-autonym="Deutsch" data-language-local-name="German" class="interlanguage-link-target"><span>Deutsch</span></a></li><li class="interlanguage-link interwiki-et mw-list-item"><a href="https://et.wikipedia.org/wiki/Andmeturve" title="Andmeturve – Estonian" lang="et" hreflang="et" data-title="Andmeturve" data-language-autonym="Eesti" data-language-local-name="Estonian" class="interlanguage-link-target"><span>Eesti</span></a></li><li class="interlanguage-link interwiki-el mw-list-item"><a href="https://el.wikipedia.org/wiki/%CE%91%CF%83%CF%86%CE%AC%CE%BB%CE%B5%CE%B9%CE%B1_%CF%80%CE%BB%CE%B7%CF%81%CE%BF%CF%86%CE%BF%CF%81%CE%B9%CE%B1%CE%BA%CF%8E%CE%BD_%CF%83%CF%85%CF%83%CF%84%CE%B7%CE%BC%CE%AC%CF%84%CF%89%CE%BD" title="Ασφάλεια πληροφοριακών συστημάτων – Greek" lang="el" hreflang="el" data-title="Ασφάλεια πληροφοριακών συστημάτων" data-language-autonym="Ελληνικά" data-language-local-name="Greek" class="interlanguage-link-target"><span>Ελληνικά</span></a></li><li class="interlanguage-link interwiki-es mw-list-item"><a href="https://es.wikipedia.org/wiki/Seguridad_de_la_informaci%C3%B3n" title="Seguridad de la información – Spanish" lang="es" hreflang="es" data-title="Seguridad de la información" data-language-autonym="Español" data-language-local-name="Spanish" class="interlanguage-link-target"><span>Español</span></a></li><li class="interlanguage-link interwiki-eu mw-list-item"><a href="https://eu.wikipedia.org/wiki/Informazioaren_segurtasun" title="Informazioaren segurtasun – Basque" lang="eu" hreflang="eu" data-title="Informazioaren segurtasun" data-language-autonym="Euskara" data-language-local-name="Basque" class="interlanguage-link-target"><span>Euskara</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D8%A7%D9%85%D9%86%DB%8C%D8%AA_%D8%A7%D8%B7%D9%84%D8%A7%D8%B9%D8%A7%D8%AA" title="امنیت اطلاعات – Persian" lang="fa" hreflang="fa" data-title="امنیت اطلاعات" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-fr mw-list-item"><a href="https://fr.wikipedia.org/wiki/S%C3%A9curit%C3%A9_de_l%27information" title="Sécurité de l&#039;information – French" lang="fr" hreflang="fr" data-title="Sécurité de l&#039;information" data-language-autonym="Français" data-language-local-name="French" class="interlanguage-link-target"><span>Français</span></a></li><li class="interlanguage-link interwiki-ko mw-list-item"><a href="https://ko.wikipedia.org/wiki/%EC%A0%95%EB%B3%B4_%EB%B3%B4%EC%95%88" title="정보 보안 – Korean" lang="ko" hreflang="ko" data-title="정보 보안" data-language-autonym="한국어" data-language-local-name="Korean" class="interlanguage-link-target"><span>한국어</span></a></li><li class="interlanguage-link interwiki-hy mw-list-item"><a href="https://hy.wikipedia.org/wiki/%D5%8F%D5%A5%D5%B2%D5%A5%D5%AF%D5%A1%D5%BF%D5%BE%D5%A1%D5%AF%D5%A1%D5%B6_%D5%A1%D5%B6%D5%BE%D5%BF%D5%A1%D5%B6%D5%A3%D5%B8%D6%82%D5%A9%D5%B5%D5%B8%D6%82%D5%B6" title="Տեղեկատվական անվտանգություն – Armenian" lang="hy" hreflang="hy" data-title="Տեղեկատվական անվտանգություն" data-language-autonym="Հայերեն" data-language-local-name="Armenian" class="interlanguage-link-target"><span>Հայերեն</span></a></li><li class="interlanguage-link interwiki-hi mw-list-item"><a href="https://hi.wikipedia.org/wiki/%E0%A4%B8%E0%A5%82%E0%A4%9A%E0%A4%A8%E0%A4%BE_%E0%A4%B8%E0%A5%81%E0%A4%B0%E0%A4%95%E0%A5%8D%E0%A4%B7%E0%A4%BE" title="सूचना सुरक्षा – Hindi" lang="hi" hreflang="hi" data-title="सूचना सुरक्षा" data-language-autonym="हिन्दी" data-language-local-name="Hindi" class="interlanguage-link-target"><span>हिन्दी</span></a></li><li class="interlanguage-link interwiki-id mw-list-item"><a href="https://id.wikipedia.org/wiki/Keamanan_informasi" title="Keamanan informasi – Indonesian" lang="id" hreflang="id" data-title="Keamanan informasi" data-language-autonym="Bahasa Indonesia" data-language-local-name="Indonesian" class="interlanguage-link-target"><span>Bahasa Indonesia</span></a></li><li class="interlanguage-link interwiki-he mw-list-item"><a href="https://he.wikipedia.org/wiki/%D7%90%D7%91%D7%98%D7%97%D7%AA_%D7%9E%D7%99%D7%93%D7%A2" title="אבטחת מידע – Hebrew" lang="he" hreflang="he" data-title="אבטחת מידע" data-language-autonym="עברית" data-language-local-name="Hebrew" class="interlanguage-link-target"><span>עברית</span></a></li><li class="interlanguage-link interwiki-kk mw-list-item"><a href="https://kk.wikipedia.org/wiki/%D0%90%D2%9B%D0%BF%D0%B0%D1%80%D0%B0%D1%82%D1%82%D1%8B%D2%9B_%D2%9B%D0%B0%D1%83%D1%96%D0%BF%D1%81%D1%96%D0%B7%D0%B4%D1%96%D0%BA" title="Ақпараттық қауіпсіздік – Kazakh" lang="kk" hreflang="kk" data-title="Ақпараттық қауіпсіздік" data-language-autonym="Қазақша" data-language-local-name="Kazakh" class="interlanguage-link-target"><span>Қазақша</span></a></li><li class="interlanguage-link interwiki-lv mw-list-item"><a href="https://lv.wikipedia.org/wiki/Inform%C4%81cijas_dro%C5%A1%C4%ABba" title="Informācijas drošība – Latvian" lang="lv" hreflang="lv" data-title="Informācijas drošība" data-language-autonym="Latviešu" data-language-local-name="Latvian" class="interlanguage-link-target"><span>Latviešu</span></a></li><li class="interlanguage-link interwiki-hu mw-list-item"><a href="https://hu.wikipedia.org/wiki/Inform%C3%A1ci%C3%B3biztons%C3%A1g" title="Információbiztonság – Hungarian" lang="hu" hreflang="hu" data-title="Információbiztonság" data-language-autonym="Magyar" data-language-local-name="Hungarian" class="interlanguage-link-target"><span>Magyar</span></a></li><li class="interlanguage-link interwiki-mk mw-list-item"><a href="https://mk.wikipedia.org/wiki/%D0%98%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D0%B8%D1%81%D0%BA%D0%B0_%D0%B1%D0%B5%D0%B7%D0%B1%D0%B5%D0%B4%D0%BD%D0%BE%D1%81%D1%82" title="Информациска безбедност – Macedonian" lang="mk" hreflang="mk" data-title="Информациска безбедност" data-language-autonym="Македонски" data-language-local-name="Macedonian" class="interlanguage-link-target"><span>Македонски</span></a></li><li class="interlanguage-link interwiki-ms mw-list-item"><a href="https://ms.wikipedia.org/wiki/Keselamatan_maklumat" title="Keselamatan maklumat – Malay" lang="ms" hreflang="ms" data-title="Keselamatan maklumat" data-language-autonym="Bahasa Melayu" data-language-local-name="Malay" class="interlanguage-link-target"><span>Bahasa Melayu</span></a></li><li class="interlanguage-link interwiki-mn mw-list-item"><a href="https://mn.wikipedia.org/wiki/%D0%9C%D1%8D%D0%B4%D1%8D%D1%8D%D0%BB%D0%BB%D0%B8%D0%B9%D0%BD_%D0%B0%D1%8E%D1%83%D0%BB%D0%B3%D2%AF%D0%B9_%D0%B1%D0%B0%D0%B9%D0%B4%D0%B0%D0%BB" title="Мэдээллийн аюулгүй байдал – Mongolian" lang="mn" hreflang="mn" data-title="Мэдээллийн аюулгүй байдал" data-language-autonym="Монгол" data-language-local-name="Mongolian" class="interlanguage-link-target"><span>Монгол</span></a></li><li class="interlanguage-link interwiki-nl mw-list-item"><a href="https://nl.wikipedia.org/wiki/Informatiebeveiliging" title="Informatiebeveiliging – Dutch" lang="nl" hreflang="nl" data-title="Informatiebeveiliging" data-language-autonym="Nederlands" data-language-local-name="Dutch" class="interlanguage-link-target"><span>Nederlands</span></a></li><li class="interlanguage-link interwiki-ja mw-list-item"><a href="https://ja.wikipedia.org/wiki/%E6%83%85%E5%A0%B1%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3" title="情報セキュリティ – Japanese" lang="ja" hreflang="ja" data-title="情報セキュリティ" data-language-autonym="日本語" data-language-local-name="Japanese" class="interlanguage-link-target"><span>日本語</span></a></li><li class="interlanguage-link interwiki-no mw-list-item"><a href="https://no.wikipedia.org/wiki/Informasjonssikkerhet" title="Informasjonssikkerhet – Norwegian Bokmål" lang="nb" hreflang="nb" data-title="Informasjonssikkerhet" data-language-autonym="Norsk bokmål" data-language-local-name="Norwegian Bokmål" class="interlanguage-link-target"><span>Norsk bokmål</span></a></li><li class="interlanguage-link interwiki-or mw-list-item"><a href="https://or.wikipedia.org/wiki/%E0%AC%A4%E0%AC%A5%E0%AD%8D%E0%AD%9F_%E0%AC%A8%E0%AC%BF%E0%AC%B0%E0%AC%BE%E0%AC%AA%E0%AC%A4%E0%AD%8D%E0%AC%A4%E0%AC%BE" title="ତଥ୍ୟ ନିରାପତ୍ତା – Odia" lang="or" hreflang="or" data-title="ତଥ୍ୟ ନିରାପତ୍ତା" data-language-autonym="ଓଡ଼ିଆ" data-language-local-name="Odia" class="interlanguage-link-target"><span>ଓଡ଼ିଆ</span></a></li><li class="interlanguage-link interwiki-uz mw-list-item"><a href="https://uz.wikipedia.org/wiki/Axborot_xavfsizligi" title="Axborot xavfsizligi – Uzbek" lang="uz" hreflang="uz" data-title="Axborot xavfsizligi" data-language-autonym="Oʻzbekcha / ўзбекча" data-language-local-name="Uzbek" class="interlanguage-link-target"><span>Oʻzbekcha / ўзбекча</span></a></li><li class="interlanguage-link interwiki-pa mw-list-item"><a href="https://pa.wikipedia.org/wiki/%E0%A8%9C%E0%A8%BE%E0%A8%A3%E0%A8%95%E0%A8%BE%E0%A8%B0%E0%A9%80_%E0%A8%A6%E0%A9%80_%E0%A8%B8%E0%A9%81%E0%A8%B0%E0%A9%B1%E0%A8%96%E0%A8%BF%E0%A8%86" title="ਜਾਣਕਾਰੀ ਦੀ ਸੁਰੱਖਿਆ – Punjabi" lang="pa" hreflang="pa" data-title="ਜਾਣਕਾਰੀ ਦੀ ਸੁਰੱਖਿਆ" data-language-autonym="ਪੰਜਾਬੀ" data-language-local-name="Punjabi" class="interlanguage-link-target"><span>ਪੰਜਾਬੀ</span></a></li><li class="interlanguage-link interwiki-ps mw-list-item"><a href="https://ps.wikipedia.org/wiki/%D8%A7%D8%B7%D9%84%D8%A7%D8%B9%D8%A7%D8%AA%D9%8A_%D8%AE%D9%88%D9%86%D8%AF%DB%8C%D8%AA%D9%88%D8%A8" title="اطلاعاتي خوندیتوب – Pashto" lang="ps" hreflang="ps" data-title="اطلاعاتي خوندیتوب" data-language-autonym="پښتو" data-language-local-name="Pashto" class="interlanguage-link-target"><span>پښتو</span></a></li><li class="interlanguage-link interwiki-pt mw-list-item"><a href="https://pt.wikipedia.org/wiki/Seguran%C3%A7a_da_informa%C3%A7%C3%A3o" title="Segurança da informação – Portuguese" lang="pt" hreflang="pt" data-title="Segurança da informação" data-language-autonym="Português" data-language-local-name="Portuguese" class="interlanguage-link-target"><span>Português</span></a></li><li class="interlanguage-link interwiki-kaa mw-list-item"><a href="https://kaa.wikipedia.org/wiki/Informa%D1%81iya_q%C3%A1wipsizligi" title="Informaсiya qáwipsizligi – Kara-Kalpak" lang="kaa" hreflang="kaa" data-title="Informaсiya qáwipsizligi" data-language-autonym="Qaraqalpaqsha" data-language-local-name="Kara-Kalpak" class="interlanguage-link-target"><span>Qaraqalpaqsha</span></a></li><li class="interlanguage-link interwiki-ro mw-list-item"><a href="https://ro.wikipedia.org/wiki/Securitatea_informa%C8%9Biei" title="Securitatea informației – Romanian" lang="ro" hreflang="ro" data-title="Securitatea informației" data-language-autonym="Română" data-language-local-name="Romanian" class="interlanguage-link-target"><span>Română</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/%D0%98%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D0%B8%D0%BE%D0%BD%D0%BD%D0%B0%D1%8F_%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C" title="Информационная безопасность – Russian" lang="ru" hreflang="ru" data-title="Информационная безопасность" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-sq mw-list-item"><a href="https://sq.wikipedia.org/wiki/Siguria_e_informacionit" title="Siguria e informacionit – Albanian" lang="sq" hreflang="sq" data-title="Siguria e informacionit" data-language-autonym="Shqip" data-language-local-name="Albanian" class="interlanguage-link-target"><span>Shqip</span></a></li><li class="interlanguage-link interwiki-simple mw-list-item"><a href="https://simple.wikipedia.org/wiki/Information_security" title="Information security – Simple English" lang="en-simple" hreflang="en-simple" data-title="Information security" data-language-autonym="Simple English" data-language-local-name="Simple English" class="interlanguage-link-target"><span>Simple English</span></a></li><li class="interlanguage-link interwiki-sl mw-list-item"><a href="https://sl.wikipedia.org/wiki/Informacijska_varnost" title="Informacijska varnost – Slovenian" lang="sl" hreflang="sl" data-title="Informacijska varnost" data-language-autonym="Slovenščina" data-language-local-name="Slovenian" class="interlanguage-link-target"><span>Slovenščina</span></a></li><li class="interlanguage-link interwiki-sr mw-list-item"><a href="https://sr.wikipedia.org/wiki/Bezbednost_informacija" title="Bezbednost informacija – Serbian" lang="sr" hreflang="sr" data-title="Bezbednost informacija" data-language-autonym="Српски / srpski" data-language-local-name="Serbian" class="interlanguage-link-target"><span>Српски / srpski</span></a></li><li class="interlanguage-link interwiki-fi mw-list-item"><a href="https://fi.wikipedia.org/wiki/Tietoturva" title="Tietoturva – Finnish" lang="fi" hreflang="fi" data-title="Tietoturva" data-language-autonym="Suomi" data-language-local-name="Finnish" class="interlanguage-link-target"><span>Suomi</span></a></li><li class="interlanguage-link interwiki-sv mw-list-item"><a href="https://sv.wikipedia.org/wiki/Informationss%C3%A4kerhet" title="Informationssäkerhet – Swedish" lang="sv" hreflang="sv" data-title="Informationssäkerhet" data-language-autonym="Svenska" data-language-local-name="Swedish" class="interlanguage-link-target"><span>Svenska</span></a></li><li class="interlanguage-link interwiki-ta mw-list-item"><a href="https://ta.wikipedia.org/wiki/%E0%AE%A4%E0%AE%95%E0%AE%B5%E0%AE%B2%E0%AF%8D_%E0%AE%AA%E0%AE%BE%E0%AE%A4%E0%AF%81%E0%AE%95%E0%AE%BE%E0%AE%AA%E0%AF%8D%E0%AE%AA%E0%AF%81" title="தகவல் பாதுகாப்பு – Tamil" lang="ta" hreflang="ta" data-title="தகவல் பாதுகாப்பு" data-language-autonym="தமிழ்" data-language-local-name="Tamil" class="interlanguage-link-target"><span>தமிழ்</span></a></li><li class="interlanguage-link interwiki-th mw-list-item"><a href="https://th.wikipedia.org/wiki/%E0%B8%81%E0%B8%B2%E0%B8%A3%E0%B8%A3%E0%B8%B1%E0%B8%81%E0%B8%A9%E0%B8%B2%E0%B8%84%E0%B8%A7%E0%B8%B2%E0%B8%A1%E0%B8%9B%E0%B8%A5%E0%B8%AD%E0%B8%94%E0%B8%A0%E0%B8%B1%E0%B8%A2%E0%B8%97%E0%B8%B2%E0%B8%87%E0%B8%82%E0%B9%89%E0%B8%AD%E0%B8%A1%E0%B8%B9%E0%B8%A5" title="การรักษาความปลอดภัยทางข้อมูล – Thai" lang="th" hreflang="th" data-title="การรักษาความปลอดภัยทางข้อมูล" data-language-autonym="ไทย" data-language-local-name="Thai" class="interlanguage-link-target"><span>ไทย</span></a></li><li class="interlanguage-link interwiki-tr mw-list-item"><a href="https://tr.wikipedia.org/wiki/Bilgi_g%C3%BCvenli%C4%9Fi" title="Bilgi güvenliği – Turkish" lang="tr" hreflang="tr" data-title="Bilgi güvenliği" data-language-autonym="Türkçe" data-language-local-name="Turkish" class="interlanguage-link-target"><span>Türkçe</span></a></li><li class="interlanguage-link interwiki-uk mw-list-item"><a href="https://uk.wikipedia.org/wiki/%D0%86%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D1%96%D0%B9%D0%BD%D0%B0_%D0%B1%D0%B5%D0%B7%D0%BF%D0%B5%D0%BA%D0%B0" title="Інформаційна безпека – Ukrainian" lang="uk" hreflang="uk" data-title="Інформаційна безпека" data-language-autonym="Українська" data-language-local-name="Ukrainian" class="interlanguage-link-target"><span>Українська</span></a></li><li class="interlanguage-link interwiki-vi mw-list-item"><a href="https://vi.wikipedia.org/wiki/An_to%C3%A0n_th%C3%B4ng_tin" title="An toàn thông tin – Vietnamese" lang="vi" hreflang="vi" data-title="An toàn thông tin" data-language-autonym="Tiếng Việt" data-language-local-name="Vietnamese" class="interlanguage-link-target"><span>Tiếng Việt</span></a></li><li class="interlanguage-link interwiki-zh mw-list-item"><a href="https://zh.wikipedia.org/wiki/%E4%BF%A1%E6%81%AF%E5%AE%89%E5%85%A8" title="信息安全 – Chinese" lang="zh" hreflang="zh" data-title="信息安全" data-language-autonym="中文" data-language-local-name="Chinese" class="interlanguage-link-target"><span>中文</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q189900#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Information_security" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:Information_security" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Information_security"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Information_security&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Information_security&amp;action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/Information_security"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Information_security&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Information_security&amp;action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/Information_security" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/Information_security" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages" title="A list of all special pages [q]" accesskey="q"><span>Special pages</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=Information_security&amp;oldid=1259072286" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=Information_security&amp;action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&amp;page=Information_security&amp;id=1259072286&amp;wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FInformation_security"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FInformation_security"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&amp;page=Information_security&amp;action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=Information_security&amp;printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="wb-otherproject-link wb-otherproject-commons mw-list-item"><a href="https://commons.wikimedia.org/wiki/Category:Information_security" hreflang="en"><span>Wikimedia Commons</span></a></li><li class="wb-otherproject-link wb-otherproject-wikiversity mw-list-item"><a href="https://en.wikiversity.org/wiki/Information_security" hreflang="en"><span>Wikiversity</span></a></li><li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q189900" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">Protecting information by mitigating risk</div> <p class="mw-empty-elt"> </p> <style data-mw-deduplicate="TemplateStyles:r1251242444">.mw-parser-output .ambox{border:1px solid #a2a9b1;border-left:10px solid #36c;background-color:#fbfbfb;box-sizing:border-box}.mw-parser-output .ambox+link+.ambox,.mw-parser-output .ambox+link+style+.ambox,.mw-parser-output .ambox+link+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+style+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+link+.ambox{margin-top:-1px}html body.mediawiki .mw-parser-output .ambox.mbox-small-left{margin:4px 1em 4px 0;overflow:hidden;width:238px;border-collapse:collapse;font-size:88%;line-height:1.25em}.mw-parser-output .ambox-speedy{border-left:10px solid #b32424;background-color:#fee7e6}.mw-parser-output .ambox-delete{border-left:10px solid #b32424}.mw-parser-output .ambox-content{border-left:10px solid #f28500}.mw-parser-output .ambox-style{border-left:10px solid #fc3}.mw-parser-output .ambox-move{border-left:10px solid #9932cc}.mw-parser-output .ambox-protection{border-left:10px solid #a2a9b1}.mw-parser-output .ambox .mbox-text{border:none;padding:0.25em 0.5em;width:100%}.mw-parser-output .ambox .mbox-image{border:none;padding:2px 0 2px 0.5em;text-align:center}.mw-parser-output .ambox .mbox-imageright{border:none;padding:2px 0.5em 2px 0;text-align:center}.mw-parser-output .ambox .mbox-empty-cell{border:none;padding:0;width:1px}.mw-parser-output .ambox .mbox-image-div{width:52px}@media(min-width:720px){.mw-parser-output .ambox{margin:0 10%}}@media print{body.ns-0 .mw-parser-output .ambox{display:none!important}}</style><table class="box-Merge_from plainlinks metadata ambox ambox-move" role="presentation"><tbody><tr><td class="mbox-image"><div class="mbox-image-div"><span typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/0/0f/Mergefrom.svg/50px-Mergefrom.svg.png" decoding="async" width="50" height="20" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/0/0f/Mergefrom.svg/75px-Mergefrom.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/0/0f/Mergefrom.svg/100px-Mergefrom.svg.png 2x" data-file-width="50" data-file-height="20" /></span></span></div></td><td class="mbox-text"><div class="mbox-text-span">It has been suggested that <i><a href="/wiki/Information_assurance" title="Information assurance">Information assurance</a></i> be <a href="/wiki/Wikipedia:Merging" title="Wikipedia:Merging">merged</a> into this article. (<a href="/wiki/Talk:Information_security#Merger_discussion" title="Talk:Information security">Discuss</a>)<small><i> Proposed since November 2024.</i></small></div></td></tr></tbody></table> <p><b>Information security</b> is the practice of protecting <a href="/wiki/Information" title="Information">information</a> by mitigating information risks. It is part of information risk management.<sup id="cite_ref-1" class="reference"><a href="#cite_note-1"><span class="cite-bracket">&#91;</span>1<span class="cite-bracket">&#93;</span></a></sup> It typically involves preventing or reducing the probability of unauthorized or inappropriate access to <a href="/wiki/Data" title="Data">data</a> or the unlawful use, <a href="/wiki/Data_breach" title="Data breach">disclosure</a>, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information. It also involves actions intended to reduce the adverse impacts of such incidents. Protected information may take any form, e.g., electronic or physical, tangible (e.g., <a href="/wiki/Document" title="Document">paperwork</a>), or intangible (e.g., <a href="/wiki/Knowledge" title="Knowledge">knowledge</a>).<sup id="cite_ref-2" class="reference"><a href="#cite_note-2"><span class="cite-bracket">&#91;</span>2<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-3" class="reference"><a href="#cite_note-3"><span class="cite-bracket">&#91;</span>3<span class="cite-bracket">&#93;</span></a></sup> Information security's primary focus is the balanced protection of <a href="/wiki/Data_confidentiality" class="mw-redirect" title="Data confidentiality">data confidentiality</a>, <a href="/wiki/Data_integrity" title="Data integrity">integrity</a>, and <a href="/wiki/Data_availability" class="mw-redirect" title="Data availability">availability</a> (also known as the 'CIA' triad)<sup id="cite_ref-SamonasTheCIA14_4-0" class="reference"><a href="#cite_note-SamonasTheCIA14-4"><span class="cite-bracket">&#91;</span>4<span class="cite-bracket">&#93;</span></a></sup> while maintaining a focus on efficient <a href="/wiki/Policy" title="Policy">policy</a> implementation, all without hampering organization <a href="/wiki/Productivity" title="Productivity">productivity</a>.<sup id="cite_ref-5" class="reference"><a href="#cite_note-5"><span class="cite-bracket">&#91;</span>5<span class="cite-bracket">&#93;</span></a></sup> This is largely achieved through a structured <a href="/wiki/Risk_management" title="Risk management">risk management</a> process.<sup id="cite_ref-6" class="reference"><a href="#cite_note-6"><span class="cite-bracket">&#91;</span>6<span class="cite-bracket">&#93;</span></a></sup> </p><p>To standardize this discipline, academics and professionals collaborate to offer guidance, policies, and industry standards on <a href="/wiki/Password" title="Password">passwords</a>, <a href="/wiki/Antivirus_software" title="Antivirus software">antivirus software</a>, <a href="/wiki/Firewall_(computing)" title="Firewall (computing)">firewalls</a>, <a href="/wiki/Encryption_software" title="Encryption software">encryption software</a>, <a href="/wiki/Legal_liability" title="Legal liability">legal liability</a>, <a href="/wiki/Security_awareness" title="Security awareness">security awareness</a> and training, and so forth.<sup id="cite_ref-7" class="reference"><a href="#cite_note-7"><span class="cite-bracket">&#91;</span>7<span class="cite-bracket">&#93;</span></a></sup> This <a href="/wiki/Standardization" title="Standardization">standardization</a> may be further driven by a wide variety of laws and regulations that affect how data is accessed, processed, stored, transferred, and destroyed.<sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span class="cite-bracket">&#91;</span>8<span class="cite-bracket">&#93;</span></a></sup> </p><p>While paper-based business operations are still prevalent, requiring their own set of information security practices, enterprise digital initiatives are increasingly being emphasized,<sup id="cite_ref-GartnerSays17_9-0" class="reference"><a href="#cite_note-GartnerSays17-9"><span class="cite-bracket">&#91;</span>9<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-GartnerSurvey17_10-0" class="reference"><a href="#cite_note-GartnerSurvey17-10"><span class="cite-bracket">&#91;</span>10<span class="cite-bracket">&#93;</span></a></sup> with information assurance now typically being dealt with by information technology (IT) security specialists. These specialists apply information security to technology (most often some form of computer system). </p><p>IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses.<sup id="cite_ref-AFH_1_11-0" class="reference"><a href="#cite_note-AFH_1-11"><span class="cite-bracket">&#91;</span>11<span class="cite-bracket">&#93;</span></a></sup> They are responsible for keeping all of the <a href="/wiki/Technology" title="Technology">technology</a> within the company secure from malicious attacks that often attempt to acquire critical private information or gain control of the internal systems.<sup id="cite_ref-12" class="reference"><a href="#cite_note-12"><span class="cite-bracket">&#91;</span>12<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-13" class="reference"><a href="#cite_note-13"><span class="cite-bracket">&#91;</span>13<span class="cite-bracket">&#93;</span></a></sup> </p><p>There are many specialist roles in Information Security including securing networks and allied <a href="/wiki/Infrastructure" title="Infrastructure">infrastructure</a>, securing <a href="/wiki/Application_software" title="Application software">applications</a> and <a href="/wiki/Database" title="Database">databases</a>, <a href="/wiki/Security_testing" title="Security testing">security testing</a>, information systems <a href="/wiki/Information_technology_audit" title="Information technology audit">auditing</a>, <a href="/wiki/Business_continuity_planning" title="Business continuity planning">business continuity planning</a>, electronic record discovery, and <a href="/wiki/Digital_forensics" title="Digital forensics">digital forensics</a>.<sup id="cite_ref-14" class="reference"><a href="#cite_note-14"><span class="cite-bracket">&#91;</span>14<span class="cite-bracket">&#93;</span></a></sup> </p> <meta property="mw:PageProp/toc" /> <div class="mw-heading mw-heading2"><h2 id="Standards">Standards</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=1" title="Edit section: Standards"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Information_security_standards" title="Information security standards">Information security standards</a></div> <p>Information security standards are techniques generally outlined in published materials that attempt to protect the information of a user or organization.<sup id="cite_ref-15" class="reference"><a href="#cite_note-15"><span class="cite-bracket">&#91;</span>15<span class="cite-bracket">&#93;</span></a></sup> This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks. </p><p>The principal objective is to reduce the risks, including preventing or mitigating attacks. These published materials consist of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies. </p><p>Common information security standards include <a href="/wiki/ISO/IEC_27001" title="ISO/IEC 27001">ISO/IEC 27001</a> and the <a href="/wiki/NIST_Cybersecurity_Framework" title="NIST Cybersecurity Framework">NIST Cybersecurity Framework</a>. </p> <div class="mw-heading mw-heading2"><h2 id="Threats">Threats</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=2" title="Edit section: Threats"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Threat_(computer_security)" title="Threat (computer security)">Threat (computer security)</a></div> <p>Information security <a href="/wiki/Threat_(computer)" class="mw-redirect" title="Threat (computer)">threats</a> come in many different forms.<sup id="cite_ref-16" class="reference"><a href="#cite_note-16"><span class="cite-bracket">&#91;</span>16<span class="cite-bracket">&#93;</span></a></sup> Some of the most common threats today are software attacks, theft of intellectual property, theft of identity, theft of equipment or information, sabotage, and information extortion.<sup id="cite_ref-17" class="reference"><a href="#cite_note-17"><span class="cite-bracket">&#91;</span>17<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-18" class="reference"><a href="#cite_note-18"><span class="cite-bracket">&#91;</span>18<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Computer_virus" title="Computer virus">Viruses</a>,<sup id="cite_ref-19" class="reference"><a href="#cite_note-19"><span class="cite-bracket">&#91;</span>19<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Computer_worm" title="Computer worm">worms</a>, <a href="/wiki/Phishing" title="Phishing">phishing attacks</a>, and <a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">Trojan horses</a> are a few common examples of software attacks. The <a href="/wiki/Intellectual_property_infringement" title="Intellectual property infringement">theft of intellectual property</a> has also been an extensive issue for many businesses.<sup id="cite_ref-WHP_1_20-0" class="reference"><a href="#cite_note-WHP_1-20"><span class="cite-bracket">&#91;</span>20<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Identity_theft" title="Identity theft">Identity theft</a> is the attempt to act as someone else usually to obtain that person's personal information or to take advantage of their access to vital information through <a href="/wiki/Social_engineering_(security)" title="Social engineering (security)">social engineering</a>.<sup id="cite_ref-21" class="reference"><a href="#cite_note-21"><span class="cite-bracket">&#91;</span>21<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-22" class="reference"><a href="#cite_note-22"><span class="cite-bracket">&#91;</span>22<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Sabotage" title="Sabotage">Sabotage</a> usually consists of the destruction of an organization's <a href="/wiki/Website" title="Website">website</a> in an attempt to cause loss of confidence on the part of its customers.<sup id="cite_ref-23" class="reference"><a href="#cite_note-23"><span class="cite-bracket">&#91;</span>23<span class="cite-bracket">&#93;</span></a></sup> Information extortion consists of theft of a company's property or information as an attempt to receive a payment in exchange for returning the information or property back to its owner, as with <a href="/wiki/Ransomware" title="Ransomware">ransomware</a>.<sup id="cite_ref-24" class="reference"><a href="#cite_note-24"><span class="cite-bracket">&#91;</span>24<span class="cite-bracket">&#93;</span></a></sup> One of the most functional precautions against these attacks is to conduct periodical user awareness.<sup id="cite_ref-25" class="reference"><a href="#cite_note-25"><span class="cite-bracket">&#91;</span>25<span class="cite-bracket">&#93;</span></a></sup> </p><p><a href="/wiki/Governments" class="mw-redirect" title="Governments">Governments</a>, <a href="/wiki/Military" title="Military">military</a>, <a href="/wiki/Corporation" title="Corporation">corporations</a>, <a href="/wiki/Financial_institution" title="Financial institution">financial institutions</a>, <a href="/wiki/Hospital" title="Hospital">hospitals</a>, non-profit organisations, and private <a href="/wiki/Businesses" class="mw-redirect" title="Businesses">businesses</a> amass a great deal of confidential information about their employees, customers, products, research, and financial status.<sup id="cite_ref-CPS_1_26-0" class="reference"><a href="#cite_note-CPS_1-26"><span class="cite-bracket">&#91;</span>26<span class="cite-bracket">&#93;</span></a></sup> Should confidential information about a business's customers or finances or new product line fall into the hands of a competitor or <a href="/wiki/Security_hacker" title="Security hacker">hacker</a>, a business and its customers could suffer widespread, irreparable financial loss, as well as damage to the company's reputation.<sup id="cite_ref-27" class="reference"><a href="#cite_note-27"><span class="cite-bracket">&#91;</span>27<span class="cite-bracket">&#93;</span></a></sup> From a business perspective, information security must be balanced against cost; the <a href="/wiki/Gordon-Loeb_Model" class="mw-redirect" title="Gordon-Loeb Model">Gordon-Loeb Model</a> provides a mathematical economic approach for addressing this concern.<sup id="cite_ref-28" class="reference"><a href="#cite_note-28"><span class="cite-bracket">&#91;</span>28<span class="cite-bracket">&#93;</span></a></sup> </p><p>For the individual, information security has a significant effect on <a href="/wiki/Privacy" title="Privacy">privacy</a>, which is viewed very differently in various <a href="/wiki/Cultures" class="mw-redirect" title="Cultures">cultures</a>.<sup id="cite_ref-29" class="reference"><a href="#cite_note-29"><span class="cite-bracket">&#91;</span>29<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="History">History</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=3" title="Edit section: History"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Since the early days of communication, diplomats and military commanders understood that it was necessary to provide some mechanism to protect the confidentiality of correspondence and to have some means of detecting <a href="/wiki/Tamper-evident" class="mw-redirect" title="Tamper-evident">tampering</a>.<sup id="cite_ref-30" class="reference"><a href="#cite_note-30"><span class="cite-bracket">&#91;</span>30<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Julius_Caesar" title="Julius Caesar">Julius Caesar</a> is credited with the invention of the <a href="/wiki/Caesar_cipher" title="Caesar cipher">Caesar cipher</a> c. 50 B.C., which was created in order to prevent his secret messages from being read should a message fall into the wrong hands.<sup id="cite_ref-31" class="reference"><a href="#cite_note-31"><span class="cite-bracket">&#91;</span>31<span class="cite-bracket">&#93;</span></a></sup> However, for the most part protection was achieved through the application of procedural handling controls.<sup id="cite_ref-32" class="reference"><a href="#cite_note-32"><span class="cite-bracket">&#91;</span>32<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-33" class="reference"><a href="#cite_note-33"><span class="cite-bracket">&#91;</span>33<span class="cite-bracket">&#93;</span></a></sup> Sensitive information was marked up to indicate that it should be protected and transported by trusted persons, guarded and stored in a secure environment or strong box.<sup id="cite_ref-34" class="reference"><a href="#cite_note-34"><span class="cite-bracket">&#91;</span>34<span class="cite-bracket">&#93;</span></a></sup> As postal services expanded, governments created official organizations to intercept, decipher, read, and reseal letters (e.g., the U.K.'s Secret Office, founded in 1653<sup id="cite_ref-JohnsonTheEvo97_35-0" class="reference"><a href="#cite_note-JohnsonTheEvo97-35"><span class="cite-bracket">&#91;</span>35<span class="cite-bracket">&#93;</span></a></sup>). </p><p>In the mid-nineteenth century more complex <a href="/wiki/Classified_information" title="Classified information">classification systems</a> were developed to allow governments to manage their information according to the degree of sensitivity.<sup id="cite_ref-WBS_1_36-0" class="reference"><a href="#cite_note-WBS_1-36"><span class="cite-bracket">&#91;</span>36<span class="cite-bracket">&#93;</span></a></sup> For example, the British Government codified this, to some extent, with the publication of the <a href="/wiki/Official_Secrets_Act_1889" title="Official Secrets Act 1889">Official Secrets Act</a> in 1889.<sup id="cite_ref-HastedtSpies11_37-0" class="reference"><a href="#cite_note-HastedtSpies11-37"><span class="cite-bracket">&#91;</span>37<span class="cite-bracket">&#93;</span></a></sup> Section 1 of the law concerned espionage and unlawful disclosures of information, while Section 2 dealt with breaches of official trust.<sup id="cite_ref-38" class="reference"><a href="#cite_note-38"><span class="cite-bracket">&#91;</span>38<span class="cite-bracket">&#93;</span></a></sup> A public interest defense was soon added to defend disclosures in the interest of the state.<sup id="cite_ref-39" class="reference"><a href="#cite_note-39"><span class="cite-bracket">&#91;</span>39<span class="cite-bracket">&#93;</span></a></sup> A similar law was passed in India in 1889, The Indian Official Secrets Act, which was associated with the British colonial era and used to crack down on newspapers that opposed the Raj's policies.<sup id="cite_ref-40" class="reference"><a href="#cite_note-40"><span class="cite-bracket">&#91;</span>40<span class="cite-bracket">&#93;</span></a></sup> A newer version was passed in 1923 that extended to all matters of confidential or secret information for governance.<sup id="cite_ref-41" class="reference"><a href="#cite_note-41"><span class="cite-bracket">&#91;</span>41<span class="cite-bracket">&#93;</span></a></sup> By the time of the <a href="/wiki/First_World_War" class="mw-redirect" title="First World War">First World War</a>, multi-tier classification systems were used to communicate information to and from various fronts, which encouraged greater use of code making and breaking sections in diplomatic and military headquarters.<sup id="cite_ref-42" class="reference"><a href="#cite_note-42"><span class="cite-bracket">&#91;</span>42<span class="cite-bracket">&#93;</span></a></sup> Encoding became more sophisticated between the wars as machines were employed to scramble and unscramble information.<sup id="cite_ref-43" class="reference"><a href="#cite_note-43"><span class="cite-bracket">&#91;</span>43<span class="cite-bracket">&#93;</span></a></sup> </p><p>The establishment of <a href="/wiki/Computer_security" title="Computer security">computer security</a> inaugurated the history of information security. The need for such appeared during <a href="/wiki/World_War_II" title="World War II">World War II</a>.<sup id="cite_ref-FOOTNOTEWhitmanMattord20173_44-0" class="reference"><a href="#cite_note-FOOTNOTEWhitmanMattord20173-44"><span class="cite-bracket">&#91;</span>44<span class="cite-bracket">&#93;</span></a></sup> The volume of information shared by the Allied countries during the Second World War necessitated formal alignment of classification systems and procedural controls.<sup id="cite_ref-45" class="reference"><a href="#cite_note-45"><span class="cite-bracket">&#91;</span>45<span class="cite-bracket">&#93;</span></a></sup> An arcane range of markings evolved to indicate who could handle documents (usually officers rather than enlisted troops) and where they should be stored as increasingly complex safes and storage facilities were developed.<sup id="cite_ref-46" class="reference"><a href="#cite_note-46"><span class="cite-bracket">&#91;</span>46<span class="cite-bracket">&#93;</span></a></sup> The <a href="/wiki/Enigma_Machine" class="mw-redirect" title="Enigma Machine">Enigma Machine</a>, which was employed by the Germans to encrypt the data of warfare and was successfully decrypted by <a href="/wiki/Alan_Turing" title="Alan Turing">Alan Turing</a>, can be regarded as a striking example of creating and using secured information.<sup id="cite_ref-Sebag-MontefioreEnigma11_47-0" class="reference"><a href="#cite_note-Sebag-MontefioreEnigma11-47"><span class="cite-bracket">&#91;</span>47<span class="cite-bracket">&#93;</span></a></sup> Procedures evolved to ensure documents were destroyed properly, and it was the failure to follow these procedures which led to some of the greatest intelligence coups of the war (e.g., the capture of <a href="/wiki/U-570" class="mw-redirect" title="U-570">U-570</a><sup id="cite_ref-Sebag-MontefioreEnigma11_47-1" class="reference"><a href="#cite_note-Sebag-MontefioreEnigma11-47"><span class="cite-bracket">&#91;</span>47<span class="cite-bracket">&#93;</span></a></sup>). </p><p>Various <a href="/wiki/Mainframe_computers" class="mw-redirect" title="Mainframe computers">mainframe computers</a> were connected online during the <a href="/wiki/Cold_War" title="Cold War">Cold War</a> to complete more sophisticated tasks, in a communication process easier than mailing <a href="/wiki/Magnetic_tapes" class="mw-redirect" title="Magnetic tapes">magnetic tapes</a> back and forth by computer centers. As such, the <a href="/wiki/Advanced_Research_Projects_Agency" class="mw-redirect" title="Advanced Research Projects Agency">Advanced Research Projects Agency</a> (ARPA), of the <a href="/wiki/United_States_Department_of_Defense" title="United States Department of Defense">United States Department of Defense</a>, started researching the feasibility of a networked system of communication to trade information within the <a href="/wiki/United_States_Armed_Forces" title="United States Armed Forces">United States Armed Forces</a>. In 1968, the <a href="/wiki/ARPANET" title="ARPANET">ARPANET</a> project was formulated by <a href="/wiki/Lawrence_Roberts_(scientist)" class="mw-redirect" title="Lawrence Roberts (scientist)">Larry Roberts</a>, which would later evolve into what is known as the <a href="/wiki/Internet" title="Internet">internet</a>.<sup id="cite_ref-FOOTNOTEWhitmanMattord20174–5_48-0" class="reference"><a href="#cite_note-FOOTNOTEWhitmanMattord20174–5-48"><span class="cite-bracket">&#91;</span>48<span class="cite-bracket">&#93;</span></a></sup> </p><p>In 1973, important elements of ARPANET security were found by internet pioneer <a href="/wiki/Robert_Metcalfe" title="Robert Metcalfe">Robert Metcalfe</a> to have many flaws such as the: "vulnerability of password structure and formats; lack of safety procedures for <a href="/wiki/Dialup_connection" class="mw-redirect" title="Dialup connection">dial-up connections</a>; and nonexistent user identification and authorizations", aside from the lack of controls and safeguards to keep data safe from unauthorized access. Hackers had effortless access to ARPANET, as phone numbers were known by the public.<sup id="cite_ref-FOOTNOTEWhitmanMattord20175_49-0" class="reference"><a href="#cite_note-FOOTNOTEWhitmanMattord20175-49"><span class="cite-bracket">&#91;</span>49<span class="cite-bracket">&#93;</span></a></sup> Due to these problems, coupled with the constant violation of computer security, as well as the exponential increase in the number of hosts and users of the system, "network security" was often alluded to as "network insecurity".<sup id="cite_ref-FOOTNOTEWhitmanMattord20175_49-1" class="reference"><a href="#cite_note-FOOTNOTEWhitmanMattord20175-49"><span class="cite-bracket">&#91;</span>49<span class="cite-bracket">&#93;</span></a></sup> </p> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Posters_for_information_security_for_the_Ministry_of_Defense_of_the_Russian_Federation.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/a/a1/Posters_for_information_security_for_the_Ministry_of_Defense_of_the_Russian_Federation.jpg/220px-Posters_for_information_security_for_the_Ministry_of_Defense_of_the_Russian_Federation.jpg" decoding="async" width="220" height="312" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/a/a1/Posters_for_information_security_for_the_Ministry_of_Defense_of_the_Russian_Federation.jpg/330px-Posters_for_information_security_for_the_Ministry_of_Defense_of_the_Russian_Federation.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/a/a1/Posters_for_information_security_for_the_Ministry_of_Defense_of_the_Russian_Federation.jpg/440px-Posters_for_information_security_for_the_Ministry_of_Defense_of_the_Russian_Federation.jpg 2x" data-file-width="904" data-file-height="1280" /></a><figcaption>Poster promoting information security by the Russian <a href="/wiki/Ministry_of_Defence_(Russia)" title="Ministry of Defence (Russia)">Ministry of Defence</a></figcaption></figure> <p>The end of the twentieth century and the early years of the twenty-first century saw rapid advancements in <a href="/wiki/Telecommunications" title="Telecommunications">telecommunications</a>, computing <a href="/wiki/Computer_hardware" title="Computer hardware">hardware</a> and <a href="/wiki/Software" title="Software">software</a>, and data <a href="/wiki/Encryption" title="Encryption">encryption</a>.<sup id="cite_ref-50" class="reference"><a href="#cite_note-50"><span class="cite-bracket">&#91;</span>50<span class="cite-bracket">&#93;</span></a></sup> The availability of smaller, more powerful, and less expensive computing equipment made <a href="/wiki/Data_processing" title="Data processing">electronic data processing</a> within the reach of <a href="/wiki/Small_business" title="Small business">small business</a> and home users.<sup id="cite_ref-51" class="reference"><a href="#cite_note-51"><span class="cite-bracket">&#91;</span>51<span class="cite-bracket">&#93;</span></a></sup> The establishment of Transfer Control Protocol/Internetwork Protocol (TCP/IP) in the early 1980s enabled different types of computers to communicate.<sup id="cite_ref-52" class="reference"><a href="#cite_note-52"><span class="cite-bracket">&#91;</span>52<span class="cite-bracket">&#93;</span></a></sup> These computers quickly became interconnected through the <a href="/wiki/Internet" title="Internet">internet</a>.<sup id="cite_ref-53" class="reference"><a href="#cite_note-53"><span class="cite-bracket">&#91;</span>53<span class="cite-bracket">&#93;</span></a></sup> </p><p>The rapid growth and widespread use of electronic data processing and <a href="/wiki/Electronic_business" title="Electronic business">electronic business</a> conducted through the internet, along with numerous occurrences of international <a href="/wiki/Terrorism" title="Terrorism">terrorism</a>, fueled the need for better methods of protecting the computers and the information they store, process, and transmit.<sup id="cite_ref-DeLeeuwTheHist07_54-0" class="reference"><a href="#cite_note-DeLeeuwTheHist07-54"><span class="cite-bracket">&#91;</span>54<span class="cite-bracket">&#93;</span></a></sup> The academic disciplines of <a href="/wiki/Computer_security" title="Computer security">computer security</a> and <a href="/wiki/Information_assurance" title="Information assurance">information assurance</a> emerged along with numerous professional organizations, all sharing the common goals of ensuring the security and reliability of <a href="/wiki/Information_system" title="Information system">information systems</a>.<sup id="cite_ref-55" class="reference"><a href="#cite_note-55"><span class="cite-bracket">&#91;</span>55<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Security_Goals">Security Goals</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=4" title="Edit section: Security Goals"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="CIA_triad">CIA triad</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=5" title="Edit section: CIA triad"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The "CIA triad" of <i><b>c</b>onfidentiality, <b>i</b>ntegrity, and <b>a</b>vailability</i> is at the heart of information security.<sup id="cite_ref-56" class="reference"><a href="#cite_note-56"><span class="cite-bracket">&#91;</span>56<span class="cite-bracket">&#93;</span></a></sup> The concept was introduced in the Anderson Report in 1972 and later repeated in <i><a href="/wiki/The_Protection_of_Information_in_Computer_Systems" title="The Protection of Information in Computer Systems">The Protection of Information in Computer Systems</a>.</i> The abbreviation was coined by Steve Lipner around 1986.<sup id="cite_ref-57" class="reference"><a href="#cite_note-57"><span class="cite-bracket">&#91;</span>57<span class="cite-bracket">&#93;</span></a></sup> </p><p>Debate continues about whether or not this triad is sufficient to address rapidly changing technology and business requirements, with recommendations to consider expanding on the intersections between availability and confidentiality, as well as the relationship between security and privacy.<sup id="cite_ref-SamonasTheCIA14_4-1" class="reference"><a href="#cite_note-SamonasTheCIA14-4"><span class="cite-bracket">&#91;</span>4<span class="cite-bracket">&#93;</span></a></sup> Other principles such as "accountability" have sometimes been proposed; it has been pointed out that issues such as <a href="/wiki/Non-repudiation" title="Non-repudiation">non-repudiation</a> do not fit well within the three core concepts.<sup id="cite_ref-NIST_58-0" class="reference"><a href="#cite_note-NIST-58"><span class="cite-bracket">&#91;</span>58<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Confidentiality">Confidentiality</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=6" title="Edit section: Confidentiality"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In information security, <a href="/wiki/Confidentiality" title="Confidentiality">confidentiality</a> "is the property, that information is not made available or disclosed to unauthorized individuals, entities, or processes."<sup id="cite_ref-BeckersPattern15_59-0" class="reference"><a href="#cite_note-BeckersPattern15-59"><span class="cite-bracket">&#91;</span>59<span class="cite-bracket">&#93;</span></a></sup> While similar to "privacy," the two words are not interchangeable. Rather, confidentiality is a component of privacy that implements to protect our data from unauthorized viewers.<sup id="cite_ref-60" class="reference"><a href="#cite_note-60"><span class="cite-bracket">&#91;</span>60<span class="cite-bracket">&#93;</span></a></sup> Examples of confidentiality of electronic data being compromised include laptop theft, password theft, or sensitive emails being sent to the incorrect individuals.<sup id="cite_ref-AndressTheBasics14_61-0" class="reference"><a href="#cite_note-AndressTheBasics14-61"><span class="cite-bracket">&#91;</span>61<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Integrity">Integrity</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=7" title="Edit section: Integrity"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In IT security, <a href="/wiki/Data_integrity" title="Data integrity">data integrity</a> means maintaining and assuring the accuracy and completeness of data over its entire lifecycle.<sup id="cite_ref-62" class="reference"><a href="#cite_note-62"><span class="cite-bracket">&#91;</span>62<span class="cite-bracket">&#93;</span></a></sup> This means that data cannot be modified in an unauthorized or undetected manner.<sup id="cite_ref-63" class="reference"><a href="#cite_note-63"><span class="cite-bracket">&#91;</span>63<span class="cite-bracket">&#93;</span></a></sup> This is not the same thing as <a href="/wiki/Referential_integrity" title="Referential integrity">referential integrity</a> in <a href="/wiki/Databases" class="mw-redirect" title="Databases">databases</a>, although it can be viewed as a special case of consistency as understood in the classic <a href="/wiki/ACID" title="ACID">ACID</a> model of <a href="/wiki/Transaction_processing" title="Transaction processing">transaction processing</a>.<sup id="cite_ref-64" class="reference"><a href="#cite_note-64"><span class="cite-bracket">&#91;</span>64<span class="cite-bracket">&#93;</span></a></sup> Information security systems typically incorporate controls to ensure their own integrity, in particular protecting the kernel or core functions against both deliberate and accidental threats.<sup id="cite_ref-65" class="reference"><a href="#cite_note-65"><span class="cite-bracket">&#91;</span>65<span class="cite-bracket">&#93;</span></a></sup> Multi-purpose and multi-user computer systems aim to compartmentalize the data and processing such that no user or process can adversely impact another: the controls may not succeed however, as we see in incidents such as malware infections, hacks, data theft, fraud, and privacy breaches.<sup id="cite_ref-66" class="reference"><a href="#cite_note-66"><span class="cite-bracket">&#91;</span>66<span class="cite-bracket">&#93;</span></a></sup> </p><p>More broadly, integrity is an information security principle that involves human/social, process, and commercial integrity, as well as data integrity. As such it touches on aspects such as credibility, consistency, truthfulness, completeness, accuracy, timeliness, and assurance.<sup id="cite_ref-67" class="reference"><a href="#cite_note-67"><span class="cite-bracket">&#91;</span>67<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Availability">Availability</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=8" title="Edit section: Availability"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>For any information system to serve its purpose, the information must be <a href="/wiki/Availability" title="Availability">available</a> when it is needed.<sup id="cite_ref-68" class="reference"><a href="#cite_note-68"><span class="cite-bracket">&#91;</span>68<span class="cite-bracket">&#93;</span></a></sup> This means the computing systems used to store and process the information, the <a href="/wiki/Security_controls" title="Security controls">security controls</a> used to protect it, and the communication channels used to access it must be functioning correctly.<sup id="cite_ref-69" class="reference"><a href="#cite_note-69"><span class="cite-bracket">&#91;</span>69<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/High_availability" title="High availability">High availability</a> systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades.<sup id="cite_ref-70" class="reference"><a href="#cite_note-70"><span class="cite-bracket">&#91;</span>70<span class="cite-bracket">&#93;</span></a></sup> Ensuring availability also involves preventing <a href="/wiki/Denial-of-service_attack" title="Denial-of-service attack">denial-of-service attacks</a>, such as a flood of incoming messages to the target system, essentially forcing it to shut down.<sup id="cite_ref-71" class="reference"><a href="#cite_note-71"><span class="cite-bracket">&#91;</span>71<span class="cite-bracket">&#93;</span></a></sup> </p><p>In the realm of information security, availability can often be viewed as one of the most important parts of a successful information security program.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (June 2021)">citation needed</span></a></i>&#93;</sup> Ultimately end-users need to be able to perform job functions; by ensuring availability an organization is able to perform to the standards that an organization's stakeholders expect.<sup id="cite_ref-72" class="reference"><a href="#cite_note-72"><span class="cite-bracket">&#91;</span>72<span class="cite-bracket">&#93;</span></a></sup> This can involve topics such as proxy configurations, outside web access, the ability to access shared drives and the ability to send emails.<sup id="cite_ref-73" class="reference"><a href="#cite_note-73"><span class="cite-bracket">&#91;</span>73<span class="cite-bracket">&#93;</span></a></sup> Executives oftentimes do not understand the technical side of information security and look at availability as an easy fix, but this often requires collaboration from many different organizational teams, such as network operations, development operations, incident response, and policy/change management.<sup id="cite_ref-74" class="reference"><a href="#cite_note-74"><span class="cite-bracket">&#91;</span>74<span class="cite-bracket">&#93;</span></a></sup> A successful information security team involves many different key roles to mesh and align for the "CIA" triad to be provided effectively.<sup id="cite_ref-75" class="reference"><a href="#cite_note-75"><span class="cite-bracket">&#91;</span>75<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Additional_security_goals">Additional security goals</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=9" title="Edit section: Additional security goals"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In addition to the classic CIA triad of security goals, some organisations may want to include security goals like authenticity, accountability, non-repudiation, and reliability. </p> <div class="mw-heading mw-heading4"><h4 id="Non-repudiation">Non-repudiation</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=10" title="Edit section: Non-repudiation"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In law, <a href="/wiki/Non-repudiation" title="Non-repudiation">non-repudiation</a> implies one's intention to fulfill their obligations to a contract. It also implies that one party of a transaction cannot deny having received a transaction, nor can the other party deny having sent a transaction.<sup id="cite_ref-BidgoliHandbook06_76-0" class="reference"><a href="#cite_note-BidgoliHandbook06-76"><span class="cite-bracket">&#91;</span>76<span class="cite-bracket">&#93;</span></a></sup> </p><p>It is important to note that while technology such as cryptographic systems can assist in non-repudiation efforts, the concept is at its core a legal concept transcending the realm of technology.<sup id="cite_ref-77" class="reference"><a href="#cite_note-77"><span class="cite-bracket">&#91;</span>77<span class="cite-bracket">&#93;</span></a></sup> It is not, for instance, sufficient to show that the message matches a digital signature signed with the sender's private key, and thus only the sender could have sent the message, and nobody else could have altered it in transit (<a href="/wiki/Data_integrity" title="Data integrity">data integrity</a>).<sup id="cite_ref-78" class="reference"><a href="#cite_note-78"><span class="cite-bracket">&#91;</span>78<span class="cite-bracket">&#93;</span></a></sup> The alleged sender could in return demonstrate that the digital signature algorithm is vulnerable or flawed, or allege or prove that his signing key has been compromised.<sup id="cite_ref-79" class="reference"><a href="#cite_note-79"><span class="cite-bracket">&#91;</span>79<span class="cite-bracket">&#93;</span></a></sup> The fault for these violations may or may not lie with the sender, and such assertions may or may not relieve the sender of liability, but the assertion would invalidate the claim that the signature necessarily proves authenticity and integrity. As such, the sender may repudiate the message (because authenticity and integrity are pre-requisites for non-repudiation).<sup id="cite_ref-80" class="reference"><a href="#cite_note-80"><span class="cite-bracket">&#91;</span>80<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Other_Models">Other Models</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=11" title="Edit section: Other Models"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In 1992 and revised in 2002, the <a href="/wiki/OECD" title="OECD">OECD</a>'s <i>Guidelines for the Security of Information Systems and Networks</i><sup id="cite_ref-81" class="reference"><a href="#cite_note-81"><span class="cite-bracket">&#91;</span>81<span class="cite-bracket">&#93;</span></a></sup> proposed the nine generally accepted principles: <a href="/wiki/Information_security_awareness" title="Information security awareness">awareness</a>, responsibility, response, ethics, democracy, risk assessment, security design and implementation, security management, and reassessment.<sup id="cite_ref-82" class="reference"><a href="#cite_note-82"><span class="cite-bracket">&#91;</span>82<span class="cite-bracket">&#93;</span></a></sup> Building upon those, in 2004 the <a href="/wiki/NIST" class="mw-redirect" title="NIST">NIST</a>'s <i>Engineering Principles for Information Technology Security</i><sup id="cite_ref-NIST_58-1" class="reference"><a href="#cite_note-NIST-58"><span class="cite-bracket">&#91;</span>58<span class="cite-bracket">&#93;</span></a></sup> proposed 33 principles. </p><p>In 1998, <a href="/wiki/Donn_Parker" class="mw-redirect" title="Donn Parker">Donn Parker</a> proposed an alternative model for the classic "CIA" triad that he called the <a href="/wiki/Parkerian_Hexad" title="Parkerian Hexad">six atomic elements of information</a>. The elements are <a href="/wiki/Confidentiality" title="Confidentiality">confidentiality</a>, <a href="/wiki/Ownership" title="Ownership">possession</a>, <a href="/wiki/Integrity" title="Integrity">integrity</a>, <a href="/wiki/Authentication" title="Authentication">authenticity</a>, <a href="/wiki/Availability" title="Availability">availability</a>, and <a href="/wiki/Utility" title="Utility">utility</a>. The merits of the <a href="/wiki/Parkerian_Hexad" title="Parkerian Hexad">Parkerian Hexad</a> are a subject of debate amongst security professionals.<sup id="cite_ref-83" class="reference"><a href="#cite_note-83"><span class="cite-bracket">&#91;</span>83<span class="cite-bracket">&#93;</span></a></sup> </p><p>In 2011, <a href="/wiki/The_Open_Group" title="The Open Group">The Open Group</a> published the information security management standard <a href="/wiki/Open_Information_Security_Maturity_Model" class="mw-redirect" title="Open Information Security Maturity Model">O-ISM3</a>.<sup id="cite_ref-84" class="reference"><a href="#cite_note-84"><span class="cite-bracket">&#91;</span>84<span class="cite-bracket">&#93;</span></a></sup> This standard proposed an <a href="/wiki/Operational_definition" title="Operational definition">operational definition</a> of the key concepts of security, with elements called "security objectives", related to <a href="/wiki/Access_control" title="Access control">access control</a> (9), <a href="/wiki/Availability" title="Availability">availability</a> (3), <a href="/wiki/Data_quality" title="Data quality">data quality</a> (1), compliance, and technical (4). </p> <div class="mw-heading mw-heading2"><h2 id="Risk_management">Risk management</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=12" title="Edit section: Risk management"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Risk_management" title="Risk management">Risk management</a></div> <p>Risk is the likelihood that something bad will happen that causes harm to an informational asset (or the loss of the asset).<sup id="cite_ref-85" class="reference"><a href="#cite_note-85"><span class="cite-bracket">&#91;</span>85<span class="cite-bracket">&#93;</span></a></sup> A vulnerability is a weakness that could be used to endanger or cause harm to an informational asset. A threat is anything (man-made or <a href="/wiki/Natural_disaster" title="Natural disaster">act of nature</a>) that has the potential to cause harm.<sup id="cite_ref-86" class="reference"><a href="#cite_note-86"><span class="cite-bracket">&#91;</span>86<span class="cite-bracket">&#93;</span></a></sup> The likelihood that a threat will use a vulnerability to cause harm creates a risk. When a threat does use a vulnerability to inflict harm, it has an impact.<sup id="cite_ref-87" class="reference"><a href="#cite_note-87"><span class="cite-bracket">&#91;</span>87<span class="cite-bracket">&#93;</span></a></sup> In the context of information security, the impact is a loss of availability, integrity, and confidentiality, and possibly other losses (lost income, loss of life, loss of real property).<sup id="cite_ref-GramaLegal14_88-0" class="reference"><a href="#cite_note-GramaLegal14-88"><span class="cite-bracket">&#91;</span>88<span class="cite-bracket">&#93;</span></a></sup> </p><p>The <i><a href="/wiki/Certified_Information_Systems_Auditor" class="mw-redirect" title="Certified Information Systems Auditor">Certified Information Systems Auditor</a> (CISA) Review Manual 2006</i> defines <b>risk management</b> as "the process of identifying <a href="/wiki/Vulnerability_(computing)" class="mw-redirect" title="Vulnerability (computing)">vulnerabilities</a> and <a href="/wiki/Threat_(computer)" class="mw-redirect" title="Threat (computer)">threats</a> to the information resources used by an organization in achieving business objectives, and deciding what <a href="/wiki/Countermeasure_(computer)" title="Countermeasure (computer)">countermeasures</a>,<sup id="cite_ref-89" class="reference"><a href="#cite_note-89"><span class="cite-bracket">&#91;</span>89<span class="cite-bracket">&#93;</span></a></sup> if any, to take in reducing risk to an acceptable level, based on the value of the information resource to the organization."<sup id="cite_ref-90" class="reference"><a href="#cite_note-90"><span class="cite-bracket">&#91;</span>90<span class="cite-bracket">&#93;</span></a></sup> </p><p>There are two things in this definition that may need some clarification. First, the <i>process</i> of risk management is an ongoing, iterative <a href="/wiki/Business_process" title="Business process">process</a>. It must be repeated indefinitely. The business environment is constantly changing and new <a href="/wiki/Threat_(computer)" class="mw-redirect" title="Threat (computer)">threats</a> and <a href="/wiki/Vulnerability_(computing)" class="mw-redirect" title="Vulnerability (computing)">vulnerabilities</a> emerge every day.<sup id="cite_ref-91" class="reference"><a href="#cite_note-91"><span class="cite-bracket">&#91;</span>91<span class="cite-bracket">&#93;</span></a></sup> Second, the choice of <a href="/wiki/Countermeasure_(computer)" title="Countermeasure (computer)">countermeasures</a> (<a href="/wiki/Security_controls" title="Security controls">controls</a>) used to manage risks must strike a balance between productivity, cost, effectiveness of the countermeasure, and the value of the informational asset being protected.<sup id="cite_ref-92" class="reference"><a href="#cite_note-92"><span class="cite-bracket">&#91;</span>92<span class="cite-bracket">&#93;</span></a></sup> Furthermore, these processes have limitations as security breaches are generally rare and emerge in a specific context which may not be easily duplicated.<sup id="cite_ref-93" class="reference"><a href="#cite_note-93"><span class="cite-bracket">&#91;</span>93<span class="cite-bracket">&#93;</span></a></sup> Thus, any process and countermeasure should itself be evaluated for vulnerabilities.<sup id="cite_ref-94" class="reference"><a href="#cite_note-94"><span class="cite-bracket">&#91;</span>94<span class="cite-bracket">&#93;</span></a></sup> It is not possible to identify all risks, nor is it possible to eliminate all risk. The remaining risk is called "residual risk".<sup id="cite_ref-95" class="reference"><a href="#cite_note-95"><span class="cite-bracket">&#91;</span>95<span class="cite-bracket">&#93;</span></a></sup> </p><p>A <a href="/wiki/Risk_assessment" title="Risk assessment">risk assessment</a> is carried out by a team of people who have knowledge of specific areas of the business.<sup id="cite_ref-96" class="reference"><a href="#cite_note-96"><span class="cite-bracket">&#91;</span>96<span class="cite-bracket">&#93;</span></a></sup> Membership of the team may vary over time as different parts of the business are assessed.<sup id="cite_ref-97" class="reference"><a href="#cite_note-97"><span class="cite-bracket">&#91;</span>97<span class="cite-bracket">&#93;</span></a></sup> The assessment may use a subjective qualitative analysis based on informed opinion, or where reliable dollar figures and historical information is available, the analysis may use <a href="/wiki/Statistics" title="Statistics">quantitative</a> analysis. </p><p>Research has shown that the most vulnerable point in most information systems is the human user, operator, designer, or other human.<sup id="cite_ref-98" class="reference"><a href="#cite_note-98"><span class="cite-bracket">&#91;</span>98<span class="cite-bracket">&#93;</span></a></sup> The <a href="/wiki/ISO/IEC_17799" class="mw-redirect" title="ISO/IEC 17799">ISO/IEC 27002:2005</a> Code of practice for <a href="/wiki/Information_security_management" title="Information security management">information security management</a> recommends the following be examined during a risk assessment: </p> <ul><li><a href="/wiki/Security_policy" title="Security policy">security policy</a>,</li> <li><a href="/wiki/Organization" title="Organization">organization</a> of information security,</li> <li><a href="/wiki/Asset_management" title="Asset management">asset management</a>,</li> <li><a href="/wiki/Human_resources" title="Human resources">human resources</a> security,</li> <li>physical and <a href="/wiki/Environmental_security" title="Environmental security">environmental security</a>,</li> <li><a href="/wiki/Communications" class="mw-redirect" title="Communications">communications</a> and operations management,</li> <li><a href="/wiki/Access_control" title="Access control">access control</a>,</li> <li>information systems acquisition, development, and maintenance,</li> <li>information security <a href="/wiki/Incident_management" title="Incident management">incident management</a>,</li> <li>business continuity management</li> <li>regulatory compliance.</li></ul> <p>In broad terms, the risk management process consists of:<sup id="cite_ref-NewsomeAPract13_99-0" class="reference"><a href="#cite_note-NewsomeAPract13-99"><span class="cite-bracket">&#91;</span>99<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-WhitmanManage16_100-0" class="reference"><a href="#cite_note-WhitmanManage16-100"><span class="cite-bracket">&#91;</span>100<span class="cite-bracket">&#93;</span></a></sup> </p> <ol><li>Identification of assets and estimating their value. Include: people, buildings, hardware, software, data (electronic, print, other), supplies.<sup id="cite_ref-101" class="reference"><a href="#cite_note-101"><span class="cite-bracket">&#91;</span>101<span class="cite-bracket">&#93;</span></a></sup></li> <li>Conduct a <a href="/wiki/Threat_assessment" title="Threat assessment">threat assessment</a>. Include: Acts of nature, acts of war, accidents, malicious acts originating from inside or outside the organization.<sup id="cite_ref-102" class="reference"><a href="#cite_note-102"><span class="cite-bracket">&#91;</span>102<span class="cite-bracket">&#93;</span></a></sup></li> <li>Conduct a <a href="/wiki/Vulnerability_assessment" title="Vulnerability assessment">vulnerability assessment</a>, and for each vulnerability, calculate the probability that it will be exploited. Evaluate policies, procedures, standards, training, <a href="/wiki/Physical_security" title="Physical security">physical security</a>, <a href="/wiki/Quality_control" title="Quality control">quality control</a>, technical security.<sup id="cite_ref-103" class="reference"><a href="#cite_note-103"><span class="cite-bracket">&#91;</span>103<span class="cite-bracket">&#93;</span></a></sup></li> <li>Calculate the impact that each threat would have on each asset. Use qualitative analysis or quantitative analysis.<sup id="cite_ref-104" class="reference"><a href="#cite_note-104"><span class="cite-bracket">&#91;</span>104<span class="cite-bracket">&#93;</span></a></sup></li> <li>Identify, select and implement appropriate controls. Provide a proportional response. Consider productivity, cost effectiveness, and value of the asset.<sup id="cite_ref-105" class="reference"><a href="#cite_note-105"><span class="cite-bracket">&#91;</span>105<span class="cite-bracket">&#93;</span></a></sup></li> <li>Evaluate the effectiveness of the control measures. Ensure the controls provide the required cost effective protection without discernible loss of productivity.<sup id="cite_ref-106" class="reference"><a href="#cite_note-106"><span class="cite-bracket">&#91;</span>106<span class="cite-bracket">&#93;</span></a></sup></li></ol> <p>For any given risk, management can choose to accept the risk based upon the relative low value of the asset, the relative low frequency of occurrence, and the relative low impact on the business.<sup id="cite_ref-107" class="reference"><a href="#cite_note-107"><span class="cite-bracket">&#91;</span>107<span class="cite-bracket">&#93;</span></a></sup> Or, leadership may choose to mitigate the risk by selecting and implementing appropriate control measures to reduce the risk. In some cases, the risk can be transferred to another business by buying insurance or outsourcing to another business.<sup id="cite_ref-SP80030_108-0" class="reference"><a href="#cite_note-SP80030-108"><span class="cite-bracket">&#91;</span>108<span class="cite-bracket">&#93;</span></a></sup> The reality of some risks may be disputed. In such cases leadership may choose to deny the risk.<sup id="cite_ref-109" class="reference"><a href="#cite_note-109"><span class="cite-bracket">&#91;</span>109<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Security_controls">Security controls</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=13" title="Edit section: Security controls"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Security_controls" title="Security controls">security controls</a></div> <p>Selecting and implementing proper security controls will initially help an organization bring down risk to acceptable levels.<sup id="cite_ref-110" class="reference"><a href="#cite_note-110"><span class="cite-bracket">&#91;</span>110<span class="cite-bracket">&#93;</span></a></sup> Control selection should follow and should be based on the risk assessment.<sup id="cite_ref-111" class="reference"><a href="#cite_note-111"><span class="cite-bracket">&#91;</span>111<span class="cite-bracket">&#93;</span></a></sup> Controls can vary in nature, but fundamentally they are ways of protecting the confidentiality, integrity or availability of information. <a href="/wiki/ISO/IEC_27001" title="ISO/IEC 27001">ISO/IEC 27001</a> has defined controls in different areas.<sup id="cite_ref-112" class="reference"><a href="#cite_note-112"><span class="cite-bracket">&#91;</span>112<span class="cite-bracket">&#93;</span></a></sup> Organizations can implement additional controls according to requirement of the organization.<sup id="cite_ref-JohnsonSecurity15_113-0" class="reference"><a href="#cite_note-JohnsonSecurity15-113"><span class="cite-bracket">&#91;</span>113<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/ISO/IEC_27002" title="ISO/IEC 27002">ISO/IEC 27002</a> offers a guideline for organizational information security standards.<sup id="cite_ref-114" class="reference"><a href="#cite_note-114"><span class="cite-bracket">&#91;</span>114<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Defense_in_depth">Defense in depth</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=14" title="Edit section: Defense in depth"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:Defense_In_Depth_-_Onion_Model.svg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/4/4c/Defense_In_Depth_-_Onion_Model.svg/220px-Defense_In_Depth_-_Onion_Model.svg.png" decoding="async" width="220" height="220" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/4/4c/Defense_In_Depth_-_Onion_Model.svg/330px-Defense_In_Depth_-_Onion_Model.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/4/4c/Defense_In_Depth_-_Onion_Model.svg/440px-Defense_In_Depth_-_Onion_Model.svg.png 2x" data-file-width="500" data-file-height="500" /></a><figcaption>The <a href="/wiki/Onion_model" title="Onion model">onion model</a> of defense in depth</figcaption></figure> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Defense_in_depth_(computing)" title="Defense in depth (computing)">Defense in depth (computing)</a></div> <p>Defense in depth is a fundamental security philosophy that relies on overlapping security systems designed to maintain protection even if individual components fail. Rather than depending on a single security measure, it combines multiple layers of security controls both in the cloud and at network endpoints. This approach includes combinations like firewalls with intrusion-detection systems, email filtering services with desktop anti-virus, and cloud-based security alongside traditional network defenses.<sup id="cite_ref-schneier2006_115-0" class="reference"><a href="#cite_note-schneier2006-115"><span class="cite-bracket">&#91;</span>115<span class="cite-bracket">&#93;</span></a></sup> The concept can be implemented through three distinct layers of administrative, logical, and physical controls,<sup id="cite_ref-Administrative_Controls_116-0" class="reference"><a href="#cite_note-Administrative_Controls-116"><span class="cite-bracket">&#91;</span>116<span class="cite-bracket">&#93;</span></a></sup> or visualized as an onion model with data at the core, surrounded by people, network security, host-based security, and application security layers.<sup id="cite_ref-117" class="reference"><a href="#cite_note-117"><span class="cite-bracket">&#91;</span>117<span class="cite-bracket">&#93;</span></a></sup> The strategy emphasizes that security involves not just technology, but also people and processes working together, with real-time monitoring and response being crucial components.<sup id="cite_ref-schneier2006_115-1" class="reference"><a href="#cite_note-schneier2006-115"><span class="cite-bracket">&#91;</span>115<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Classification">Classification</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=15" title="Edit section: Classification"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>An important aspect of information security and risk management is recognizing the value of information and defining appropriate procedures and protection requirements for the information.<sup id="cite_ref-118" class="reference"><a href="#cite_note-118"><span class="cite-bracket">&#91;</span>118<span class="cite-bracket">&#93;</span></a></sup> Not all information is equal and so not all information requires the same degree of protection.<sup id="cite_ref-119" class="reference"><a href="#cite_note-119"><span class="cite-bracket">&#91;</span>119<span class="cite-bracket">&#93;</span></a></sup> This requires information to be assigned a <a href="/wiki/Classified_information" title="Classified information">security classification</a>.<sup id="cite_ref-120" class="reference"><a href="#cite_note-120"><span class="cite-bracket">&#91;</span>120<span class="cite-bracket">&#93;</span></a></sup> The first step in information classification is to identify a member of senior management as the owner of the particular information to be classified. Next, develop a classification policy.<sup id="cite_ref-121" class="reference"><a href="#cite_note-121"><span class="cite-bracket">&#91;</span>121<span class="cite-bracket">&#93;</span></a></sup> The policy should describe the different classification labels, define the criteria for information to be assigned a particular label, and list the required <a href="/wiki/Security_controls" title="Security controls">security controls</a> for each classification.<sup id="cite_ref-BayukEnterprise09_122-0" class="reference"><a href="#cite_note-BayukEnterprise09-122"><span class="cite-bracket">&#91;</span>122<span class="cite-bracket">&#93;</span></a></sup> </p><p>Some factors that influence which classification information should be assigned include how much value that information has to the organization, how old the information is and whether or not the information has become obsolete.<sup id="cite_ref-123" class="reference"><a href="#cite_note-123"><span class="cite-bracket">&#91;</span>123<span class="cite-bracket">&#93;</span></a></sup> Laws and other regulatory requirements are also important considerations when classifying information.<sup id="cite_ref-124" class="reference"><a href="#cite_note-124"><span class="cite-bracket">&#91;</span>124<span class="cite-bracket">&#93;</span></a></sup> The <a href="/wiki/ISACA" title="ISACA">Information Systems Audit and Control Association</a> (ISACA) and its <i>Business Model for Information Security</i> also serves as a tool for security professionals to examine security from a systems perspective, creating an environment where security can be managed holistically, allowing actual risks to be addressed.<sup id="cite_ref-ISACA-BMIS_125-0" class="reference"><a href="#cite_note-ISACA-BMIS-125"><span class="cite-bracket">&#91;</span>125<span class="cite-bracket">&#93;</span></a></sup> </p><p>The type of information security classification labels selected and used will depend on the nature of the organization, with examples being:<sup id="cite_ref-BayukEnterprise09_122-1" class="reference"><a href="#cite_note-BayukEnterprise09-122"><span class="cite-bracket">&#91;</span>122<span class="cite-bracket">&#93;</span></a></sup> </p> <ul><li>In the business sector, labels such as: Public, Sensitive, Private, Confidential.</li> <li>In the government sector, labels such as: Unclassified, Unofficial, Protected, Confidential, Secret, Top Secret, and their non-English equivalents.<sup id="cite_ref-126" class="reference"><a href="#cite_note-126"><span class="cite-bracket">&#91;</span>126<span class="cite-bracket">&#93;</span></a></sup></li> <li>In cross-sectoral formations, the <a href="/wiki/Traffic_Light_Protocol" title="Traffic Light Protocol">Traffic Light Protocol</a>, which consists of: White, Green, Amber, and Red.</li> <li>In the personal sector, one label such as Financial. This includes activities related to managing money, such as online banking.<sup id="cite_ref-127" class="reference"><a href="#cite_note-127"><span class="cite-bracket">&#91;</span>127<span class="cite-bracket">&#93;</span></a></sup></li></ul> <p>All employees in the organization, as well as business partners, must be trained on the classification schema and understand the required security controls and handling procedures for each classification.<sup id="cite_ref-128" class="reference"><a href="#cite_note-128"><span class="cite-bracket">&#91;</span>128<span class="cite-bracket">&#93;</span></a></sup> The classification of a particular information asset that has been assigned should be reviewed periodically to ensure the classification is still appropriate for the information and to ensure the security controls required by the classification are in place and are followed in their right procedures.<sup id="cite_ref-129" class="reference"><a href="#cite_note-129"><span class="cite-bracket">&#91;</span>129<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Access_control">Access control</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=16" title="Edit section: Access control"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Access to protected information must be restricted to people who are authorized to access the information.<sup id="cite_ref-ACM_Press_130-0" class="reference"><a href="#cite_note-ACM_Press-130"><span class="cite-bracket">&#91;</span>130<span class="cite-bracket">&#93;</span></a></sup> The computer programs, and in many cases the computers that process the information, must also be authorized.<sup id="cite_ref-Peiss_2020_16–39_131-0" class="reference"><a href="#cite_note-Peiss_2020_16–39-131"><span class="cite-bracket">&#91;</span>131<span class="cite-bracket">&#93;</span></a></sup> This requires that mechanisms be in place to control the access to protected information.<sup id="cite_ref-Peiss_2020_16–39_131-1" class="reference"><a href="#cite_note-Peiss_2020_16–39-131"><span class="cite-bracket">&#91;</span>131<span class="cite-bracket">&#93;</span></a></sup> The sophistication of the access control mechanisms should be in parity with the value of the information being protected; the more sensitive or valuable the information the stronger the control mechanisms need to be.<sup id="cite_ref-132" class="reference"><a href="#cite_note-132"><span class="cite-bracket">&#91;</span>132<span class="cite-bracket">&#93;</span></a></sup> The foundation on which access control mechanisms are built start with identification and <a href="/wiki/Authentication" title="Authentication">authentication</a>.<sup id="cite_ref-133" class="reference"><a href="#cite_note-133"><span class="cite-bracket">&#91;</span>133<span class="cite-bracket">&#93;</span></a></sup> </p><p>Access control is generally considered in three steps: identification, <a href="/wiki/Authentication" title="Authentication">authentication</a>, and <a href="/wiki/Authorization" title="Authorization">authorization</a>.<sup id="cite_ref-134" class="reference"><a href="#cite_note-134"><span class="cite-bracket">&#91;</span>134<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-AndressTheBasics14_61-1" class="reference"><a href="#cite_note-AndressTheBasics14-61"><span class="cite-bracket">&#91;</span>61<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Identification">Identification</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=17" title="Edit section: Identification"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Identification is an assertion of who someone is or what something is. If a person makes the statement "Hello, my name is <a href="/wiki/John_Doe" title="John Doe">John Doe</a>" they are making a claim of who they are.<sup id="cite_ref-135" class="reference"><a href="#cite_note-135"><span class="cite-bracket">&#91;</span>135<span class="cite-bracket">&#93;</span></a></sup> However, their claim may or may not be true. Before John Doe can be granted access to protected information it will be necessary to verify that the person claiming to be John Doe really is John Doe.<sup id="cite_ref-136" class="reference"><a href="#cite_note-136"><span class="cite-bracket">&#91;</span>136<span class="cite-bracket">&#93;</span></a></sup> Typically the claim is in the form of a username. By entering that username you are claiming "I am the person the username belongs to".<sup id="cite_ref-137" class="reference"><a href="#cite_note-137"><span class="cite-bracket">&#91;</span>137<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Authentication">Authentication</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=18" title="Edit section: Authentication"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Authentication is the act of verifying a claim of identity. When John Doe goes into a bank to make a withdrawal, he tells the <a href="/wiki/Bank_teller" title="Bank teller">bank teller</a> he is John Doe, a claim of identity.<sup id="cite_ref-138" class="reference"><a href="#cite_note-138"><span class="cite-bracket">&#91;</span>138<span class="cite-bracket">&#93;</span></a></sup> The bank teller asks to see a photo ID, so he hands the teller his <a href="/wiki/Driver%27s_license" title="Driver&#39;s license">driver's license</a>.<sup id="cite_ref-139" class="reference"><a href="#cite_note-139"><span class="cite-bracket">&#91;</span>139<span class="cite-bracket">&#93;</span></a></sup> The bank teller checks the license to make sure it has John Doe printed on it and compares the photograph on the license against the person claiming to be John Doe.<sup id="cite_ref-140" class="reference"><a href="#cite_note-140"><span class="cite-bracket">&#91;</span>140<span class="cite-bracket">&#93;</span></a></sup> If the photo and name match the person, then the teller has authenticated that John Doe is who he claimed to be. Similarly, by entering the correct password, the user is providing evidence that he/she is the person the username belongs to.<sup id="cite_ref-141" class="reference"><a href="#cite_note-141"><span class="cite-bracket">&#91;</span>141<span class="cite-bracket">&#93;</span></a></sup> </p><p>There are three different types of information that can be used for authentication:<sup id="cite_ref-142" class="reference"><a href="#cite_note-142"><span class="cite-bracket">&#91;</span>142<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-143" class="reference"><a href="#cite_note-143"><span class="cite-bracket">&#91;</span>143<span class="cite-bracket">&#93;</span></a></sup> </p> <ul><li>Something you know: things such as a PIN, a <a href="/wiki/Password" title="Password">password</a>, or your mother's <a href="/wiki/Maiden_name" class="mw-redirect" title="Maiden name">maiden name</a><sup id="cite_ref-144" class="reference"><a href="#cite_note-144"><span class="cite-bracket">&#91;</span>144<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-145" class="reference"><a href="#cite_note-145"><span class="cite-bracket">&#91;</span>145<span class="cite-bracket">&#93;</span></a></sup></li> <li>Something you have: a driver's license or a magnetic <a href="/wiki/Swipe_card" class="mw-redirect" title="Swipe card">swipe card</a><sup id="cite_ref-146" class="reference"><a href="#cite_note-146"><span class="cite-bracket">&#91;</span>146<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-147" class="reference"><a href="#cite_note-147"><span class="cite-bracket">&#91;</span>147<span class="cite-bracket">&#93;</span></a></sup></li> <li>Something you are: <a href="/wiki/Biometrics" title="Biometrics">biometrics</a>, including <a href="/wiki/Palm_print" title="Palm print">palm prints</a>, <a href="/wiki/Fingerprint" title="Fingerprint">fingerprints</a>, <a href="/wiki/Speaker_recognition" title="Speaker recognition">voice prints</a>, and <a href="/wiki/Retina_scan" class="mw-redirect" title="Retina scan">retina (eye) scans</a><sup id="cite_ref-148" class="reference"><a href="#cite_note-148"><span class="cite-bracket">&#91;</span>148<span class="cite-bracket">&#93;</span></a></sup></li></ul> <p>Strong authentication requires providing more than one type of authentication information (two-factor authentication).<sup id="cite_ref-149" class="reference"><a href="#cite_note-149"><span class="cite-bracket">&#91;</span>149<span class="cite-bracket">&#93;</span></a></sup> The <a href="/wiki/Username" class="mw-redirect" title="Username">username</a> is the most common form of identification on computer systems today and the password is the most common form of authentication.<sup id="cite_ref-150" class="reference"><a href="#cite_note-150"><span class="cite-bracket">&#91;</span>150<span class="cite-bracket">&#93;</span></a></sup> Usernames and passwords have served their purpose, but they are increasingly inadequate.<sup id="cite_ref-151" class="reference"><a href="#cite_note-151"><span class="cite-bracket">&#91;</span>151<span class="cite-bracket">&#93;</span></a></sup> Usernames and passwords are slowly being replaced or supplemented with more sophisticated authentication mechanisms such as <a href="/wiki/Time-based_one-time_password" title="Time-based one-time password">time-based one-time password algorithms</a>.<sup id="cite_ref-152" class="reference"><a href="#cite_note-152"><span class="cite-bracket">&#91;</span>152<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Authorization">Authorization</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=19" title="Edit section: Authorization"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>After a person, program or computer has successfully been identified and authenticated then it must be determined what informational resources they are permitted to access and what actions they will be allowed to perform (run, view, create, delete, or change).<sup id="cite_ref-153" class="reference"><a href="#cite_note-153"><span class="cite-bracket">&#91;</span>153<span class="cite-bracket">&#93;</span></a></sup> This is called <a href="/wiki/Authorization" title="Authorization">authorization</a>. Authorization to access information and other computing services begins with administrative policies and procedures.<sup id="cite_ref-154" class="reference"><a href="#cite_note-154"><span class="cite-bracket">&#91;</span>154<span class="cite-bracket">&#93;</span></a></sup> The policies prescribe what information and computing services can be accessed, by whom, and under what conditions. The access control mechanisms are then configured to enforce these policies.<sup id="cite_ref-155" class="reference"><a href="#cite_note-155"><span class="cite-bracket">&#91;</span>155<span class="cite-bracket">&#93;</span></a></sup> Different computing systems are equipped with different kinds of access control mechanisms. Some may even offer a choice of different access control mechanisms.<sup id="cite_ref-156" class="reference"><a href="#cite_note-156"><span class="cite-bracket">&#91;</span>156<span class="cite-bracket">&#93;</span></a></sup> The access control mechanism a system offers will be based upon one of three approaches to access control, or it may be derived from a combination of the three approaches.<sup id="cite_ref-AndressTheBasics14_61-2" class="reference"><a href="#cite_note-AndressTheBasics14-61"><span class="cite-bracket">&#91;</span>61<span class="cite-bracket">&#93;</span></a></sup> </p><p>The non-discretionary approach consolidates all access control under a centralized administration.<sup id="cite_ref-discretionary_access_control_157-0" class="reference"><a href="#cite_note-discretionary_access_control-157"><span class="cite-bracket">&#91;</span>157<span class="cite-bracket">&#93;</span></a></sup> The access to information and other resources is usually based on the individuals function (role) in the organization or the tasks the individual must perform.<sup id="cite_ref-IS_1_158-0" class="reference"><a href="#cite_note-IS_1-158"><span class="cite-bracket">&#91;</span>158<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-159" class="reference"><a href="#cite_note-159"><span class="cite-bracket">&#91;</span>159<span class="cite-bracket">&#93;</span></a></sup> The discretionary approach gives the creator or owner of the information resource the ability to control access to those resources.<sup id="cite_ref-discretionary_access_control_157-1" class="reference"><a href="#cite_note-discretionary_access_control-157"><span class="cite-bracket">&#91;</span>157<span class="cite-bracket">&#93;</span></a></sup> In the mandatory access control approach, access is granted or denied basing upon the security classification assigned to the information resource.<sup id="cite_ref-ACM_Press_130-1" class="reference"><a href="#cite_note-ACM_Press-130"><span class="cite-bracket">&#91;</span>130<span class="cite-bracket">&#93;</span></a></sup> </p><p>Examples of common access control mechanisms in use today include <a href="/wiki/Role-Based_Access_Control" class="mw-redirect" title="Role-Based Access Control">role-based access control</a>, available in many advanced database management systems; simple <a href="/wiki/File_system_permissions" class="mw-redirect" title="File system permissions">file permissions</a> provided in the UNIX and Windows operating systems;<sup id="cite_ref-160" class="reference"><a href="#cite_note-160"><span class="cite-bracket">&#91;</span>160<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Group_Policy_Object" class="mw-redirect" title="Group Policy Object">Group Policy Objects</a> provided in Windows network systems; and <a href="/wiki/Kerberos_(protocol)" title="Kerberos (protocol)">Kerberos</a>, <a href="/wiki/RADIUS" title="RADIUS">RADIUS</a>, <a href="/wiki/TACACS" title="TACACS">TACACS</a>, and the simple access lists used in many <a href="/wiki/Firewall_(networking)" class="mw-redirect" title="Firewall (networking)">firewalls</a> and <a href="/wiki/Router_(computing)" title="Router (computing)">routers</a>.<sup id="cite_ref-161" class="reference"><a href="#cite_note-161"><span class="cite-bracket">&#91;</span>161<span class="cite-bracket">&#93;</span></a></sup> </p><p>To be effective, policies and other security controls must be enforceable and upheld. Effective policies ensure that people are held accountable for their actions.<sup id="cite_ref-162" class="reference"><a href="#cite_note-162"><span class="cite-bracket">&#91;</span>162<span class="cite-bracket">&#93;</span></a></sup> The <a href="/wiki/United_States_Department_of_the_Treasury" title="United States Department of the Treasury">U.S. Treasury</a>'s guidelines for systems processing sensitive or proprietary information, for example, states that all failed and successful authentication and access attempts must be logged, and all access to information must leave some type of <a href="/wiki/Audit_trail" title="Audit trail">audit trail</a>.<sup id="cite_ref-163" class="reference"><a href="#cite_note-163"><span class="cite-bracket">&#91;</span>163<span class="cite-bracket">&#93;</span></a></sup> </p><p>Also, the need-to-know principle needs to be in effect when talking about access control. This principle gives access rights to a person to perform their job functions.<sup id="cite_ref-164" class="reference"><a href="#cite_note-164"><span class="cite-bracket">&#91;</span>164<span class="cite-bracket">&#93;</span></a></sup> This principle is used in the government when dealing with difference clearances.<sup id="cite_ref-165" class="reference"><a href="#cite_note-165"><span class="cite-bracket">&#91;</span>165<span class="cite-bracket">&#93;</span></a></sup> Even though two employees in different departments have a <a href="/wiki/Classified_information" title="Classified information">top-secret clearance</a>, they must have a need-to-know in order for information to be exchanged. Within the need-to-know principle, network administrators grant the employee the least amount of privilege to prevent employees from accessing more than what they are supposed to.<sup id="cite_ref-166" class="reference"><a href="#cite_note-166"><span class="cite-bracket">&#91;</span>166<span class="cite-bracket">&#93;</span></a></sup> Need-to-know helps to enforce the confidentiality-integrity-availability triad. Need-to-know directly impacts the confidential area of the triad.<sup id="cite_ref-167" class="reference"><a href="#cite_note-167"><span class="cite-bracket">&#91;</span>167<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Cryptography">Cryptography</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=20" title="Edit section: Cryptography"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Cryptography" title="Cryptography">Cryptography</a></div> <p>Information security uses <a href="/wiki/Cryptography" title="Cryptography">cryptography</a> to transform usable information into a form that renders it unusable by anyone other than an authorized user; this process is called <a href="/wiki/Encryption" title="Encryption">encryption</a>.<sup id="cite_ref-168" class="reference"><a href="#cite_note-168"><span class="cite-bracket">&#91;</span>168<span class="cite-bracket">&#93;</span></a></sup> Information that has been encrypted (rendered unusable) can be transformed back into its original usable form by an authorized user who possesses the <a href="/wiki/Key_(cryptography)" title="Key (cryptography)">cryptographic key</a>, through the process of decryption.<sup id="cite_ref-169" class="reference"><a href="#cite_note-169"><span class="cite-bracket">&#91;</span>169<span class="cite-bracket">&#93;</span></a></sup> Cryptography is used in information security to protect information from unauthorized or accidental disclosure while the <a href="/wiki/Information" title="Information">information</a> is in transit (either electronically or physically) and while information is in storage.<sup id="cite_ref-AndressTheBasics14_61-3" class="reference"><a href="#cite_note-AndressTheBasics14-61"><span class="cite-bracket">&#91;</span>61<span class="cite-bracket">&#93;</span></a></sup> </p><p>Cryptography provides information security with other useful applications as well, including improved authentication methods, message digests, digital signatures, <a href="/wiki/Non-repudiation" title="Non-repudiation">non-repudiation</a>, and encrypted network communications.<sup id="cite_ref-170" class="reference"><a href="#cite_note-170"><span class="cite-bracket">&#91;</span>170<span class="cite-bracket">&#93;</span></a></sup> Older, less secure applications such as <a href="/wiki/Telnet" title="Telnet">Telnet</a> and <a href="/wiki/File_Transfer_Protocol" title="File Transfer Protocol">File Transfer Protocol</a> (FTP) are slowly being replaced with more secure applications such as <a href="/wiki/Secure_Shell" title="Secure Shell">Secure Shell</a> (SSH) that use encrypted network communications.<sup id="cite_ref-URK_1_171-0" class="reference"><a href="#cite_note-URK_1-171"><span class="cite-bracket">&#91;</span>171<span class="cite-bracket">&#93;</span></a></sup> Wireless communications can be encrypted using protocols such as <a href="/wiki/Wi-Fi_Protected_Access" title="Wi-Fi Protected Access">WPA/WPA2</a> or the older (and less secure) <a href="/wiki/Wired_Equivalent_Privacy" title="Wired Equivalent Privacy">WEP</a>. Wired communications (such as <a href="/wiki/ITU-T" title="ITU-T">ITU‑T</a> <a href="/wiki/G.hn" title="G.hn">G.hn</a>) are secured using <a href="/wiki/Advanced_Encryption_Standard" title="Advanced Encryption Standard">AES</a> for encryption and <a href="/wiki/X.1035" title="X.1035">X.1035</a> for authentication and key exchange.<sup id="cite_ref-172" class="reference"><a href="#cite_note-172"><span class="cite-bracket">&#91;</span>172<span class="cite-bracket">&#93;</span></a></sup> Software applications such as <a href="/wiki/GnuPG" class="mw-redirect" title="GnuPG">GnuPG</a> or <a href="/wiki/Pretty_Good_Privacy" title="Pretty Good Privacy">PGP</a> can be used to encrypt data files and email.<sup id="cite_ref-173" class="reference"><a href="#cite_note-173"><span class="cite-bracket">&#91;</span>173<span class="cite-bracket">&#93;</span></a></sup> </p><p>Cryptography can introduce security problems when it is not implemented correctly.<sup id="cite_ref-174" class="reference"><a href="#cite_note-174"><span class="cite-bracket">&#91;</span>174<span class="cite-bracket">&#93;</span></a></sup> Cryptographic solutions need to be implemented using industry-accepted solutions that have undergone rigorous peer review by independent experts in cryptography.<sup id="cite_ref-175" class="reference"><a href="#cite_note-175"><span class="cite-bracket">&#91;</span>175<span class="cite-bracket">&#93;</span></a></sup> The <a href="/wiki/Key_size" title="Key size">length and strength</a> of the encryption key is also an important consideration.<sup id="cite_ref-Key_Encryption_Key_176-0" class="reference"><a href="#cite_note-Key_Encryption_Key-176"><span class="cite-bracket">&#91;</span>176<span class="cite-bracket">&#93;</span></a></sup> A key that is <a href="/wiki/Weak_key" title="Weak key">weak</a> or too short will produce <a href="/wiki/Weak_encryption" class="mw-redirect" title="Weak encryption">weak encryption</a>.<sup id="cite_ref-Key_Encryption_Key_176-1" class="reference"><a href="#cite_note-Key_Encryption_Key-176"><span class="cite-bracket">&#91;</span>176<span class="cite-bracket">&#93;</span></a></sup> The keys used for encryption and decryption must be protected with the same degree of rigor as any other confidential information.<sup id="cite_ref-177" class="reference"><a href="#cite_note-177"><span class="cite-bracket">&#91;</span>177<span class="cite-bracket">&#93;</span></a></sup> They must be protected from unauthorized disclosure and destruction, and they must be available when needed.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="link no longer works (November 2023)">citation needed</span></a></i>&#93;</sup> <a href="/wiki/Public_key_infrastructure" title="Public key infrastructure">Public key infrastructure</a> (PKI) solutions address many of the problems that surround <a href="/wiki/Key_management" title="Key management">key management</a>.<sup id="cite_ref-AndressTheBasics14_61-4" class="reference"><a href="#cite_note-AndressTheBasics14-61"><span class="cite-bracket">&#91;</span>61<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Process">Process</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=21" title="Edit section: Process"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>U.S. <a href="/wiki/Federal_Sentencing_Guidelines" class="mw-redirect" title="Federal Sentencing Guidelines">Federal Sentencing Guidelines</a> now make it possible to hold corporate officers liable for failing to exercise due care and due diligence in the management of their information systems.<sup id="cite_ref-VallabhaneniCorporate08_178-0" class="reference"><a href="#cite_note-VallabhaneniCorporate08-178"><span class="cite-bracket">&#91;</span>178<span class="cite-bracket">&#93;</span></a></sup> </p><p>In the field of information security, Harris<sup id="cite_ref-179" class="reference"><a href="#cite_note-179"><span class="cite-bracket">&#91;</span>179<span class="cite-bracket">&#93;</span></a></sup> offers the following definitions of due care and due diligence: </p> <blockquote><p><i>"Due care are steps that are taken to show that a company has taken responsibility for the activities that take place within the corporation and has taken the necessary steps to help protect the company, its resources, and employees</i><sup id="cite_ref-180" class="reference"><a href="#cite_note-180"><span class="cite-bracket">&#91;</span>180<span class="cite-bracket">&#93;</span></a></sup><i>."</i> And, [Due diligence are the] <i>"continual activities that make sure the protection mechanisms are continually maintained and operational."</i><sup id="cite_ref-181" class="reference"><a href="#cite_note-181"><span class="cite-bracket">&#91;</span>181<span class="cite-bracket">&#93;</span></a></sup> </p></blockquote> <p>Attention should be made to two important points in these definitions.<sup id="cite_ref-182" class="reference"><a href="#cite_note-182"><span class="cite-bracket">&#91;</span>182<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-183" class="reference"><a href="#cite_note-183"><span class="cite-bracket">&#91;</span>183<span class="cite-bracket">&#93;</span></a></sup> First, in due care, steps are taken to show; this means that the steps can be verified, measured, or even produce tangible artifacts.<sup id="cite_ref-184" class="reference"><a href="#cite_note-184"><span class="cite-bracket">&#91;</span>184<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-185" class="reference"><a href="#cite_note-185"><span class="cite-bracket">&#91;</span>185<span class="cite-bracket">&#93;</span></a></sup> Second, in due diligence, there are continual activities; this means that people are actually doing things to monitor and maintain the protection mechanisms, and these activities are ongoing.<sup id="cite_ref-186" class="reference"><a href="#cite_note-186"><span class="cite-bracket">&#91;</span>186<span class="cite-bracket">&#93;</span></a></sup> </p><p>Organizations have a responsibility with practicing duty of care when applying information security. The Duty of Care Risk Analysis Standard (DoCRA)<sup id="cite_ref-187" class="reference"><a href="#cite_note-187"><span class="cite-bracket">&#91;</span>187<span class="cite-bracket">&#93;</span></a></sup> provides principles and practices for evaluating risk.<sup id="cite_ref-188" class="reference"><a href="#cite_note-188"><span class="cite-bracket">&#91;</span>188<span class="cite-bracket">&#93;</span></a></sup> It considers all parties that could be affected by those risks.<sup id="cite_ref-189" class="reference"><a href="#cite_note-189"><span class="cite-bracket">&#91;</span>189<span class="cite-bracket">&#93;</span></a></sup> DoCRA helps evaluate safeguards if they are appropriate in protecting others from harm while presenting a reasonable burden.<sup id="cite_ref-190" class="reference"><a href="#cite_note-190"><span class="cite-bracket">&#91;</span>190<span class="cite-bracket">&#93;</span></a></sup> With increased data breach litigation, companies must balance security controls, compliance, and its mission.<sup id="cite_ref-191" class="reference"><a href="#cite_note-191"><span class="cite-bracket">&#91;</span>191<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Incident_response_plans">Incident response plans</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=22" title="Edit section: Incident response plans"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Computer_security_incident_management" title="Computer security incident management">Computer security incident management</a></div> <p>Computer security incident management is a specialized form of incident management focused on monitoring, detecting, and responding to security events on computers and networks in a predictable way.<sup id="cite_ref-192" class="reference"><a href="#cite_note-192"><span class="cite-bracket">&#91;</span>192<span class="cite-bracket">&#93;</span></a></sup> </p><p>Organizations implement this through incident response plans (IRPs) that are activated when security breaches are detected.<sup id="cite_ref-193" class="reference"><a href="#cite_note-193"><span class="cite-bracket">&#91;</span>193<span class="cite-bracket">&#93;</span></a></sup> These plans typically involve an incident response team (IRT) with specialized skills in areas like penetration testing, computer forensics, and network security.<sup id="cite_ref-194" class="reference"><a href="#cite_note-194"><span class="cite-bracket">&#91;</span>194<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Change_management">Change management</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=23" title="Edit section: Change management"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Change_management_(ITSM)" title="Change management (ITSM)">Change management (ITSM)</a></div> <p>Change management is a formal process for directing and controlling alterations to the information processing environment.<sup id="cite_ref-195" class="reference"><a href="#cite_note-195"><span class="cite-bracket">&#91;</span>195<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-196" class="reference"><a href="#cite_note-196"><span class="cite-bracket">&#91;</span>196<span class="cite-bracket">&#93;</span></a></sup> This includes alterations to desktop computers, the network, servers, and software.<sup id="cite_ref-197" class="reference"><a href="#cite_note-197"><span class="cite-bracket">&#91;</span>197<span class="cite-bracket">&#93;</span></a></sup> The objectives of change management are to reduce the risks posed by changes to the information processing environment and improve the stability and reliability of the processing environment as changes are made.<sup id="cite_ref-198" class="reference"><a href="#cite_note-198"><span class="cite-bracket">&#91;</span>198<span class="cite-bracket">&#93;</span></a></sup> It is not the objective of change management to prevent or hinder necessary changes from being implemented.<sup id="cite_ref-CampbellPractical16_199-0" class="reference"><a href="#cite_note-CampbellPractical16-199"><span class="cite-bracket">&#91;</span>199<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-200" class="reference"><a href="#cite_note-200"><span class="cite-bracket">&#91;</span>200<span class="cite-bracket">&#93;</span></a></sup> </p><p>Any change to the information processing environment introduces an element of risk.<sup id="cite_ref-201" class="reference"><a href="#cite_note-201"><span class="cite-bracket">&#91;</span>201<span class="cite-bracket">&#93;</span></a></sup> Even apparently simple changes can have unexpected effects.<sup id="cite_ref-202" class="reference"><a href="#cite_note-202"><span class="cite-bracket">&#91;</span>202<span class="cite-bracket">&#93;</span></a></sup> One of management's many responsibilities is the management of risk.<sup id="cite_ref-203" class="reference"><a href="#cite_note-203"><span class="cite-bracket">&#91;</span>203<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-204" class="reference"><a href="#cite_note-204"><span class="cite-bracket">&#91;</span>204<span class="cite-bracket">&#93;</span></a></sup> Change management is a tool for managing the risks introduced by changes to the information processing environment.<sup id="cite_ref-205" class="reference"><a href="#cite_note-205"><span class="cite-bracket">&#91;</span>205<span class="cite-bracket">&#93;</span></a></sup> Part of the change management process ensures that changes are not implemented at inopportune times when they may disrupt critical business processes or interfere with other changes being implemented.<sup id="cite_ref-206" class="reference"><a href="#cite_note-206"><span class="cite-bracket">&#91;</span>206<span class="cite-bracket">&#93;</span></a></sup> </p><p>Not every change needs to be managed.<sup id="cite_ref-207" class="reference"><a href="#cite_note-207"><span class="cite-bracket">&#91;</span>207<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-208" class="reference"><a href="#cite_note-208"><span class="cite-bracket">&#91;</span>208<span class="cite-bracket">&#93;</span></a></sup> Some kinds of changes are a part of the everyday routine of information processing and adhere to a predefined procedure, which reduces the overall level of risk to the processing environment.<sup id="cite_ref-209" class="reference"><a href="#cite_note-209"><span class="cite-bracket">&#91;</span>209<span class="cite-bracket">&#93;</span></a></sup> Creating a new user account or deploying a new desktop computer are examples of changes that do not generally require change management.<sup id="cite_ref-210" class="reference"><a href="#cite_note-210"><span class="cite-bracket">&#91;</span>210<span class="cite-bracket">&#93;</span></a></sup> However, relocating user file shares, or upgrading the Email server pose a much higher level of risk to the processing environment and are not a normal everyday activity.<sup id="cite_ref-211" class="reference"><a href="#cite_note-211"><span class="cite-bracket">&#91;</span>211<span class="cite-bracket">&#93;</span></a></sup> The critical first steps in change management are (a) defining change (and communicating that definition) and (b) defining the scope of the change system.<sup id="cite_ref-212" class="reference"><a href="#cite_note-212"><span class="cite-bracket">&#91;</span>212<span class="cite-bracket">&#93;</span></a></sup> </p><p>Change management is usually overseen by a change review board composed of representatives from key business areas,<sup id="cite_ref-213" class="reference"><a href="#cite_note-213"><span class="cite-bracket">&#91;</span>213<span class="cite-bracket">&#93;</span></a></sup> security, networking, systems administrators, database administration, application developers, desktop support, and the help desk.<sup id="cite_ref-214" class="reference"><a href="#cite_note-214"><span class="cite-bracket">&#91;</span>214<span class="cite-bracket">&#93;</span></a></sup> The tasks of the change review board can be facilitated with the use of automated work flow application.<sup id="cite_ref-215" class="reference"><a href="#cite_note-215"><span class="cite-bracket">&#91;</span>215<span class="cite-bracket">&#93;</span></a></sup> The responsibility of the change review board is to ensure the organization's documented change management procedures are followed.<sup id="cite_ref-216" class="reference"><a href="#cite_note-216"><span class="cite-bracket">&#91;</span>216<span class="cite-bracket">&#93;</span></a></sup> The change management process is as follows<sup id="cite_ref-TaylorProject08_217-0" class="reference"><a href="#cite_note-TaylorProject08-217"><span class="cite-bracket">&#91;</span>217<span class="cite-bracket">&#93;</span></a></sup> </p> <ul><li><b>Request</b>: Anyone can request a change.<sup id="cite_ref-218" class="reference"><a href="#cite_note-218"><span class="cite-bracket">&#91;</span>218<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-219" class="reference"><a href="#cite_note-219"><span class="cite-bracket">&#91;</span>219<span class="cite-bracket">&#93;</span></a></sup> The person making the change request may or may not be the same person that performs the analysis or implements the change.<sup id="cite_ref-220" class="reference"><a href="#cite_note-220"><span class="cite-bracket">&#91;</span>220<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-221" class="reference"><a href="#cite_note-221"><span class="cite-bracket">&#91;</span>221<span class="cite-bracket">&#93;</span></a></sup> When a request for change is received, it may undergo a preliminary review to determine if the requested change is compatible with the organizations <a href="/wiki/Business_model" title="Business model">business model</a> and practices, and to determine the amount of resources needed to implement the change.<sup id="cite_ref-222" class="reference"><a href="#cite_note-222"><span class="cite-bracket">&#91;</span>222<span class="cite-bracket">&#93;</span></a></sup></li> <li><b>Approve</b>: Management runs the business and controls the allocation of resources therefore, management must approve requests for changes and assign a priority for every change.<sup id="cite_ref-223" class="reference"><a href="#cite_note-223"><span class="cite-bracket">&#91;</span>223<span class="cite-bracket">&#93;</span></a></sup> Management might choose to reject a change request if the change is not compatible with the business model, industry standards or best practices.<sup id="cite_ref-224" class="reference"><a href="#cite_note-224"><span class="cite-bracket">&#91;</span>224<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-225" class="reference"><a href="#cite_note-225"><span class="cite-bracket">&#91;</span>225<span class="cite-bracket">&#93;</span></a></sup> Management might also choose to reject a change request if the change requires more resources than can be allocated for the change.<sup id="cite_ref-226" class="reference"><a href="#cite_note-226"><span class="cite-bracket">&#91;</span>226<span class="cite-bracket">&#93;</span></a></sup></li> <li><b>Plan</b>: Planning a change involves discovering the scope and impact of the proposed change; analyzing the complexity of the change; allocation of resources and, developing, testing, and documenting both implementation and back-out plans.<sup id="cite_ref-227" class="reference"><a href="#cite_note-227"><span class="cite-bracket">&#91;</span>227<span class="cite-bracket">&#93;</span></a></sup> Need to define the criteria on which a decision to back out will be made.<sup id="cite_ref-228" class="reference"><a href="#cite_note-228"><span class="cite-bracket">&#91;</span>228<span class="cite-bracket">&#93;</span></a></sup></li> <li><b>Test</b>: Every change must be tested in a safe test environment, which closely reflects the actual production environment, before the change is applied to the production environment.<sup id="cite_ref-229" class="reference"><a href="#cite_note-229"><span class="cite-bracket">&#91;</span>229<span class="cite-bracket">&#93;</span></a></sup> The backout plan must also be tested.<sup id="cite_ref-230" class="reference"><a href="#cite_note-230"><span class="cite-bracket">&#91;</span>230<span class="cite-bracket">&#93;</span></a></sup></li> <li><b>Schedule</b>: Part of the change review board's responsibility is to assist in the scheduling of changes by reviewing the proposed implementation date for potential conflicts with other scheduled changes or critical business activities.<sup id="cite_ref-231" class="reference"><a href="#cite_note-231"><span class="cite-bracket">&#91;</span>231<span class="cite-bracket">&#93;</span></a></sup></li> <li><b>Communicate</b>: Once a change has been scheduled it must be communicated.<sup id="cite_ref-232" class="reference"><a href="#cite_note-232"><span class="cite-bracket">&#91;</span>232<span class="cite-bracket">&#93;</span></a></sup> The communication is to give others the opportunity to remind the change review board about other changes or critical business activities that might have been overlooked when scheduling the change.<sup id="cite_ref-233" class="reference"><a href="#cite_note-233"><span class="cite-bracket">&#91;</span>233<span class="cite-bracket">&#93;</span></a></sup> The communication also serves to make the help desk and users aware that a change is about to occur.<sup id="cite_ref-234" class="reference"><a href="#cite_note-234"><span class="cite-bracket">&#91;</span>234<span class="cite-bracket">&#93;</span></a></sup> Another responsibility of the change review board is to ensure that scheduled changes have been properly communicated to those who will be affected by the change or otherwise have an interest in the change.<sup id="cite_ref-235" class="reference"><a href="#cite_note-235"><span class="cite-bracket">&#91;</span>235<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-236" class="reference"><a href="#cite_note-236"><span class="cite-bracket">&#91;</span>236<span class="cite-bracket">&#93;</span></a></sup></li> <li><b>Implement</b>: At the appointed date and time, the changes must be implemented.<sup id="cite_ref-237" class="reference"><a href="#cite_note-237"><span class="cite-bracket">&#91;</span>237<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-238" class="reference"><a href="#cite_note-238"><span class="cite-bracket">&#91;</span>238<span class="cite-bracket">&#93;</span></a></sup> Part of the planning process was to develop an implementation plan, testing plan and, a back out plan.<sup id="cite_ref-239" class="reference"><a href="#cite_note-239"><span class="cite-bracket">&#91;</span>239<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-240" class="reference"><a href="#cite_note-240"><span class="cite-bracket">&#91;</span>240<span class="cite-bracket">&#93;</span></a></sup> If the implementation of the change should fail or, the post implementation testing fails or, other "drop dead" criteria have been met, the back out plan should be implemented.<sup id="cite_ref-241" class="reference"><a href="#cite_note-241"><span class="cite-bracket">&#91;</span>241<span class="cite-bracket">&#93;</span></a></sup></li> <li><b>Document</b>: All changes must be documented.<sup id="cite_ref-242" class="reference"><a href="#cite_note-242"><span class="cite-bracket">&#91;</span>242<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-243" class="reference"><a href="#cite_note-243"><span class="cite-bracket">&#91;</span>243<span class="cite-bracket">&#93;</span></a></sup> The documentation includes the initial request for change, its approval, the priority assigned to it, the implementation,<sup id="cite_ref-244" class="reference"><a href="#cite_note-244"><span class="cite-bracket">&#91;</span>244<span class="cite-bracket">&#93;</span></a></sup> testing and back out plans, the results of the change review board critique, the date/time the change was implemented,<sup id="cite_ref-245" class="reference"><a href="#cite_note-245"><span class="cite-bracket">&#91;</span>245<span class="cite-bracket">&#93;</span></a></sup> who implemented it, and whether the change was implemented successfully, failed or postponed.<sup id="cite_ref-246" class="reference"><a href="#cite_note-246"><span class="cite-bracket">&#91;</span>246<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-247" class="reference"><a href="#cite_note-247"><span class="cite-bracket">&#91;</span>247<span class="cite-bracket">&#93;</span></a></sup></li> <li><b>Post-change review</b>: The change review board should hold a post-implementation review of changes.<sup id="cite_ref-Soriani_248-0" class="reference"><a href="#cite_note-Soriani-248"><span class="cite-bracket">&#91;</span>248<span class="cite-bracket">&#93;</span></a></sup> It is particularly important to review failed and backed out changes. The review board should try to understand the problems that were encountered, and look for areas for improvement.<sup id="cite_ref-Soriani_248-1" class="reference"><a href="#cite_note-Soriani-248"><span class="cite-bracket">&#91;</span>248<span class="cite-bracket">&#93;</span></a></sup></li></ul> <p>Change management procedures that are simple to follow and easy to use can greatly reduce the overall risks created when changes are made to the information processing environment.<sup id="cite_ref-249" class="reference"><a href="#cite_note-249"><span class="cite-bracket">&#91;</span>249<span class="cite-bracket">&#93;</span></a></sup> Good change management procedures improve the overall quality and success of changes as they are implemented.<sup id="cite_ref-250" class="reference"><a href="#cite_note-250"><span class="cite-bracket">&#91;</span>250<span class="cite-bracket">&#93;</span></a></sup> This is accomplished through planning, peer review, documentation, and communication.<sup id="cite_ref-251" class="reference"><a href="#cite_note-251"><span class="cite-bracket">&#91;</span>251<span class="cite-bracket">&#93;</span></a></sup> </p><p><a href="/wiki/ISO/IEC_20000" title="ISO/IEC 20000">ISO/IEC 20000</a>, The Visible OPS Handbook: Implementing ITIL in 4 Practical and Auditable Steps<sup id="cite_ref-252" class="reference"><a href="#cite_note-252"><span class="cite-bracket">&#91;</span>252<span class="cite-bracket">&#93;</span></a></sup> (Full book summary),<sup id="cite_ref-253" class="reference"><a href="#cite_note-253"><span class="cite-bracket">&#91;</span>253<span class="cite-bracket">&#93;</span></a></sup> and <a href="/wiki/ITIL" title="ITIL">ITIL</a> all provide valuable guidance on implementing an efficient and effective change management program information security.<sup id="cite_ref-254" class="reference"><a href="#cite_note-254"><span class="cite-bracket">&#91;</span>254<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Business_continuity">Business continuity</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=24" title="Edit section: Business continuity"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Business_continuity_planning" title="Business continuity planning">Business continuity planning</a></div> <p>Business continuity management (<a href="/wiki/Business_continuity_planning" title="Business continuity planning">BCM</a>) concerns arrangements aiming to protect an organization's critical business functions from interruption due to incidents, or at least minimize the effects.<sup id="cite_ref-255" class="reference"><a href="#cite_note-255"><span class="cite-bracket">&#91;</span>255<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-256" class="reference"><a href="#cite_note-256"><span class="cite-bracket">&#91;</span>256<span class="cite-bracket">&#93;</span></a></sup> BCM is essential to any organization to keep technology and business in line with current threats to the continuation of business as usual.<sup id="cite_ref-257" class="reference"><a href="#cite_note-257"><span class="cite-bracket">&#91;</span>257<span class="cite-bracket">&#93;</span></a></sup> The BCM should be included in an organizations <a href="/wiki/Risk_analysis" class="mw-redirect" title="Risk analysis">risk analysis</a> plan to ensure that all of the necessary business functions have what they need to keep going in the event of any type of threat to any business function.<sup id="cite_ref-258" class="reference"><a href="#cite_note-258"><span class="cite-bracket">&#91;</span>258<span class="cite-bracket">&#93;</span></a></sup> </p><p>It encompasses: </p> <ul><li>Analysis of requirements, e.g., identifying critical business functions, dependencies and potential failure points, potential threats and hence incidents or risks of concern to the organization;<sup id="cite_ref-259" class="reference"><a href="#cite_note-259"><span class="cite-bracket">&#91;</span>259<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-260" class="reference"><a href="#cite_note-260"><span class="cite-bracket">&#91;</span>260<span class="cite-bracket">&#93;</span></a></sup></li> <li>Specification, e.g., maximum tolerable outage periods; recovery point objectives (maximum acceptable periods of data loss);<sup id="cite_ref-261" class="reference"><a href="#cite_note-261"><span class="cite-bracket">&#91;</span>261<span class="cite-bracket">&#93;</span></a></sup></li> <li>Architecture and design, e.g., an appropriate combination of approaches including resilience (e.g. engineering IT systems and processes for high availability,<sup id="cite_ref-262" class="reference"><a href="#cite_note-262"><span class="cite-bracket">&#91;</span>262<span class="cite-bracket">&#93;</span></a></sup> avoiding or preventing situations that might interrupt the business), incident and emergency management (e.g., evacuating premises, calling the emergency services, triage/situation<sup id="cite_ref-263" class="reference"><a href="#cite_note-263"><span class="cite-bracket">&#91;</span>263<span class="cite-bracket">&#93;</span></a></sup> assessment and invoking recovery plans), recovery (e.g., rebuilding) and contingency management (generic capabilities to deal positively with whatever occurs using whatever resources are available);<sup id="cite_ref-264" class="reference"><a href="#cite_note-264"><span class="cite-bracket">&#91;</span>264<span class="cite-bracket">&#93;</span></a></sup></li> <li>Implementation, e.g., configuring and scheduling backups, data transfers, etc., duplicating and strengthening critical elements; contracting with service and equipment suppliers;</li> <li>Testing, e.g., business continuity exercises of various types, costs and assurance levels;<sup id="cite_ref-265" class="reference"><a href="#cite_note-265"><span class="cite-bracket">&#91;</span>265<span class="cite-bracket">&#93;</span></a></sup></li> <li>Management, e.g., defining strategies, setting objectives and goals; planning and directing the work; allocating funds, people and other resources; prioritization relative to other activities; team building, leadership, control, motivation and coordination with other business functions and activities<sup id="cite_ref-266" class="reference"><a href="#cite_note-266"><span class="cite-bracket">&#91;</span>266<span class="cite-bracket">&#93;</span></a></sup> (e.g., IT, facilities, human resources, risk management, information risk and security, operations); monitoring the situation, checking and updating the arrangements when things change; maturing the approach through continuous improvement, learning and appropriate investment;<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (June 2021)">citation needed</span></a></i>&#93;</sup></li> <li>Assurance, e.g., testing against specified requirements; measuring, analyzing, and reporting key parameters; conducting additional tests, reviews and audits for greater confidence that the arrangements will go to plan if invoked.<sup id="cite_ref-267" class="reference"><a href="#cite_note-267"><span class="cite-bracket">&#91;</span>267<span class="cite-bracket">&#93;</span></a></sup></li></ul> <p>Whereas BCM takes a broad approach to minimizing disaster-related risks by reducing both the probability and the severity of incidents, a <a href="/wiki/Disaster_recovery_plan" class="mw-redirect" title="Disaster recovery plan">disaster recovery plan</a> (DRP) focuses specifically on resuming business operations as quickly as possible after a disaster.<sup id="cite_ref-268" class="reference"><a href="#cite_note-268"><span class="cite-bracket">&#91;</span>268<span class="cite-bracket">&#93;</span></a></sup> A disaster recovery plan, invoked soon after a disaster occurs, lays out the steps necessary to recover critical <a href="/wiki/Information_and_communications_technology" title="Information and communications technology">information and communications technology</a> (ICT) infrastructure.<sup id="cite_ref-269" class="reference"><a href="#cite_note-269"><span class="cite-bracket">&#91;</span>269<span class="cite-bracket">&#93;</span></a></sup> Disaster recovery planning includes establishing a planning group, performing risk assessment, establishing priorities, developing recovery strategies, preparing inventories and documentation of the plan, developing verification criteria and procedure, and lastly implementing the plan.<sup id="cite_ref-270" class="reference"><a href="#cite_note-270"><span class="cite-bracket">&#91;</span>270<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Laws_and_regulations">Laws and regulations</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=25" title="Edit section: Laws and regulations"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Privacy_International_2007_privacy_ranking_map.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/2/2c/Privacy_International_2007_privacy_ranking_map.png/220px-Privacy_International_2007_privacy_ranking_map.png" decoding="async" width="220" height="102" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/2/2c/Privacy_International_2007_privacy_ranking_map.png/330px-Privacy_International_2007_privacy_ranking_map.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/2/2c/Privacy_International_2007_privacy_ranking_map.png/440px-Privacy_International_2007_privacy_ranking_map.png 2x" data-file-width="1357" data-file-height="628" /></a><figcaption><a href="/wiki/Privacy_International" title="Privacy International">Privacy International</a> 2007 privacy ranking<br />green: Protections and safeguards<br />red: Endemic surveillance societies</figcaption></figure> <p>Below is a partial listing of governmental laws and regulations in various parts of the world that have, had, or will have, a significant effect on data processing and information security.<sup id="cite_ref-dx.doi.org_271-0" class="reference"><a href="#cite_note-dx.doi.org-271"><span class="cite-bracket">&#91;</span>271<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-272" class="reference"><a href="#cite_note-272"><span class="cite-bracket">&#91;</span>272<span class="cite-bracket">&#93;</span></a></sup> Important industry sector regulations have also been included when they have a significant impact on information security.<sup id="cite_ref-dx.doi.org_271-1" class="reference"><a href="#cite_note-dx.doi.org-271"><span class="cite-bracket">&#91;</span>271<span class="cite-bracket">&#93;</span></a></sup> </p> <ul><li>The UK <a href="/wiki/Data_Protection_Act_1984" class="mw-redirect" title="Data Protection Act 1984">Data Protection Act 1998</a> makes new provisions for the regulation of the processing of information relating to individuals, including the obtaining, holding, use or disclosure of such information.<sup id="cite_ref-273" class="reference"><a href="#cite_note-273"><span class="cite-bracket">&#91;</span>273<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-274" class="reference"><a href="#cite_note-274"><span class="cite-bracket">&#91;</span>274<span class="cite-bracket">&#93;</span></a></sup> The European Union Data Protection Directive (EUDPD) requires that all E.U. members adopt national regulations to standardize the protection of <a href="/wiki/Information_privacy" title="Information privacy">data privacy</a> for citizens throughout the E.U.<sup id="cite_ref-275" class="reference"><a href="#cite_note-275"><span class="cite-bracket">&#91;</span>275<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-UKDataProtAct_276-0" class="reference"><a href="#cite_note-UKDataProtAct-276"><span class="cite-bracket">&#91;</span>276<span class="cite-bracket">&#93;</span></a></sup></li> <li>The <a href="/wiki/Computer_Misuse_Act" class="mw-redirect" title="Computer Misuse Act">Computer Misuse Act</a> 1990 is an Act of the <a href="/wiki/Parliament_of_the_United_Kingdom" title="Parliament of the United Kingdom">U.K. Parliament</a> making computer crime (e.g., hacking) a criminal offense.<sup id="cite_ref-277" class="reference"><a href="#cite_note-277"><span class="cite-bracket">&#91;</span>277<span class="cite-bracket">&#93;</span></a></sup> The act has become a model upon which several other countries,<sup id="cite_ref-278" class="reference"><a href="#cite_note-278"><span class="cite-bracket">&#91;</span>278<span class="cite-bracket">&#93;</span></a></sup> including <a href="/wiki/Canada" title="Canada">Canada</a> and <a href="/wiki/Republic_of_Ireland" title="Republic of Ireland">Ireland</a>, have drawn inspiration from when subsequently drafting their own information security laws.<sup id="cite_ref-279" class="reference"><a href="#cite_note-279"><span class="cite-bracket">&#91;</span>279<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-UKCompMisAct_280-0" class="reference"><a href="#cite_note-UKCompMisAct-280"><span class="cite-bracket">&#91;</span>280<span class="cite-bracket">&#93;</span></a></sup></li> <li>The E.U.'s <a href="/wiki/Data_Retention_Directive" title="Data Retention Directive">Data Retention Directive</a> (annulled) required internet service providers and phone companies to keep data on every electronic message sent and phone call made for between six months and two years.<sup id="cite_ref-EU24EC06_281-0" class="reference"><a href="#cite_note-EU24EC06-281"><span class="cite-bracket">&#91;</span>281<span class="cite-bracket">&#93;</span></a></sup></li> <li>The <a href="/wiki/Family_Educational_Rights_and_Privacy_Act" title="Family Educational Rights and Privacy Act">Family Educational Rights and Privacy Act</a> (FERPA) (<a href="/wiki/Title_20_of_the_United_States_Code" title="Title 20 of the United States Code">20&#160;U.S.C.</a>&#160;<a rel="nofollow" class="external text" href="https://www.law.cornell.edu/uscode/text/20/1232">§&#160;1232</a> g; 34 CFR Part 99) is a U.S. Federal law that protects the privacy of student education records.<sup id="cite_ref-282" class="reference"><a href="#cite_note-282"><span class="cite-bracket">&#91;</span>282<span class="cite-bracket">&#93;</span></a></sup> The law applies to all schools that receive funds under an applicable program of the <a href="/wiki/U.S._Department_of_Education" class="mw-redirect" title="U.S. Department of Education">U.S. Department of Education</a>.<sup id="cite_ref-ReferenceA_283-0" class="reference"><a href="#cite_note-ReferenceA-283"><span class="cite-bracket">&#91;</span>283<span class="cite-bracket">&#93;</span></a></sup> Generally, schools must have written permission from the parent or eligible student<sup id="cite_ref-ReferenceA_283-1" class="reference"><a href="#cite_note-ReferenceA-283"><span class="cite-bracket">&#91;</span>283<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-284" class="reference"><a href="#cite_note-284"><span class="cite-bracket">&#91;</span>284<span class="cite-bracket">&#93;</span></a></sup> in order to release any information from a student's education record.<sup id="cite_ref-FERPA_285-0" class="reference"><a href="#cite_note-FERPA-285"><span class="cite-bracket">&#91;</span>285<span class="cite-bracket">&#93;</span></a></sup></li> <li>The <a href="/wiki/Federal_Financial_Institutions_Examination_Council" title="Federal Financial Institutions Examination Council">Federal Financial Institutions Examination Council</a>'s (FFIEC) security guidelines for auditors specifies requirements for online banking security.<sup id="cite_ref-FFIECAudit_286-0" class="reference"><a href="#cite_note-FFIECAudit-286"><span class="cite-bracket">&#91;</span>286<span class="cite-bracket">&#93;</span></a></sup></li> <li>The <a href="/wiki/Health_Insurance_Portability_and_Accountability_Act" title="Health Insurance Portability and Accountability Act">Health Insurance Portability and Accountability Act</a> (HIPAA) of 1996 requires the adoption of national standards for electronic health care transactions and national identifiers for providers, health insurance plans, and employers.<sup id="cite_ref-287" class="reference"><a href="#cite_note-287"><span class="cite-bracket">&#91;</span>287<span class="cite-bracket">&#93;</span></a></sup> Additionally, it requires health care providers, insurance providers and employers to safeguard the security and privacy of health data.<sup id="cite_ref-HIPAAGPO_288-0" class="reference"><a href="#cite_note-HIPAAGPO-288"><span class="cite-bracket">&#91;</span>288<span class="cite-bracket">&#93;</span></a></sup></li> <li>The <a href="/wiki/Gramm%E2%80%93Leach%E2%80%93Bliley_Act" title="Gramm–Leach–Bliley Act">Gramm–Leach–Bliley Act</a> of 1999 (GLBA), also known as the Financial Services Modernization Act of 1999, protects the privacy and security of private financial information that financial institutions collect, hold, and process.<sup id="cite_ref-GLBAGPO_289-0" class="reference"><a href="#cite_note-GLBAGPO-289"><span class="cite-bracket">&#91;</span>289<span class="cite-bracket">&#93;</span></a></sup></li> <li>Section 404 of the <a href="/wiki/Sarbanes%E2%80%93Oxley_Act" title="Sarbanes–Oxley Act">Sarbanes–Oxley Act of 2002 (SOX)</a> requires publicly traded companies to assess the effectiveness of their internal controls for financial reporting in annual reports they submit at the end of each fiscal year.<sup id="cite_ref-290" class="reference"><a href="#cite_note-290"><span class="cite-bracket">&#91;</span>290<span class="cite-bracket">&#93;</span></a></sup> Chief information officers are responsible for the security, accuracy, and the reliability of the systems that manage and report the financial data.<sup id="cite_ref-291" class="reference"><a href="#cite_note-291"><span class="cite-bracket">&#91;</span>291<span class="cite-bracket">&#93;</span></a></sup> The act also requires publicly traded companies to engage with independent auditors who must attest to, and report on, the validity of their assessments.<sup id="cite_ref-SOAGPO_292-0" class="reference"><a href="#cite_note-SOAGPO-292"><span class="cite-bracket">&#91;</span>292<span class="cite-bracket">&#93;</span></a></sup></li> <li>The <a href="/wiki/Payment_Card_Industry_Data_Security_Standard" title="Payment Card Industry Data Security Standard">Payment Card Industry Data Security Standard (PCI DSS)</a> establishes comprehensive requirements for enhancing payment account data security.<sup id="cite_ref-293" class="reference"><a href="#cite_note-293"><span class="cite-bracket">&#91;</span>293<span class="cite-bracket">&#93;</span></a></sup> It was developed by the founding payment brands of the PCI Security Standards Council — including <a href="/wiki/American_Express" title="American Express">American Express</a>, <a href="/wiki/Discover_Card" title="Discover Card">Discover Financial Services</a>, JCB, MasterCard Worldwide,<sup id="cite_ref-294" class="reference"><a href="#cite_note-294"><span class="cite-bracket">&#91;</span>294<span class="cite-bracket">&#93;</span></a></sup> and <a href="/wiki/Visa_Inc." title="Visa Inc.">Visa International</a> — to help facilitate the broad adoption of consistent <a href="/wiki/Data_security" title="Data security">data security</a> measures on a global basis.<sup id="cite_ref-295" class="reference"><a href="#cite_note-295"><span class="cite-bracket">&#91;</span>295<span class="cite-bracket">&#93;</span></a></sup> The PCI DSS is a multifaceted security standard that includes requirements for security management, policies, procedures, <a href="/wiki/Network_architecture" title="Network architecture">network architecture</a>, software design, and other critical protective measures.<sup id="cite_ref-PCIDSS3.2_296-0" class="reference"><a href="#cite_note-PCIDSS3.2-296"><span class="cite-bracket">&#91;</span>296<span class="cite-bracket">&#93;</span></a></sup></li> <li>State <a href="/wiki/Security_breach_notification_laws" class="mw-redirect" title="Security breach notification laws">security breach notification laws</a> (California and many others) require businesses, nonprofits, and state institutions to notify consumers when unencrypted "personal information" may have been compromised, lost, or stolen.<sup id="cite_ref-NCSLStateSecBreach17_297-0" class="reference"><a href="#cite_note-NCSLStateSecBreach17-297"><span class="cite-bracket">&#91;</span>297<span class="cite-bracket">&#93;</span></a></sup></li> <li>The Personal Information Protection and Electronics Document Act (<a href="/wiki/Personal_Information_Protection_and_Electronic_Documents_Act" title="Personal Information Protection and Electronic Documents Act">PIPEDA</a>) of Canada supports and promotes electronic commerce by protecting personal information that is collected, used or disclosed in certain circumstances,<sup id="cite_ref-298" class="reference"><a href="#cite_note-298"><span class="cite-bracket">&#91;</span>298<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-299" class="reference"><a href="#cite_note-299"><span class="cite-bracket">&#91;</span>299<span class="cite-bracket">&#93;</span></a></sup> by providing for the use of electronic means to communicate or record information or transactions and by amending the <a href="/wiki/Canada_Evidence_Act" title="Canada Evidence Act">Canada Evidence Act</a>, the Statutory Instruments Act and the Statute Revision Act.<sup id="cite_ref-300" class="reference"><a href="#cite_note-300"><span class="cite-bracket">&#91;</span>300<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-301" class="reference"><a href="#cite_note-301"><span class="cite-bracket">&#91;</span>301<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-PIPEDA_302-0" class="reference"><a href="#cite_note-PIPEDA-302"><span class="cite-bracket">&#91;</span>302<span class="cite-bracket">&#93;</span></a></sup></li> <li>Greece's Hellenic Authority for Communication Security and Privacy (ADAE) (Law 165/2011) establishes and describes the minimum information security controls that should be deployed by every company which provides electronic communication networks and/or services in Greece in order to protect customers' confidentiality.<sup id="cite_ref-303" class="reference"><a href="#cite_note-303"><span class="cite-bracket">&#91;</span>303<span class="cite-bracket">&#93;</span></a></sup> These include both managerial and technical controls (e.g., log records should be stored for two years).<sup id="cite_ref-RACEC_304-0" class="reference"><a href="#cite_note-RACEC-304"><span class="cite-bracket">&#91;</span>304<span class="cite-bracket">&#93;</span></a></sup></li> <li>Greece's Hellenic Authority for Communication Security and Privacy (ADAE) (Law 205/2013) concentrates around the protection of the integrity and availability of the services and data offered by Greek telecommunication companies.<sup id="cite_ref-305" class="reference"><a href="#cite_note-305"><span class="cite-bracket">&#91;</span>305<span class="cite-bracket">&#93;</span></a></sup> The law forces these and other related companies to build, deploy, and test appropriate business continuity plans and redundant infrastructures.<sup id="cite_ref-205/2013_306-0" class="reference"><a href="#cite_note-205/2013-306"><span class="cite-bracket">&#91;</span>306<span class="cite-bracket">&#93;</span></a></sup></li></ul> <p>The US Department of Defense (DoD) issued DoD Directive 8570 in 2004, supplemented by DoD Directive 8140, requiring all DoD employees and all DoD contract personnel involved in information assurance roles and activities to earn and maintain various industry Information Technology (IT) certifications in an effort to ensure that all DoD personnel involved in network infrastructure defense have minimum levels of IT industry recognized knowledge, skills and abilities (KSA). Andersson and Reimers (2019) report these certifications range from CompTIA's A+ and Security+ through the ICS2.org's CISSP, etc.<sup id="cite_ref-307" class="reference"><a href="#cite_note-307"><span class="cite-bracket">&#91;</span>307<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Culture">Culture</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=26" title="Edit section: Culture"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Describing more than simply how security aware employees are, information security culture is the ideas, customs, and social behaviors of an organization that impact information security in both positive and negative ways.<sup id="cite_ref-308" class="reference"><a href="#cite_note-308"><span class="cite-bracket">&#91;</span>308<span class="cite-bracket">&#93;</span></a></sup> Cultural concepts can help different segments of the organization work effectively or work against effectiveness towards information security within an organization. The way employees think and feel about security and the actions they take can have a big impact on information security in organizations. Roer &amp; Petric (2017) identify seven core dimensions of information security culture in organizations:<sup id="cite_ref-309" class="reference"><a href="#cite_note-309"><span class="cite-bracket">&#91;</span>309<span class="cite-bracket">&#93;</span></a></sup> </p> <ul><li>Attitudes: employees' feelings and emotions about the various activities that pertain to the organizational security of information.<sup id="cite_ref-310" class="reference"><a href="#cite_note-310"><span class="cite-bracket">&#91;</span>310<span class="cite-bracket">&#93;</span></a></sup></li> <li>Behaviors: actual or intended activities and risk-taking actions of employees that have direct or indirect impact on information security.</li> <li>Cognition: employees' awareness, verifiable knowledge, and beliefs regarding practices, activities, and <a href="/wiki/Self-efficacy" title="Self-efficacy">self-efficacy</a> relation that are related to information security.</li> <li>Communication: ways employees communicate with each other, sense of belonging, support for security issues, and incident reporting.</li> <li>Compliance: adherence to organizational security policies, awareness of the existence of such policies and the ability to recall the substance of such policies.</li> <li>Norms: perceptions of security-related organizational conduct and practices that are informally deemed either normal or deviant by employees and their peers, e.g. hidden expectations regarding security behaviors and unwritten rules regarding uses of information-communication technologies.</li> <li>Responsibilities: employees' understanding of the roles and responsibilities they have as a critical factor in sustaining or endangering the security of information, and thereby the organization.</li></ul> <p>Andersson and Reimers (2014) found that employees often do not see themselves as part of the organization Information Security "effort" and often take actions that ignore organizational information security best interests.<sup id="cite_ref-Andersson_&amp;_Reimers_2014_311-0" class="reference"><a href="#cite_note-Andersson_&amp;_Reimers_2014-311"><span class="cite-bracket">&#91;</span>311<span class="cite-bracket">&#93;</span></a></sup> Research shows information security culture needs to be improved continuously. In <i>Information Security Culture from Analysis to Change</i>, authors commented, "It's a never ending process, a cycle of evaluation and change or maintenance." To manage the information security culture, five steps should be taken: pre-evaluation, strategic planning, operative planning, implementation, and post-evaluation.<sup id="cite_ref-Schlienger,_Thomas_2003_312-0" class="reference"><a href="#cite_note-Schlienger,_Thomas_2003-312"><span class="cite-bracket">&#91;</span>312<span class="cite-bracket">&#93;</span></a></sup> </p> <ul><li>Pre-evaluation: to identify the awareness of information security within employees and to analyze current security policy</li> <li>Strategic planning: to come up a better awareness-program, we need to set clear targets. Clustering people is helpful to achieve it</li> <li>Operative planning: create a good security culture based on internal communication, management buy-in, security awareness, and training programs</li> <li>Implementation: should feature commitment of management, communication with organizational members, courses for all organizational members, and commitment of the employees<sup id="cite_ref-Schlienger,_Thomas_2003_312-1" class="reference"><a href="#cite_note-Schlienger,_Thomas_2003-312"><span class="cite-bracket">&#91;</span>312<span class="cite-bracket">&#93;</span></a></sup></li> <li>Post-evaluation: to better gauge the effectiveness of the prior steps and build on continuous improvement</li></ul> <p><br /> </p> <div class="mw-heading mw-heading2"><h2 id="Other_defintions">Other defintions</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=27" title="Edit section: Other defintions"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:CIAJMK1209-en.svg" class="mw-file-description"><img alt="vectorial version" src="//upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/220px-CIAJMK1209-en.svg.png" decoding="async" width="220" height="220" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/330px-CIAJMK1209-en.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/440px-CIAJMK1209-en.svg.png 2x" data-file-width="496" data-file-height="496" /></a><figcaption><b>Information Security Attributes</b>: or qualities, i.e., <a href="/wiki/Confidentiality" title="Confidentiality">Confidentiality</a>, <a href="/wiki/Data_integrity" title="Data integrity">Integrity</a> and <a href="/wiki/Availability" title="Availability">Availability</a> (CIA). <a href="/wiki/Information_Systems" class="mw-redirect" title="Information Systems">Information Systems</a> are composed in three main portions, hardware, software and communications with the purpose to help identify and apply information security industry standards, as mechanisms of protection and prevention, at three levels or layers: <a href="/wiki/Physical_information_security" title="Physical information security">physical</a>, personal and organizational. Essentially, procedures or policies are implemented to tell administrators, users and operators how to use products to ensure information security within the organizations.<sup id="cite_ref-Cherdantseva_Y_2013_313-0" class="reference"><a href="#cite_note-Cherdantseva_Y_2013-313"><span class="cite-bracket">&#91;</span>313<span class="cite-bracket">&#93;</span></a></sup></figcaption></figure> <p>Various definitions of information security are suggested below, summarized from different sources: </p> <ol><li>"Preservation of confidentiality, integrity and availability of information. Note: In addition, other properties, such as authenticity, accountability, non-repudiation and reliability can also be involved." (ISO/IEC 27000:2018)<sup id="cite_ref-314" class="reference"><a href="#cite_note-314"><span class="cite-bracket">&#91;</span>314<span class="cite-bracket">&#93;</span></a></sup></li> <li>"The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability." (CNSS, 2010)<sup id="cite_ref-315" class="reference"><a href="#cite_note-315"><span class="cite-bracket">&#91;</span>315<span class="cite-bracket">&#93;</span></a></sup></li> <li>"Ensures that only authorized users (confidentiality) have access to accurate and complete information (integrity) when required (availability)." (<a href="/wiki/ISACA" title="ISACA">ISACA</a>, 2008)<sup id="cite_ref-316" class="reference"><a href="#cite_note-316"><span class="cite-bracket">&#91;</span>316<span class="cite-bracket">&#93;</span></a></sup></li> <li>"Information Security is the process of protecting the intellectual property of an organisation." (Pipkin, 2000)<sup id="cite_ref-317" class="reference"><a href="#cite_note-317"><span class="cite-bracket">&#91;</span>317<span class="cite-bracket">&#93;</span></a></sup></li> <li>"...information security is a risk management discipline, whose job is to manage the cost of information risk to the business." (McDermott and Geer, 2001)<sup id="cite_ref-318" class="reference"><a href="#cite_note-318"><span class="cite-bracket">&#91;</span>318<span class="cite-bracket">&#93;</span></a></sup></li> <li>"A well-informed sense of assurance that information risks and controls are in balance." (Anderson, J., 2003)<sup id="cite_ref-319" class="reference"><a href="#cite_note-319"><span class="cite-bracket">&#91;</span>319<span class="cite-bracket">&#93;</span></a></sup></li> <li>"Information security is the protection of information and minimizes the risk of exposing information to unauthorized parties." (Venter and Eloff, 2003)<sup id="cite_ref-320" class="reference"><a href="#cite_note-320"><span class="cite-bracket">&#91;</span>320<span class="cite-bracket">&#93;</span></a></sup></li> <li>"Information Security is a multidisciplinary area of study and professional activity which is concerned with the development and implementation of security mechanisms of all available types (technical, organizational, human-oriented and legal) in order to keep information in all its locations (within and outside the organization's perimeter) and, consequently, information systems, where information is created, processed, stored, transmitted and destroyed, free from threats.<sup id="cite_ref-321" class="reference"><a href="#cite_note-321"><span class="cite-bracket">&#91;</span>321<span class="cite-bracket">&#93;</span></a></sup></li> <li>Information and information resource security using telecommunication system or devices means protecting information, information systems or books from unauthorized access, damage, theft, or destruction (Kurose and Ross, 2010).<sup id="cite_ref-322" class="reference"><a href="#cite_note-322"><span class="cite-bracket">&#91;</span>322<span class="cite-bracket">&#93;</span></a></sup></li></ol> <p><br /> </p> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=28" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1184024115">.mw-parser-output .div-col{margin-top:0.3em;column-width:30em}.mw-parser-output .div-col-small{font-size:90%}.mw-parser-output .div-col-rules{column-rule:1px solid #aaa}.mw-parser-output .div-col dl,.mw-parser-output .div-col ol,.mw-parser-output .div-col ul{margin-top:0}.mw-parser-output .div-col li,.mw-parser-output .div-col dd{page-break-inside:avoid;break-inside:avoid-column}</style><div class="div-col"> <ul><li><a href="/wiki/Backup" title="Backup">Backup</a></li> <li><a href="/wiki/Capability-based_security" title="Capability-based security">Capability-based security</a></li> <li><a href="/wiki/Data-centric_security" title="Data-centric security">Data-centric security</a></li> <li><a href="/wiki/Enterprise_information_security_architecture" title="Enterprise information security architecture">Enterprise information security architecture</a></li> <li><a href="/wiki/Identity-based_security" title="Identity-based security">Identity-based security</a></li> <li><a href="/wiki/Information_privacy" title="Information privacy">Information privacy</a></li> <li><a href="/wiki/Information_infrastructure" title="Information infrastructure">Information infrastructure</a></li> <li><a href="/wiki/Information_security_indicators" title="Information security indicators">Information security indicators</a></li> <li><a href="/wiki/Information_technology" title="Information technology">Information technology</a></li> <li><a href="/wiki/IT_risk" title="IT risk">IT risk</a></li> <li><a href="/wiki/ITIL_security_management" title="ITIL security management">ITIL security management</a></li> <li><a href="/wiki/Kill_chain" class="mw-disambig" title="Kill chain">Kill chain</a></li> <li><a href="/wiki/List_of_computer_security_certifications" title="List of computer security certifications">List of computer security certifications</a></li> <li><a href="/wiki/Mobile_security" title="Mobile security">Mobile security</a></li> <li><a href="/wiki/Network_Security_Services" title="Network Security Services">Network Security Services</a></li> <li><a href="/wiki/Privacy_engineering" title="Privacy engineering">Privacy engineering</a></li> <li><a href="/wiki/Privacy-enhancing_technologies" title="Privacy-enhancing technologies">Privacy-enhancing technologies</a></li> <li><a href="/wiki/Security_convergence" title="Security convergence">Security convergence</a></li> <li><a href="/wiki/Security_information_management" title="Security information management">Security information management</a></li> <li><a href="/wiki/Security_level_management" title="Security level management">Security level management</a></li> <li><a href="/wiki/Security_of_Information_Act" title="Security of Information Act">Security of Information Act</a></li> <li><a href="/wiki/Security_service_(telecommunication)" title="Security service (telecommunication)">Security service (telecommunication)</a></li> <li><a href="/wiki/Verification_and_validation" title="Verification and validation">Verification and validation</a></li></ul> </div> <ul><li><a href="/wiki/Gordon%E2%80%93Loeb_model" title="Gordon–Loeb model">Gordon–Loeb model</a> for information security investments</li></ul> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=29" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist"> <div class="mw-references-wrap mw-references-columns"><ol class="references"> <li id="cite_note-1"><span class="mw-cite-backlink"><b><a href="#cite_ref-1">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite id="CITEREFJoshiSingh2017" class="citation journal cs1">Joshi, Chanchala; Singh, Umesh Kumar (August 2017). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/j.jisa.2017.06.006">"Information security risks management framework – A step towards mitigating security risks in university network"</a>. <i>Journal of Information Security and Applications</i>. <b>35</b>: 128–137. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.jisa.2017.06.006">10.1016/j.jisa.2017.06.006</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/2214-2126">2214-2126</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Journal+of+Information+Security+and+Applications&amp;rft.atitle=Information+security+risks+management+framework+%E2%80%93+A+step+towards+mitigating+security+risks+in+university+network&amp;rft.volume=35&amp;rft.pages=128-137&amp;rft.date=2017-08&amp;rft_id=info%3Adoi%2F10.1016%2Fj.jisa.2017.06.006&amp;rft.issn=2214-2126&amp;rft.aulast=Joshi&amp;rft.aufirst=Chanchala&amp;rft.au=Singh%2C+Umesh+Kumar&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2Fj.jisa.2017.06.006&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-2"><span class="mw-cite-backlink"><b><a href="#cite_ref-2">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDanielTitman2006" class="citation journal cs1">Daniel, Kent; Titman, Sheridan (August 2006). <a rel="nofollow" class="external text" href="https://www.nber.org/papers/w9743">"Market Reactions to Tangible and Intangible Information"</a>. <i>The Journal of Finance</i>. <b>61</b> (4): 1605–1643. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1111%2Fj.1540-6261.2006.00884.x">10.1111/j.1540-6261.2006.00884.x</a>. <a href="/wiki/SSRN_(identifier)" class="mw-redirect" title="SSRN (identifier)">SSRN</a>&#160;<a rel="nofollow" class="external text" href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=414701">414701</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Journal+of+Finance&amp;rft.atitle=Market+Reactions+to+Tangible+and+Intangible+Information&amp;rft.volume=61&amp;rft.issue=4&amp;rft.pages=1605-1643&amp;rft.date=2006-08&amp;rft_id=https%3A%2F%2Fpapers.ssrn.com%2Fsol3%2Fpapers.cfm%3Fabstract_id%3D414701%23id-name%3DSSRN&amp;rft_id=info%3Adoi%2F10.1111%2Fj.1540-6261.2006.00884.x&amp;rft.aulast=Daniel&amp;rft.aufirst=Kent&amp;rft.au=Titman%2C+Sheridan&amp;rft_id=https%3A%2F%2Fwww.nber.org%2Fpapers%2Fw9743&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-3"><span class="mw-cite-backlink"><b><a href="#cite_ref-3">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFink2004" class="citation book cs1">Fink, Kerstin (2004). <i>Knowledge Potential Measurement and Uncertainty</i>. Deutscher Universitätsverlag. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-3-322-81240-7" title="Special:BookSources/978-3-322-81240-7"><bdi>978-3-322-81240-7</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/851734708">851734708</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Knowledge+Potential+Measurement+and+Uncertainty&amp;rft.pub=Deutscher+Universit%C3%A4tsverlag&amp;rft.date=2004&amp;rft_id=info%3Aoclcnum%2F851734708&amp;rft.isbn=978-3-322-81240-7&amp;rft.aulast=Fink&amp;rft.aufirst=Kerstin&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-SamonasTheCIA14-4"><span class="mw-cite-backlink">^ <a href="#cite_ref-SamonasTheCIA14_4-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-SamonasTheCIA14_4-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSamonas,_S.Coss,_D.2014" class="citation journal cs1">Samonas, S.; Coss, D. (2014). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20180922115139/http://www.jissec.org/Contents/V10/N3/V10N3-Samonas.html">"The CIA Strikes Back: Redefining Confidentiality, Integrity and Availability in Security"</a>. <i>Journal of Information System Security</i>. <b>10</b> (3): 21–45. Archived from <a rel="nofollow" class="external text" href="http://www.jissec.org/Contents/V10/N3/V10N3-Samonas.html">the original</a> on September 22, 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">January 25,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Journal+of+Information+System+Security&amp;rft.atitle=The+CIA+Strikes+Back%3A+Redefining+Confidentiality%2C+Integrity+and+Availability+in+Security&amp;rft.volume=10&amp;rft.issue=3&amp;rft.pages=21-45&amp;rft.date=2014&amp;rft.au=Samonas%2C+S.&amp;rft.au=Coss%2C+D.&amp;rft_id=http%3A%2F%2Fwww.jissec.org%2FContents%2FV10%2FN3%2FV10N3-Samonas.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-5"><span class="mw-cite-backlink"><b><a href="#cite_ref-5">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKeyser2018" class="citation cs2">Keyser, Tobias (April 19, 2018), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1201/9781315385488-13">"Security policy"</a>, <i>The Information Governance Toolkit</i>, CRC Press, pp.&#160;57–62, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1201%2F9781315385488-13">10.1201/9781315385488-13</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-315-38548-8" title="Special:BookSources/978-1-315-38548-8"><bdi>978-1-315-38548-8</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">May 28,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Information+Governance+Toolkit&amp;rft.atitle=Security+policy&amp;rft.pages=57-62&amp;rft.date=2018-04-19&amp;rft_id=info%3Adoi%2F10.1201%2F9781315385488-13&amp;rft.isbn=978-1-315-38548-8&amp;rft.aulast=Keyser&amp;rft.aufirst=Tobias&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1201%2F9781315385488-13&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-6"><span class="mw-cite-backlink"><b><a href="#cite_ref-6">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDanzigNational_Defense_University_Washington_DC_Inst_for_National_Strategic_Studies1995" class="citation web cs1">Danzig, Richard; National Defense University Washington DC Inst for National Strategic Studies (1995). <a rel="nofollow" class="external text" href="https://apps.dtic.mil/sti/citations/ADA421883">"The big three: Our greatest security risks and how to address them"</a>. <a href="/wiki/DTIC_(identifier)" class="mw-redirect" title="DTIC (identifier)">DTIC</a> <a rel="nofollow" class="external text" href="https://apps.dtic.mil/sti/citations/ADA421883">ADA421883</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=The+big+three%3A+Our+greatest+security+risks+and+how+to+address+them&amp;rft.date=1995&amp;rft.aulast=Danzig&amp;rft.aufirst=Richard&amp;rft.au=National+Defense+University+Washington+DC+Inst+for+National+Strategic+Studies&amp;rft_id=https%3A%2F%2Fapps.dtic.mil%2Fsti%2Fcitations%2FADA421883&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-7">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLyuLau2000" class="citation book cs1">Lyu, M.R.; Lau, L.K.Y. (2000). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1109/cmpsac.2000.884700">"Firewall security: Policies, testing and performance evaluation"</a>. <i>Proceedings 24th Annual International Computer Software and Applications Conference. COMPSAC2000</i>. IEEE Comput. Soc. pp.&#160;116–121. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2Fcmpsac.2000.884700">10.1109/cmpsac.2000.884700</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0-7695-0792-1" title="Special:BookSources/0-7695-0792-1"><bdi>0-7695-0792-1</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:11202223">11202223</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Firewall+security%3A+Policies%2C+testing+and+performance+evaluation&amp;rft.btitle=Proceedings+24th+Annual+International+Computer+Software+and+Applications+Conference.+COMPSAC2000&amp;rft.pages=116-121&amp;rft.pub=IEEE+Comput.+Soc&amp;rft.date=2000&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A11202223%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1109%2Fcmpsac.2000.884700&amp;rft.isbn=0-7695-0792-1&amp;rft.aulast=Lyu&amp;rft.aufirst=M.R.&amp;rft.au=Lau%2C+L.K.Y.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1109%2Fcmpsac.2000.884700&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-8">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1002/9781119205012.ch3">"How the Lack of Data Standardization Impedes Data-Driven Healthcare"</a>, <i>Data-Driven Healthcare</i>, Hoboken, NJ, US: John Wiley &amp; Sons, Inc., p.&#160;29, October 17, 2015, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1002%2F9781119205012.ch3">10.1002/9781119205012.ch3</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-119-20501-2" title="Special:BookSources/978-1-119-20501-2"><bdi>978-1-119-20501-2</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">May 28,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Data-Driven+Healthcare&amp;rft.atitle=How+the+Lack+of+Data+Standardization+Impedes+Data-Driven+Healthcare&amp;rft.pages=29&amp;rft.date=2015-10-17&amp;rft_id=info%3Adoi%2F10.1002%2F9781119205012.ch3&amp;rft.isbn=978-1-119-20501-2&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1002%2F9781119205012.ch3&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-GartnerSays17-9"><span class="mw-cite-backlink"><b><a href="#cite_ref-GartnerSays17_9-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.gartner.com/en/newsroom/press-releases/2017-10-02-gartner-says-digital-disruptors-are-impacting-all-industries-digital-kpis-are-crucial-to-measuring-success">"Gartner Says Digital Disruptors Are Impacting All Industries; Digital KPIs Are Crucial to Measuring Success"</a>. Gartner. October 2, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">January 25,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Gartner+Says+Digital+Disruptors+Are+Impacting+All+Industries%3B+Digital+KPIs+Are+Crucial+to+Measuring+Success&amp;rft.pub=Gartner&amp;rft.date=2017-10-02&amp;rft_id=https%3A%2F%2Fwww.gartner.com%2Fen%2Fnewsroom%2Fpress-releases%2F2017-10-02-gartner-says-digital-disruptors-are-impacting-all-industries-digital-kpis-are-crucial-to-measuring-success&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-GartnerSurvey17-10"><span class="mw-cite-backlink"><b><a href="#cite_ref-GartnerSurvey17_10-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.gartner.com/en/newsroom/press-releases/2017-04-24-gartner-survey-shows-42-percent-of-ceos-have-begun-digital-business-transformation">"Gartner Survey Shows 42 Percent of CEOs Have Begun Digital Business Transformation"</a>. Gartner. April 24, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">January 25,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Gartner+Survey+Shows+42+Percent+of+CEOs+Have+Begun+Digital+Business+Transformation&amp;rft.pub=Gartner&amp;rft.date=2017-04-24&amp;rft_id=https%3A%2F%2Fwww.gartner.com%2Fen%2Fnewsroom%2Fpress-releases%2F2017-04-24-gartner-survey-shows-42-percent-of-ceos-have-begun-digital-business-transformation&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-AFH_1-11"><span class="mw-cite-backlink"><b><a href="#cite_ref-AFH_1_11-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFetzerHighfillHossisoHowells2018" class="citation web cs1">Fetzer, James; Highfill, Tina; Hossiso, Kassu; Howells, Thomas; Strassner, Erich; Young, Jeffrey (November 2018). <a rel="nofollow" class="external text" href="https://www.nber.org/papers/w25249">"Accounting for Firm Heterogeneity within U.S. Industries: Extended Supply-Use Tables and Trade in Value Added using Enterprise and Establishment Level Data"</a>. Working Paper Series. <a href="/wiki/National_Bureau_of_Economic_Research" title="National Bureau of Economic Research">National Bureau of Economic Research</a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.3386%2Fw25249">10.3386/w25249</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:169324096">169324096</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Accounting+for+Firm+Heterogeneity+within+U.S.+Industries%3A+Extended+Supply-Use+Tables+and+Trade+in+Value+Added+using+Enterprise+and+Establishment+Level+Data&amp;rft.series=Working+Paper+Series&amp;rft.pub=National+Bureau+of+Economic+Research&amp;rft.date=2018-11&amp;rft_id=info%3Adoi%2F10.3386%2Fw25249&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A169324096%23id-name%3DS2CID&amp;rft.aulast=Fetzer&amp;rft.aufirst=James&amp;rft.au=Highfill%2C+Tina&amp;rft.au=Hossiso%2C+Kassu&amp;rft.au=Howells%2C+Thomas&amp;rft.au=Strassner%2C+Erich&amp;rft.au=Young%2C+Jeffrey&amp;rft_id=https%3A%2F%2Fwww.nber.org%2Fpapers%2Fw25249&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-12"><span class="mw-cite-backlink"><b><a href="#cite_ref-12">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/b978-0-12-818701-2.00021-4">"Secure estimation subject to cyber stochastic attacks"</a>, <i>Cloud Control Systems</i>, Emerging Methodologies and Applications in Modelling, Elsevier: 373–404, 2020, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fb978-0-12-818701-2.00021-4">10.1016/b978-0-12-818701-2.00021-4</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-12-818701-2" title="Special:BookSources/978-0-12-818701-2"><bdi>978-0-12-818701-2</bdi></a>, <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:240746156">240746156</a><span class="reference-accessdate">, retrieved <span class="nowrap">May 28,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Cloud+Control+Systems&amp;rft.atitle=Secure+estimation+subject+to+cyber+stochastic+attacks&amp;rft.pages=373-404&amp;rft.date=2020&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A240746156%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1016%2Fb978-0-12-818701-2.00021-4&amp;rft.isbn=978-0-12-818701-2&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2Fb978-0-12-818701-2.00021-4&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-13">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNijmeijer2003" class="citation book cs1">Nijmeijer, H. (2003). <i>Synchronization of mechanical systems</i>. World Scientific. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-981-279-497-0" title="Special:BookSources/978-981-279-497-0"><bdi>978-981-279-497-0</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/262846185">262846185</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Synchronization+of+mechanical+systems&amp;rft.pub=World+Scientific&amp;rft.date=2003&amp;rft_id=info%3Aoclcnum%2F262846185&amp;rft.isbn=978-981-279-497-0&amp;rft.aulast=Nijmeijer&amp;rft.aufirst=H.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-14">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://learn.org/articles/types_of_cybersecurity_specializations.html">"9 Types of Cybersecurity Specializations"</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=9+Types+of+Cybersecurity+Specializations&amp;rft_id=https%3A%2F%2Flearn.org%2Farticles%2Ftypes_of_cybersecurity_specializations.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-15">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.itu.int/ITU-T/recommendations/rec.aspx?rec=9136">"ITU-T Recommendation database"</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=ITU-T+Recommendation+database&amp;rft_id=http%3A%2F%2Fwww.itu.int%2FITU-T%2Frecommendations%2Frec.aspx%3Frec%3D9136&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-16">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRahim2006" class="citation book cs1">Rahim, Noor H. (March 2006). <i>Human Rights and Internal Security in Malaysia: Rhetoric and Reality</i>. Defense Technical Information Center. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/74288358">74288358</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Human+Rights+and+Internal+Security+in+Malaysia%3A+Rhetoric+and+Reality.&amp;rft.pub=Defense+Technical+Information+Center&amp;rft.date=2006-03&amp;rft_id=info%3Aoclcnum%2F74288358&amp;rft.aulast=Rahim&amp;rft.aufirst=Noor+H.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-17">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKramer2018" class="citation journal cs1">Kramer, David (September 14, 2018). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1063/pt.6.2.20180914a">"Nuclear theft and sabotage threats remain high, report warns"</a>. <i>Physics Today</i> (9): 30951. <a href="/wiki/Bibcode_(identifier)" class="mw-redirect" title="Bibcode (identifier)">Bibcode</a>:<a rel="nofollow" class="external text" href="https://ui.adsabs.harvard.edu/abs/2018PhT..2018i0951K">2018PhT..2018i0951K</a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1063%2Fpt.6.2.20180914a">10.1063/pt.6.2.20180914a</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1945-0699">1945-0699</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:240223415">240223415</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Physics+Today&amp;rft.atitle=Nuclear+theft+and+sabotage+threats+remain+high%2C+report+warns&amp;rft.issue=9&amp;rft.pages=30951&amp;rft.date=2018-09-14&amp;rft_id=info%3Adoi%2F10.1063%2Fpt.6.2.20180914a&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A240223415%23id-name%3DS2CID&amp;rft.issn=1945-0699&amp;rft_id=info%3Abibcode%2F2018PhT..2018i0951K&amp;rft.aulast=Kramer&amp;rft.aufirst=David&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1063%2Fpt.6.2.20180914a&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-18">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWilding2017" class="citation book cs1">Wilding, Edward (March 2, 2017). <i>Information risk and security&#160;: preventing and investigating workplace computer crime</i>. Routledge. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-351-92755-0" title="Special:BookSources/978-1-351-92755-0"><bdi>978-1-351-92755-0</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/1052118207">1052118207</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Information+risk+and+security+%3A+preventing+and+investigating+workplace+computer+crime&amp;rft.pub=Routledge&amp;rft.date=2017-03-02&amp;rft_id=info%3Aoclcnum%2F1052118207&amp;rft.isbn=978-1-351-92755-0&amp;rft.aulast=Wilding&amp;rft.aufirst=Edward&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-19">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFStewart2012" class="citation book cs1">Stewart, James (2012). <i>CISSP Study Guide</i>. Canada: John Wiley &amp; Sons. pp.&#160;255–257. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-118-31417-3" title="Special:BookSources/978-1-118-31417-3"><bdi>978-1-118-31417-3</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=CISSP+Study+Guide&amp;rft.place=Canada&amp;rft.pages=255-257&amp;rft.pub=John+Wiley+%26+Sons&amp;rft.date=2012&amp;rft.isbn=978-1-118-31417-3&amp;rft.aulast=Stewart&amp;rft.aufirst=James&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-WHP_1-20"><span class="mw-cite-backlink"><b><a href="#cite_ref-WHP_1_20-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation book cs1"><a rel="nofollow" class="external text" href="https://www.oecd-ilibrary.org/economics/oecd-economic-surveys-denmark-2009/why-has-productivity-growth-declined_eco_surveys-dnk-2009-4-en">"Why has productivity growth declined?"</a>. <i>OECD Economic Surveys: Denmark 2009</i>. <a href="/wiki/OECD" title="OECD">OECD</a>. 2009. pp.&#160;65–96. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1787%2Feco_surveys-dnk-2009-4-en">10.1787/eco_surveys-dnk-2009-4-en</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9789264076556" title="Special:BookSources/9789264076556"><bdi>9789264076556</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">November 30,</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Why+has+productivity+growth+declined%3F&amp;rft.btitle=OECD+Economic+Surveys%3A+Denmark+2009&amp;rft.pages=65-96&amp;rft.pub=OECD&amp;rft.date=2009&amp;rft_id=info%3Adoi%2F10.1787%2Feco_surveys-dnk-2009-4-en&amp;rft.isbn=9789264076556&amp;rft_id=https%3A%2F%2Fwww.oecd-ilibrary.org%2Feconomics%2Foecd-economic-surveys-denmark-2009%2Fwhy-has-productivity-growth-declined_eco_surveys-dnk-2009-4-en&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-21"><span class="mw-cite-backlink"><b><a href="#cite_ref-21">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1"><a rel="nofollow" class="external text" href="https://doi.org/10.48009%2F2_iis_2007_297-302">"Identity Theft: The Newest Digital Attackking Industry Must Take Seriously"</a>. <i>Issues in Information Systems</i>. 2007. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.48009%2F2_iis_2007_297-302">10.48009/2_iis_2007_297-302</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1529-7314">1529-7314</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Issues+in+Information+Systems&amp;rft.atitle=Identity+Theft%3A+The+Newest+Digital+Attackking+Industry+Must+Take+Seriously&amp;rft.date=2007&amp;rft_id=info%3Adoi%2F10.48009%2F2_iis_2007_297-302&amp;rft.issn=1529-7314&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.48009%252F2_iis_2007_297-302&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-22"><span class="mw-cite-backlink"><b><a href="#cite_ref-22">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWendel-PerssonRonnhed2017" class="citation book cs1">Wendel-Persson, Anna; Ronnhed, Fredrik (2017). <i>IT-säkerhet och människan&#160;: De har världens starkaste mur men porten står alltid på glänt</i>. Umeå universitet, Institutionen för informatik. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/1233659973">1233659973</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=IT-s%C3%A4kerhet+och+m%C3%A4nniskan+%3A+De+har+v%C3%A4rldens+starkaste+mur+men+porten+st%C3%A5r+alltid+p%C3%A5+gl%C3%A4nt&amp;rft.pub=Ume%C3%A5+universitet%2C+Institutionen+f%C3%B6r+informatik&amp;rft.date=2017&amp;rft_id=info%3Aoclcnum%2F1233659973&amp;rft.aulast=Wendel-Persson&amp;rft.aufirst=Anna&amp;rft.au=Ronnhed%2C+Fredrik&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-23">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFShaoSkarlicki2014" class="citation journal cs1">Shao, Ruodan; Skarlicki, Daniel P. (2014). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1037/t31653-000">"Sabotage toward the Customers who Mistreated Employees Scale"</a>. <i>PsycTESTS Dataset</i>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1037%2Ft31653-000">10.1037/t31653-000</a><span class="reference-accessdate">. Retrieved <span class="nowrap">May 28,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=PsycTESTS+Dataset&amp;rft.atitle=Sabotage+toward+the+Customers+who+Mistreated+Employees+Scale&amp;rft.date=2014&amp;rft_id=info%3Adoi%2F10.1037%2Ft31653-000&amp;rft.aulast=Shao&amp;rft.aufirst=Ruodan&amp;rft.au=Skarlicki%2C+Daniel+P.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1037%2Ft31653-000&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-24"><span class="mw-cite-backlink"><b><a href="#cite_ref-24">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKitchen2008" class="citation journal cs1">Kitchen, Julie (June 2008). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1017/s1472669608000364">"7side – Company Information, Company Formations and Property Searches"</a>. <i>Legal Information Management</i>. <b>8</b> (2): 146. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1017%2Fs1472669608000364">10.1017/s1472669608000364</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1472-6696">1472-6696</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:144325193">144325193</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Legal+Information+Management&amp;rft.atitle=7side+%E2%80%93+Company+Information%2C+Company+Formations+and+Property+Searches&amp;rft.volume=8&amp;rft.issue=2&amp;rft.pages=146&amp;rft.date=2008-06&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A144325193%23id-name%3DS2CID&amp;rft.issn=1472-6696&amp;rft_id=info%3Adoi%2F10.1017%2Fs1472669608000364&amp;rft.aulast=Kitchen&amp;rft.aufirst=Julie&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1017%2Fs1472669608000364&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-25"><span class="mw-cite-backlink"><b><a href="#cite_ref-25">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFYoung2018" class="citation cs2">Young, Courtenay (May 8, 2018), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.4324/9780429475474-32">"Working with panic attacks"</a>, <i>Help Yourself Towards Mental Health</i>, Routledge, pp.&#160;209–214, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.4324%2F9780429475474-32">10.4324/9780429475474-32</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-429-47547-4" title="Special:BookSources/978-0-429-47547-4"><bdi>978-0-429-47547-4</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">May 28,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Help+Yourself+Towards+Mental+Health&amp;rft.atitle=Working+with+panic+attacks&amp;rft.pages=209-214&amp;rft.date=2018-05-08&amp;rft_id=info%3Adoi%2F10.4324%2F9780429475474-32&amp;rft.isbn=978-0-429-47547-4&amp;rft.aulast=Young&amp;rft.aufirst=Courtenay&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.4324%2F9780429475474-32&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-CPS_1-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-CPS_1_26-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLequiller,_F.Blades,_D.2014" class="citation book cs1">Lequiller, F.; Blades, D. (2014). <a rel="nofollow" class="external text" href="https://www.oecd.org/sdd/UNA-2014.pdf"><i>Table 7.7 France: Comparison of the profit shares of non-financial corporations and non-financial corporations plus unincorporated enterprises</i></a> <span class="cs1-format">(PDF)</span>. <a href="/wiki/OECD" title="OECD">OECD</a>. p.&#160;217. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1787%2F9789264214637-en">10.1787/9789264214637-en</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-92-64-21462-0" title="Special:BookSources/978-92-64-21462-0"><bdi>978-92-64-21462-0</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">December 1,</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Table+7.7+France%3A+Comparison+of+the+profit+shares+of+non-financial+corporations+and+non-financial+corporations+plus+unincorporated+enterprises&amp;rft.pages=217&amp;rft.pub=OECD&amp;rft.date=2014&amp;rft_id=info%3Adoi%2F10.1787%2F9789264214637-en&amp;rft.isbn=978-92-64-21462-0&amp;rft.au=Lequiller%2C+F.&amp;rft.au=Blades%2C+D.&amp;rft_id=https%3A%2F%2Fwww.oecd.org%2Fsdd%2FUNA-2014.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-27">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2">"How Did it All Come About?", <i>The Compliance Business and Its Customers</i>, Basingstoke: Palgrave Macmillan, 2012, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1057%2F9781137271150.0007">10.1057/9781137271150.0007</a> (inactive November 11, 2024), <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-137-27115-0" title="Special:BookSources/978-1-137-27115-0"><bdi>978-1-137-27115-0</bdi></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Compliance+Business+and+Its+Customers&amp;rft.atitle=How+Did+it+All+Come+About%3F&amp;rft.date=2012&amp;rft_id=info%3Adoi%2F10.1057%2F9781137271150.0007&amp;rft.isbn=978-1-137-27115-0&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Citation" title="Template:Citation">citation</a>}}</code>: CS1 maint: DOI inactive as of November 2024 (<a href="/wiki/Category:CS1_maint:_DOI_inactive_as_of_November_2024" title="Category:CS1 maint: DOI inactive as of November 2024">link</a>)</span></span> </li> <li id="cite_note-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-28">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGordonLoeb2002" class="citation journal cs1"><a href="/wiki/Lawrence_A._Gordon" title="Lawrence A. Gordon">Gordon, Lawrence A.</a>; <a href="/wiki/Martin_P._Loeb" title="Martin P. Loeb">Loeb, Martin P.</a> (November 2002). <a rel="nofollow" class="external text" href="http://tissec.acm.org/">"The Economics of Information Security Investment"</a>. <i>ACM Transactions on Information and System Security</i>. <b>5</b> (4): 438–457. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F581271.581274">10.1145/581271.581274</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:1500788">1500788</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=ACM+Transactions+on+Information+and+System+Security&amp;rft.atitle=The+Economics+of+Information+Security+Investment&amp;rft.volume=5&amp;rft.issue=4&amp;rft.pages=438-457&amp;rft.date=2002-11&amp;rft_id=info%3Adoi%2F10.1145%2F581271.581274&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A1500788%23id-name%3DS2CID&amp;rft.aulast=Gordon&amp;rft.aufirst=Lawrence+A.&amp;rft.au=Loeb%2C+Martin+P.&amp;rft_id=http%3A%2F%2Ftissec.acm.org%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-29">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCho_KimKhansaJames2011" class="citation journal cs1">Cho Kim, Byung; Khansa, Lara; James, Tabitha (July 2011). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1080/15536548.2011.10855915">"Individual Trust and Consumer Risk Perception"</a>. <i>Journal of Information Privacy and Security</i>. <b>7</b> (3): 3–22. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F15536548.2011.10855915">10.1080/15536548.2011.10855915</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1553-6548">1553-6548</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:144643691">144643691</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Journal+of+Information+Privacy+and+Security&amp;rft.atitle=Individual+Trust+and+Consumer+Risk+Perception&amp;rft.volume=7&amp;rft.issue=3&amp;rft.pages=3-22&amp;rft.date=2011-07&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A144643691%23id-name%3DS2CID&amp;rft.issn=1553-6548&amp;rft_id=info%3Adoi%2F10.1080%2F15536548.2011.10855915&amp;rft.aulast=Cho+Kim&amp;rft.aufirst=Byung&amp;rft.au=Khansa%2C+Lara&amp;rft.au=James%2C+Tabitha&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1080%2F15536548.2011.10855915&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-30">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLarsen2019" class="citation journal cs1">Larsen, Daniel (October 31, 2019). <a rel="nofollow" class="external text" href="https://doi.org/10.1093/dh/dhz046">"Creating An American Culture Of Secrecy: Cryptography In Wilson-Era Diplomacy"</a>. <i>Diplomatic History</i>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1093%2Fdh%2Fdhz046">10.1093/dh/dhz046</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0145-2096">0145-2096</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Diplomatic+History&amp;rft.atitle=Creating+An+American+Culture+Of+Secrecy%3A+Cryptography+In+Wilson-Era+Diplomacy&amp;rft.date=2019-10-31&amp;rft_id=info%3Adoi%2F10.1093%2Fdh%2Fdhz046&amp;rft.issn=0145-2096&amp;rft.aulast=Larsen&amp;rft.aufirst=Daniel&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.1093%2Fdh%2Fdhz046&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-31">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.5040/9781474245784.0005">"Introduction&#160;: Caesar Is Dead. Long Live Caesar!"</a>, <i>Julius Caesar's Self-Created Image and Its Dramatic Afterlife</i>, Bloomsbury Academic, 2018, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.5040%2F9781474245784.0005">10.5040/9781474245784.0005</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4742-4578-4" title="Special:BookSources/978-1-4742-4578-4"><bdi>978-1-4742-4578-4</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">May 29,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Julius+Caesar%27s+Self-Created+Image+and+Its+Dramatic+Afterlife&amp;rft.atitle=Introduction+%3A+Caesar+Is+Dead.+Long+Live+Caesar%21&amp;rft.date=2018&amp;rft_id=info%3Adoi%2F10.5040%2F9781474245784.0005&amp;rft.isbn=978-1-4742-4578-4&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.5040%2F9781474245784.0005&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-32"><span class="mw-cite-backlink"><b><a href="#cite_ref-32">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSuetonius_Tranquillus2008" class="citation book cs1"><a href="/wiki/Suetonius" title="Suetonius">Suetonius Tranquillus, Gaius</a> (2008). <i>Lives of the Caesars (Oxford World's Classics)</i>. New York: Oxford University Press. p.&#160;28. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-19-953756-3" title="Special:BookSources/978-0-19-953756-3"><bdi>978-0-19-953756-3</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Lives+of+the+Caesars+%28Oxford+World%27s+Classics%29&amp;rft.place=New+York&amp;rft.pages=28&amp;rft.pub=Oxford+University+Press&amp;rft.date=2008&amp;rft.isbn=978-0-19-953756-3&amp;rft.aulast=Suetonius+Tranquillus&amp;rft.aufirst=Gaius&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-33"><span class="mw-cite-backlink"><b><a href="#cite_ref-33">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSingh2000" class="citation book cs1"><a href="/wiki/Simon_Singh" title="Simon Singh">Singh, Simon</a> (2000). <a href="/wiki/The_Code_Book" title="The Code Book"><i>The Code Book</i></a>. Anchor. pp.&#160;<a rel="nofollow" class="external text" href="https://archive.org/details/codebook00simo/page/289">289–290</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-385-49532-5" title="Special:BookSources/978-0-385-49532-5"><bdi>978-0-385-49532-5</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=The+Code+Book&amp;rft.pages=289-290&amp;rft.pub=Anchor&amp;rft.date=2000&amp;rft.isbn=978-0-385-49532-5&amp;rft.aulast=Singh&amp;rft.aufirst=Simon&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-34"><span class="mw-cite-backlink"><b><a href="#cite_ref-34">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFTan2017" class="citation thesis cs1">Tan, Heng Chuan (2017). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.32657/10356/72758"><i>Towards trusted and secure communications in a vehicular environment</i></a> (Thesis). Nanyang Technological University. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.32657%2F10356%2F72758">10.32657/10356/72758</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adissertation&amp;rft.title=Towards+trusted+and+secure+communications+in+a+vehicular+environment&amp;rft.inst=Nanyang+Technological+University&amp;rft.date=2017&amp;rft_id=info%3Adoi%2F10.32657%2F10356%2F72758&amp;rft.aulast=Tan&amp;rft.aufirst=Heng+Chuan&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.32657%2F10356%2F72758&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-JohnsonTheEvo97-35"><span class="mw-cite-backlink"><b><a href="#cite_ref-JohnsonTheEvo97_35-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJohnson1997" class="citation book cs1">Johnson, John (1997). <i>The Evolution of British Sigint: 1653–1939</i>. Her Majesty's Stationery Office. <a href="/wiki/ASIN_(identifier)" class="mw-redirect" title="ASIN (identifier)">ASIN</a>&#160;<a rel="nofollow" class="external text" href="https://www.amazon.com/dp/B00GYX1GX2">B00GYX1GX2</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=The+Evolution+of+British+Sigint%3A+1653%E2%80%931939&amp;rft.pub=Her+Majesty%27s+Stationery+Office&amp;rft.date=1997&amp;rft_id=https%3A%2F%2Fwww.amazon.com%2Fdp%2FB00GYX1GX2%23id-name%3DASIN&amp;rft.aulast=Johnson&amp;rft.aufirst=John&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-WBS_1-36"><span class="mw-cite-backlink"><b><a href="#cite_ref-WBS_1_36-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWillison,_M.2018" class="citation journal cs1">Willison, M. (September 21, 2018). <a rel="nofollow" class="external text" href="https://ssrn.com/abstract=3249510">"Were Banks Special? Contrasting Viewpoints in Mid-Nineteenth Century Britain"</a>. <i>Monetary Economics: International Financial Flows</i>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.2139%2Fssrn.3249510">10.2139/ssrn.3249510</a><span class="reference-accessdate">. Retrieved <span class="nowrap">December 1,</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Monetary+Economics%3A+International+Financial+Flows&amp;rft.atitle=Were+Banks+Special%3F+Contrasting+Viewpoints+in+Mid-Nineteenth+Century+Britain&amp;rft.date=2018-09-21&amp;rft_id=info%3Adoi%2F10.2139%2Fssrn.3249510&amp;rft.au=Willison%2C+M.&amp;rft_id=https%3A%2F%2Fssrn.com%2Fabstract%3D3249510&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-HastedtSpies11-37"><span class="mw-cite-backlink"><b><a href="#cite_ref-HastedtSpies11_37-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRuppert,_K.2011" class="citation book cs1">Ruppert, K. (2011). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=A8WoNp2vI-cC&amp;pg=PA589">"Official Secrets Act (1889; New 1911; Amended 1920, 1939, 1989)"</a>. In Hastedt, G.P. (ed.). <i>Spies, Wiretaps, and Secret Operations: An Encyclopedia of American Espionage</i>. Vol.&#160;2. ABC-CLIO. pp.&#160;589–590. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9781851098088" title="Special:BookSources/9781851098088"><bdi>9781851098088</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Official+Secrets+Act+%281889%3B+New+1911%3B+Amended+1920%2C+1939%2C+1989%29&amp;rft.btitle=Spies%2C+Wiretaps%2C+and+Secret+Operations%3A+An+Encyclopedia+of+American+Espionage&amp;rft.pages=589-590&amp;rft.pub=ABC-CLIO&amp;rft.date=2011&amp;rft.isbn=9781851098088&amp;rft.au=Ruppert%2C+K.&amp;rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DA8WoNp2vI-cC%26pg%3DPA589&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-38"><span class="mw-cite-backlink"><b><a href="#cite_ref-38">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation book cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.7312/dunn93452-003">"2. The Clayton Act: A consideration of section 2, defining unlawful price discrimination"</a>. <i>The Federal Anti-Trust Law</i>. Columbia University Press. December 31, 1930. pp.&#160;18–28. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.7312%2Fdunn93452-003">10.7312/dunn93452-003</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-231-89377-0" title="Special:BookSources/978-0-231-89377-0"><bdi>978-0-231-89377-0</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">May 29,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=2.+The+Clayton+Act%3A+A+consideration+of+section+2%2C+defining+unlawful+price+discrimination&amp;rft.btitle=The+Federal+Anti-Trust+Law&amp;rft.pages=18-28&amp;rft.pub=Columbia+University+Press&amp;rft.date=1930-12-31&amp;rft_id=info%3Adoi%2F10.7312%2Fdunn93452-003&amp;rft.isbn=978-0-231-89377-0&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.7312%2Fdunn93452-003&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-39"><span class="mw-cite-backlink"><b><a href="#cite_ref-39">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMaerGay2008" class="citation web cs1">Maer, Lucinda; Gay (December 30, 2008). <a rel="nofollow" class="external text" href="https://fas.org/irp/world/uk/secrecy.pdf">"Official Secrecy"</a> <span class="cs1-format">(PDF)</span>. <i>Federation of American Scientists</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Federation+of+American+Scientists&amp;rft.atitle=Official+Secrecy&amp;rft.date=2008-12-30&amp;rft.aulast=Maer&amp;rft.aufirst=Lucinda&amp;rft.au=Gay&amp;rft_id=https%3A%2F%2Ffas.org%2Firp%2Fworld%2Fuk%2Fsecrecy.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-40"><span class="mw-cite-backlink"><b><a href="#cite_ref-40">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2">"The Official Secrets Act 1989 which replaced section 2 of the 1911 Act", <i>Espionage and Secrecy (Routledge Revivals)</i>, Routledge, pp.&#160;267–282, June 10, 2016, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.4324%2F9781315542515-21">10.4324/9781315542515-21</a> (inactive November 1, 2024), <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-315-54251-5" title="Special:BookSources/978-1-315-54251-5"><bdi>978-1-315-54251-5</bdi></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Espionage+and+Secrecy+%28Routledge+Revivals%29&amp;rft.atitle=The+Official+Secrets+Act+1989+which+replaced+section+2+of+the+1911+Act&amp;rft.pages=267-282&amp;rft.date=2016-06-10&amp;rft_id=info%3Adoi%2F10.4324%2F9781315542515-21&amp;rft.isbn=978-1-315-54251-5&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Citation" title="Template:Citation">citation</a>}}</code>: CS1 maint: DOI inactive as of November 2024 (<a href="/wiki/Category:CS1_maint:_DOI_inactive_as_of_November_2024" title="Category:CS1 maint: DOI inactive as of November 2024">link</a>)</span></span> </li> <li id="cite_note-41"><span class="mw-cite-backlink"><b><a href="#cite_ref-41">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://indianexpress.com/article/explained/official-secrets-act-what-it-covers-when-it-has-been-used-questioned-rafale-deal-5616457/">"Official Secrets Act: what it covers; when it has been used, questioned"</a>. <i>The Indian Express</i>. March 8, 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">August 7,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=The+Indian+Express&amp;rft.atitle=Official+Secrets+Act%3A+what+it+covers%3B+when+it+has+been+used%2C+questioned&amp;rft.date=2019-03-08&amp;rft_id=https%3A%2F%2Findianexpress.com%2Farticle%2Fexplained%2Fofficial-secrets-act-what-it-covers-when-it-has-been-used-questioned-rafale-deal-5616457%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-42"><span class="mw-cite-backlink"><b><a href="#cite_ref-42">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSingh2015" class="citation journal cs1">Singh, Gajendra (November 2015). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1163/2352-3786_dlws1_b9789004211452_019">"<span class="cs1-kern-left"></span>"Breaking the Chains with Which We were Bound": The Interrogation Chamber, the Indian National Army and the Negation of Military Identities, 1941–1947"</a>. <i>Brill's Digital Library of World War I</i>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1163%2F2352-3786_dlws1_b9789004211452_019">10.1163/2352-3786_dlws1_b9789004211452_019</a><span class="reference-accessdate">. Retrieved <span class="nowrap">May 28,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Brill%27s+Digital+Library+of+World+War+I&amp;rft.atitle=%22Breaking+the+Chains+with+Which+We+were+Bound%22%3A+The+Interrogation+Chamber%2C+the+Indian+National+Army+and+the+Negation+of+Military+Identities%2C+1941%E2%80%931947&amp;rft.date=2015-11&amp;rft_id=info%3Adoi%2F10.1163%2F2352-3786_dlws1_b9789004211452_019&amp;rft.aulast=Singh&amp;rft.aufirst=Gajendra&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1163%2F2352-3786_dlws1_b9789004211452_019&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-43"><span class="mw-cite-backlink"><b><a href="#cite_ref-43">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDuncanson1982" class="citation journal cs1">Duncanson, Dennis (June 1982). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1080/03068378208730070">"The scramble to unscramble French Indochina"</a>. <i>Asian Affairs</i>. <b>13</b> (2): 161–170. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F03068378208730070">10.1080/03068378208730070</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0306-8374">0306-8374</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Asian+Affairs&amp;rft.atitle=The+scramble+to+unscramble+French+Indochina&amp;rft.volume=13&amp;rft.issue=2&amp;rft.pages=161-170&amp;rft.date=1982-06&amp;rft_id=info%3Adoi%2F10.1080%2F03068378208730070&amp;rft.issn=0306-8374&amp;rft.aulast=Duncanson&amp;rft.aufirst=Dennis&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1080%2F03068378208730070&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTEWhitmanMattord20173-44"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEWhitmanMattord20173_44-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFWhitmanMattord2017">Whitman et al. 2017</a>, pp.&#160;3.</span> </li> <li id="cite_note-45"><span class="mw-cite-backlink"><b><a href="#cite_ref-45">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.3138/9781442617117-003">"Allied Power. Mobilizing Hydro-Electricity During Canada'S Second World War"</a>, <i>Allied Power</i>, University of Toronto Press, pp.&#160;1–2, December 31, 2015, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.3138%2F9781442617117-003">10.3138/9781442617117-003</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4426-1711-7" title="Special:BookSources/978-1-4426-1711-7"><bdi>978-1-4426-1711-7</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">May 29,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Allied+Power&amp;rft.atitle=Allied+Power.+Mobilizing+Hydro-Electricity+During+Canada%27S+Second+World+War&amp;rft.pages=1-2&amp;rft.date=2015-12-31&amp;rft_id=info%3Adoi%2F10.3138%2F9781442617117-003&amp;rft.isbn=978-1-4426-1711-7&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.3138%2F9781442617117-003&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-46"><span class="mw-cite-backlink"><b><a href="#cite_ref-46">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGlatthaar2011" class="citation cs2">Glatthaar, Joseph T. (June 15, 2011), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.5149/9780807877869_glatthaar.11">"Officers and Enlisted Men"</a>, <i>Soldiering in the Army of Northern Virginia</i>, University of North Carolina Press, pp.&#160;83–96, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.5149%2F9780807877869_glatthaar.11">10.5149/9780807877869_glatthaar.11</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-8078-3492-3" title="Special:BookSources/978-0-8078-3492-3"><bdi>978-0-8078-3492-3</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">May 28,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Soldiering+in+the+Army+of+Northern+Virginia&amp;rft.atitle=Officers+and+Enlisted+Men&amp;rft.pages=83-96&amp;rft.date=2011-06-15&amp;rft_id=info%3Adoi%2F10.5149%2F9780807877869_glatthaar.11&amp;rft.isbn=978-0-8078-3492-3&amp;rft.aulast=Glatthaar&amp;rft.aufirst=Joseph+T.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.5149%2F9780807877869_glatthaar.11&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-Sebag-MontefioreEnigma11-47"><span class="mw-cite-backlink">^ <a href="#cite_ref-Sebag-MontefioreEnigma11_47-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Sebag-MontefioreEnigma11_47-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSebag–Montefiore,_H.2011" class="citation book cs1">Sebag–Montefiore, H. (2011). <i>Enigma: The Battle for the Code</i>. Orion. p.&#160;576. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9781780221236" title="Special:BookSources/9781780221236"><bdi>9781780221236</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Enigma%3A+The+Battle+for+the+Code&amp;rft.pages=576&amp;rft.pub=Orion&amp;rft.date=2011&amp;rft.isbn=9781780221236&amp;rft.au=Sebag%E2%80%93Montefiore%2C+H.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTEWhitmanMattord20174–5-48"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEWhitmanMattord20174–5_48-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFWhitmanMattord2017">Whitman et al. 2017</a>, pp.&#160;4–5.</span> </li> <li id="cite_note-FOOTNOTEWhitmanMattord20175-49"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTEWhitmanMattord20175_49-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTEWhitmanMattord20175_49-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFWhitmanMattord2017">Whitman et al. 2017</a>, p.&#160;5.</span> </li> <li id="cite_note-50"><span class="mw-cite-backlink"><b><a href="#cite_ref-50">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDekar,_Paul_R.2012" class="citation book cs1">Dekar, Paul R. (April 26, 2012). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.2307/j.ctt1cg4k28.13"><i>Thomas Merton: Twentieth-Century Wisdom for Twenty-First-Century Living</i></a>. The Lutterworth Press. pp.&#160;160–184. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.2307%2Fj.ctt1cg4k28.13">10.2307/j.ctt1cg4k28.13</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-7188-4069-3" title="Special:BookSources/978-0-7188-4069-3"><bdi>978-0-7188-4069-3</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">May 29,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Thomas+Merton%3A+Twentieth-Century+Wisdom+for+Twenty-First-Century+Living&amp;rft.pages=160-184&amp;rft.pub=The+Lutterworth+Press&amp;rft.date=2012-04-26&amp;rft_id=info%3Adoi%2F10.2307%2Fj.ctt1cg4k28.13&amp;rft.isbn=978-0-7188-4069-3&amp;rft.au=Dekar%2C+Paul+R.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.2307%2Fj.ctt1cg4k28.13&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-51"><span class="mw-cite-backlink"><b><a href="#cite_ref-51">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMurphy2009" class="citation report cs1">Murphy, Richard C. (September 1, 2009). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.2172/993898">Building more powerful less expensive supercomputers using Processing-In-Memory (PIM) LDRD final report</a> (Report). <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.2172%2F993898">10.2172/993898</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=report&amp;rft.btitle=Building+more+powerful+less+expensive+supercomputers+using+Processing-In-Memory+%28PIM%29+LDRD+final+report&amp;rft.date=2009-09-01&amp;rft_id=info%3Adoi%2F10.2172%2F993898&amp;rft.aulast=Murphy&amp;rft.aufirst=Richard+C.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.2172%2F993898&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-52"><span class="mw-cite-backlink"><b><a href="#cite_ref-52">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.usg.edu/galileo/skills/unit07/internet07_02.phtml">"A Brief History of the Internet"</a>. <i>www.usg.edu</i><span class="reference-accessdate">. Retrieved <span class="nowrap">August 7,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=www.usg.edu&amp;rft.atitle=A+Brief+History+of+the+Internet&amp;rft_id=https%3A%2F%2Fwww.usg.edu%2Fgalileo%2Fskills%2Funit07%2Finternet07_02.phtml&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-53"><span class="mw-cite-backlink"><b><a href="#cite_ref-53">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/s0097-8493(01)00149-2">"Walking through the view of Delft - on Internet"</a>. <i>Computers &amp; Graphics</i>. <b>25</b> (5): 927. October 2001. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fs0097-8493%2801%2900149-2">10.1016/s0097-8493(01)00149-2</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0097-8493">0097-8493</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Computers+%26+Graphics&amp;rft.atitle=Walking+through+the+view+of+Delft+-+on+Internet&amp;rft.volume=25&amp;rft.issue=5&amp;rft.pages=927&amp;rft.date=2001-10&amp;rft_id=info%3Adoi%2F10.1016%2Fs0097-8493%2801%2900149-2&amp;rft.issn=0097-8493&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2Fs0097-8493%2801%2900149-2&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-DeLeeuwTheHist07-54"><span class="mw-cite-backlink"><b><a href="#cite_ref-DeLeeuwTheHist07_54-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDeNardis,_L.2007" class="citation book cs1">DeNardis, L. (2007). "Chapter 24: A History of Internet Security". In de Leeuw, K.M.M.; Bergstra, J. (eds.). <span class="id-lock-limited" title="Free access subject to limited trial, subscription normally required"><a rel="nofollow" class="external text" href="https://archive.org/details/historyinformati00leeu"><i>The History of Information Security: A Comprehensive Handbook</i></a></span>. Elsevier. pp.&#160;<a rel="nofollow" class="external text" href="https://archive.org/details/historyinformati00leeu/page/n661">681</a>–704. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9780080550589" title="Special:BookSources/9780080550589"><bdi>9780080550589</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Chapter+24%3A+A+History+of+Internet+Security&amp;rft.btitle=The+History+of+Information+Security%3A+A+Comprehensive+Handbook&amp;rft.pages=681-704&amp;rft.pub=Elsevier&amp;rft.date=2007&amp;rft.isbn=9780080550589&amp;rft.au=DeNardis%2C+L.&amp;rft_id=https%3A%2F%2Farchive.org%2Fdetails%2Fhistoryinformati00leeu&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-55"><span class="mw-cite-backlink"><b><a href="#cite_ref-55">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFParrishImpagliazzoRajSantos2018" class="citation book cs1">Parrish, Allen; Impagliazzo, John; Raj, Rajendra K.; Santos, Henrique; Asghar, Muhammad Rizwan; Jøsang, Audun; Pereira, Teresa; Stavrou, Eliana (July 2, 2018). <a rel="nofollow" class="external text" href="https://dl.acm.org/doi/10.1145/3293881.3295778">"Global perspectives on cybersecurity education for 2030: A case for a meta-discipline"</a>. <i>Proceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education</i>. ACM. pp.&#160;36–54. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F3293881.3295778">10.1145/3293881.3295778</a>. <a href="/wiki/Hdl_(identifier)" class="mw-redirect" title="Hdl (identifier)">hdl</a>:<a rel="nofollow" class="external text" href="https://hdl.handle.net/1822%2F71620">1822/71620</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4503-6223-8" title="Special:BookSources/978-1-4503-6223-8"><bdi>978-1-4503-6223-8</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:58004425">58004425</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Global+perspectives+on+cybersecurity+education+for+2030%3A+A+case+for+a+meta-discipline&amp;rft.btitle=Proceedings+Companion+of+the+23rd+Annual+ACM+Conference+on+Innovation+and+Technology+in+Computer+Science+Education&amp;rft.pages=36-54&amp;rft.pub=ACM&amp;rft.date=2018-07-02&amp;rft_id=info%3Ahdl%2F1822%2F71620&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A58004425%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1145%2F3293881.3295778&amp;rft.isbn=978-1-4503-6223-8&amp;rft.aulast=Parrish&amp;rft.aufirst=Allen&amp;rft.au=Impagliazzo%2C+John&amp;rft.au=Raj%2C+Rajendra+K.&amp;rft.au=Santos%2C+Henrique&amp;rft.au=Asghar%2C+Muhammad+Rizwan&amp;rft.au=J%C3%B8sang%2C+Audun&amp;rft.au=Pereira%2C+Teresa&amp;rft.au=Stavrou%2C+Eliana&amp;rft_id=https%3A%2F%2Fdl.acm.org%2Fdoi%2F10.1145%2F3293881.3295778&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-56"><span class="mw-cite-backlink"><b><a href="#cite_ref-56">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPerrin2008" class="citation web cs1">Perrin, Chad (June 30, 2008). <a rel="nofollow" class="external text" href="https://www.techrepublic.com/blog/security/the-cia-triad/488">"The CIA Triad"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">May 31,</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=The+CIA+Triad&amp;rft.date=2008-06-30&amp;rft.aulast=Perrin&amp;rft.aufirst=Chad&amp;rft_id=http%3A%2F%2Fwww.techrepublic.com%2Fblog%2Fsecurity%2Fthe-cia-triad%2F488&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-57"><span class="mw-cite-backlink"><b><a href="#cite_ref-57">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHam2021" class="citation journal cs1">Ham, Jeroen Van Der (June 8, 2021). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1145/3442445">"Toward a Better Understanding of "Cybersecurity"<span class="cs1-kern-right"></span>"</a>. <i>Digital Threats: Research and Practice</i>. <b>2</b> (3): 1–3. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F3442445">10.1145/3442445</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/2692-1626">2692-1626</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Digital+Threats%3A+Research+and+Practice&amp;rft.atitle=Toward+a+Better+Understanding+of+%22Cybersecurity%22&amp;rft.volume=2&amp;rft.issue=3&amp;rft.pages=1-3&amp;rft.date=2021-06-08&amp;rft_id=info%3Adoi%2F10.1145%2F3442445&amp;rft.issn=2692-1626&amp;rft.aulast=Ham&amp;rft.aufirst=Jeroen+Van+Der&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1145%2F3442445&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-NIST-58"><span class="mw-cite-backlink">^ <a href="#cite_ref-NIST_58-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-NIST_58-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFStoneburnerHaydenFeringa2004" class="citation web cs1">Stoneburner, G.; Hayden, C.; Feringa, A. (2004). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20110815124528/http://csrc.nist.gov/publications/nistpubs/800-27A/SP800-27-RevA.pdf">"Engineering Principles for Information Technology Security"</a> <span class="cs1-format">(PDF)</span>. csrc.nist.gov. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.6028%2FNIST.SP.800-27rA">10.6028/NIST.SP.800-27rA</a>. Archived from <a rel="nofollow" class="external text" href="http://csrc.nist.gov/publications/nistpubs/800-27A/SP800-27-RevA.pdf">the original</a> <span class="cs1-format">(PDF)</span> on August 15, 2011<span class="reference-accessdate">. Retrieved <span class="nowrap">August 28,</span> 2011</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Engineering+Principles+for+Information+Technology+Security&amp;rft.pub=csrc.nist.gov&amp;rft.date=2004&amp;rft_id=info%3Adoi%2F10.6028%2FNIST.SP.800-27rA&amp;rft.aulast=Stoneburner&amp;rft.aufirst=G.&amp;rft.au=Hayden%2C+C.&amp;rft.au=Feringa%2C+A.&amp;rft_id=http%3A%2F%2Fcsrc.nist.gov%2Fpublications%2Fnistpubs%2F800-27A%2FSP800-27-RevA.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-BeckersPattern15-59"><span class="mw-cite-backlink"><b><a href="#cite_ref-BeckersPattern15_59-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBeckers,_K.2015" class="citation book cs1">Beckers, K. (2015). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=DvdICAAAQBAJ&amp;pg=PA100"><i>Pattern and Security Requirements: Engineering-Based Establishment of Security Standards</i></a>. Springer. p.&#160;100. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9783319166643" title="Special:BookSources/9783319166643"><bdi>9783319166643</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Pattern+and+Security+Requirements%3A+Engineering-Based+Establishment+of+Security+Standards&amp;rft.pages=100&amp;rft.pub=Springer&amp;rft.date=2015&amp;rft.isbn=9783319166643&amp;rft.au=Beckers%2C+K.&amp;rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DDvdICAAAQBAJ%26pg%3DPA100&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-60"><span class="mw-cite-backlink"><b><a href="#cite_ref-60">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFienbergSlavković2011" class="citation cs2">Fienberg, Stephen E.; Slavković, Aleksandra B. (2011), "Data Privacy and Confidentiality", <i>International Encyclopedia of Statistical Science</i>, pp.&#160;342–345, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-3-642-04898-2_202">10.1007/978-3-642-04898-2_202</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-3-642-04897-5" title="Special:BookSources/978-3-642-04897-5"><bdi>978-3-642-04897-5</bdi></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Data+Privacy+and+Confidentiality&amp;rft.btitle=International+Encyclopedia+of+Statistical+Science&amp;rft.pages=342-345&amp;rft.date=2011&amp;rft_id=info%3Adoi%2F10.1007%2F978-3-642-04898-2_202&amp;rft.isbn=978-3-642-04897-5&amp;rft.aulast=Fienberg&amp;rft.aufirst=Stephen+E.&amp;rft.au=Slavkovi%C4%87%2C+Aleksandra+B.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-AndressTheBasics14-61"><span class="mw-cite-backlink">^ <a href="#cite_ref-AndressTheBasics14_61-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-AndressTheBasics14_61-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-AndressTheBasics14_61-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-AndressTheBasics14_61-3"><sup><i><b>d</b></i></sup></a> <a href="#cite_ref-AndressTheBasics14_61-4"><sup><i><b>e</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAndress,_J.2014" class="citation book cs1">Andress, J. (2014). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=9NI0AwAAQBAJ&amp;pg=PA6"><i>The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice</i></a>. Syngress. p.&#160;240. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9780128008126" title="Special:BookSources/9780128008126"><bdi>9780128008126</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=The+Basics+of+Information+Security%3A+Understanding+the+Fundamentals+of+InfoSec+in+Theory+and+Practice&amp;rft.pages=240&amp;rft.pub=Syngress&amp;rft.date=2014&amp;rft.isbn=9780128008126&amp;rft.au=Andress%2C+J.&amp;rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3D9NI0AwAAQBAJ%26pg%3DPA6&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-62"><span class="mw-cite-backlink"><b><a href="#cite_ref-62">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBoritz2005" class="citation journal cs1">Boritz, J. Efrim (2005). "IS Practitioners' Views on Core Concepts of Information Integrity". <i>International Journal of Accounting Information Systems</i>. <b>6</b> (4). Elsevier: 260–279. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.accinf.2005.07.001">10.1016/j.accinf.2005.07.001</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=International+Journal+of+Accounting+Information+Systems&amp;rft.atitle=IS+Practitioners%27+Views+on+Core+Concepts+of+Information+Integrity&amp;rft.volume=6&amp;rft.issue=4&amp;rft.pages=260-279&amp;rft.date=2005&amp;rft_id=info%3Adoi%2F10.1016%2Fj.accinf.2005.07.001&amp;rft.aulast=Boritz&amp;rft.aufirst=J.+Efrim&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-63"><span class="mw-cite-backlink"><b><a href="#cite_ref-63">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHryshko2020" class="citation journal cs1">Hryshko, I. (2020). <a rel="nofollow" class="external text" href="https://doi.org/10.32841%2F2307-1745.2020.43.40">"Unauthorized Occupation of Land and Unauthorized Construction: Concepts and Types of Tactical Means of Investigation"</a>. <i>International Humanitarian University Herald. Jurisprudence</i> (43): 180–184. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.32841%2F2307-1745.2020.43.40">10.32841/2307-1745.2020.43.40</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/2307-1745">2307-1745</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=International+Humanitarian+University+Herald.+Jurisprudence&amp;rft.atitle=Unauthorized+Occupation+of+Land+and+Unauthorized+Construction%3A+Concepts+and+Types+of+Tactical+Means+of+Investigation&amp;rft.issue=43&amp;rft.pages=180-184&amp;rft.date=2020&amp;rft_id=info%3Adoi%2F10.32841%2F2307-1745.2020.43.40&amp;rft.issn=2307-1745&amp;rft.aulast=Hryshko&amp;rft.aufirst=I.&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.32841%252F2307-1745.2020.43.40&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-64"><span class="mw-cite-backlink"><b><a href="#cite_ref-64">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKim2000" class="citation cs2">Kim, Bonn-Oh (September 21, 2000), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1201/9781420031560-34">"Referential Integrity for Database Design"</a>, <i>High-Performance Web Databases</i>, Auerbach Publications, pp.&#160;427–434, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1201%2F9781420031560-34">10.1201/9781420031560-34</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-429-11600-1" title="Special:BookSources/978-0-429-11600-1"><bdi>978-0-429-11600-1</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">May 29,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=High-Performance+Web+Databases&amp;rft.atitle=Referential+Integrity+for+Database+Design&amp;rft.pages=427-434&amp;rft.date=2000-09-21&amp;rft_id=info%3Adoi%2F10.1201%2F9781420031560-34&amp;rft.isbn=978-0-429-11600-1&amp;rft.aulast=Kim&amp;rft.aufirst=Bonn-Oh&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1201%2F9781420031560-34&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-65"><span class="mw-cite-backlink"><b><a href="#cite_ref-65">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPevnev2018" class="citation journal cs1">Pevnev, V. (2018). <a rel="nofollow" class="external text" href="https://doi.org/10.32836%2F2521-6643-2018.2-56.6">"Model Threats and Ensure the Integrity of Information"</a>. <i>Systems and Technologies</i>. <b>2</b> (56): 80–95. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.32836%2F2521-6643-2018.2-56.6">10.32836/2521-6643-2018.2-56.6</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/2521-6643">2521-6643</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Systems+and+Technologies&amp;rft.atitle=Model+Threats+and+Ensure+the+Integrity+of+Information&amp;rft.volume=2&amp;rft.issue=56&amp;rft.pages=80-95&amp;rft.date=2018&amp;rft_id=info%3Adoi%2F10.32836%2F2521-6643-2018.2-56.6&amp;rft.issn=2521-6643&amp;rft.aulast=Pevnev&amp;rft.aufirst=V.&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.32836%252F2521-6643-2018.2-56.6&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-66"><span class="mw-cite-backlink"><b><a href="#cite_ref-66">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFanWangChengLi2013" class="citation journal cs1">Fan, Lejun; Wang, Yuanzhuo; Cheng, Xueqi; Li, Jinming; Jin, Shuyuan (February 26, 2013). <a rel="nofollow" class="external text" href="https://doi.org/10.1002%2Fsec.705">"Privacy theft malware multi-process collaboration analysis"</a>. <i>Security and Communication Networks</i>. <b>8</b> (1): 51–67. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1002%2Fsec.705">10.1002/sec.705</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1939-0114">1939-0114</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Security+and+Communication+Networks&amp;rft.atitle=Privacy+theft+malware+multi-process+collaboration+analysis&amp;rft.volume=8&amp;rft.issue=1&amp;rft.pages=51-67&amp;rft.date=2013-02-26&amp;rft_id=info%3Adoi%2F10.1002%2Fsec.705&amp;rft.issn=1939-0114&amp;rft.aulast=Fan&amp;rft.aufirst=Lejun&amp;rft.au=Wang%2C+Yuanzhuo&amp;rft.au=Cheng%2C+Xueqi&amp;rft.au=Li%2C+Jinming&amp;rft.au=Jin%2C+Shuyuan&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.1002%252Fsec.705&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-67"><span class="mw-cite-backlink"><b><a href="#cite_ref-67">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation book cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/b978-0-12-397033-6.00030-4">"Completeness, Consistency, and Integrity of the Data Model"</a>. <i>Measuring Data Quality for Ongoing Improvement</i>. MK Series on Business Intelligence. Elsevier. 2013. pp.&#160;e11–e19. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fb978-0-12-397033-6.00030-4">10.1016/b978-0-12-397033-6.00030-4</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-12-397033-6" title="Special:BookSources/978-0-12-397033-6"><bdi>978-0-12-397033-6</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">May 29,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Completeness%2C+Consistency%2C+and+Integrity+of+the+Data+Model&amp;rft.btitle=Measuring+Data+Quality+for+Ongoing+Improvement&amp;rft.series=MK+Series+on+Business+Intelligence&amp;rft.pages=e11-e19&amp;rft.pub=Elsevier&amp;rft.date=2013&amp;rft_id=info%3Adoi%2F10.1016%2Fb978-0-12-397033-6.00030-4&amp;rft.isbn=978-0-12-397033-6&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2Fb978-0-12-397033-6.00030-4&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-68"><span class="mw-cite-backlink"><b><a href="#cite_ref-68">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation audio-visual cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1117/12.2266326.5459349132001"><i>Video from SPIE - the International Society for Optics and Photonics</i></a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1117%2F12.2266326.5459349132001">10.1117/12.2266326.5459349132001</a><span class="reference-accessdate">. Retrieved <span class="nowrap">May 29,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Video+from+SPIE+-+the+International+Society+for+Optics+and+Photonics&amp;rft_id=info%3Adoi%2F10.1117%2F12.2266326.5459349132001&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1117%2F12.2266326.5459349132001&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-69"><span class="mw-cite-backlink"><b><a href="#cite_ref-69">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1"><a rel="nofollow" class="external text" href="https://doi.org/10.48009%2F1_iis_2005_311-317">"Communication Skills Used by Information Systems Graduates"</a>. <i>Issues in Information Systems</i>. 2005. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.48009%2F1_iis_2005_311-317">10.48009/1_iis_2005_311-317</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1529-7314">1529-7314</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Issues+in+Information+Systems&amp;rft.atitle=Communication+Skills+Used+by+Information+Systems+Graduates&amp;rft.date=2005&amp;rft_id=info%3Adoi%2F10.48009%2F1_iis_2005_311-317&amp;rft.issn=1529-7314&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.48009%252F1_iis_2005_311-317&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-70"><span class="mw-cite-backlink"><b><a href="#cite_ref-70">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation report cs1"><a rel="nofollow" class="external text" href="https://www.osti.gov/biblio/5083196/">Outages of electric power supply resulting from cable failures Boston Edison Company system</a> (Report). July 1, 1980. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.2172%2F5083196">10.2172/5083196</a>. <a href="/wiki/OSTI_(identifier)" class="mw-redirect" title="OSTI (identifier)">OSTI</a>&#160;<a rel="nofollow" class="external text" href="https://www.osti.gov/biblio/5083196">5083196</a><span class="reference-accessdate">. Retrieved <span class="nowrap">January 18,</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=report&amp;rft.btitle=Outages+of+electric+power+supply+resulting+from+cable+failures+Boston+Edison+Company+system&amp;rft.date=1980-07-01&amp;rft_id=https%3A%2F%2Fwww.osti.gov%2Fbiblio%2F5083196%23id-name%3DOSTI&amp;rft_id=info%3Adoi%2F10.2172%2F5083196&amp;rft_id=https%3A%2F%2Fwww.osti.gov%2Fbiblio%2F5083196%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-71"><span class="mw-cite-backlink"><b><a href="#cite_ref-71">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLoukasOke2010" class="citation journal cs1">Loukas, G.; Oke, G. (September 2010) [August 2009]. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20120324115835/http://staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke-DoSSurveyComputerJournal.pdf">"Protection Against Denial of Service Attacks: A Survey"</a> <span class="cs1-format">(PDF)</span>. <i><a href="/wiki/The_Computer_Journal" title="The Computer Journal">Comput. J.</a></i> <b>53</b> (7): 1020–1037. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1093%2Fcomjnl%2Fbxp078">10.1093/comjnl/bxp078</a>. Archived from <a rel="nofollow" class="external text" href="http://staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke-DoSSurveyComputerJournal.pdf">the original</a> <span class="cs1-format">(PDF)</span> on March 24, 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">August 28,</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Comput.+J.&amp;rft.atitle=Protection+Against+Denial+of+Service+Attacks%3A+A+Survey&amp;rft.volume=53&amp;rft.issue=7&amp;rft.pages=1020-1037&amp;rft.date=2010-09&amp;rft_id=info%3Adoi%2F10.1093%2Fcomjnl%2Fbxp078&amp;rft.aulast=Loukas&amp;rft.aufirst=G.&amp;rft.au=Oke%2C+G.&amp;rft_id=http%3A%2F%2Fstaffweb.cms.gre.ac.uk%2F~lg47%2Fpublications%2FLoukasOke-DoSSurveyComputerJournal.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-72"><span class="mw-cite-backlink"><b><a href="#cite_ref-72">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2">"Be Able To Perform a Clinical Activity", <i>Definitions</i>, Qeios, February 2, 2020, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.32388%2Fdine5x">10.32388/dine5x</a></span>, <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:241238722">241238722</a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Definitions&amp;rft.atitle=Be+Able+To+Perform+a+Clinical+Activity&amp;rft.date=2020-02-02&amp;rft_id=info%3Adoi%2F10.32388%2Fdine5x&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A241238722%23id-name%3DS2CID&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-73"><span class="mw-cite-backlink"><b><a href="#cite_ref-73">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFOhtaFujii2011" class="citation book cs1">Ohta, Mai; Fujii, Takeo (May 2011). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1109/dyspan.2011.5936257">"Iterative cooperative sensing on shared primary spectrum for improving sensing ability"</a>. <i>2011 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN)</i>. IEEE. pp.&#160;623–627. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2Fdyspan.2011.5936257">10.1109/dyspan.2011.5936257</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4577-0177-1" title="Special:BookSources/978-1-4577-0177-1"><bdi>978-1-4577-0177-1</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:15119653">15119653</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Iterative+cooperative+sensing+on+shared+primary+spectrum+for+improving+sensing+ability&amp;rft.btitle=2011+IEEE+International+Symposium+on+Dynamic+Spectrum+Access+Networks+%28DySPAN%29&amp;rft.pages=623-627&amp;rft.pub=IEEE&amp;rft.date=2011-05&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A15119653%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1109%2Fdyspan.2011.5936257&amp;rft.isbn=978-1-4577-0177-1&amp;rft.aulast=Ohta&amp;rft.aufirst=Mai&amp;rft.au=Fujii%2C+Takeo&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1109%2Fdyspan.2011.5936257&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-74"><span class="mw-cite-backlink"><b><a href="#cite_ref-74">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.3403/30387743"><i>Information technology. Information security incident management</i></a>, BSI British Standards, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.3403%2F30387743">10.3403/30387743</a><span class="reference-accessdate">, retrieved <span class="nowrap">May 29,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Information+technology.+Information+security+incident+management&amp;rft.pub=BSI+British+Standards&amp;rft_id=info%3Adoi%2F10.3403%2F30387743&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.3403%2F30387743&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-75"><span class="mw-cite-backlink"><b><a href="#cite_ref-75">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBlum2020" class="citation cs2">Blum, Dan (2020), "Identify and Align Security-Related Roles", <i>Rational Cybersecurity for Business</i>, Berkeley, CA: Apress, pp.&#160;31–60, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-1-4842-5952-8_2">10.1007/978-1-4842-5952-8_2</a></span>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4842-5951-1" title="Special:BookSources/978-1-4842-5951-1"><bdi>978-1-4842-5951-1</bdi></a>, <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:226626983">226626983</a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Rational+Cybersecurity+for+Business&amp;rft.atitle=Identify+and+Align+Security-Related+Roles&amp;rft.pages=31-60&amp;rft.date=2020&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A226626983%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1007%2F978-1-4842-5952-8_2&amp;rft.isbn=978-1-4842-5951-1&amp;rft.aulast=Blum&amp;rft.aufirst=Dan&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-BidgoliHandbook06-76"><span class="mw-cite-backlink"><b><a href="#cite_ref-BidgoliHandbook06_76-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMcCarthy,_C.2006" class="citation book cs1">McCarthy, C. (2006). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=0RfANAwOUdIC&amp;pg=PA65">"Digital Libraries: Security and Preservation Considerations"</a>. In Bidgoli, H. (ed.). <i>Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management</i>. Vol.&#160;3. John Wiley &amp; Sons. pp.&#160;49–76. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9780470051214" title="Special:BookSources/9780470051214"><bdi>9780470051214</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Digital+Libraries%3A+Security+and+Preservation+Considerations&amp;rft.btitle=Handbook+of+Information+Security%2C+Threats%2C+Vulnerabilities%2C+Prevention%2C+Detection%2C+and+Management&amp;rft.pages=49-76&amp;rft.pub=John+Wiley+%26+Sons&amp;rft.date=2006&amp;rft.isbn=9780470051214&amp;rft.au=McCarthy%2C+C.&amp;rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3D0RfANAwOUdIC%26pg%3DPA65&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-77"><span class="mw-cite-backlink"><b><a href="#cite_ref-77">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.3403/01110206u"><i>Information technology. Open systems interconnection. Security frameworks for open systems</i></a>, BSI British Standards, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.3403%2F01110206u">10.3403/01110206u</a><span class="reference-accessdate">, retrieved <span class="nowrap">May 29,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Information+technology.+Open+systems+interconnection.+Security+frameworks+for+open+systems&amp;rft.pub=BSI+British+Standards&amp;rft_id=info%3Adoi%2F10.3403%2F01110206u&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.3403%2F01110206u&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-78"><span class="mw-cite-backlink"><b><a href="#cite_ref-78">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChristofori2014" class="citation cs2">Christofori, Ralf (January 1, 2014), "Thus could it have been", <i>Julio Rondo - O.k., Meta Memory</i>, Wilhelm Fink Verlag, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.30965%2F9783846757673_003">10.30965/9783846757673_003</a> (inactive November 1, 2024), <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-3-7705-5767-7" title="Special:BookSources/978-3-7705-5767-7"><bdi>978-3-7705-5767-7</bdi></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Julio+Rondo+-+O.k.%2C+Meta+Memory&amp;rft.atitle=Thus+could+it+have+been&amp;rft.date=2014-01-01&amp;rft_id=info%3Adoi%2F10.30965%2F9783846757673_003&amp;rft.isbn=978-3-7705-5767-7&amp;rft.aulast=Christofori&amp;rft.aufirst=Ralf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Citation" title="Template:Citation">citation</a>}}</code>: CS1 maint: DOI inactive as of November 2024 (<a href="/wiki/Category:CS1_maint:_DOI_inactive_as_of_November_2024" title="Category:CS1 maint: DOI inactive as of November 2024">link</a>)</span></span> </li> <li id="cite_note-79"><span class="mw-cite-backlink"><b><a href="#cite_ref-79">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAtkins2021" class="citation journal cs1">Atkins, D. (May 2021). <a rel="nofollow" class="external text" href="https://www.rfc-editor.org/info/rfc9021">"Use of the Walnut Digital Signature Algorithm with CBOR Object Signing and Encryption (COSE)"</a>. <i>RFC Editor</i>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.17487%2Frfc9021">10.17487/rfc9021</a></span>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:182252627">182252627</a></span><span class="reference-accessdate">. Retrieved <span class="nowrap">January 18,</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=&#82;FC+Editor&amp;rft.atitle=Use+of+the+Walnut+Digital+Signature+Algorithm+with+CBOR+Object+Signing+and+Encryption+%28COSE%29&amp;rft.date=2021-05&amp;rft_id=info%3Adoi%2F10.17487%2Frfc9021&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A182252627%23id-name%3DS2CID&amp;rft.aulast=Atkins&amp;rft.aufirst=D.&amp;rft_id=https%3A%2F%2Fwww.rfc-editor.org%2Finfo%2Frfc9021&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-80"><span class="mw-cite-backlink"><b><a href="#cite_ref-80">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLe_May2003" class="citation cs2">Le May, I. (2003), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/b0-08-043749-4/01001-6">"Structural Integrity in the Petrochemical Industry"</a>, <i>Comprehensive Structural Integrity</i>, Elsevier, pp.&#160;125–149, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fb0-08-043749-4%2F01001-6">10.1016/b0-08-043749-4/01001-6</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-08-043749-1" title="Special:BookSources/978-0-08-043749-1"><bdi>978-0-08-043749-1</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">May 29,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Comprehensive+Structural+Integrity&amp;rft.atitle=Structural+Integrity+in+the+Petrochemical+Industry&amp;rft.pages=125-149&amp;rft.date=2003&amp;rft_id=info%3Adoi%2F10.1016%2Fb0-08-043749-4%2F01001-6&amp;rft.isbn=978-0-08-043749-1&amp;rft.aulast=Le+May&amp;rft.aufirst=I.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2Fb0-08-043749-4%2F01001-6&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-81"><span class="mw-cite-backlink"><b><a href="#cite_ref-81">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20110516085505/http://www.oecd.org/dataoecd/16/22/15582260.pdf">"oecd.org"</a> <span class="cs1-format">(PDF)</span>. Archived from <a rel="nofollow" class="external text" href="http://www.oecd.org/dataoecd/16/22/15582260.pdf">the original</a> <span class="cs1-format">(PDF)</span> on May 16, 2011<span class="reference-accessdate">. Retrieved <span class="nowrap">January 17,</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=oecd.org&amp;rft_id=http%3A%2F%2Fwww.oecd.org%2Fdataoecd%2F16%2F22%2F15582260.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-82"><span class="mw-cite-backlink"><b><a href="#cite_ref-82">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/0167-4048(96)82630-7">"GSSP (Generally-Accepted system Security Principles): A trip to abilene"</a>. <i>Computers &amp; Security</i>. <b>15</b> (5): 417. January 1996. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2F0167-4048%2896%2982630-7">10.1016/0167-4048(96)82630-7</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0167-4048">0167-4048</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Computers+%26+Security&amp;rft.atitle=GSSP+%28Generally-Accepted+system+Security+Principles%29%3A+A+trip+to+abilene&amp;rft.volume=15&amp;rft.issue=5&amp;rft.pages=417&amp;rft.date=1996-01&amp;rft_id=info%3Adoi%2F10.1016%2F0167-4048%2896%2982630-7&amp;rft.issn=0167-4048&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2F0167-4048%2896%2982630-7&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-83"><span class="mw-cite-backlink"><b><a href="#cite_ref-83">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSlade" class="citation web cs1">Slade, Rob. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20171117003743/http://blog.isc2.org/isc2_blog/2008/12/cia-triad-versus-parkerian-hexad.html">"(ICS)2 Blog"</a>. Archived from <a rel="nofollow" class="external text" href="http://blog.isc2.org/isc2_blog/2008/12/cia-triad-versus-parkerian-hexad.html">the original</a> on November 17, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">November 17,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=%28ICS%292+Blog&amp;rft.aulast=Slade&amp;rft.aufirst=Rob&amp;rft_id=http%3A%2F%2Fblog.isc2.org%2Fisc2_blog%2F2008%2F12%2Fcia-triad-versus-parkerian-hexad.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-84"><span class="mw-cite-backlink"><b><a href="#cite_ref-84">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAceituno" class="citation web cs1">Aceituno, Vicente. <a rel="nofollow" class="external text" href="http://www.ism3.com/node/39">"Open Information Security Maturity Model"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">February 12,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Open+Information+Security+Maturity+Model&amp;rft.aulast=Aceituno&amp;rft.aufirst=Vicente&amp;rft_id=http%3A%2F%2Fwww.ism3.com%2Fnode%2F39&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-85"><span class="mw-cite-backlink"><b><a href="#cite_ref-85">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSodjahinChampagneCogginsGillet2017" class="citation journal cs1">Sodjahin, Amos; Champagne, Claudia; Coggins, Frank; Gillet, Roland (January 11, 2017). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1057/s41260-016-0039-y">"Leading or lagging indicators of risk? The informational content of extra-financial performance scores"</a>. <i>Journal of Asset Management</i>. <b>18</b> (5): 347–370. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1057%2Fs41260-016-0039-y">10.1057/s41260-016-0039-y</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1470-8272">1470-8272</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:157485290">157485290</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Journal+of+Asset+Management&amp;rft.atitle=Leading+or+lagging+indicators+of+risk%3F+The+informational+content+of+extra-financial+performance+scores&amp;rft.volume=18&amp;rft.issue=5&amp;rft.pages=347-370&amp;rft.date=2017-01-11&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A157485290%23id-name%3DS2CID&amp;rft.issn=1470-8272&amp;rft_id=info%3Adoi%2F10.1057%2Fs41260-016-0039-y&amp;rft.aulast=Sodjahin&amp;rft.aufirst=Amos&amp;rft.au=Champagne%2C+Claudia&amp;rft.au=Coggins%2C+Frank&amp;rft.au=Gillet%2C+Roland&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1057%2Fs41260-016-0039-y&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-86"><span class="mw-cite-backlink"><b><a href="#cite_ref-86">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFReynolds1995" class="citation journal cs1">Reynolds, E H (July 22, 1995). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1136/bmj.311.6999.257">"Folate has potential to cause harm"</a>. <i>BMJ</i>. <b>311</b> (6999): 257. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1136%2Fbmj.311.6999.257">10.1136/bmj.311.6999.257</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0959-8138">0959-8138</a>. <a href="/wiki/PMC_(identifier)" class="mw-redirect" title="PMC (identifier)">PMC</a>&#160;<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2550299">2550299</a></span>. <a href="/wiki/PMID_(identifier)" class="mw-redirect" title="PMID (identifier)">PMID</a>&#160;<a rel="nofollow" class="external text" href="https://pubmed.ncbi.nlm.nih.gov/7503870">7503870</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=BMJ&amp;rft.atitle=Folate+has+potential+to+cause+harm&amp;rft.volume=311&amp;rft.issue=6999&amp;rft.pages=257&amp;rft.date=1995-07-22&amp;rft_id=https%3A%2F%2Fwww.ncbi.nlm.nih.gov%2Fpmc%2Farticles%2FPMC2550299%23id-name%3DPMC&amp;rft.issn=0959-8138&amp;rft_id=info%3Apmid%2F7503870&amp;rft_id=info%3Adoi%2F10.1136%2Fbmj.311.6999.257&amp;rft.aulast=Reynolds&amp;rft.aufirst=E+H&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1136%2Fbmj.311.6999.257&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-87"><span class="mw-cite-backlink"><b><a href="#cite_ref-87">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRandall2011" class="citation cs2">Randall, Alan (2011), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1017/cbo9780511974557.003">"Harm, risk, and threat"</a>, <i>Risk and Precaution</i>, Cambridge: Cambridge University Press, pp.&#160;31–42, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1017%2Fcbo9780511974557.003">10.1017/cbo9780511974557.003</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-511-97455-7" title="Special:BookSources/978-0-511-97455-7"><bdi>978-0-511-97455-7</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">May 29,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Risk+and+Precaution&amp;rft.atitle=Harm%2C+risk%2C+and+threat&amp;rft.pages=31-42&amp;rft.date=2011&amp;rft_id=info%3Adoi%2F10.1017%2Fcbo9780511974557.003&amp;rft.isbn=978-0-511-97455-7&amp;rft.aulast=Randall&amp;rft.aufirst=Alan&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1017%2Fcbo9780511974557.003&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-GramaLegal14-88"><span class="mw-cite-backlink"><b><a href="#cite_ref-GramaLegal14_88-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGrama,_J.L.2014" class="citation book cs1">Grama, J.L. (2014). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=kqoyDwAAQBAJ&amp;pg=PT38"><i>Legal Issues in Information Security</i></a>. Jones &amp; Bartlett Learning. p.&#160;550. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9781284151046" title="Special:BookSources/9781284151046"><bdi>9781284151046</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Legal+Issues+in+Information+Security&amp;rft.pages=550&amp;rft.pub=Jones+%26+Bartlett+Learning&amp;rft.date=2014&amp;rft.isbn=9781284151046&amp;rft.au=Grama%2C+J.L.&amp;rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DkqoyDwAAQBAJ%26pg%3DPT38&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-89"><span class="mw-cite-backlink"><b><a href="#cite_ref-89">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCannon2016" class="citation book cs1">Cannon, David L. (March 4, 2016). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1002/9781119419211.ch3">"Audit Process"</a>. <i>CISA: Certified Information Systems Auditor Study Guide</i> (Fourth&#160;ed.). pp.&#160;139–214. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1002%2F9781119419211.ch3">10.1002/9781119419211.ch3</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9781119056249" title="Special:BookSources/9781119056249"><bdi>9781119056249</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Audit+Process&amp;rft.btitle=CISA%3A+Certified+Information+Systems+Auditor+Study+Guide&amp;rft.pages=139-214&amp;rft.edition=Fourth&amp;rft.date=2016-03-04&amp;rft_id=info%3Adoi%2F10.1002%2F9781119419211.ch3&amp;rft.isbn=9781119056249&amp;rft.aulast=Cannon&amp;rft.aufirst=David+L.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1002%2F9781119419211.ch3&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-90"><span class="mw-cite-backlink"><b><a href="#cite_ref-90">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation book cs1"><i>CISA Review Manual 2006</i>. Information Systems Audit and Control Association. 2006. p.&#160;85. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-933284-15-6" title="Special:BookSources/978-1-933284-15-6"><bdi>978-1-933284-15-6</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=CISA+Review+Manual+2006&amp;rft.pages=85&amp;rft.pub=Information+Systems+Audit+and+Control+Association&amp;rft.date=2006&amp;rft.isbn=978-1-933284-15-6&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-91"><span class="mw-cite-backlink"><b><a href="#cite_ref-91">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKadlec2012" class="citation journal cs1">Kadlec, Jaroslav (November 2, 2012). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1108/14637151211283320">"Two-dimensional process modeling (2DPM)"</a>. <i>Business Process Management Journal</i>. <b>18</b> (6): 849–875. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1108%2F14637151211283320">10.1108/14637151211283320</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1463-7154">1463-7154</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Business+Process+Management+Journal&amp;rft.atitle=Two-dimensional+process+modeling+%282DPM%29&amp;rft.volume=18&amp;rft.issue=6&amp;rft.pages=849-875&amp;rft.date=2012-11-02&amp;rft_id=info%3Adoi%2F10.1108%2F14637151211283320&amp;rft.issn=1463-7154&amp;rft.aulast=Kadlec&amp;rft.aufirst=Jaroslav&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1108%2F14637151211283320&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-92"><span class="mw-cite-backlink"><b><a href="#cite_ref-92">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1007/0-387-21712-6_14">"All Countermeasures Have Some Value, But No Countermeasure Is Perfect"</a>, <i>Beyond Fear</i>, New York: Springer-Verlag, pp.&#160;207–232, 2003, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F0-387-21712-6_14">10.1007/0-387-21712-6_14</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0-387-02620-7" title="Special:BookSources/0-387-02620-7"><bdi>0-387-02620-7</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">May 29,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Beyond+Fear&amp;rft.atitle=All+Countermeasures+Have+Some+Value%2C+But+No+Countermeasure+Is+Perfect&amp;rft.pages=207-232&amp;rft.date=2003&amp;rft_id=info%3Adoi%2F10.1007%2F0-387-21712-6_14&amp;rft.isbn=0-387-02620-7&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1007%2F0-387-21712-6_14&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-93"><span class="mw-cite-backlink"><b><a href="#cite_ref-93">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/s1361-3723(17)30086-6">"Data breaches: Deloitte suffers serious hit while more details emerge about Equifax and Yahoo"</a>. <i>Computer Fraud &amp; Security</i>. <b>2017</b> (10): 1–3. October 2017. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fs1361-3723%2817%2930086-6">10.1016/s1361-3723(17)30086-6</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1361-3723">1361-3723</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Computer+Fraud+%26+Security&amp;rft.atitle=Data+breaches%3A+Deloitte+suffers+serious+hit+while+more+details+emerge+about+Equifax+and+Yahoo&amp;rft.volume=2017&amp;rft.issue=10&amp;rft.pages=1-3&amp;rft.date=2017-10&amp;rft_id=info%3Adoi%2F10.1016%2Fs1361-3723%2817%2930086-6&amp;rft.issn=1361-3723&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2Fs1361-3723%2817%2930086-6&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-94"><span class="mw-cite-backlink"><b><a href="#cite_ref-94">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSpagnolettiResca_A.2008" class="citation journal cs1">Spagnoletti, Paolo; Resca A. (2008). <a rel="nofollow" class="external text" href="http://eprints.luiss.it/955/">"The duality of Information Security Management: fighting against predictable and unpredictable threats"</a>. <i>Journal of Information System Security</i>. <b>4</b> (3): 46–62.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Journal+of+Information+System+Security&amp;rft.atitle=The+duality+of+Information+Security+Management%3A+fighting+against+predictable+and+unpredictable+threats&amp;rft.volume=4&amp;rft.issue=3&amp;rft.pages=46-62&amp;rft.date=2008&amp;rft.aulast=Spagnoletti&amp;rft.aufirst=Paolo&amp;rft.au=Resca+A.&amp;rft_id=http%3A%2F%2Feprints.luiss.it%2F955%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-95"><span class="mw-cite-backlink"><b><a href="#cite_ref-95">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFYusoffYusof2009" class="citation journal cs1">Yusoff, Nor Hashim; Yusof, Mohd Radzuan (August 4, 2009). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.2118/122545-ms">"Managing HSE Risk in Harsh Environment"</a>. <i>All Days</i>. SPE. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.2118%2F122545-ms">10.2118/122545-ms</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=All+Days&amp;rft.atitle=Managing+HSE+Risk+in+Harsh+Environment&amp;rft.date=2009-08-04&amp;rft_id=info%3Adoi%2F10.2118%2F122545-ms&amp;rft.aulast=Yusoff&amp;rft.aufirst=Nor+Hashim&amp;rft.au=Yusof%2C+Mohd+Radzuan&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.2118%2F122545-ms&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-96"><span class="mw-cite-backlink"><b><a href="#cite_ref-96">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBaxter2010" class="citation thesis cs1">Baxter, Wesley (2010). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.22215/etd/2010-09016"><i>Sold out: how Ottawa's downtown business improvement areas have secured and valorized urban space</i></a> (Thesis). Carleton University. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.22215%2Fetd%2F2010-09016">10.22215/etd/2010-09016</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adissertation&amp;rft.title=Sold+out%3A+how+Ottawa%27s+downtown+business+improvement+areas+have+secured+and+valorized+urban+space&amp;rft.inst=Carleton+University&amp;rft.date=2010&amp;rft_id=info%3Adoi%2F10.22215%2Fetd%2F2010-09016&amp;rft.aulast=Baxter&amp;rft.aufirst=Wesley&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.22215%2Fetd%2F2010-09016&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-97"><span class="mw-cite-backlink"><b><a href="#cite_ref-97">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFde_SouzaLynch2012" class="citation web cs1">de Souza, André; Lynch, Anthony (June 2012). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.3386/w18137">"Does Mutual Fund Performance Vary over the Business Cycle?"</a>. Cambridge, MA. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.3386%2Fw18137">10.3386/w18137</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:262620435">262620435</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Does+Mutual+Fund+Performance+Vary+over+the+Business+Cycle%3F&amp;rft.place=Cambridge%2C+MA&amp;rft.date=2012-06&amp;rft_id=info%3Adoi%2F10.3386%2Fw18137&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A262620435%23id-name%3DS2CID&amp;rft.aulast=de+Souza&amp;rft.aufirst=Andr%C3%A9&amp;rft.au=Lynch%2C+Anthony&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.3386%2Fw18137&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-98"><span class="mw-cite-backlink"><b><a href="#cite_ref-98">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKiountouzisKokolakis1996" class="citation book cs1">Kiountouzis, E.A.; Kokolakis, S.A. (May 31, 1996). <i>Information systems security: facing the information society of the 21st century</i>. London: Chapman &amp; Hall, Ltd. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-412-78120-9" title="Special:BookSources/978-0-412-78120-9"><bdi>978-0-412-78120-9</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Information+systems+security%3A+facing+the+information+society+of+the+21st+century&amp;rft.place=London&amp;rft.pub=Chapman+%26+Hall%2C+Ltd.&amp;rft.date=1996-05-31&amp;rft.isbn=978-0-412-78120-9&amp;rft.aulast=Kiountouzis&amp;rft.aufirst=E.A.&amp;rft.au=Kokolakis%2C+S.A.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-NewsomeAPract13-99"><span class="mw-cite-backlink"><b><a href="#cite_ref-NewsomeAPract13_99-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNewsome,_B.2013" class="citation book cs1">Newsome, B. (2013). <i>A Practical Introduction to Security and Risk Management</i>. SAGE Publications. p.&#160;208. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9781483324852" title="Special:BookSources/9781483324852"><bdi>9781483324852</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=A+Practical+Introduction+to+Security+and+Risk+Management&amp;rft.pages=208&amp;rft.pub=SAGE+Publications&amp;rft.date=2013&amp;rft.isbn=9781483324852&amp;rft.au=Newsome%2C+B.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-WhitmanManage16-100"><span class="mw-cite-backlink"><b><a href="#cite_ref-WhitmanManage16_100-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWhitman,_M.E.Mattord,_H.J.2016" class="citation book cs1">Whitman, M.E.; Mattord, H.J. (2016). <i>Management of Information Security</i> (5th&#160;ed.). Cengage Learning. p.&#160;592. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9781305501256" title="Special:BookSources/9781305501256"><bdi>9781305501256</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Management+of+Information+Security&amp;rft.pages=592&amp;rft.edition=5th&amp;rft.pub=Cengage+Learning&amp;rft.date=2016&amp;rft.isbn=9781305501256&amp;rft.au=Whitman%2C+M.E.&amp;rft.au=Mattord%2C+H.J.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-101"><span class="mw-cite-backlink"><b><a href="#cite_ref-101">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.4324/9780080958392-20">"Hardware, Fabrics, Adhesives, and Other Theatrical Supplies"</a>, <i>Illustrated Theatre Production Guide</i>, Routledge, pp.&#160;203–232, March 20, 2013, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.4324%2F9780080958392-20">10.4324/9780080958392-20</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-08-095839-2" title="Special:BookSources/978-0-08-095839-2"><bdi>978-0-08-095839-2</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">May 29,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Illustrated+Theatre+Production+Guide&amp;rft.atitle=Hardware%2C+Fabrics%2C+Adhesives%2C+and+Other+Theatrical+Supplies&amp;rft.pages=203-232&amp;rft.date=2013-03-20&amp;rft_id=info%3Adoi%2F10.4324%2F9780080958392-20&amp;rft.isbn=978-0-08-095839-2&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.4324%2F9780080958392-20&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-102"><span class="mw-cite-backlink"><b><a href="#cite_ref-102">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFReason2017" class="citation cs2">Reason, James (March 2, 2017), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1201/9781315239125-7">"Perceptions of Unsafe Acts"</a>, <i>The Human Contribution</i>, CRC Press, pp.&#160;69–103, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1201%2F9781315239125-7">10.1201/9781315239125-7</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-315-23912-5" title="Special:BookSources/978-1-315-23912-5"><bdi>978-1-315-23912-5</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">May 29,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Human+Contribution&amp;rft.atitle=Perceptions+of+Unsafe+Acts&amp;rft.pages=69-103&amp;rft.date=2017-03-02&amp;rft_id=info%3Adoi%2F10.1201%2F9781315239125-7&amp;rft.isbn=978-1-315-23912-5&amp;rft.aulast=Reason&amp;rft.aufirst=James&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1201%2F9781315239125-7&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-103"><span class="mw-cite-backlink"><b><a href="#cite_ref-103">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1201/9781315372785-5">"Information Security Procedures and Standards"</a>, <i>Information Security Policies, Procedures, and Standards</i>, Boca Raton, FL: Auerbach Publications, pp.&#160;81–92, March 27, 2017, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1201%2F9781315372785-5">10.1201/9781315372785-5</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-315-37278-5" title="Special:BookSources/978-1-315-37278-5"><bdi>978-1-315-37278-5</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">May 29,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Information+Security+Policies%2C+Procedures%2C+and+Standards&amp;rft.atitle=Information+Security+Procedures+and+Standards&amp;rft.pages=81-92&amp;rft.date=2017-03-27&amp;rft_id=info%3Adoi%2F10.1201%2F9781315372785-5&amp;rft.isbn=978-1-315-37278-5&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1201%2F9781315372785-5&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-104"><span class="mw-cite-backlink"><b><a href="#cite_ref-104">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFZhuangChenShengHong2020" class="citation journal cs1">Zhuang, Haifeng; Chen, Yu; Sheng, Xianfu; Hong, Lili; Gao, Ruilan; Zhuang, Xiaofen (June 25, 2020). <a rel="nofollow" class="external text" href="https://doi.org/10.7717%2Fpeerj.9437%2Fsupp-1">"Figure S1: Analysis of the prognostic impact of each single signature gene"</a>. <i>PeerJ</i>. <b>8</b>: e9437. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.7717%2Fpeerj.9437%2Fsupp-1">10.7717/peerj.9437/supp-1</a></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=PeerJ&amp;rft.atitle=Figure+S1%3A+Analysis+of+the+prognostic+impact+of+each+single+signature+gene&amp;rft.volume=8&amp;rft.pages=e9437&amp;rft.date=2020-06-25&amp;rft_id=info%3Adoi%2F10.7717%2Fpeerj.9437%2Fsupp-1&amp;rft.aulast=Zhuang&amp;rft.aufirst=Haifeng&amp;rft.au=Chen%2C+Yu&amp;rft.au=Sheng%2C+Xianfu&amp;rft.au=Hong%2C+Lili&amp;rft.au=Gao%2C+Ruilan&amp;rft.au=Zhuang%2C+Xiaofen&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.7717%252Fpeerj.9437%252Fsupp-1&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-105"><span class="mw-cite-backlink"><b><a href="#cite_ref-105">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFStandaertEthgenEmerson2012" class="citation journal cs1">Standaert, B.; Ethgen, O.; Emerson, R.A. (June 2012). <a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.jval.2012.03.015">"CO4 Cost-Effectiveness Analysis - Appropriate for All Situations?"</a>. <i>Value in Health</i>. <b>15</b> (4): A2. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.jval.2012.03.015">10.1016/j.jval.2012.03.015</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1098-3015">1098-3015</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Value+in+Health&amp;rft.atitle=CO4+Cost-Effectiveness+Analysis+-+Appropriate+for+All+Situations%3F&amp;rft.volume=15&amp;rft.issue=4&amp;rft.pages=A2&amp;rft.date=2012-06&amp;rft_id=info%3Adoi%2F10.1016%2Fj.jval.2012.03.015&amp;rft.issn=1098-3015&amp;rft.aulast=Standaert&amp;rft.aufirst=B.&amp;rft.au=Ethgen%2C+O.&amp;rft.au=Emerson%2C+R.A.&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.1016%252Fj.jval.2012.03.015&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-106"><span class="mw-cite-backlink"><b><a href="#cite_ref-106">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/s0034-3617(96)91328-4">"GRP canopies provide cost-effective over-door protection"</a>. <i>Reinforced Plastics</i>. <b>40</b> (11): 8. November 1996. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fs0034-3617%2896%2991328-4">10.1016/s0034-3617(96)91328-4</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0034-3617">0034-3617</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Reinforced+Plastics&amp;rft.atitle=GRP+canopies+provide+cost-effective+over-door+protection&amp;rft.volume=40&amp;rft.issue=11&amp;rft.pages=8&amp;rft.date=1996-11&amp;rft_id=info%3Adoi%2F10.1016%2Fs0034-3617%2896%2991328-4&amp;rft.issn=0034-3617&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2Fs0034-3617%2896%2991328-4&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-107"><span class="mw-cite-backlink"><b><a href="#cite_ref-107">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1787/888933171410">"Figure 2.3. Relative risk of being a low performer depending on personal circumstances (2012)"</a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1787%2F888933171410">10.1787/888933171410</a><span class="reference-accessdate">. Retrieved <span class="nowrap">May 29,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Figure+2.3.+Relative+risk+of+being+a+low+performer+depending+on+personal+circumstances+%282012%29&amp;rft_id=info%3Adoi%2F10.1787%2F888933171410&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1787%2F888933171410&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-SP80030-108"><span class="mw-cite-backlink"><b><a href="#cite_ref-SP80030_108-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFStoneburnerGoguenFeringa2002" class="citation web cs1">Stoneburner, Gary; Goguen, Alice; Feringa, Alexis (2002). <a rel="nofollow" class="external text" href="https://csrc.nist.gov/publications/detail/sp/800-30/archive/2002-07-01">"NIST SP 800-30 Risk Management Guide for Information Technology Systems"</a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.6028%2FNIST.SP.800-30">10.6028/NIST.SP.800-30</a><span class="reference-accessdate">. Retrieved <span class="nowrap">January 18,</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=NIST+SP+800-30+Risk+Management+Guide+for+Information+Technology+Systems&amp;rft.date=2002&amp;rft_id=info%3Adoi%2F10.6028%2FNIST.SP.800-30&amp;rft.aulast=Stoneburner&amp;rft.aufirst=Gary&amp;rft.au=Goguen%2C+Alice&amp;rft.au=Feringa%2C+Alexis&amp;rft_id=https%3A%2F%2Fcsrc.nist.gov%2Fpublications%2Fdetail%2Fsp%2F800-30%2Farchive%2F2002-07-01&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-109"><span class="mw-cite-backlink"><b><a href="#cite_ref-109">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2">"May I Choose? Can I Choose? Oppression and Choice", <i>A Theory of Freedom</i>, Palgrave Macmillan, 2012, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1057%2F9781137295026.0007">10.1057/9781137295026.0007</a> (inactive November 11, 2024), <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-137-29502-6" title="Special:BookSources/978-1-137-29502-6"><bdi>978-1-137-29502-6</bdi></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=A+Theory+of+Freedom&amp;rft.atitle=May+I+Choose%3F+Can+I+Choose%3F+Oppression+and+Choice&amp;rft.date=2012&amp;rft_id=info%3Adoi%2F10.1057%2F9781137295026.0007&amp;rft.isbn=978-1-137-29502-6&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Citation" title="Template:Citation">citation</a>}}</code>: CS1 maint: DOI inactive as of November 2024 (<a href="/wiki/Category:CS1_maint:_DOI_inactive_as_of_November_2024" title="Category:CS1 maint: DOI inactive as of November 2024">link</a>)</span></span> </li> <li id="cite_note-110"><span class="mw-cite-backlink"><b><a href="#cite_ref-110">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFParker1994" class="citation journal cs1">Parker, Donn B. (January 1994). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1080/10658989409342459">"A Guide to Selecting and Implementing Security Controls"</a>. <i>Information Systems Security</i>. <b>3</b> (2): 75–86. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F10658989409342459">10.1080/10658989409342459</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1065-898X">1065-898X</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Information+Systems+Security&amp;rft.atitle=A+Guide+to+Selecting+and+Implementing+Security+Controls&amp;rft.volume=3&amp;rft.issue=2&amp;rft.pages=75-86&amp;rft.date=1994-01&amp;rft_id=info%3Adoi%2F10.1080%2F10658989409342459&amp;rft.issn=1065-898X&amp;rft.aulast=Parker&amp;rft.aufirst=Donn+B.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1080%2F10658989409342459&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-111"><span class="mw-cite-backlink"><b><a href="#cite_ref-111">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFZoccaliMallamaciTripepi2007" class="citation journal cs1">Zoccali, Carmine; Mallamaci, Francesca; Tripepi, Giovanni (September 25, 2007). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1111/j.1525-139x.2007.00317.x">"Guest Editor: Rajiv Agarwal: Cardiovascular Risk Profile Assessment and Medication Control Should Come First"</a>. <i>Seminars in Dialysis</i>. <b>20</b> (5): 405–408. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1111%2Fj.1525-139x.2007.00317.x">10.1111/j.1525-139x.2007.00317.x</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0894-0959">0894-0959</a>. <a href="/wiki/PMID_(identifier)" class="mw-redirect" title="PMID (identifier)">PMID</a>&#160;<a rel="nofollow" class="external text" href="https://pubmed.ncbi.nlm.nih.gov/17897245">17897245</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:33256127">33256127</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Seminars+in+Dialysis&amp;rft.atitle=Guest+Editor%3A+Rajiv+Agarwal%3A+Cardiovascular+Risk+Profile+Assessment+and+Medication+Control+Should+Come+First&amp;rft.volume=20&amp;rft.issue=5&amp;rft.pages=405-408&amp;rft.date=2007-09-25&amp;rft.issn=0894-0959&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A33256127%23id-name%3DS2CID&amp;rft_id=info%3Apmid%2F17897245&amp;rft_id=info%3Adoi%2F10.1111%2Fj.1525-139x.2007.00317.x&amp;rft.aulast=Zoccali&amp;rft.aufirst=Carmine&amp;rft.au=Mallamaci%2C+Francesca&amp;rft.au=Tripepi%2C+Giovanni&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1111%2Fj.1525-139x.2007.00317.x&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-112"><span class="mw-cite-backlink"><b><a href="#cite_ref-112">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation book cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.3403/9780580829109"><i>Guide to the Implementation and Auditing of ISMS Controls based on ISO/IEC 27001</i></a>. London: BSI British Standards. November 1, 2013. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.3403%2F9780580829109">10.3403/9780580829109</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-580-82910-9" title="Special:BookSources/978-0-580-82910-9"><bdi>978-0-580-82910-9</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Guide+to+the+Implementation+and+Auditing+of+ISMS+Controls+based+on+ISO%2FIEC+27001&amp;rft.place=London&amp;rft.pub=BSI+British+Standards&amp;rft.date=2013-11-01&amp;rft_id=info%3Adoi%2F10.3403%2F9780580829109&amp;rft.isbn=978-0-580-82910-9&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.3403%2F9780580829109&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-JohnsonSecurity15-113"><span class="mw-cite-backlink"><b><a href="#cite_ref-JohnsonSecurity15_113-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJohnson,_L.2015" class="citation book cs1">Johnson, L. (2015). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=X7SYBAAAQBAJ&amp;pg=PA9"><i>Security Controls Evaluation, Testing, and Assessment Handbook</i></a>. Syngress. p.&#160;678. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9780128025642" title="Special:BookSources/9780128025642"><bdi>9780128025642</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Security+Controls+Evaluation%2C+Testing%2C+and+Assessment+Handbook&amp;rft.pages=678&amp;rft.pub=Syngress&amp;rft.date=2015&amp;rft.isbn=9780128025642&amp;rft.au=Johnson%2C+L.&amp;rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DX7SYBAAAQBAJ%26pg%3DPA9&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-114"><span class="mw-cite-backlink"><b><a href="#cite_ref-114">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.3403/30310928"><i>Information technology. Security techniques. Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002</i></a>, BSI British Standards, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.3403%2F30310928">10.3403/30310928</a><span class="reference-accessdate">, retrieved <span class="nowrap">May 29,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Information+technology.+Security+techniques.+Mapping+the+revised+editions+of+ISO%2FIEC+27001+and+ISO%2FIEC+27002&amp;rft.pub=BSI+British+Standards&amp;rft_id=info%3Adoi%2F10.3403%2F30310928&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.3403%2F30310928&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-schneier2006-115"><span class="mw-cite-backlink">^ <a href="#cite_ref-schneier2006_115-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-schneier2006_115-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.schneier.com/blog/archives/2006/02/security_in_the.html">Schneier on Security: Security in the Cloud</a></span> </li> <li id="cite_note-Administrative_Controls-116"><span class="mw-cite-backlink"><b><a href="#cite_ref-Administrative_Controls_116-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1201/9780203507933-6">"Administrative Controls"</a>, <i>Occupational Ergonomics</i>, CRC Press, pp.&#160;443–666, March 26, 2003, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1201%2F9780203507933-6">10.1201/9780203507933-6</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-429-21155-3" title="Special:BookSources/978-0-429-21155-3"><bdi>978-0-429-21155-3</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">May 29,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Occupational+Ergonomics&amp;rft.atitle=Administrative+Controls&amp;rft.pages=443-666&amp;rft.date=2003-03-26&amp;rft_id=info%3Adoi%2F10.1201%2F9780203507933-6&amp;rft.isbn=978-0-429-21155-3&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1201%2F9780203507933-6&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-117"><span class="mw-cite-backlink"><b><a href="#cite_ref-117">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation book cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/b978-0-12-417208-1.09986-4">"Security Onion Control Scripts"</a>. <i>Applied Network Security Monitoring</i>. Elsevier. 2014. pp.&#160;451–456. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fb978-0-12-417208-1.09986-4">10.1016/b978-0-12-417208-1.09986-4</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-12-417208-1" title="Special:BookSources/978-0-12-417208-1"><bdi>978-0-12-417208-1</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">May 29,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Security+Onion+Control+Scripts&amp;rft.btitle=Applied+Network+Security+Monitoring&amp;rft.pages=451-456&amp;rft.pub=Elsevier&amp;rft.date=2014&amp;rft_id=info%3Adoi%2F10.1016%2Fb978-0-12-417208-1.09986-4&amp;rft.isbn=978-0-12-417208-1&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2Fb978-0-12-417208-1.09986-4&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-118"><span class="mw-cite-backlink"><b><a href="#cite_ref-118">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2">"Overview", <i>Information Security Policies, Procedures, and Standards</i>, Auerbach Publications, December 20, 2001, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1201%2F9780849390326.ch1">10.1201/9780849390326.ch1</a> (inactive November 11, 2024), <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-8493-1137-6" title="Special:BookSources/978-0-8493-1137-6"><bdi>978-0-8493-1137-6</bdi></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Information+Security+Policies%2C+Procedures%2C+and+Standards&amp;rft.atitle=Overview&amp;rft.date=2001-12-20&amp;rft_id=info%3Adoi%2F10.1201%2F9780849390326.ch1&amp;rft.isbn=978-0-8493-1137-6&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Citation" title="Template:Citation">citation</a>}}</code>: CS1 maint: DOI inactive as of November 2024 (<a href="/wiki/Category:CS1_maint:_DOI_inactive_as_of_November_2024" title="Category:CS1 maint: DOI inactive as of November 2024">link</a>)</span></span> </li> <li id="cite_note-119"><span class="mw-cite-backlink"><b><a href="#cite_ref-119">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.3403/bs142-1"><i>Electrical protection relays. Information and requirements for all protection relays</i></a>, BSI British Standards, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.3403%2Fbs142-1">10.3403/bs142-1</a><span class="reference-accessdate">, retrieved <span class="nowrap">May 29,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Electrical+protection+relays.+Information+and+requirements+for+all+protection+relays&amp;rft.pub=BSI+British+Standards&amp;rft_id=info%3Adoi%2F10.3403%2Fbs142-1&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.3403%2Fbs142-1&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-120"><span class="mw-cite-backlink"><b><a href="#cite_ref-120">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDibattistaReimerStatMasucci2019" class="citation journal cs1">Dibattista, Joseph D.; Reimer, James D.; Stat, Michael; Masucci, Giovanni D.; Biondi, Piera; Brauwer, Maarten De; Bunce, Michael (February 6, 2019). <a rel="nofollow" class="external text" href="https://doi.org/10.7717%2Fpeerj.6379%2Fsupp-4">"Supplemental Information 4: List of all combined families in alphabetical order assigned in MEGAN vers. 5.11.3"</a>. <i>PeerJ</i>. <b>7</b>: e6379. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.7717%2Fpeerj.6379%2Fsupp-4">10.7717/peerj.6379/supp-4</a></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=PeerJ&amp;rft.atitle=Supplemental+Information+4%3A+List+of+all+combined+families+in+alphabetical+order+assigned+in+MEGAN+vers.+5.11.3.&amp;rft.volume=7&amp;rft.pages=e6379&amp;rft.date=2019-02-06&amp;rft_id=info%3Adoi%2F10.7717%2Fpeerj.6379%2Fsupp-4&amp;rft.aulast=Dibattista&amp;rft.aufirst=Joseph+D.&amp;rft.au=Reimer%2C+James+D.&amp;rft.au=Stat%2C+Michael&amp;rft.au=Masucci%2C+Giovanni+D.&amp;rft.au=Biondi%2C+Piera&amp;rft.au=Brauwer%2C+Maarten+De&amp;rft.au=Bunce%2C+Michael&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.7717%252Fpeerj.6379%252Fsupp-4&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-121"><span class="mw-cite-backlink"><b><a href="#cite_ref-121">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKim2006" class="citation journal cs1">Kim, Sung-Won (March 31, 2006). <a rel="nofollow" class="external text" href="https://doi.org/10.1633%2Fjim.2006.37.1.083">"A Quantitative Analysis of Classification Classes and Classified Information Resources of Directory"</a>. <i>Journal of Information Management</i>. <b>37</b> (1): 83–103. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1633%2Fjim.2006.37.1.083">10.1633/jim.2006.37.1.083</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0254-3621">0254-3621</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Journal+of+Information+Management&amp;rft.atitle=A+Quantitative+Analysis+of+Classification+Classes+and+Classified+Information+Resources+of+Directory&amp;rft.volume=37&amp;rft.issue=1&amp;rft.pages=83-103&amp;rft.date=2006-03-31&amp;rft_id=info%3Adoi%2F10.1633%2Fjim.2006.37.1.083&amp;rft.issn=0254-3621&amp;rft.aulast=Kim&amp;rft.aufirst=Sung-Won&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.1633%252Fjim.2006.37.1.083&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-BayukEnterprise09-122"><span class="mw-cite-backlink">^ <a href="#cite_ref-BayukEnterprise09_122-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-BayukEnterprise09_122-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBayuk,_J.2009" class="citation book cs1">Bayuk, J. (2009). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=XxPhvm1EP3EC&amp;pg=PA59">"Chapter 4: Information Classification"</a>. In Axelrod, C.W.; Bayuk, J.L.; Schutzer, D. (eds.). <i>Enterprise Information Security and Privacy</i>. Artech House. pp.&#160;59–70. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9781596931916" title="Special:BookSources/9781596931916"><bdi>9781596931916</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Chapter+4%3A+Information+Classification&amp;rft.btitle=Enterprise+Information+Security+and+Privacy&amp;rft.pages=59-70&amp;rft.pub=Artech+House&amp;rft.date=2009&amp;rft.isbn=9781596931916&amp;rft.au=Bayuk%2C+J.&amp;rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DXxPhvm1EP3EC%26pg%3DPA59&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-123"><span class="mw-cite-backlink"><b><a href="#cite_ref-123">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1002/9781119200642.ch5">"Welcome to the Information Age"</a>, <i>Overload!</i>, Hoboken, NJ, US: John Wiley &amp; Sons, Inc., pp.&#160;43–65, September 11, 2015, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1002%2F9781119200642.ch5">10.1002/9781119200642.ch5</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-119-20064-2" title="Special:BookSources/978-1-119-20064-2"><bdi>978-1-119-20064-2</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">May 29,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Overload%21&amp;rft.atitle=Welcome+to+the+Information+Age&amp;rft.pages=43-65&amp;rft.date=2015-09-11&amp;rft_id=info%3Adoi%2F10.1002%2F9781119200642.ch5&amp;rft.isbn=978-1-119-20064-2&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1002%2F9781119200642.ch5&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-124"><span class="mw-cite-backlink"><b><a href="#cite_ref-124">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCrooks2006" class="citation book cs1">Crooks, S. (2006). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.3320/1.2759009">"102. Case Study: When Exposure Control Efforts Override Other Important Design Considerations"</a>. <i>AIHce 2006</i>. AIHA. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.3320%2F1.2759009">10.3320/1.2759009</a> (inactive November 1, 2024).</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=102.+Case+Study%3A+When+Exposure+Control+Efforts+Override+Other+Important+Design+Considerations&amp;rft.btitle=AIHce+2006&amp;rft.pub=AIHA&amp;rft.date=2006&amp;rft_id=info%3Adoi%2F10.3320%2F1.2759009&amp;rft.aulast=Crooks&amp;rft.aufirst=S.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.3320%2F1.2759009&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_book" title="Template:Cite book">cite book</a>}}</code>: CS1 maint: DOI inactive as of November 2024 (<a href="/wiki/Category:CS1_maint:_DOI_inactive_as_of_November_2024" title="Category:CS1 maint: DOI inactive as of November 2024">link</a>)</span></span> </li> <li id="cite_note-ISACA-BMIS-125"><span class="mw-cite-backlink"><b><a href="#cite_ref-ISACA-BMIS_125-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20180126072505/https://www.isaca.org/KNOWLEDGE-CENTER/BMIS/Pages/Business-Model-for-Information-Security.aspx">"Business Model for Information Security (BMIS)"</a>. ISACA. Archived from <a rel="nofollow" class="external text" href="https://www.isaca.org/KNOWLEDGE-CENTER/BMIS/Pages/Business-Model-for-Information-Security.aspx">the original</a> on January 26, 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">January 25,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Business+Model+for+Information+Security+%28BMIS%29&amp;rft.pub=ISACA&amp;rft_id=https%3A%2F%2Fwww.isaca.org%2FKNOWLEDGE-CENTER%2FBMIS%2FPages%2FBusiness-Model-for-Information-Security.aspx&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-126"><span class="mw-cite-backlink"><b><a href="#cite_ref-126">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMcAuliffe1987" class="citation journal cs1">McAuliffe, Leo (January 1987). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/0740-624x(87)90068-2">"Top secret/trade secret: Accessing and safeguarding restricted information"</a>. <i>Government Information Quarterly</i>. <b>4</b> (1): 123–124. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2F0740-624x%2887%2990068-2">10.1016/0740-624x(87)90068-2</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0740-624X">0740-624X</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Government+Information+Quarterly&amp;rft.atitle=Top+secret%2Ftrade+secret%3A+Accessing+and+safeguarding+restricted+information&amp;rft.volume=4&amp;rft.issue=1&amp;rft.pages=123-124&amp;rft.date=1987-01&amp;rft_id=info%3Adoi%2F10.1016%2F0740-624x%2887%2990068-2&amp;rft.issn=0740-624X&amp;rft.aulast=McAuliffe&amp;rft.aufirst=Leo&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2F0740-624x%2887%2990068-2&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-127"><span class="mw-cite-backlink"><b><a href="#cite_ref-127">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFIqbalSoroyaMahmood2023" class="citation journal cs1">Iqbal, Javaid; Soroya, Saira Hanif; Mahmood, Khalid (January 5, 2023). <a rel="nofollow" class="external text" href="http://journals.sagepub.com/doi/10.1177/02666669221149346">"Financial information security behavior in online banking"</a>. <i>Information Development</i>. <b>40</b> (4): 550–565. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1177%2F02666669221149346">10.1177/02666669221149346</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0266-6669">0266-6669</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:255742685">255742685</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Information+Development&amp;rft.atitle=Financial+information+security+behavior+in+online+banking&amp;rft.volume=40&amp;rft.issue=4&amp;rft.pages=550-565&amp;rft.date=2023-01-05&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A255742685%23id-name%3DS2CID&amp;rft.issn=0266-6669&amp;rft_id=info%3Adoi%2F10.1177%2F02666669221149346&amp;rft.aulast=Iqbal&amp;rft.aufirst=Javaid&amp;rft.au=Soroya%2C+Saira+Hanif&amp;rft.au=Mahmood%2C+Khalid&amp;rft_id=http%3A%2F%2Fjournals.sagepub.com%2Fdoi%2F10.1177%2F02666669221149346&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-128"><span class="mw-cite-backlink"><b><a href="#cite_ref-128">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKhairuddinSidekAbdul_MajeedRazman2021" class="citation journal cs1">Khairuddin, Ismail Mohd; Sidek, Shahrul Naim; Abdul Majeed, Anwar P.P.; Razman, Mohd Azraai Mohd; Puzi, Asmarani Ahmad; Yusof, Hazlina Md (February 25, 2021). <a rel="nofollow" class="external text" href="https://doi.org/10.7717%2Fpeerj-cs.379%2Ffig-7">"Figure 7: Classification accuracy for each model for all features"</a>. <i>PeerJ Computer Science</i>. <b>7</b>: e379. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.7717%2Fpeerj-cs.379%2Ffig-7">10.7717/peerj-cs.379/fig-7</a></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=PeerJ+Computer+Science&amp;rft.atitle=Figure+7%3A+Classification+accuracy+for+each+model+for+all+features.&amp;rft.volume=7&amp;rft.pages=e379&amp;rft.date=2021-02-25&amp;rft_id=info%3Adoi%2F10.7717%2Fpeerj-cs.379%2Ffig-7&amp;rft.aulast=Khairuddin&amp;rft.aufirst=Ismail+Mohd&amp;rft.au=Sidek%2C+Shahrul+Naim&amp;rft.au=Abdul+Majeed%2C+Anwar+P.P.&amp;rft.au=Razman%2C+Mohd+Azraai+Mohd&amp;rft.au=Puzi%2C+Asmarani+Ahmad&amp;rft.au=Yusof%2C+Hazlina+Md&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.7717%252Fpeerj-cs.379%252Ffig-7&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-129"><span class="mw-cite-backlink"><b><a href="#cite_ref-129">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1201/b15573-18">"Asset Classification"</a>, <i>Information Security Fundamentals</i>, Auerbach Publications, pp.&#160;327–356, October 16, 2013, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1201%2Fb15573-18">10.1201/b15573-18</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-429-13028-1" title="Special:BookSources/978-0-429-13028-1"><bdi>978-0-429-13028-1</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 1,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Information+Security+Fundamentals&amp;rft.atitle=Asset+Classification&amp;rft.pages=327-356&amp;rft.date=2013-10-16&amp;rft_id=info%3Adoi%2F10.1201%2Fb15573-18&amp;rft.isbn=978-0-429-13028-1&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1201%2Fb15573-18&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-ACM_Press-130"><span class="mw-cite-backlink">^ <a href="#cite_ref-ACM_Press_130-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-ACM_Press_130-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAlmehmadiEl-Khatib2013" class="citation book cs1">Almehmadi, Abdulaziz; El-Khatib, Khalil (2013). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1145/2523514.2523612">"Authorized! Access denied, unauthorized! Access granted"</a>. <i>Proceedings of the 6th International Conference on Security of Information and Networks</i>. Sin '13. New York, New York, US: ACM Press. pp.&#160;363–367. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F2523514.2523612">10.1145/2523514.2523612</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4503-2498-4" title="Special:BookSources/978-1-4503-2498-4"><bdi>978-1-4503-2498-4</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:17260474">17260474</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Authorized%21+Access+denied%2C+unauthorized%21+Access+granted&amp;rft.btitle=Proceedings+of+the+6th+International+Conference+on+Security+of+Information+and+Networks&amp;rft.place=New+York%2C+New+York%2C+US&amp;rft.series=Sin+%2713&amp;rft.pages=363-367&amp;rft.pub=ACM+Press&amp;rft.date=2013&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A17260474%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1145%2F2523514.2523612&amp;rft.isbn=978-1-4503-2498-4&amp;rft.aulast=Almehmadi&amp;rft.aufirst=Abdulaziz&amp;rft.au=El-Khatib%2C+Khalil&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1145%2F2523514.2523612&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-Peiss_2020_16–39-131"><span class="mw-cite-backlink">^ <a href="#cite_ref-Peiss_2020_16–39_131-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Peiss_2020_16–39_131-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPeiss2020" class="citation cs2">Peiss, Kathy (2020), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1093/oso/9780190944612.003.0003">"The Country of the Mind Must Also Attack"</a>, <i>Information Hunters</i>, Oxford University Press, pp.&#160;16–39, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1093%2Foso%2F9780190944612.003.0003">10.1093/oso/9780190944612.003.0003</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-19-094461-2" title="Special:BookSources/978-0-19-094461-2"><bdi>978-0-19-094461-2</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 1,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Information+Hunters&amp;rft.atitle=The+Country+of+the+Mind+Must+Also+Attack&amp;rft.pages=16-39&amp;rft.date=2020&amp;rft_id=info%3Adoi%2F10.1093%2Foso%2F9780190944612.003.0003&amp;rft.isbn=978-0-19-094461-2&amp;rft.aulast=Peiss&amp;rft.aufirst=Kathy&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1093%2Foso%2F9780190944612.003.0003&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-132"><span class="mw-cite-backlink"><b><a href="#cite_ref-132">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFuginiMartella1988" class="citation journal cs1">Fugini, M.G.; Martella, G. (January 1988). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/0306-4379(88)90026-9">"A petri-net model of access control mechanisms"</a>. <i>Information Systems</i>. <b>13</b> (1): 53–63. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2F0306-4379%2888%2990026-9">10.1016/0306-4379(88)90026-9</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0306-4379">0306-4379</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Information+Systems&amp;rft.atitle=A+petri-net+model+of+access+control+mechanisms&amp;rft.volume=13&amp;rft.issue=1&amp;rft.pages=53-63&amp;rft.date=1988-01&amp;rft_id=info%3Adoi%2F10.1016%2F0306-4379%2888%2990026-9&amp;rft.issn=0306-4379&amp;rft.aulast=Fugini&amp;rft.aufirst=M.G.&amp;rft.au=Martella%2C+G.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2F0306-4379%2888%2990026-9&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-133"><span class="mw-cite-backlink"><b><a href="#cite_ref-133">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.3403/30170670u"><i>Information technology. Personal identification. ISO-compliant driving licence</i></a>, BSI British Standards, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.3403%2F30170670u">10.3403/30170670u</a><span class="reference-accessdate">, retrieved <span class="nowrap">June 1,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Information+technology.+Personal+identification.+ISO-compliant+driving+licence&amp;rft.pub=BSI+British+Standards&amp;rft_id=info%3Adoi%2F10.3403%2F30170670u&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.3403%2F30170670u&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-134"><span class="mw-cite-backlink"><b><a href="#cite_ref-134">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSantos2015" class="citation book cs1">Santos, Omar (2015). <i>Ccna security 210-260 official cert guide</i>. Cisco press. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-58720-566-8" title="Special:BookSources/978-1-58720-566-8"><bdi>978-1-58720-566-8</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/951897116">951897116</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Ccna+security+210-260+official+cert+guide.&amp;rft.pub=Cisco+press&amp;rft.date=2015&amp;rft_id=info%3Aoclcnum%2F951897116&amp;rft.isbn=978-1-58720-566-8&amp;rft.aulast=Santos&amp;rft.aufirst=Omar&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-135"><span class="mw-cite-backlink"><b><a href="#cite_ref-135">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.4324/9780203169186_chapter_one">"What is Assertion?"</a>, <i>ASSERTION TRAINING</i>, Abingdon, UK: Taylor &amp; Francis, pp.&#160;1–7, 1991, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.4324%2F9780203169186_chapter_one">10.4324/9780203169186_chapter_one</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-203-28556-5" title="Special:BookSources/978-0-203-28556-5"><bdi>978-0-203-28556-5</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 1,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=ASSERTION+TRAINING&amp;rft.atitle=What+is+Assertion%3F&amp;rft.pages=1-7&amp;rft.date=1991&amp;rft_id=info%3Adoi%2F10.4324%2F9780203169186_chapter_one&amp;rft.isbn=978-0-203-28556-5&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.4324%2F9780203169186_chapter_one&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-136"><span class="mw-cite-backlink"><b><a href="#cite_ref-136">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDoe1960" class="citation journal cs1">Doe, John (1960). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.2136/sh1960.2.0010">"Field Season In Illinois Begins May 2"</a>. <i>Soil Horizons</i>. <b>1</b> (2): 10. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.2136%2Fsh1960.2.0010">10.2136/sh1960.2.0010</a> (inactive November 1, 2024). <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/2163-2812">2163-2812</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Soil+Horizons&amp;rft.atitle=Field+Season+In+Illinois+Begins+May+2&amp;rft.volume=1&amp;rft.issue=2&amp;rft.pages=10&amp;rft.date=1960&amp;rft_id=info%3Adoi%2F10.2136%2Fsh1960.2.0010&amp;rft.issn=2163-2812&amp;rft.aulast=Doe&amp;rft.aufirst=John&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.2136%2Fsh1960.2.0010&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_journal" title="Template:Cite journal">cite journal</a>}}</code>: CS1 maint: DOI inactive as of November 2024 (<a href="/wiki/Category:CS1_maint:_DOI_inactive_as_of_November_2024" title="Category:CS1 maint: DOI inactive as of November 2024">link</a>)</span></span> </li> <li id="cite_note-137"><span class="mw-cite-backlink"><b><a href="#cite_ref-137">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLeech1996" class="citation web cs1">Leech, M. (March 1996). <a rel="nofollow" class="external text" href="https://www.rfc-editor.org/info/rfc1929">"Username/Password Authentication for SOCKS V5"</a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.17487%2Frfc1929">10.17487/rfc1929</a><span class="reference-accessdate">. Retrieved <span class="nowrap">January 18,</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Username%2FPassword+Authentication+for+SOCKS+V5&amp;rft.date=1996-03&amp;rft_id=info%3Adoi%2F10.17487%2Frfc1929&amp;rft.aulast=Leech&amp;rft.aufirst=M.&amp;rft_id=https%3A%2F%2Fwww.rfc-editor.org%2Finfo%2Frfc1929&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-138"><span class="mw-cite-backlink"><b><a href="#cite_ref-138">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKirkWall2011" class="citation cs2">Kirk, John; Wall, Christine (2011), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1057/9780230305625_6">"Teller, Seller, Union Activist: Class Formation and Changing Bank Worker Identities"</a>, <i>Work and Identity</i>, London: Palgrave Macmillan UK, pp.&#160;124–148, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1057%2F9780230305625_6">10.1057/9780230305625_6</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-349-36871-6" title="Special:BookSources/978-1-349-36871-6"><bdi>978-1-349-36871-6</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 1,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Work+and+Identity&amp;rft.atitle=Teller%2C+Seller%2C+Union+Activist%3A+Class+Formation+and+Changing+Bank+Worker+Identities&amp;rft.pages=124-148&amp;rft.date=2011&amp;rft_id=info%3Adoi%2F10.1057%2F9780230305625_6&amp;rft.isbn=978-1-349-36871-6&amp;rft.aulast=Kirk&amp;rft.aufirst=John&amp;rft.au=Wall%2C+Christine&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1057%2F9780230305625_6&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-139"><span class="mw-cite-backlink"><b><a href="#cite_ref-139">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDewi2020" class="citation journal cs1">Dewi, Mila Nurmala (December 23, 2020). <a rel="nofollow" class="external text" href="https://doi.org/10.30997%2Fjn.v6i2.1932">"Perbandingan Kinerja Teller Kriya Dan Teller Organik Pt. Bank Syariah Mandiri"</a>. <i>Nisbah: Jurnal Perbankan Syariah</i>. <b>6</b> (2): 75. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.30997%2Fjn.v6i2.1932">10.30997/jn.v6i2.1932</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/2528-6633">2528-6633</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:234420571">234420571</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Nisbah%3A+Jurnal+Perbankan+Syariah&amp;rft.atitle=Perbandingan+Kinerja+Teller+Kriya+Dan+Teller+Organik+Pt.+Bank+Syariah+Mandiri&amp;rft.volume=6&amp;rft.issue=2&amp;rft.pages=75&amp;rft.date=2020-12-23&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A234420571%23id-name%3DS2CID&amp;rft.issn=2528-6633&amp;rft_id=info%3Adoi%2F10.30997%2Fjn.v6i2.1932&amp;rft.aulast=Dewi&amp;rft.aufirst=Mila+Nurmala&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.30997%252Fjn.v6i2.1932&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-140"><span class="mw-cite-backlink"><b><a href="#cite_ref-140">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFVile2013" class="citation cs2">Vile, John (2013), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.4135/9781452234243.n462">"License Checks"</a>, <i>Encyclopedia of the Fourth Amendment</i>, Washington DC: CQ Press, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.4135%2F9781452234243.n462">10.4135/9781452234243.n462</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-60426-589-7" title="Special:BookSources/978-1-60426-589-7"><bdi>978-1-60426-589-7</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 1,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=License+Checks&amp;rft.btitle=Encyclopedia+of+the+Fourth+Amendment&amp;rft.place=Washington+DC&amp;rft.pub=CQ+Press&amp;rft.date=2013&amp;rft_id=info%3Adoi%2F10.4135%2F9781452234243.n462&amp;rft.isbn=978-1-60426-589-7&amp;rft.aulast=Vile&amp;rft.aufirst=John&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.4135%2F9781452234243.n462&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-141"><span class="mw-cite-backlink"><b><a href="#cite_ref-141">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.2307/j.ctv6wgjjv.6">"He Said/She Said"</a>, <i>My Ghost Has a Name</i>, University of South Carolina Press, pp.&#160;17–32, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.2307%2Fj.ctv6wgjjv.6">10.2307/j.ctv6wgjjv.6</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-61117-827-2" title="Special:BookSources/978-1-61117-827-2"><bdi>978-1-61117-827-2</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">May 29,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=My+Ghost+Has+a+Name&amp;rft.atitle=He+Said%2FShe+Said&amp;rft.pages=17-32&amp;rft_id=info%3Adoi%2F10.2307%2Fj.ctv6wgjjv.6&amp;rft.isbn=978-1-61117-827-2&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.2307%2Fj.ctv6wgjjv.6&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-142"><span class="mw-cite-backlink"><b><a href="#cite_ref-142">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBacigalupoDixonGubbinsKucharski2020" class="citation journal cs1">Bacigalupo, Sonny A.; Dixon, Linda K.; Gubbins, Simon; Kucharski, Adam J.; Drewe, Julian A. (October 26, 2020). <a rel="nofollow" class="external text" href="https://doi.org/10.7717%2Fpeerj.10221%2Fsupp-8">"Supplemental Information 8: Methods used to monitor different types of contact"</a>. <i>PeerJ</i>. <b>8</b>: e10221. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.7717%2Fpeerj.10221%2Fsupp-8">10.7717/peerj.10221/supp-8</a></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=PeerJ&amp;rft.atitle=Supplemental+Information+8%3A+Methods+used+to+monitor+different+types+of+contact&amp;rft.volume=8&amp;rft.pages=e10221&amp;rft.date=2020-10-26&amp;rft_id=info%3Adoi%2F10.7717%2Fpeerj.10221%2Fsupp-8&amp;rft.aulast=Bacigalupo&amp;rft.aufirst=Sonny+A.&amp;rft.au=Dixon%2C+Linda+K.&amp;rft.au=Gubbins%2C+Simon&amp;rft.au=Kucharski%2C+Adam+J.&amp;rft.au=Drewe%2C+Julian+A.&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.7717%252Fpeerj.10221%252Fsupp-8&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-143"><span class="mw-cite-backlink"><b><a href="#cite_ref-143">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFIgelnikZurada2013" class="citation book cs1">Igelnik, Boris M.; Zurada, Jacek (2013). <i>Efficiency and scalability methods for computational intellect</i>. Information Science Reference. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4666-3942-3" title="Special:BookSources/978-1-4666-3942-3"><bdi>978-1-4666-3942-3</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/833130899">833130899</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Efficiency+and+scalability+methods+for+computational+intellect&amp;rft.pub=Information+Science+Reference&amp;rft.date=2013&amp;rft_id=info%3Aoclcnum%2F833130899&amp;rft.isbn=978-1-4666-3942-3&amp;rft.aulast=Igelnik&amp;rft.aufirst=Boris+M.&amp;rft.au=Zurada%2C+Jacek&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-144"><span class="mw-cite-backlink"><b><a href="#cite_ref-144">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.4324/9780203020289-11">"The Insurance Superbill Must Have Your Name as the Provider"</a>, <i>Before You See Your First Client</i>, Routledge, pp.&#160;37–38, January 1, 2005, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.4324%2F9780203020289-11">10.4324/9780203020289-11</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-203-02028-9" title="Special:BookSources/978-0-203-02028-9"><bdi>978-0-203-02028-9</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 1,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Before+You+See+Your+First+Client&amp;rft.atitle=The+Insurance+Superbill+Must+Have+Your+Name+as+the+Provider&amp;rft.pages=37-38&amp;rft.date=2005-01-01&amp;rft_id=info%3Adoi%2F10.4324%2F9780203020289-11&amp;rft.isbn=978-0-203-02028-9&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.4324%2F9780203020289-11&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-145"><span class="mw-cite-backlink"><b><a href="#cite_ref-145">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKissell" class="citation book cs1">Kissell, Joe. <i>Take Control of Your Passwords</i>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4920-6638-5" title="Special:BookSources/978-1-4920-6638-5"><bdi>978-1-4920-6638-5</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/1029606129">1029606129</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Take+Control+of+Your+Passwords&amp;rft_id=info%3Aoclcnum%2F1029606129&amp;rft.isbn=978-1-4920-6638-5&amp;rft.aulast=Kissell&amp;rft.aufirst=Joe&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-146"><span class="mw-cite-backlink"><b><a href="#cite_ref-146">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/s0965-2590(09)70126-4">"New smart Queensland driver license announced"</a>. <i>Card Technology Today</i>. <b>21</b> (7): 5. July 2009. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fs0965-2590%2809%2970126-4">10.1016/s0965-2590(09)70126-4</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0965-2590">0965-2590</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Card+Technology+Today&amp;rft.atitle=New+smart+Queensland+driver+license+announced&amp;rft.volume=21&amp;rft.issue=7&amp;rft.pages=5&amp;rft.date=2009-07&amp;rft_id=info%3Adoi%2F10.1016%2Fs0965-2590%2809%2970126-4&amp;rft.issn=0965-2590&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2Fs0965-2590%2809%2970126-4&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-147"><span class="mw-cite-backlink"><b><a href="#cite_ref-147">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLawrence_Livermore_National_Laboratory._United_States._Department_of_Energy._Office_of_Scientific_and_Technical_Information1995" class="citation book cs1">Lawrence Livermore National Laboratory. United States. Department of Energy. Office of Scientific and Technical Information (1995). <i>A human engineering and ergonomic evaluation of the security access panel interface</i>. United States. Dept. of Energy. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/727181384">727181384</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=A+human+engineering+and+ergonomic+evaluation+of+the+security+access+panel+interface.&amp;rft.pub=United+States.+Dept.+of+Energy&amp;rft.date=1995&amp;rft_id=info%3Aoclcnum%2F727181384&amp;rft.au=Lawrence+Livermore+National+Laboratory.+United+States.+Department+of+Energy.+Office+of+Scientific+and+Technical+Information&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-148"><span class="mw-cite-backlink"><b><a href="#cite_ref-148">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLee2017" class="citation journal cs1">Lee, Paul (April 2017). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/s0969-4765(17)30074-7">"Prints charming: how fingerprints are trailblazing mainstream biometrics"</a>. <i>Biometric Technology Today</i>. <b>2017</b> (4): 8–11. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fs0969-4765%2817%2930074-7">10.1016/s0969-4765(17)30074-7</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0969-4765">0969-4765</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Biometric+Technology+Today&amp;rft.atitle=Prints+charming%3A+how+fingerprints+are+trailblazing+mainstream+biometrics&amp;rft.volume=2017&amp;rft.issue=4&amp;rft.pages=8-11&amp;rft.date=2017-04&amp;rft_id=info%3Adoi%2F10.1016%2Fs0969-4765%2817%2930074-7&amp;rft.issn=0969-4765&amp;rft.aulast=Lee&amp;rft.aufirst=Paul&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2Fs0969-4765%2817%2930074-7&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-149"><span class="mw-cite-backlink"><b><a href="#cite_ref-149">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLandrock2005" class="citation encyclopaedia cs1">Landrock, Peter (2005). "Two-Factor Authentication". <i>Encyclopedia of Cryptography and Security</i>. p.&#160;638. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F0-387-23483-7_443">10.1007/0-387-23483-7_443</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-387-23473-1" title="Special:BookSources/978-0-387-23473-1"><bdi>978-0-387-23473-1</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Two-Factor+Authentication&amp;rft.btitle=Encyclopedia+of+Cryptography+and+Security&amp;rft.pages=638&amp;rft.date=2005&amp;rft_id=info%3Adoi%2F10.1007%2F0-387-23483-7_443&amp;rft.isbn=978-0-387-23473-1&amp;rft.aulast=Landrock&amp;rft.aufirst=Peter&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-150"><span class="mw-cite-backlink"><b><a href="#cite_ref-150">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1787/888932392533">"Figure 1.5. Marriage remains the most common form of partnership among couples, 2000-07"</a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1787%2F888932392533">10.1787/888932392533</a><span class="reference-accessdate">. Retrieved <span class="nowrap">June 1,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Figure+1.5.+Marriage+remains+the+most+common+form+of+partnership+among+couples%2C+2000-07&amp;rft_id=info%3Adoi%2F10.1787%2F888932392533&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1787%2F888932392533&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-151"><span class="mw-cite-backlink"><b><a href="#cite_ref-151">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAkpeninor2013" class="citation book cs1">Akpeninor, James Ohwofasa (2013). <a rel="nofollow" class="external text" href="https://books.google.com/books?isbn=1481782320"><i>Modern Concepts of Security</i></a>. Bloomington, IN: AuthorHouse. p.&#160;135. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4817-8232-6" title="Special:BookSources/978-1-4817-8232-6"><bdi>978-1-4817-8232-6</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">January 18,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Modern+Concepts+of+Security&amp;rft.place=Bloomington%2C+IN&amp;rft.pages=135&amp;rft.pub=AuthorHouse&amp;rft.date=2013&amp;rft.isbn=978-1-4817-8232-6&amp;rft.aulast=Akpeninor&amp;rft.aufirst=James+Ohwofasa&amp;rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fisbn%3D1481782320&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-152"><span class="mw-cite-backlink"><b><a href="#cite_ref-152">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRichards2012" class="citation web cs1">Richards, G. (April 2012). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.17487/rfc6560">"One-Time Password (OTP) Pre-Authentication"</a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.17487%2Frfc6560">10.17487/rfc6560</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=One-Time+Password+%28OTP%29+Pre-Authentication&amp;rft.date=2012-04&amp;rft_id=info%3Adoi%2F10.17487%2Frfc6560&amp;rft.aulast=Richards&amp;rft.aufirst=G.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.17487%2Frfc6560&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-153"><span class="mw-cite-backlink"><b><a href="#cite_ref-153">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSchumacher2016" class="citation book cs1">Schumacher, Dietmar (April 3, 2016). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1190/ice2016-6522983.1">"Surface geochemical exploration after 85 years: What has been accomplished and what more must be done"</a>. <i>International Conference and Exhibition, Barcelona, Spain, 3-6 April 2016</i>. SEG Global Meeting Abstracts. Society of Exploration Geophysicists and American Association of Petroleum Geologists. p.&#160;100. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1190%2Fice2016-6522983.1">10.1190/ice2016-6522983.1</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Surface+geochemical+exploration+after+85+years%3A+What+has+been+accomplished+and+what+more+must+be+done&amp;rft.btitle=International+Conference+and+Exhibition%2C+Barcelona%2C+Spain%2C+3-6+April+2016&amp;rft.series=SEG+Global+Meeting+Abstracts&amp;rft.pages=100&amp;rft.pub=Society+of+Exploration+Geophysicists+and+American+Association+of+Petroleum+Geologists&amp;rft.date=2016-04-03&amp;rft_id=info%3Adoi%2F10.1190%2Fice2016-6522983.1&amp;rft.aulast=Schumacher&amp;rft.aufirst=Dietmar&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1190%2Fice2016-6522983.1&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-154"><span class="mw-cite-backlink"><b><a href="#cite_ref-154">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1002/9781119203964.ch10">"Authorization And Approval Program"</a>, <i>Internal Controls Policies and Procedures</i>, Hoboken, NJ, US: John Wiley &amp; Sons, Inc., pp.&#160;69–72, October 23, 2015, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1002%2F9781119203964.ch10">10.1002/9781119203964.ch10</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-119-20396-4" title="Special:BookSources/978-1-119-20396-4"><bdi>978-1-119-20396-4</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 1,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Internal+Controls+Policies+and+Procedures&amp;rft.atitle=Authorization+And+Approval+Program&amp;rft.pages=69-72&amp;rft.date=2015-10-23&amp;rft_id=info%3Adoi%2F10.1002%2F9781119203964.ch10&amp;rft.isbn=978-1-119-20396-4&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1002%2F9781119203964.ch10&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-155"><span class="mw-cite-backlink"><b><a href="#cite_ref-155">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.2307/j.ctvqc6hn1.12">"What responses under what conditions?"</a>, <i>Local Policies and the European Social Fund</i>, Policy Press, pp.&#160;81–102, October 2, 2019, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.2307%2Fj.ctvqc6hn1.12">10.2307/j.ctvqc6hn1.12</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4473-4652-4" title="Special:BookSources/978-1-4473-4652-4"><bdi>978-1-4473-4652-4</bdi></a>, <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:241438707">241438707</a><span class="reference-accessdate">, retrieved <span class="nowrap">June 1,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Local+Policies+and+the+European+Social+Fund&amp;rft.atitle=What+responses+under+what+conditions%3F&amp;rft.pages=81-102&amp;rft.date=2019-10-02&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A241438707%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.2307%2Fj.ctvqc6hn1.12&amp;rft.isbn=978-1-4473-4652-4&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.2307%2Fj.ctvqc6hn1.12&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-156"><span class="mw-cite-backlink"><b><a href="#cite_ref-156">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChengZhangHan2013" class="citation book cs1">Cheng, Liang; Zhang, Yang; Han, Zhihui (June 2013). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1109/sere.2013.12">"Quantitatively Measure Access Control Mechanisms across Different Operating Systems"</a>. <i>2013 IEEE 7th International Conference on Software Security and Reliability</i>. IEEE. pp.&#160;50–59. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2Fsere.2013.12">10.1109/sere.2013.12</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4799-0406-8" title="Special:BookSources/978-1-4799-0406-8"><bdi>978-1-4799-0406-8</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:13261344">13261344</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Quantitatively+Measure+Access+Control+Mechanisms+across+Different+Operating+Systems&amp;rft.btitle=2013+IEEE+7th+International+Conference+on+Software+Security+and+Reliability&amp;rft.pages=50-59&amp;rft.pub=IEEE&amp;rft.date=2013-06&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A13261344%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1109%2Fsere.2013.12&amp;rft.isbn=978-1-4799-0406-8&amp;rft.aulast=Cheng&amp;rft.aufirst=Liang&amp;rft.au=Zhang%2C+Yang&amp;rft.au=Han%2C+Zhihui&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1109%2Fsere.2013.12&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-discretionary_access_control-157"><span class="mw-cite-backlink">^ <a href="#cite_ref-discretionary_access_control_157-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-discretionary_access_control_157-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWeik2000" class="citation cs2">Weik, Martin H. (2000), "discretionary access control", <i>Computer Science and Communications Dictionary</i>, p.&#160;426, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F1-4020-0613-6_5225">10.1007/1-4020-0613-6_5225</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-7923-8425-0" title="Special:BookSources/978-0-7923-8425-0"><bdi>978-0-7923-8425-0</bdi></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=discretionary+access+control&amp;rft.btitle=Computer+Science+and+Communications+Dictionary&amp;rft.pages=426&amp;rft.date=2000&amp;rft_id=info%3Adoi%2F10.1007%2F1-4020-0613-6_5225&amp;rft.isbn=978-0-7923-8425-0&amp;rft.aulast=Weik&amp;rft.aufirst=Martin+H.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-IS_1-158"><span class="mw-cite-backlink"><b><a href="#cite_ref-IS_1_158-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGrewer,_C.Balani,_P.Weidenfeller,_C.Bartusel,_T.2005" class="citation journal cs1">Grewer, C.; Balani, P.; Weidenfeller, C.; Bartusel, T.; Zhen Tao; Rauen, T. (August 10, 2005). <a rel="nofollow" class="external text" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2459315">"Individual Subunits of the Glutamate Transporter EAAC1 Homotrimer Function Independently of Each Other"</a>. <i><a href="/wiki/Biochemistry" title="Biochemistry">Biochemistry</a></i>. <b>44</b> (35): 11913–11923. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1021%2Fbi050987n">10.1021/bi050987n</a>. <a href="/wiki/PMC_(identifier)" class="mw-redirect" title="PMC (identifier)">PMC</a>&#160;<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2459315">2459315</a></span>. <a href="/wiki/PMID_(identifier)" class="mw-redirect" title="PMID (identifier)">PMID</a>&#160;<a rel="nofollow" class="external text" href="https://pubmed.ncbi.nlm.nih.gov/16128593">16128593</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Biochemistry&amp;rft.atitle=Individual+Subunits+of+the+Glutamate+Transporter+EAAC1+Homotrimer+Function+Independently+of+Each+Other&amp;rft.volume=44&amp;rft.issue=35&amp;rft.pages=11913-11923&amp;rft.date=2005-08-10&amp;rft_id=https%3A%2F%2Fwww.ncbi.nlm.nih.gov%2Fpmc%2Farticles%2FPMC2459315%23id-name%3DPMC&amp;rft_id=info%3Apmid%2F16128593&amp;rft_id=info%3Adoi%2F10.1021%2Fbi050987n&amp;rft.au=Grewer%2C+C.&amp;rft.au=Balani%2C+P.&amp;rft.au=Weidenfeller%2C+C.&amp;rft.au=Bartusel%2C+T.&amp;rft.au=Zhen+Tao&amp;rft.au=Rauen%2C+T.&amp;rft_id=https%3A%2F%2Fwww.ncbi.nlm.nih.gov%2Fpmc%2Farticles%2FPMC2459315&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-159"><span class="mw-cite-backlink"><b><a href="#cite_ref-159">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFEllis_Ormrod2012" class="citation book cs1">Ellis Ormrod, Jeanne (2012). <i>Essentials of educational psychology: big ideas to guide effective teaching</i>. Pearson. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-13-136727-2" title="Special:BookSources/978-0-13-136727-2"><bdi>978-0-13-136727-2</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/663953375">663953375</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Essentials+of+educational+psychology%3A+big+ideas+to+guide+effective+teaching&amp;rft.pub=Pearson&amp;rft.date=2012&amp;rft_id=info%3Aoclcnum%2F663953375&amp;rft.isbn=978-0-13-136727-2&amp;rft.aulast=Ellis+Ormrod&amp;rft.aufirst=Jeanne&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-160"><span class="mw-cite-backlink"><b><a href="#cite_ref-160">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBelimBogachenkoKabanov2018" class="citation book cs1">Belim, S. V.; Bogachenko, N. F.; Kabanov, A. N. (November 2018). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1109/dynamics.2018.8601460">"Severity Level of Permissions in Role-Based Access Control"</a>. <i>2018 Dynamics of Systems, Mechanisms and Machines (Dynamics)</i>. IEEE. pp.&#160;1–5. <a href="/wiki/ArXiv_(identifier)" class="mw-redirect" title="ArXiv (identifier)">arXiv</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://arxiv.org/abs/1812.11404">1812.11404</a></span>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2Fdynamics.2018.8601460">10.1109/dynamics.2018.8601460</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-5386-5941-0" title="Special:BookSources/978-1-5386-5941-0"><bdi>978-1-5386-5941-0</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:57189531">57189531</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Severity+Level+of+Permissions+in+Role-Based+Access+Control&amp;rft.btitle=2018+Dynamics+of+Systems%2C+Mechanisms+and+Machines+%28Dynamics%29&amp;rft.pages=1-5&amp;rft.pub=IEEE&amp;rft.date=2018-11&amp;rft_id=info%3Aarxiv%2F1812.11404&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A57189531%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1109%2Fdynamics.2018.8601460&amp;rft.isbn=978-1-5386-5941-0&amp;rft.aulast=Belim&amp;rft.aufirst=S.+V.&amp;rft.au=Bogachenko%2C+N.+F.&amp;rft.au=Kabanov%2C+A.+N.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1109%2Fdynamics.2018.8601460&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-161"><span class="mw-cite-backlink"><b><a href="#cite_ref-161">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2">"Configuring TACACS and Extended TACACS", <i>Securing and Controlling Cisco Routers</i>, Auerbach Publications, May 15, 2002, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1201%2F9781420031454.ch11">10.1201/9781420031454.ch11</a> (inactive November 11, 2024), <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-8493-1290-8" title="Special:BookSources/978-0-8493-1290-8"><bdi>978-0-8493-1290-8</bdi></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Securing+and+Controlling+Cisco+Routers&amp;rft.atitle=Configuring+TACACS+and+Extended+TACACS&amp;rft.date=2002-05-15&amp;rft_id=info%3Adoi%2F10.1201%2F9781420031454.ch11&amp;rft.isbn=978-0-8493-1290-8&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Citation" title="Template:Citation">citation</a>}}</code>: CS1 maint: DOI inactive as of November 2024 (<a href="/wiki/Category:CS1_maint:_DOI_inactive_as_of_November_2024" title="Category:CS1 maint: DOI inactive as of November 2024">link</a>)</span></span> </li> <li id="cite_note-162"><span class="mw-cite-backlink"><b><a href="#cite_ref-162">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1201/9781420078718-18">"Developing Effective Security Policies"</a>, <i>Risk Analysis and Security Countermeasure Selection</i>, CRC Press, pp.&#160;261–274, December 18, 2009, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1201%2F9781420078718-18">10.1201/9781420078718-18</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-429-24979-2" title="Special:BookSources/978-0-429-24979-2"><bdi>978-0-429-24979-2</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 1,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Risk+Analysis+and+Security+Countermeasure+Selection&amp;rft.atitle=Developing+Effective+Security+Policies&amp;rft.pages=261-274&amp;rft.date=2009-12-18&amp;rft_id=info%3Adoi%2F10.1201%2F9781420078718-18&amp;rft.isbn=978-0-429-24979-2&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1201%2F9781420078718-18&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-163"><span class="mw-cite-backlink"><b><a href="#cite_ref-163">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.treasury.gov/tigta/auditreports/2004reports/200420131fr.html">"The Use of Audit Trails to Monitor Key Networks and Systems Should Remain Part of the Computer Security Material Weakness"</a>. <i>www.treasury.gov</i><span class="reference-accessdate">. Retrieved <span class="nowrap">October 6,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=www.treasury.gov&amp;rft.atitle=The+Use+of+Audit+Trails+to+Monitor+Key+Networks+and+Systems+Should+Remain+Part+of+the+Computer+Security+Material+Weakness&amp;rft_id=https%3A%2F%2Fwww.treasury.gov%2Ftigta%2Fauditreports%2F2004reports%2F200420131fr.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-164"><span class="mw-cite-backlink"><b><a href="#cite_ref-164">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1163/2210-7975_hrd-9902-0152">"fixing-canadas-access-to-medicines-regime-what-you-need-to-know-about-bill-c398"</a>. <i>Human Rights Documents online</i>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1163%2F2210-7975_hrd-9902-0152">10.1163/2210-7975_hrd-9902-0152</a><span class="reference-accessdate">. Retrieved <span class="nowrap">June 1,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Human+Rights+Documents+online&amp;rft.atitle=fixing-canadas-access-to-medicines-regime-what-you-need-to-know-about-bill-c398&amp;rft_id=info%3Adoi%2F10.1163%2F2210-7975_hrd-9902-0152&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1163%2F2210-7975_hrd-9902-0152&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-165"><span class="mw-cite-backlink"><b><a href="#cite_ref-165">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSalazar2006" class="citation journal cs1">Salazar, Mary K. (January 2006). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1177/216507990605400102">"Dealing with Uncertain Risks—When to Apply the Precautionary Principle"</a>. <i>AAOHN Journal</i>. <b>54</b> (1): 11–13. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1177%2F216507990605400102">10.1177/216507990605400102</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0891-0162">0891-0162</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:87769508">87769508</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=AAOHN+Journal&amp;rft.atitle=Dealing+with+Uncertain+Risks%E2%80%94When+to+Apply+the+Precautionary+Principle&amp;rft.volume=54&amp;rft.issue=1&amp;rft.pages=11-13&amp;rft.date=2006-01&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A87769508%23id-name%3DS2CID&amp;rft.issn=0891-0162&amp;rft_id=info%3Adoi%2F10.1177%2F216507990605400102&amp;rft.aulast=Salazar&amp;rft.aufirst=Mary+K.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1177%2F216507990605400102&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-166"><span class="mw-cite-backlink"><b><a href="#cite_ref-166">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1163/2210-7975_hrd-9970-2016117">"We Need to Know More About How the Government Censors Its Employees"</a>. <i>Human Rights Documents Online</i>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1163%2F2210-7975_hrd-9970-2016117">10.1163/2210-7975_hrd-9970-2016117</a><span class="reference-accessdate">. Retrieved <span class="nowrap">June 1,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Human+Rights+Documents+Online&amp;rft.atitle=We+Need+to+Know+More+About+How+the+Government+Censors+Its+Employees&amp;rft_id=info%3Adoi%2F10.1163%2F2210-7975_hrd-9970-2016117&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1163%2F2210-7975_hrd-9970-2016117&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-167"><span class="mw-cite-backlink"><b><a href="#cite_ref-167">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPournelle2004" class="citation cs2">Pournelle, Jerry (April 22, 2004), <a rel="nofollow" class="external text" href="https://academic.oup.com/book/40772/chapter-abstract/348693201">"1001 Computer Words You Need to Know"</a>, <i>1001 Computer Words You Need to Know: The Ultimate Guide To The Language Of Computers</i>, Oxford Scholarship Online, Oxford University Press, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1093%2Foso%2F9780195167757.003.0007">10.1093/oso/9780195167757.003.0007</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-19-516775-7" title="Special:BookSources/978-0-19-516775-7"><bdi>978-0-19-516775-7</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">July 30,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=1001+Computer+Words+You+Need+to+Know&amp;rft.btitle=1001+Computer+Words+You+Need+to+Know%3A+The+Ultimate+Guide+To+The+Language+Of+Computers&amp;rft.series=Oxford+Scholarship+Online&amp;rft.pub=Oxford+University+Press&amp;rft.date=2004-04-22&amp;rft_id=info%3Adoi%2F10.1093%2Foso%2F9780195167757.003.0007&amp;rft.isbn=978-0-19-516775-7&amp;rft.aulast=Pournelle&amp;rft.aufirst=Jerry&amp;rft_id=https%3A%2F%2Facademic.oup.com%2Fbook%2F40772%2Fchapter-abstract%2F348693201&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-168"><span class="mw-cite-backlink"><b><a href="#cite_ref-168">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFEasttom2021" class="citation cs2">Easttom, William (2021), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1007/978-3-030-63115-4_11">"Elliptic Curve Cryptography"</a>, <i>Modern Cryptography</i>, Cham: Springer International Publishing, pp.&#160;245–256, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-3-030-63115-4_11">10.1007/978-3-030-63115-4_11</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-3-030-63114-7" title="Special:BookSources/978-3-030-63114-7"><bdi>978-3-030-63114-7</bdi></a>, <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:234106555">234106555</a><span class="reference-accessdate">, retrieved <span class="nowrap">June 1,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Modern+Cryptography&amp;rft.atitle=Elliptic+Curve+Cryptography&amp;rft.pages=245-256&amp;rft.date=2021&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A234106555%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1007%2F978-3-030-63115-4_11&amp;rft.isbn=978-3-030-63114-7&amp;rft.aulast=Easttom&amp;rft.aufirst=William&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1007%2F978-3-030-63115-4_11&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-169"><span class="mw-cite-backlink"><b><a href="#cite_ref-169">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFollman2014" class="citation thesis cs1">Follman, Rebecca (March 1, 2014). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.9776/14322"><i>From Someone Who Has Been There: Information Seeking in Mentoring</i></a>. <i>IConference 2014 Proceedings</i> (Thesis). iSchools. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.9776%2F14322">10.9776/14322</a>. <a href="/wiki/Hdl_(identifier)" class="mw-redirect" title="Hdl (identifier)">hdl</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://hdl.handle.net/1903%2F14292">1903/14292</a></span>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-9884900-1-7" title="Special:BookSources/978-0-9884900-1-7"><bdi>978-0-9884900-1-7</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adissertation&amp;rft.title=From+Someone+Who+Has+Been+There%3A+Information+Seeking+in+Mentoring&amp;rft.inst=iSchools&amp;rft.date=2014-03-01&amp;rft_id=info%3Ahdl%2F1903%2F14292&amp;rft_id=info%3Adoi%2F10.9776%2F14322&amp;rft.isbn=978-0-9884900-1-7&amp;rft.aulast=Follman&amp;rft.aufirst=Rebecca&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.9776%2F14322&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-170"><span class="mw-cite-backlink"><b><a href="#cite_ref-170">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWeiss2004" class="citation cs2">Weiss, Jason (2004), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/b978-012742751-5/50012-8">"Message Digests, Message Authentication Codes, and Digital Signatures"</a>, <i>Java Cryptography Extensions</i>, Elsevier, pp.&#160;101–118, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fb978-012742751-5%2F50012-8">10.1016/b978-012742751-5/50012-8</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-12-742751-5" title="Special:BookSources/978-0-12-742751-5"><bdi>978-0-12-742751-5</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Java+Cryptography+Extensions&amp;rft.atitle=Message+Digests%2C+Message+Authentication+Codes%2C+and+Digital+Signatures&amp;rft.pages=101-118&amp;rft.date=2004&amp;rft_id=info%3Adoi%2F10.1016%2Fb978-012742751-5%2F50012-8&amp;rft.isbn=978-0-12-742751-5&amp;rft.aulast=Weiss&amp;rft.aufirst=Jason&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2Fb978-012742751-5%2F50012-8&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-URK_1-171"><span class="mw-cite-backlink"><b><a href="#cite_ref-URK_1_171-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBider,_D.2018" class="citation web cs1">Bider, D. (March 2018). <a rel="nofollow" class="external text" href="https://www.rfc-editor.org/rfc/pdfrfc/rfc8332.txt.pdf">"Use of RSA Keys with SHA-256 and SHA-512 in the Secure Shell (SSH) Protocol"</a> <span class="cs1-format">(PDF)</span>. The RFC Series. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.17487%2FRFC8332">10.17487/RFC8332</a><span class="reference-accessdate">. Retrieved <span class="nowrap">November 30,</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Use+of+RSA+Keys+with+SHA-256+and+SHA-512+in+the+Secure+Shell+%28SSH%29+Protocol&amp;rft.pub=The+&#82;FC+Series&amp;rft.date=2018-03&amp;rft_id=info%3Adoi%2F10.17487%2F&#82;FC8332&amp;rft.au=Bider%2C+D.&amp;rft_id=https%3A%2F%2Fwww.rfc-editor.org%2Frfc%2Fpdfrfc%2Frfc8332.txt.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-172"><span class="mw-cite-backlink"><b><a href="#cite_ref-172">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNohKimKwonCho2016" class="citation book cs1">Noh, Jaewon; Kim, Jeehyeong; Kwon, Giwon; Cho, Sunghyun (October 2016). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1109/icce-asia.2016.7804782">"Secure key exchange scheme for WPA/WPA2-PSK using public key cryptography"</a>. <i>2016 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)</i>. IEEE. pp.&#160;1–4. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2Ficce-asia.2016.7804782">10.1109/icce-asia.2016.7804782</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-5090-2743-9" title="Special:BookSources/978-1-5090-2743-9"><bdi>978-1-5090-2743-9</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:10595698">10595698</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Secure+key+exchange+scheme+for+WPA%2FWPA2-PSK+using+public+key+cryptography&amp;rft.btitle=2016+IEEE+International+Conference+on+Consumer+Electronics-Asia+%28ICCE-Asia%29&amp;rft.pages=1-4&amp;rft.pub=IEEE&amp;rft.date=2016-10&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A10595698%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1109%2Ficce-asia.2016.7804782&amp;rft.isbn=978-1-5090-2743-9&amp;rft.aulast=Noh&amp;rft.aufirst=Jaewon&amp;rft.au=Kim%2C+Jeehyeong&amp;rft.au=Kwon%2C+Giwon&amp;rft.au=Cho%2C+Sunghyun&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1109%2Ficce-asia.2016.7804782&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-173"><span class="mw-cite-backlink"><b><a href="#cite_ref-173">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFVan_Buren1990" class="citation journal cs1">Van Buren, Roy F. (May 1990). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1145/101126.101130">"How you can use the data encryption standard to encrypt your files and data bases"</a>. <i>ACM SIGSAC Review</i>. <b>8</b> (2): 33–39. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F101126.101130">10.1145/101126.101130</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0277-920X">0277-920X</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=ACM+SIGSAC+Review&amp;rft.atitle=How+you+can+use+the+data+encryption+standard+to+encrypt+your+files+and+data+bases&amp;rft.volume=8&amp;rft.issue=2&amp;rft.pages=33-39&amp;rft.date=1990-05&amp;rft_id=info%3Adoi%2F10.1145%2F101126.101130&amp;rft.issn=0277-920X&amp;rft.aulast=Van+Buren&amp;rft.aufirst=Roy+F.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1145%2F101126.101130&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-174"><span class="mw-cite-backlink"><b><a href="#cite_ref-174">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBonneau2016" class="citation cs2">Bonneau, Joseph (2016), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1007/978-3-662-53357-4_2">"Why Buy when You Can Rent?"</a>, <i>Financial Cryptography and Data Security</i>, Lecture Notes in Computer Science, vol.&#160;9604, Berlin, Heidelberg: Springer Berlin Heidelberg, pp.&#160;19–26, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-3-662-53357-4_2">10.1007/978-3-662-53357-4_2</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-3-662-53356-7" title="Special:BookSources/978-3-662-53356-7"><bdi>978-3-662-53356-7</bdi></a>, <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:18122687">18122687</a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Financial+Cryptography+and+Data+Security&amp;rft.atitle=Why+Buy+when+You+Can+Rent%3F&amp;rft.volume=9604&amp;rft.pages=19-26&amp;rft.date=2016&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A18122687%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1007%2F978-3-662-53357-4_2&amp;rft.isbn=978-3-662-53356-7&amp;rft.aulast=Bonneau&amp;rft.aufirst=Joseph&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1007%2F978-3-662-53357-4_2&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-175"><span class="mw-cite-backlink"><b><a href="#cite_ref-175">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFColemanAndron2015" class="citation cs2">Coleman, Heather; Andron, Jeff (August 1, 2015), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.17128/9781589483651_2">"What GIS Experts and Policy Professionals Need to Know about Using Marxan in Multiobjective Planning Processes"</a>, <i>Ocean Solutions, Earth Solutions</i>, Esri Press, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.17128%2F9781589483651_2">10.17128/9781589483651_2</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-58948-365-1" title="Special:BookSources/978-1-58948-365-1"><bdi>978-1-58948-365-1</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Ocean+Solutions%2C+Earth+Solutions&amp;rft.atitle=What+GIS+Experts+and+Policy+Professionals+Need+to+Know+about+Using+Marxan+in+Multiobjective+Planning+Processes&amp;rft.date=2015-08-01&amp;rft_id=info%3Adoi%2F10.17128%2F9781589483651_2&amp;rft.isbn=978-1-58948-365-1&amp;rft.aulast=Coleman&amp;rft.aufirst=Heather&amp;rft.au=Andron%2C+Jeff&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.17128%2F9781589483651_2&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-Key_Encryption_Key-176"><span class="mw-cite-backlink">^ <a href="#cite_ref-Key_Encryption_Key_176-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Key_Encryption_Key_176-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLandrock2005" class="citation cs2">Landrock, Peter (2005), "Key Encryption Key", <i>Encyclopedia of Cryptography and Security</i>, pp.&#160;326–327, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F0-387-23483-7_220">10.1007/0-387-23483-7_220</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-387-23473-1" title="Special:BookSources/978-0-387-23473-1"><bdi>978-0-387-23473-1</bdi></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Key+Encryption+Key&amp;rft.btitle=Encyclopedia+of+Cryptography+and+Security&amp;rft.pages=326-327&amp;rft.date=2005&amp;rft_id=info%3Adoi%2F10.1007%2F0-387-23483-7_220&amp;rft.isbn=978-0-387-23473-1&amp;rft.aulast=Landrock&amp;rft.aufirst=Peter&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-177"><span class="mw-cite-backlink"><b><a href="#cite_ref-177">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGiriBaruaSrivastavaJana2010" class="citation cs2">Giri, Debasis; Barua, Prithayan; Srivastava, P. D.; Jana, Biswapati (2010), "A Cryptosystem for Encryption and Decryption of Long Confidential Messages", <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1007/978-3-642-13365-7_9"><i>Information Security and Assurance</i></a>, Communications in Computer and Information Science, vol.&#160;76, Berlin, Heidelberg: Springer Berlin Heidelberg, pp.&#160;86–96, <a href="/wiki/Bibcode_(identifier)" class="mw-redirect" title="Bibcode (identifier)">Bibcode</a>:<a rel="nofollow" class="external text" href="https://ui.adsabs.harvard.edu/abs/2010isa..conf...86G">2010isa..conf...86G</a>, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-3-642-13365-7_9">10.1007/978-3-642-13365-7_9</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-3-642-13364-0" title="Special:BookSources/978-3-642-13364-0"><bdi>978-3-642-13364-0</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=A+Cryptosystem+for+Encryption+and+Decryption+of+Long+Confidential+Messages&amp;rft.btitle=Information+Security+and+Assurance&amp;rft.place=Berlin%2C+Heidelberg&amp;rft.series=Communications+in+Computer+and+Information+Science&amp;rft.pages=86-96&amp;rft.pub=Springer+Berlin+Heidelberg&amp;rft.date=2010&amp;rft_id=info%3Adoi%2F10.1007%2F978-3-642-13365-7_9&amp;rft_id=info%3Abibcode%2F2010isa..conf...86G&amp;rft.isbn=978-3-642-13364-0&amp;rft.aulast=Giri&amp;rft.aufirst=Debasis&amp;rft.au=Barua%2C+Prithayan&amp;rft.au=Srivastava%2C+P.+D.&amp;rft.au=Jana%2C+Biswapati&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1007%2F978-3-642-13365-7_9&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-VallabhaneniCorporate08-178"><span class="mw-cite-backlink"><b><a href="#cite_ref-VallabhaneniCorporate08_178-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFVallabhaneni,_S.R.2008" class="citation book cs1">Vallabhaneni, S.R. (2008). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=BvYbQr9MV_sC&amp;pg=PA288"><i>Corporate Management, Governance, and Ethics Best Practices</i></a>. John Wiley &amp; Sons. p.&#160;288. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9780470255803" title="Special:BookSources/9780470255803"><bdi>9780470255803</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Corporate+Management%2C+Governance%2C+and+Ethics+Best+Practices&amp;rft.pages=288&amp;rft.pub=John+Wiley+%26+Sons&amp;rft.date=2008&amp;rft.isbn=9780470255803&amp;rft.au=Vallabhaneni%2C+S.R.&amp;rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DBvYbQr9MV_sC%26pg%3DPA288&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-179"><span class="mw-cite-backlink"><b><a href="#cite_ref-179">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFShon_Harris2003" class="citation book cs1"><a href="/wiki/Shon_Harris" title="Shon Harris">Shon Harris</a> (2003). <i>All-in-one CISSP Certification Exam Guide</i> (2nd&#160;ed.). <a href="/wiki/Emeryville,_California" title="Emeryville, California">Emeryville, California</a>: <a href="/wiki/McGraw-Hill" class="mw-redirect" title="McGraw-Hill">McGraw-Hill</a>/Osborne. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-07-222966-0" title="Special:BookSources/978-0-07-222966-0"><bdi>978-0-07-222966-0</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=All-in-one+CISSP+Certification+Exam+Guide&amp;rft.place=Emeryville%2C+California&amp;rft.edition=2nd&amp;rft.pub=McGraw-Hill%2FOsborne&amp;rft.date=2003&amp;rft.isbn=978-0-07-222966-0&amp;rft.au=Shon+Harris&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-180"><span class="mw-cite-backlink"><b><a href="#cite_ref-180">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBoncardo2018" class="citation journal cs1">Boncardo, Robert (September 20, 2018). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.3366/edinburgh/9781474429528.003.0005">"Jean-Claude Milner's Mallarmé: Nothing Has Taken Place"</a>. <i>Edinburgh University Press</i>. <b>1</b>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.3366%2Fedinburgh%2F9781474429528.003.0005">10.3366/edinburgh/9781474429528.003.0005</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:172045429">172045429</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Edinburgh+University+Press&amp;rft.atitle=Jean-Claude+Milner%27s+Mallarm%C3%A9%3A+Nothing+Has+Taken+Place&amp;rft.volume=1&amp;rft.date=2018-09-20&amp;rft_id=info%3Adoi%2F10.3366%2Fedinburgh%2F9781474429528.003.0005&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A172045429%23id-name%3DS2CID&amp;rft.aulast=Boncardo&amp;rft.aufirst=Robert&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.3366%2Fedinburgh%2F9781474429528.003.0005&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-181"><span class="mw-cite-backlink"><b><a href="#cite_ref-181">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1002/9781119197485.ch2">"The Importance of Operational Due Diligence"</a>, <i>Hedge Fund Operational Due Diligence</i>, Hoboken, NJ, US: John Wiley &amp; Sons, Inc., pp.&#160;49–67, October 16, 2015, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1002%2F9781119197485.ch2">10.1002/9781119197485.ch2</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-119-19748-5" title="Special:BookSources/978-1-119-19748-5"><bdi>978-1-119-19748-5</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Hedge+Fund+Operational+Due+Diligence&amp;rft.atitle=The+Importance+of+Operational+Due+Diligence&amp;rft.pages=49-67&amp;rft.date=2015-10-16&amp;rft_id=info%3Adoi%2F10.1002%2F9781119197485.ch2&amp;rft.isbn=978-1-119-19748-5&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1002%2F9781119197485.ch2&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-182"><span class="mw-cite-backlink"><b><a href="#cite_ref-182">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHall1917" class="citation journal cs1">Hall, Gaylord C. (March 1917). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1097/00007611-191703000-00007">"Some Important Diagnostic Points the General Practioner&#32;&#91;<i>sic</i>&#93; Should Know About the Nose"</a>. <i>Southern Medical Journal</i>. <b>10</b> (3): 211. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1097%2F00007611-191703000-00007">10.1097/00007611-191703000-00007</a> (inactive November 11, 2024). <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0038-4348">0038-4348</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Southern+Medical+Journal&amp;rft.atitle=Some+Important+Diagnostic+Points+the+General+Practioner%26%2332%3B%26%2391%3Bsic%26%2393%3B+Should+Know+About+the+Nose&amp;rft.volume=10&amp;rft.issue=3&amp;rft.pages=211&amp;rft.date=1917-03&amp;rft_id=info%3Adoi%2F10.1097%2F00007611-191703000-00007&amp;rft.issn=0038-4348&amp;rft.aulast=Hall&amp;rft.aufirst=Gaylord+C.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1097%2F00007611-191703000-00007&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_journal" title="Template:Cite journal">cite journal</a>}}</code>: CS1 maint: DOI inactive as of November 2024 (<a href="/wiki/Category:CS1_maint:_DOI_inactive_as_of_November_2024" title="Category:CS1 maint: DOI inactive as of November 2024">link</a>)</span></span> </li> <li id="cite_note-183"><span class="mw-cite-backlink"><b><a href="#cite_ref-183">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRenes1999" class="citation book cs1">Renes, J. (1999). <i>Landschappen van Maas en Peel: een toegepast historisch-geografisch onderzoek in het streekplangebied Noord- en Midden-Limburg</i>. Eisma. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/90-74252-84-2" title="Special:BookSources/90-74252-84-2"><bdi>90-74252-84-2</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/782897414">782897414</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Landschappen+van+Maas+en+Peel%3A+een+toegepast+historisch-geografisch+onderzoek+in+het+streekplangebied+Noord-+en+Midden-Limburg.&amp;rft.pub=Eisma&amp;rft.date=1999&amp;rft_id=info%3Aoclcnum%2F782897414&amp;rft.isbn=90-74252-84-2&amp;rft.aulast=Renes&amp;rft.aufirst=J.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-184"><span class="mw-cite-backlink"><b><a href="#cite_ref-184">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFThomas2017" class="citation journal cs1">Thomas, Brook (June 22, 2017). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1093/acprof:oso/9780190456368.003.0002">"Minding Previous Steps Taken"</a>. <i>Oxford Scholarship Online</i>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1093%2Facprof%3Aoso%2F9780190456368.003.0002">10.1093/acprof:oso/9780190456368.003.0002</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-19-045639-9" title="Special:BookSources/978-0-19-045639-9"><bdi>978-0-19-045639-9</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Oxford+Scholarship+Online&amp;rft.atitle=Minding+Previous+Steps+Taken&amp;rft.date=2017-06-22&amp;rft_id=info%3Adoi%2F10.1093%2Facprof%3Aoso%2F9780190456368.003.0002&amp;rft.isbn=978-0-19-045639-9&amp;rft.aulast=Thomas&amp;rft.aufirst=Brook&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1093%2Facprof%3Aoso%2F9780190456368.003.0002&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-185"><span class="mw-cite-backlink"><b><a href="#cite_ref-185">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLundgren2018" class="citation book cs1">Lundgren, Regina E. (2018). <i>Risk communication&#160;: a handbook for communicating environmental, safety, and health risks</i>. Wiley. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-119-45613-1" title="Special:BookSources/978-1-119-45613-1"><bdi>978-1-119-45613-1</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/1043389392">1043389392</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Risk+communication+%3A+a+handbook+for+communicating+environmental%2C+safety%2C+and+health+risks&amp;rft.pub=Wiley&amp;rft.date=2018&amp;rft_id=info%3Aoclcnum%2F1043389392&amp;rft.isbn=978-1-119-45613-1&amp;rft.aulast=Lundgren&amp;rft.aufirst=Regina+E.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-186"><span class="mw-cite-backlink"><b><a href="#cite_ref-186">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJensen2020" class="citation cs2">Jensen, Eric Talbot (December 3, 2020), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1093/oso/9780198869900.003.0015">"Due Diligence in Cyber Activities"</a>, <i>Due Diligence in the International Legal Order</i>, Oxford University Press, pp.&#160;252–270, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1093%2Foso%2F9780198869900.003.0015">10.1093/oso/9780198869900.003.0015</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-19-886990-0" title="Special:BookSources/978-0-19-886990-0"><bdi>978-0-19-886990-0</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Due+Diligence+in+the+International+Legal+Order&amp;rft.atitle=Due+Diligence+in+Cyber+Activities&amp;rft.pages=252-270&amp;rft.date=2020-12-03&amp;rft_id=info%3Adoi%2F10.1093%2Foso%2F9780198869900.003.0015&amp;rft.isbn=978-0-19-886990-0&amp;rft.aulast=Jensen&amp;rft.aufirst=Eric+Talbot&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1093%2Foso%2F9780198869900.003.0015&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-187"><span class="mw-cite-backlink"><b><a href="#cite_ref-187">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20180814170112/https://docra.org/">"The Duty of Care Risk Analysis Standard"</a>. <i>DoCRA</i>. Archived from <a rel="nofollow" class="external text" href="https://docra.org/">the original</a> on August 14, 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">August 15,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=DoCRA&amp;rft.atitle=The+Duty+of+Care+Risk+Analysis+Standard&amp;rft_id=https%3A%2F%2Fdocra.org%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-188"><span class="mw-cite-backlink"><b><a href="#cite_ref-188">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSuttonCherneyWhite2008" class="citation cs2">Sutton, Adam; Cherney, Adrian; White, Rob (2008), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1017/cbo9780511804601.006">"Evaluating crime prevention"</a>, <i>Crime Prevention</i>, Cambridge: Cambridge University Press, pp.&#160;70–90, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1017%2Fcbo9780511804601.006">10.1017/cbo9780511804601.006</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-511-80460-1" title="Special:BookSources/978-0-511-80460-1"><bdi>978-0-511-80460-1</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Crime+Prevention&amp;rft.atitle=Evaluating+crime+prevention&amp;rft.pages=70-90&amp;rft.date=2008&amp;rft_id=info%3Adoi%2F10.1017%2Fcbo9780511804601.006&amp;rft.isbn=978-0-511-80460-1&amp;rft.aulast=Sutton&amp;rft.aufirst=Adam&amp;rft.au=Cherney%2C+Adrian&amp;rft.au=White%2C+Rob&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1017%2Fcbo9780511804601.006&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-189"><span class="mw-cite-backlink"><b><a href="#cite_ref-189">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCheck2004" class="citation journal cs1">Check, Erika (September 15, 2004). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1038/news040913-15">"FDA considers antidepressant risks for kids"</a>. <i>Nature</i>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1038%2Fnews040913-15">10.1038/news040913-15</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0028-0836">0028-0836</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Nature&amp;rft.atitle=FDA+considers+antidepressant+risks+for+kids&amp;rft.date=2004-09-15&amp;rft_id=info%3Adoi%2F10.1038%2Fnews040913-15&amp;rft.issn=0028-0836&amp;rft.aulast=Check&amp;rft.aufirst=Erika&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1038%2Fnews040913-15&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-190"><span class="mw-cite-backlink"><b><a href="#cite_ref-190">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAuckland2017" class="citation journal cs1">Auckland, Cressida (August 16, 2017). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1093/medlaw/fwx037">"Protecting me from my Directive: Ensuring Appropriate Safeguards for Advance Directives in Dementia"</a>. <i>Medical Law Review</i>. <b>26</b> (1): 73–97. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1093%2Fmedlaw%2Ffwx037">10.1093/medlaw/fwx037</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0967-0742">0967-0742</a>. <a href="/wiki/PMID_(identifier)" class="mw-redirect" title="PMID (identifier)">PMID</a>&#160;<a rel="nofollow" class="external text" href="https://pubmed.ncbi.nlm.nih.gov/28981694">28981694</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Medical+Law+Review&amp;rft.atitle=Protecting+me+from+my+Directive%3A+Ensuring+Appropriate+Safeguards+for+Advance+Directives+in+Dementia&amp;rft.volume=26&amp;rft.issue=1&amp;rft.pages=73-97&amp;rft.date=2017-08-16&amp;rft.issn=0967-0742&amp;rft_id=info%3Apmid%2F28981694&amp;rft_id=info%3Adoi%2F10.1093%2Fmedlaw%2Ffwx037&amp;rft.aulast=Auckland&amp;rft.aufirst=Cressida&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1093%2Fmedlaw%2Ffwx037&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-191"><span class="mw-cite-backlink"><b><a href="#cite_ref-191">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFTakach2016" class="citation cs2">Takach, George S. (2016), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/b978-0-12-803451-4.00009-5">"Preparing for Breach Litigation"</a>, <i>Data Breach Preparation and Response</i>, Elsevier, pp.&#160;217–230, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fb978-0-12-803451-4.00009-5">10.1016/b978-0-12-803451-4.00009-5</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-12-803451-4" title="Special:BookSources/978-0-12-803451-4"><bdi>978-0-12-803451-4</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Data+Breach+Preparation+and+Response&amp;rft.atitle=Preparing+for+Breach+Litigation&amp;rft.pages=217-230&amp;rft.date=2016&amp;rft_id=info%3Adoi%2F10.1016%2Fb978-0-12-803451-4.00009-5&amp;rft.isbn=978-0-12-803451-4&amp;rft.aulast=Takach&amp;rft.aufirst=George+S.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2Fb978-0-12-803451-4.00009-5&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-192"><span class="mw-cite-backlink"><b><a href="#cite_ref-192">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.iso.org">"ISO 17799|ISO/IEC 17799:2005(E)"</a>. <i>Information technology - Security techniques - Code of practice for information security management</i>. ISO copyright office. June 15, 2005. pp.&#160;90–94.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Information+technology+-+Security+techniques+-+Code+of+practice+for+information+security+management&amp;rft.atitle=ISO+17799%7CISO%2FIEC+17799%3A2005%28E%29&amp;rft.pages=90-94&amp;rft.date=2005-06-15&amp;rft_id=http%3A%2F%2Fwww.iso.org&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-193"><span class="mw-cite-backlink"><b><a href="#cite_ref-193">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFowler2016" class="citation cs2">Fowler, Kevvie (2016), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/b978-0-12-803451-4.00003-4">"Developing a Computer Security Incident Response Plan"</a>, <i>Data Breach Preparation and Response</i>, Elsevier, pp.&#160;49–77, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fb978-0-12-803451-4.00003-4">10.1016/b978-0-12-803451-4.00003-4</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-12-803451-4" title="Special:BookSources/978-0-12-803451-4"><bdi>978-0-12-803451-4</bdi></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Data+Breach+Preparation+and+Response&amp;rft.atitle=Developing+a+Computer+Security+Incident+Response+Plan&amp;rft.pages=49-77&amp;rft.date=2016&amp;rft_id=info%3Adoi%2F10.1016%2Fb978-0-12-803451-4.00003-4&amp;rft.isbn=978-0-12-803451-4&amp;rft.aulast=Fowler&amp;rft.aufirst=Kevvie&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2Fb978-0-12-803451-4.00003-4&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-194"><span class="mw-cite-backlink"><b><a href="#cite_ref-194">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJohnson2014" class="citation cs2">Johnson, Leighton R. (2014), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/b978-1-59749-996-5.00038-8">"Part 1. Incident Response Team"</a>, <i>Computer Incident Response and Forensics Team Management</i>, Elsevier, pp.&#160;17–19, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fb978-1-59749-996-5.00038-8">10.1016/b978-1-59749-996-5.00038-8</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-59749-996-5" title="Special:BookSources/978-1-59749-996-5"><bdi>978-1-59749-996-5</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Computer+Incident+Response+and+Forensics+Team+Management&amp;rft.atitle=Part+1.+Incident+Response+Team&amp;rft.pages=17-19&amp;rft.date=2014&amp;rft_id=info%3Adoi%2F10.1016%2Fb978-1-59749-996-5.00038-8&amp;rft.isbn=978-1-59749-996-5&amp;rft.aulast=Johnson&amp;rft.aufirst=Leighton+R.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2Fb978-1-59749-996-5.00038-8&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-195"><span class="mw-cite-backlink"><b><a href="#cite_ref-195">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKampfner1985" class="citation journal cs1">Kampfner, Roberto R. (1985). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/0306-4573(85)90086-x">"Formal specification of information systems requirements"</a>. <i>Information Processing &amp; Management</i>. <b>21</b> (5): 401–414. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2F0306-4573%2885%2990086-x">10.1016/0306-4573(85)90086-x</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0306-4573">0306-4573</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Information+Processing+%26+Management&amp;rft.atitle=Formal+specification+of+information+systems+requirements&amp;rft.volume=21&amp;rft.issue=5&amp;rft.pages=401-414&amp;rft.date=1985&amp;rft_id=info%3Adoi%2F10.1016%2F0306-4573%2885%2990086-x&amp;rft.issn=0306-4573&amp;rft.aulast=Kampfner&amp;rft.aufirst=Roberto+R.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2F0306-4573%2885%2990086-x&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-196"><span class="mw-cite-backlink"><b><a href="#cite_ref-196">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJenner1995" class="citation book cs1">Jenner, H.A. (1995). <i>Assessment of ecotoxicological risks of element leaching from pulverized coal ashes</i>. s.n.] <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/905474381">905474381</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Assessment+of+ecotoxicological+risks+of+element+leaching+from+pulverized+coal+ashes&amp;rft.pub=s.n.%5D&amp;rft.date=1995&amp;rft_id=info%3Aoclcnum%2F905474381&amp;rft.aulast=Jenner&amp;rft.aufirst=H.A.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-197"><span class="mw-cite-backlink"><b><a href="#cite_ref-197">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation book cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1007/0-387-28058-8_3">"Desktop Computers: Software"</a>. <i>Practical Pathology Informatics</i>. New York: Springer-Verlag. 2006. pp.&#160;51–82. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F0-387-28058-8_3">10.1007/0-387-28058-8_3</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0-387-28057-X" title="Special:BookSources/0-387-28057-X"><bdi>0-387-28057-X</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">June 5,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Desktop+Computers%3A+Software&amp;rft.btitle=Practical+Pathology+Informatics&amp;rft.place=New+York&amp;rft.pages=51-82&amp;rft.pub=Springer-Verlag&amp;rft.date=2006&amp;rft_id=info%3Adoi%2F10.1007%2F0-387-28058-8_3&amp;rft.isbn=0-387-28057-X&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1007%2F0-387-28058-8_3&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-198"><span class="mw-cite-backlink"><b><a href="#cite_ref-198">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWilbyOrrHedgerForrow2006" class="citation journal cs1">Wilby, R.L.; Orr, H.G.; Hedger, M.; Forrow, D.; Blackmore, M. (December 2006). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/j.envint.2006.06.017">"Risks posed by climate change to the delivery of Water Framework Directive objectives in the UK"</a>. <i>Environment International</i>. <b>32</b> (8): 1043–1055. <a href="/wiki/Bibcode_(identifier)" class="mw-redirect" title="Bibcode (identifier)">Bibcode</a>:<a rel="nofollow" class="external text" href="https://ui.adsabs.harvard.edu/abs/2006EnInt..32.1043W">2006EnInt..32.1043W</a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.envint.2006.06.017">10.1016/j.envint.2006.06.017</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0160-4120">0160-4120</a>. <a href="/wiki/PMID_(identifier)" class="mw-redirect" title="PMID (identifier)">PMID</a>&#160;<a rel="nofollow" class="external text" href="https://pubmed.ncbi.nlm.nih.gov/16857260">16857260</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Environment+International&amp;rft.atitle=Risks+posed+by+climate+change+to+the+delivery+of+Water+Framework+Directive+objectives+in+the+UK&amp;rft.volume=32&amp;rft.issue=8&amp;rft.pages=1043-1055&amp;rft.date=2006-12&amp;rft_id=info%3Adoi%2F10.1016%2Fj.envint.2006.06.017&amp;rft.issn=0160-4120&amp;rft_id=info%3Apmid%2F16857260&amp;rft_id=info%3Abibcode%2F2006EnInt..32.1043W&amp;rft.aulast=Wilby&amp;rft.aufirst=R.L.&amp;rft.au=Orr%2C+H.G.&amp;rft.au=Hedger%2C+M.&amp;rft.au=Forrow%2C+D.&amp;rft.au=Blackmore%2C+M.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2Fj.envint.2006.06.017&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-CampbellPractical16-199"><span class="mw-cite-backlink"><b><a href="#cite_ref-CampbellPractical16_199-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCampbell,_T.2016" class="citation book cs1">Campbell, T. (2016). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=sbWiDQAAQBAJ&amp;pg=PA218">"Chapter 14: Secure Systems Development"</a>. <i>Practical Information Security Management: A Complete Guide to Planning and Implementation</i>. Apress. p.&#160;218. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9781484216859" title="Special:BookSources/9781484216859"><bdi>9781484216859</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Chapter+14%3A+Secure+Systems+Development&amp;rft.btitle=Practical+Information+Security+Management%3A+A+Complete+Guide+to+Planning+and+Implementation&amp;rft.pages=218&amp;rft.pub=Apress&amp;rft.date=2016&amp;rft.isbn=9781484216859&amp;rft.au=Campbell%2C+T.&amp;rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DsbWiDQAAQBAJ%26pg%3DPA218&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-200"><span class="mw-cite-backlink"><b><a href="#cite_ref-200">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKoppelman2011" class="citation book cs1">Koppelman, Kent L. (2011). <i>Understanding human differences&#160;: multicultural education for a diverse America</i>. Pearson/Allyn &amp; Bacon. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/1245910610">1245910610</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Understanding+human+differences+%3A+multicultural+education+for+a+diverse+America&amp;rft.pub=Pearson%2FAllyn+%26+Bacon&amp;rft.date=2011&amp;rft_id=info%3Aoclcnum%2F1245910610&amp;rft.aulast=Koppelman&amp;rft.aufirst=Kent+L.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-201"><span class="mw-cite-backlink"><b><a href="#cite_ref-201">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation book cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.4324/9780240821351-9">"Post-processing"</a>. <i>Simple Scene, Sensational Shot</i>. Routledge. April 12, 2013. pp.&#160;128–147. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.4324%2F9780240821351-9">10.4324/9780240821351-9</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-240-82135-1" title="Special:BookSources/978-0-240-82135-1"><bdi>978-0-240-82135-1</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">June 5,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Post-processing&amp;rft.btitle=Simple+Scene%2C+Sensational+Shot&amp;rft.pages=128-147&amp;rft.pub=Routledge&amp;rft.date=2013-04-12&amp;rft_id=info%3Adoi%2F10.4324%2F9780240821351-9&amp;rft.isbn=978-0-240-82135-1&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.4324%2F9780240821351-9&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-202"><span class="mw-cite-backlink"><b><a href="#cite_ref-202">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKumarMahtoKumariRavi2016" class="citation journal cs1">Kumar, Binay; Mahto, Tulsi; Kumari, Vinita; Ravi, Binod Kumar; Deepmala (2016). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.5958/0974-1283.2016.00063.3">"Quackery: How It Can Prove Fatal Even in Apparently Simple Cases-A Case Report"</a>. <i>Medico-Legal Update</i>. <b>16</b> (2): 75. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.5958%2F0974-1283.2016.00063.3">10.5958/0974-1283.2016.00063.3</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0971-720X">0971-720X</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Medico-Legal+Update&amp;rft.atitle=Quackery%3A+How+It+Can+Prove+Fatal+Even+in+Apparently+Simple+Cases-A+Case+Report&amp;rft.volume=16&amp;rft.issue=2&amp;rft.pages=75&amp;rft.date=2016&amp;rft_id=info%3Adoi%2F10.5958%2F0974-1283.2016.00063.3&amp;rft.issn=0971-720X&amp;rft.aulast=Kumar&amp;rft.aufirst=Binay&amp;rft.au=Mahto%2C+Tulsi&amp;rft.au=Kumari%2C+Vinita&amp;rft.au=Ravi%2C+Binod+Kumar&amp;rft.au=Deepmala&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.5958%2F0974-1283.2016.00063.3&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-203"><span class="mw-cite-backlink"><b><a href="#cite_ref-203">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPriest2019" class="citation journal cs1">Priest, Sally (February 22, 2019). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1111/jfr3.12528">"Shared roles and responsibilities in flood risk management"</a>. <i>Journal of Flood Risk Management</i>. <b>12</b> (1): e12528. <a href="/wiki/Bibcode_(identifier)" class="mw-redirect" title="Bibcode (identifier)">Bibcode</a>:<a rel="nofollow" class="external text" href="https://ui.adsabs.harvard.edu/abs/2019JFRM...12E2528P">2019JFRM...12E2528P</a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1111%2Fjfr3.12528">10.1111/jfr3.12528</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1753-318X">1753-318X</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:133789858">133789858</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Journal+of+Flood+Risk+Management&amp;rft.atitle=Shared+roles+and+responsibilities+in+flood+risk+management&amp;rft.volume=12&amp;rft.issue=1&amp;rft.pages=e12528&amp;rft.date=2019-02-22&amp;rft_id=info%3Adoi%2F10.1111%2Fjfr3.12528&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A133789858%23id-name%3DS2CID&amp;rft.issn=1753-318X&amp;rft_id=info%3Abibcode%2F2019JFRM...12E2528P&amp;rft.aulast=Priest&amp;rft.aufirst=Sally&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1111%2Fjfr3.12528&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-204"><span class="mw-cite-backlink"><b><a href="#cite_ref-204">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFUnited_States._Department_of_Energy._Office_of_Inspector_General._Office_of_Scientific_and_Technical_Information2009" class="citation book cs1">United States. Department of Energy. Office of Inspector General. Office of Scientific and Technical Information (2009). <i>Audit Report, "Fire Protection Deficiencies at Los Alamos National Laboratory."</i>. United States. Dept. of Energy. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/727225166">727225166</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Audit+Report%2C+%22Fire+Protection+Deficiencies+at+Los+Alamos+National+Laboratory.%22&amp;rft.pub=United+States.+Dept.+of+Energy&amp;rft.date=2009&amp;rft_id=info%3Aoclcnum%2F727225166&amp;rft.au=United+States.+Department+of+Energy.+Office+of+Inspector+General.+Office+of+Scientific+and+Technical+Information&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-205"><span class="mw-cite-backlink"><b><a href="#cite_ref-205">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFToms1992" class="citation journal cs1">Toms, Elaine G. (January 1992). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/0306-4573(92)90052-2">"Managing change in libraries and information services; A systems approach"</a>. <i>Information Processing &amp; Management</i>. <b>28</b> (2): 281–282. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2F0306-4573%2892%2990052-2">10.1016/0306-4573(92)90052-2</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0306-4573">0306-4573</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Information+Processing+%26+Management&amp;rft.atitle=Managing+change+in+libraries+and+information+services%3B+A+systems+approach&amp;rft.volume=28&amp;rft.issue=2&amp;rft.pages=281-282&amp;rft.date=1992-01&amp;rft_id=info%3Adoi%2F10.1016%2F0306-4573%2892%2990052-2&amp;rft.issn=0306-4573&amp;rft.aulast=Toms&amp;rft.aufirst=Elaine+G.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2F0306-4573%2892%2990052-2&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-206"><span class="mw-cite-backlink"><b><a href="#cite_ref-206">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAbolhassan2003" class="citation book cs1">Abolhassan, Ferri (2003). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1007/978-3-540-24703-6_2">"The Change Management Process Implemented at IDS Scheer"</a>. <i>Business Process Change Management</i>. Berlin, Heidelberg: Springer Berlin Heidelberg. pp.&#160;15–22. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-3-540-24703-6_2">10.1007/978-3-540-24703-6_2</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-3-642-05532-4" title="Special:BookSources/978-3-642-05532-4"><bdi>978-3-642-05532-4</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">June 5,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=The+Change+Management+Process+Implemented+at+IDS+Scheer&amp;rft.btitle=Business+Process+Change+Management&amp;rft.place=Berlin%2C+Heidelberg&amp;rft.pages=15-22&amp;rft.pub=Springer+Berlin+Heidelberg&amp;rft.date=2003&amp;rft_id=info%3Adoi%2F10.1007%2F978-3-540-24703-6_2&amp;rft.isbn=978-3-642-05532-4&amp;rft.aulast=Abolhassan&amp;rft.aufirst=Ferri&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1007%2F978-3-540-24703-6_2&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-207"><span class="mw-cite-backlink"><b><a href="#cite_ref-207">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDawson2020" class="citation book cs1">Dawson, Chris (July 1, 2020). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1515/9780804774673"><i>Leading Culture Change</i></a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1515%2F9780804774673">10.1515/9780804774673</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9780804774673" title="Special:BookSources/9780804774673"><bdi>9780804774673</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:242348822">242348822</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Leading+Culture+Change&amp;rft.date=2020-07-01&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A242348822%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1515%2F9780804774673&amp;rft.isbn=9780804774673&amp;rft.aulast=Dawson&amp;rft.aufirst=Chris&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1515%2F9780804774673&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-208"><span class="mw-cite-backlink"><b><a href="#cite_ref-208">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMcCormick,_Douglas_P.2016" class="citation book cs1">McCormick, Douglas P. (March 22, 2016). <i>Family Inc.&#160;: using business principles to maximize your family's wealth</i>. John Wiley &amp; Sons. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-119-21976-7" title="Special:BookSources/978-1-119-21976-7"><bdi>978-1-119-21976-7</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/945632737">945632737</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Family+Inc.+%3A+using+business+principles+to+maximize+your+family%27s+wealth&amp;rft.pub=John+Wiley+%26+Sons&amp;rft.date=2016-03-22&amp;rft_id=info%3Aoclcnum%2F945632737&amp;rft.isbn=978-1-119-21976-7&amp;rft.au=McCormick%2C+Douglas+P.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-209"><span class="mw-cite-backlink"><b><a href="#cite_ref-209">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSchuler1995" class="citation journal cs1">Schuler, Rainer (August 1995). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/0020-0190(95)00108-o">"Some properties of sets tractable under every polynomial-time computable distribution"</a>. <i>Information Processing Letters</i>. <b>55</b> (4): 179–184. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2F0020-0190%2895%2900108-o">10.1016/0020-0190(95)00108-o</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0020-0190">0020-0190</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Information+Processing+Letters&amp;rft.atitle=Some+properties+of+sets+tractable+under+every+polynomial-time+computable+distribution&amp;rft.volume=55&amp;rft.issue=4&amp;rft.pages=179-184&amp;rft.date=1995-08&amp;rft_id=info%3Adoi%2F10.1016%2F0020-0190%2895%2900108-o&amp;rft.issn=0020-0190&amp;rft.aulast=Schuler&amp;rft.aufirst=Rainer&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2F0020-0190%2895%2900108-o&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-210"><span class="mw-cite-backlink"><b><a href="#cite_ref-210">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1787/888933881610">"Figure 12.2. Share of own-account workers who generally do not have more than one client"</a> <span class="cs1-format">(Excel)</span>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1787%2F888933881610">10.1787/888933881610</a><span class="reference-accessdate">. Retrieved <span class="nowrap">June 5,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Figure+12.2.+Share+of+own-account+workers+who+generally+do+not+have+more+than+one+client&amp;rft_id=info%3Adoi%2F10.1787%2F888933881610&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1787%2F888933881610&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-211"><span class="mw-cite-backlink"><b><a href="#cite_ref-211">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/0140-3664(87)90353-7">"Multi-user file server for DOS LANs"</a>. <i>Computer Communications</i>. <b>10</b> (3): 153. June 1987. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2F0140-3664%2887%2990353-7">10.1016/0140-3664(87)90353-7</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0140-3664">0140-3664</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Computer+Communications&amp;rft.atitle=Multi-user+file+server+for+DOS+LANs&amp;rft.volume=10&amp;rft.issue=3&amp;rft.pages=153&amp;rft.date=1987-06&amp;rft_id=info%3Adoi%2F10.1016%2F0140-3664%2887%2990353-7&amp;rft.issn=0140-3664&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2F0140-3664%2887%2990353-7&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-212"><span class="mw-cite-backlink"><b><a href="#cite_ref-212">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1002/9781444340372.ch1">"Defining Organizational Change"</a>, <i>Organizational Change</i>, Oxford, UK: Wiley-Blackwell, pp.&#160;21–51, April 19, 2011, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1002%2F9781444340372.ch1">10.1002/9781444340372.ch1</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4443-4037-2" title="Special:BookSources/978-1-4443-4037-2"><bdi>978-1-4443-4037-2</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Organizational+Change&amp;rft.atitle=Defining+Organizational+Change&amp;rft.pages=21-51&amp;rft.date=2011-04-19&amp;rft_id=info%3Adoi%2F10.1002%2F9781444340372.ch1&amp;rft.isbn=978-1-4443-4037-2&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1002%2F9781444340372.ch1&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-213"><span class="mw-cite-backlink"><b><a href="#cite_ref-213">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKirchmerScheer2003" class="citation cs2">Kirchmer, Mathias; Scheer, August-Wilhelm (2003), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1007/978-3-540-24703-6_1">"Change Management — Key for Business Process Excellence"</a>, <i>Business Process Change Management</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, pp.&#160;1–14, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-3-540-24703-6_1">10.1007/978-3-540-24703-6_1</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-3-642-05532-4" title="Special:BookSources/978-3-642-05532-4"><bdi>978-3-642-05532-4</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Business+Process+Change+Management&amp;rft.atitle=Change+Management+%E2%80%94+Key+for+Business+Process+Excellence&amp;rft.pages=1-14&amp;rft.date=2003&amp;rft_id=info%3Adoi%2F10.1007%2F978-3-540-24703-6_1&amp;rft.isbn=978-3-642-05532-4&amp;rft.aulast=Kirchmer&amp;rft.aufirst=Mathias&amp;rft.au=Scheer%2C+August-Wilhelm&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1007%2F978-3-540-24703-6_1&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-214"><span class="mw-cite-backlink"><b><a href="#cite_ref-214">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMoreStieberLiu2016" class="citation cs2">More, Josh; Stieber, Anthony J.; Liu, Chris (2016), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/b978-0-12-800783-9.00029-x">"Tier 2—Advanced Help Desk—Help Desk Supervisor"</a>, <i>Breaking Into Information Security</i>, Elsevier, pp.&#160;111–113, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fb978-0-12-800783-9.00029-x">10.1016/b978-0-12-800783-9.00029-x</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-12-800783-9" title="Special:BookSources/978-0-12-800783-9"><bdi>978-0-12-800783-9</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Breaking+Into+Information+Security&amp;rft.atitle=Tier+2%E2%80%94Advanced+Help+Desk%E2%80%94Help+Desk+Supervisor&amp;rft.pages=111-113&amp;rft.date=2016&amp;rft_id=info%3Adoi%2F10.1016%2Fb978-0-12-800783-9.00029-x&amp;rft.isbn=978-0-12-800783-9&amp;rft.aulast=More&amp;rft.aufirst=Josh&amp;rft.au=Stieber%2C+Anthony+J.&amp;rft.au=Liu%2C+Chris&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2Fb978-0-12-800783-9.00029-x&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-215"><span class="mw-cite-backlink"><b><a href="#cite_ref-215">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.4324/9780415963572-10">"An Application of Bayesian Networks in Automated Scoring of Computerized Simulation Tasks"</a>, <i>Automated Scoring of Complex Tasks in Computer-Based Testing</i>, Routledge, pp.&#160;212–264, April 4, 2006, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.4324%2F9780415963572-10">10.4324/9780415963572-10</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-415-96357-2" title="Special:BookSources/978-0-415-96357-2"><bdi>978-0-415-96357-2</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Automated+Scoring+of+Complex+Tasks+in+Computer-Based+Testing&amp;rft.atitle=An+Application+of+Bayesian+Networks+in+Automated+Scoring+of+Computerized+Simulation+Tasks&amp;rft.pages=212-264&amp;rft.date=2006-04-04&amp;rft_id=info%3Adoi%2F10.4324%2F9780415963572-10&amp;rft.isbn=978-0-415-96357-2&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.4324%2F9780415963572-10&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-216"><span class="mw-cite-backlink"><b><a href="#cite_ref-216">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKavanagh1994" class="citation journal cs1">Kavanagh, Michael J. (June 1994). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1177/1059601194192001">"Change, Change, Change"</a>. <i>Group &amp; Organization Management</i>. <b>19</b> (2): 139–140. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1177%2F1059601194192001">10.1177/1059601194192001</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1059-6011">1059-6011</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:144169263">144169263</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Group+%26+Organization+Management&amp;rft.atitle=Change%2C+Change%2C+Change&amp;rft.volume=19&amp;rft.issue=2&amp;rft.pages=139-140&amp;rft.date=1994-06&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A144169263%23id-name%3DS2CID&amp;rft.issn=1059-6011&amp;rft_id=info%3Adoi%2F10.1177%2F1059601194192001&amp;rft.aulast=Kavanagh&amp;rft.aufirst=Michael+J.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1177%2F1059601194192001&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-TaylorProject08-217"><span class="mw-cite-backlink"><b><a href="#cite_ref-TaylorProject08_217-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFTaylor,_J.2008" class="citation book cs1">Taylor, J. (2008). "Chapter 10: Understanding the Project Change Process". <i>Project Scheduling and Cost Control: Planning, Monitoring and Controlling the Baseline</i>. J. Ross Publishing. pp.&#160;187–214. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9781932159110" title="Special:BookSources/9781932159110"><bdi>9781932159110</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Chapter+10%3A+Understanding+the+Project+Change+Process&amp;rft.btitle=Project+Scheduling+and+Cost+Control%3A+Planning%2C+Monitoring+and+Controlling+the+Baseline&amp;rft.pages=187-214&amp;rft.pub=J.+Ross+Publishing&amp;rft.date=2008&amp;rft.isbn=9781932159110&amp;rft.au=Taylor%2C+J.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-218"><span class="mw-cite-backlink"><b><a href="#cite_ref-218">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1515/9780824860936-019">"17. Innovation and Change: Can Anyone Do This?"</a>, <i>Backstage in a Bureaucracy</i>, University of Hawaii Press, pp.&#160;87–96, December 31, 2017, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1515%2F9780824860936-019">10.1515/9780824860936-019</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-8248-6093-6" title="Special:BookSources/978-0-8248-6093-6"><bdi>978-0-8248-6093-6</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Backstage+in+a+Bureaucracy&amp;rft.atitle=17.+Innovation+and+Change%3A+Can+Anyone+Do+This%3F&amp;rft.pages=87-96&amp;rft.date=2017-12-31&amp;rft_id=info%3Adoi%2F10.1515%2F9780824860936-019&amp;rft.isbn=978-0-8248-6093-6&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1515%2F9780824860936-019&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-219"><span class="mw-cite-backlink"><b><a href="#cite_ref-219">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBraun2015" class="citation book cs1">Braun, Adam (February 3, 2015). <i>Promise of a pencil&#160;: how an ordinary person can create extraordinary change</i>. Simon and Schuster. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4767-3063-9" title="Special:BookSources/978-1-4767-3063-9"><bdi>978-1-4767-3063-9</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/902912775">902912775</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Promise+of+a+pencil+%3A+how+an+ordinary+person+can+create+extraordinary+change&amp;rft.pub=Simon+and+Schuster&amp;rft.date=2015-02-03&amp;rft_id=info%3Aoclcnum%2F902912775&amp;rft.isbn=978-1-4767-3063-9&amp;rft.aulast=Braun&amp;rft.aufirst=Adam&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-220"><span class="mw-cite-backlink"><b><a href="#cite_ref-220">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.4324/9781315744094-14">"Describing Within-Person Change Over Time"</a>, <i>Longitudinal Analysis</i>, Routledge, pp.&#160;235–306, January 30, 2015, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.4324%2F9781315744094-14">10.4324/9781315744094-14</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-315-74409-4" title="Special:BookSources/978-1-315-74409-4"><bdi>978-1-315-74409-4</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Longitudinal+Analysis&amp;rft.atitle=Describing+Within-Person+Change+Over+Time&amp;rft.pages=235-306&amp;rft.date=2015-01-30&amp;rft_id=info%3Adoi%2F10.4324%2F9781315744094-14&amp;rft.isbn=978-1-315-74409-4&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.4324%2F9781315744094-14&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-221"><span class="mw-cite-backlink"><b><a href="#cite_ref-221">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFIngrahamBan1984" class="citation book cs1">Ingraham, Carolyn; Ban, Patricia W. (1984). <i>Legislating bureaucratic change&#160;: the Civil Service Reform Act of 1978</i>. State University of New York Press. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0-87395-886-1" title="Special:BookSources/0-87395-886-1"><bdi>0-87395-886-1</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/10300171">10300171</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Legislating+bureaucratic+change+%3A+the+Civil+Service+Reform+Act+of+1978&amp;rft.pub=State+University+of+New+York+Press&amp;rft.date=1984&amp;rft_id=info%3Aoclcnum%2F10300171&amp;rft.isbn=0-87395-886-1&amp;rft.aulast=Ingraham&amp;rft.aufirst=Carolyn&amp;rft.au=Ban%2C+Patricia+W.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-222"><span class="mw-cite-backlink"><b><a href="#cite_ref-222">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWei2000" class="citation journal cs1">Wei, J. (May 4, 2000). <a rel="nofollow" class="external text" href="https://www.osti.gov/biblio/1157253/">"Preliminary Change Request for the SNS 1.3 GeV-Compatible Ring"</a>. <i>OSTI.GOV</i>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.2172%2F1157253">10.2172/1157253</a>. <a href="/wiki/OSTI_(identifier)" class="mw-redirect" title="OSTI (identifier)">OSTI</a>&#160;<a rel="nofollow" class="external text" href="https://www.osti.gov/biblio/1157253">1157253</a><span class="reference-accessdate">. Retrieved <span class="nowrap">January 18,</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=OSTI.GOV&amp;rft.atitle=Preliminary+Change+Request+for+the+SNS+1.3+GeV-Compatible+Ring&amp;rft.date=2000-05-04&amp;rft_id=https%3A%2F%2Fwww.osti.gov%2Fbiblio%2F1157253%23id-name%3DOSTI&amp;rft_id=info%3Adoi%2F10.2172%2F1157253&amp;rft.aulast=Wei&amp;rft.aufirst=J.&amp;rft_id=https%3A%2F%2Fwww.osti.gov%2Fbiblio%2F1157253%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-223"><span class="mw-cite-backlink"><b><a href="#cite_ref-223">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChen_Liang2011" class="citation book cs1">Chen Liang (May 2011). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1109/icbmei.2011.5917018">"Allocation priority management of agricultural water resources based on the theory of virtual water"</a>. <i>2011 International Conference on Business Management and Electronic Information</i>. Vol.&#160;1. IEEE. pp.&#160;644–647. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2Ficbmei.2011.5917018">10.1109/icbmei.2011.5917018</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-61284-108-3" title="Special:BookSources/978-1-61284-108-3"><bdi>978-1-61284-108-3</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:29137725">29137725</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Allocation+priority+management+of+agricultural+water+resources+based+on+the+theory+of+virtual+water&amp;rft.btitle=2011+International+Conference+on+Business+Management+and+Electronic+Information&amp;rft.pages=644-647&amp;rft.pub=IEEE&amp;rft.date=2011-05&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A29137725%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1109%2Ficbmei.2011.5917018&amp;rft.isbn=978-1-61284-108-3&amp;rft.au=Chen+Liang&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1109%2Ficbmei.2011.5917018&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-224"><span class="mw-cite-backlink"><b><a href="#cite_ref-224">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2">"Change risks and best practices in Business Change Management Unmanaged change risk leads to problems for change management", <i>Leading and Implementing Business Change Management</i>, Routledge, pp.&#160;32–74, July 18, 2013, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.4324%2F9780203073957-9">10.4324/9780203073957-9</a> (inactive November 1, 2024), <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-203-07395-7" title="Special:BookSources/978-0-203-07395-7"><bdi>978-0-203-07395-7</bdi></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Leading+and+Implementing+Business+Change+Management&amp;rft.atitle=Change+risks+and+best+practices+in+Business+Change+Management+Unmanaged+change+risk+leads+to+problems+for+change+management&amp;rft.pages=32-74&amp;rft.date=2013-07-18&amp;rft_id=info%3Adoi%2F10.4324%2F9780203073957-9&amp;rft.isbn=978-0-203-07395-7&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Citation" title="Template:Citation">citation</a>}}</code>: CS1 maint: DOI inactive as of November 2024 (<a href="/wiki/Category:CS1_maint:_DOI_inactive_as_of_November_2024" title="Category:CS1 maint: DOI inactive as of November 2024">link</a>)</span></span> </li> <li id="cite_note-225"><span class="mw-cite-backlink"><b><a href="#cite_ref-225">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBragg2016" class="citation book cs1">Bragg, Steven M. (2016). <i>Accounting Best Practices</i>. Wiley. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-118-41780-5" title="Special:BookSources/978-1-118-41780-5"><bdi>978-1-118-41780-5</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/946625204">946625204</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Accounting+Best+Practices&amp;rft.pub=Wiley&amp;rft.date=2016&amp;rft_id=info%3Aoclcnum%2F946625204&amp;rft.isbn=978-1-118-41780-5&amp;rft.aulast=Bragg&amp;rft.aufirst=Steven+M.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-226"><span class="mw-cite-backlink"><b><a href="#cite_ref-226">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1108/hrmid.2008.04416gad.005">"Successful change requires more than change management"</a>. <i>Human Resource Management International Digest</i>. <b>16</b> (7). October 17, 2008. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1108%2Fhrmid.2008.04416gad.005">10.1108/hrmid.2008.04416gad.005</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0967-0734">0967-0734</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Human+Resource+Management+International+Digest&amp;rft.atitle=Successful+change+requires+more+than+change+management&amp;rft.volume=16&amp;rft.issue=7&amp;rft.date=2008-10-17&amp;rft_id=info%3Adoi%2F10.1108%2Fhrmid.2008.04416gad.005&amp;rft.issn=0967-0734&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1108%2Fhrmid.2008.04416gad.005&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-227"><span class="mw-cite-backlink"><b><a href="#cite_ref-227">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.4324/9780203846537-20">"Planning for water resources under climate change"</a>, <i>Spatial Planning and Climate Change</i>, Routledge, pp.&#160;287–313, September 13, 2010, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.4324%2F9780203846537-20">10.4324/9780203846537-20</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-203-84653-7" title="Special:BookSources/978-0-203-84653-7"><bdi>978-0-203-84653-7</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Spatial+Planning+and+Climate+Change&amp;rft.atitle=Planning+for+water+resources+under+climate+change&amp;rft.pages=287-313&amp;rft.date=2010-09-13&amp;rft_id=info%3Adoi%2F10.4324%2F9780203846537-20&amp;rft.isbn=978-0-203-84653-7&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.4324%2F9780203846537-20&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-228"><span class="mw-cite-backlink"><b><a href="#cite_ref-228">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRowan1967" class="citation journal cs1">Rowan, John (January 1967). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1108/eb000776">"Answering the computer back"</a>. <i>Management Decision</i>. <b>1</b> (1): 51–54. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1108%2Feb000776">10.1108/eb000776</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0025-1747">0025-1747</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Management+Decision&amp;rft.atitle=Answering+the+computer+back&amp;rft.volume=1&amp;rft.issue=1&amp;rft.pages=51-54&amp;rft.date=1967-01&amp;rft_id=info%3Adoi%2F10.1108%2Feb000776&amp;rft.issn=0025-1747&amp;rft.aulast=Rowan&amp;rft.aufirst=John&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1108%2Feb000776&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-229"><span class="mw-cite-backlink"><b><a href="#cite_ref-229">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBiswasBiswas1981" class="citation journal cs1">Biswas, Margaret R.; Biswas, Asit K. (February 1981). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/0304-1131(81)90050-3">"Climatic change and food production"</a>. <i>Agriculture and Environment</i>. <b>5</b> (4): 332. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2F0304-1131%2881%2990050-3">10.1016/0304-1131(81)90050-3</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0304-1131">0304-1131</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Agriculture+and+Environment&amp;rft.atitle=Climatic+change+and+food+production&amp;rft.volume=5&amp;rft.issue=4&amp;rft.pages=332&amp;rft.date=1981-02&amp;rft_id=info%3Adoi%2F10.1016%2F0304-1131%2881%2990050-3&amp;rft.issn=0304-1131&amp;rft.aulast=Biswas&amp;rft.aufirst=Margaret+R.&amp;rft.au=Biswas%2C+Asit+K.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2F0304-1131%2881%2990050-3&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-230"><span class="mw-cite-backlink"><b><a href="#cite_ref-230">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWeik2000" class="citation cs2">Weik, Martin H. (2000), "backout", <i>Computer Science and Communications Dictionary</i>, p.&#160;96, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F1-4020-0613-6_1259">10.1007/1-4020-0613-6_1259</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-7923-8425-0" title="Special:BookSources/978-0-7923-8425-0"><bdi>978-0-7923-8425-0</bdi></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=backout&amp;rft.btitle=Computer+Science+and+Communications+Dictionary&amp;rft.pages=96&amp;rft.date=2000&amp;rft_id=info%3Adoi%2F10.1007%2F1-4020-0613-6_1259&amp;rft.isbn=978-0-7923-8425-0&amp;rft.aulast=Weik&amp;rft.aufirst=Martin+H.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-231"><span class="mw-cite-backlink"><b><a href="#cite_ref-231">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1108/s2043-9059(2011)0000003005">"Editorial Advisory and Review Board"</a>, <i>Business and Sustainability: Concepts, Strategies and Changes</i>, Critical Studies on Corporate Responsibility, Governance and Sustainability, vol.&#160;3, Emerald Group Publishing Limited, pp.&#160;xv–xvii, December 6, 2011, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1108%2Fs2043-9059%282011%290000003005">10.1108/s2043-9059(2011)0000003005</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-78052-438-2" title="Special:BookSources/978-1-78052-438-2"><bdi>978-1-78052-438-2</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Business+and+Sustainability%3A+Concepts%2C+Strategies+and+Changes&amp;rft.atitle=Editorial+Advisory+and+Review+Board&amp;rft.volume=3&amp;rft.pages=xv-xvii&amp;rft.date=2011-12-06&amp;rft_id=info%3Adoi%2F10.1108%2Fs2043-9059%282011%290000003005&amp;rft.isbn=978-1-78052-438-2&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1108%2Fs2043-9059%282011%290000003005&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-232"><span class="mw-cite-backlink"><b><a href="#cite_ref-232">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.2307/j.ctv6sj8d1.65">"Where a Mirage Has Once Been, Life Must Be"</a>, <i>New and Selected Poems</i>, University of South Carolina Press, p.&#160;103, 2014, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.2307%2Fj.ctv6sj8d1.65">10.2307/j.ctv6sj8d1.65</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-61117-323-9" title="Special:BookSources/978-1-61117-323-9"><bdi>978-1-61117-323-9</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=New+and+Selected+Poems&amp;rft.atitle=Where+a+Mirage+Has+Once+Been%2C+Life+Must+Be&amp;rft.pages=103&amp;rft.date=2014&amp;rft_id=info%3Adoi%2F10.2307%2Fj.ctv6sj8d1.65&amp;rft.isbn=978-1-61117-323-9&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.2307%2Fj.ctv6sj8d1.65&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-233"><span class="mw-cite-backlink"><b><a href="#cite_ref-233">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBell1983" class="citation journal cs1">Bell, Marvin (1983). "Two, When There Might Have Been Three". <i>The Antioch Review</i>. <b>41</b> (2): 209. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.2307%2F4611230">10.2307/4611230</a>. <a href="/wiki/JSTOR_(identifier)" class="mw-redirect" title="JSTOR (identifier)">JSTOR</a>&#160;<a rel="nofollow" class="external text" href="https://www.jstor.org/stable/4611230">4611230</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Antioch+Review&amp;rft.atitle=Two%2C+When+There+Might+Have+Been+Three&amp;rft.volume=41&amp;rft.issue=2&amp;rft.pages=209&amp;rft.date=1983&amp;rft_id=info%3Adoi%2F10.2307%2F4611230&amp;rft_id=https%3A%2F%2Fwww.jstor.org%2Fstable%2F4611230%23id-name%3DJSTOR&amp;rft.aulast=Bell&amp;rft.aufirst=Marvin&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-234"><span class="mw-cite-backlink"><b><a href="#cite_ref-234">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1163/2210-7975_hrd-0148-2015175">"We can also make change"</a>. <i>Human Rights Documents Online</i>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1163%2F2210-7975_hrd-0148-2015175">10.1163/2210-7975_hrd-0148-2015175</a><span class="reference-accessdate">. Retrieved <span class="nowrap">June 5,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Human+Rights+Documents+Online&amp;rft.atitle=We+can+also+make+change&amp;rft_id=info%3Adoi%2F10.1163%2F2210-7975_hrd-0148-2015175&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1163%2F2210-7975_hrd-0148-2015175&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-235"><span class="mw-cite-backlink"><b><a href="#cite_ref-235">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMazikana2020" class="citation ssrn cs1">Mazikana, Anthony Tapiwa (November 5, 2020). "<span class="cs1-kern-left"></span>'Change Is the Law of Life. and Those Who Look only to the past or Present Are Certain to Miss the Future- John F. Kennedy' Assessing This Statement with References to Organizations in Zimbabwe Who Have Been Affected by Change". <a href="/wiki/SSRN_(identifier)" class="mw-redirect" title="SSRN (identifier)">SSRN</a>&#160;<a rel="nofollow" class="external text" href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3725707">3725707</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=preprint&amp;rft.jtitle=Social+Science+Research+Network&amp;rft.atitle=%27Change+Is+the+Law+of+Life.+and+Those+Who+Look+only+to+the+past+or+Present+Are+Certain+to+Miss+the+Future-+John+F.+Kennedy%27+Assessing+This+Statement+with+References+to+Organizations+in+Zimbabwe+Who+Have+Been+Affected+by+Change.&amp;rft.date=2020-11-05&amp;rft_id=https%3A%2F%2Fpapers.ssrn.com%2Fsol3%2Fpapers.cfm%3Fabstract_id%3D3725707%23id-name%3DSSRN&amp;rft.aulast=Mazikana&amp;rft.aufirst=Anthony+Tapiwa&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-236"><span class="mw-cite-backlink"><b><a href="#cite_ref-236">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRamanadham" class="citation book cs1">Ramanadham, V. V. (ed.). <i>Privatisation in the UK</i>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-429-19973-8" title="Special:BookSources/978-0-429-19973-8"><bdi>978-0-429-19973-8</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/1085890184">1085890184</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Privatisation+in+the+UK&amp;rft_id=info%3Aoclcnum%2F1085890184&amp;rft.isbn=978-0-429-19973-8&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-237"><span class="mw-cite-backlink"><b><a href="#cite_ref-237">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1"><a rel="nofollow" class="external text" href="https://doi.org/10.5194%2Fgmd-2020-107-rc2">"More complex/realistic rheology must be implemented; Numerical convergence tests must be performed"</a>. <i>Geoloscientific Model Development Discussions</i>. September 22, 2020. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.5194%2Fgmd-2020-107-rc2">10.5194/gmd-2020-107-rc2</a></span>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:241597573">241597573</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Geoloscientific+Model+Development+Discussions&amp;rft.atitle=More+complex%2Frealistic+rheology+must+be+implemented%3B+Numerical+convergence+tests+must+be+performed&amp;rft.date=2020-09-22&amp;rft_id=info%3Adoi%2F10.5194%2Fgmd-2020-107-rc2&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A241597573%23id-name%3DS2CID&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.5194%252Fgmd-2020-107-rc2&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-238"><span class="mw-cite-backlink"><b><a href="#cite_ref-238">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFStone,_Edward" class="citation book cs1">Stone, Edward. <i>Edward C. Stone Collection</i>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/733102101">733102101</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Edward+C.+Stone+Collection&amp;rft_id=info%3Aoclcnum%2F733102101&amp;rft.au=Stone%2C+Edward&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-239"><span class="mw-cite-backlink"><b><a href="#cite_ref-239">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLientz2002" class="citation book cs1">Lientz, B (2002). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/b978-0-12-449984-3.50011-8">"Develop Your Improvement Implementation Plan"</a>. <i>Achieve Lasting Process Improvement</i>. Elsevier. pp.&#160;151–171. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fb978-0-12-449984-3.50011-8">10.1016/b978-0-12-449984-3.50011-8</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-12-449984-3" title="Special:BookSources/978-0-12-449984-3"><bdi>978-0-12-449984-3</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">June 5,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Develop+Your+Improvement+Implementation+Plan&amp;rft.btitle=Achieve+Lasting+Process+Improvement&amp;rft.pages=151-171&amp;rft.pub=Elsevier&amp;rft.date=2002&amp;rft_id=info%3Adoi%2F10.1016%2Fb978-0-12-449984-3.50011-8&amp;rft.isbn=978-0-12-449984-3&amp;rft.aulast=Lientz&amp;rft.aufirst=B&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2Fb978-0-12-449984-3.50011-8&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-240"><span class="mw-cite-backlink"><b><a href="#cite_ref-240">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSmeets2009" class="citation book cs1">Smeets, Peter (2009). <i>Expeditie agroparken&#160;: ontwerpend onderzoek naar metropolitane landbouw en duurzame ontwikkeling</i>. s.n.] <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-90-8585-515-6" title="Special:BookSources/978-90-8585-515-6"><bdi>978-90-8585-515-6</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/441821141">441821141</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Expeditie+agroparken+%3A+ontwerpend+onderzoek+naar+metropolitane+landbouw+en+duurzame+ontwikkeling&amp;rft.pub=s.n.%5D&amp;rft.date=2009&amp;rft_id=info%3Aoclcnum%2F441821141&amp;rft.isbn=978-90-8585-515-6&amp;rft.aulast=Smeets&amp;rft.aufirst=Peter&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-241"><span class="mw-cite-backlink"><b><a href="#cite_ref-241">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1787/888933323735">"Figure 1.3. About 50 percent of the Going for Growth recommendations have been implemented or are in process of implementation"</a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1787%2F888933323735">10.1787/888933323735</a><span class="reference-accessdate">. Retrieved <span class="nowrap">June 5,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Figure+1.3.+About+50+percent+of+the+Going+for+Growth+recommendations+have+been+implemented+or+are+in+process+of+implementation&amp;rft_id=info%3Adoi%2F10.1787%2F888933323735&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1787%2F888933323735&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-242"><span class="mw-cite-backlink"><b><a href="#cite_ref-242">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKekes2019" class="citation cs2">Kekes, John (February 21, 2019), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1093/oso/9780190919986.003.0005">"Must Justice Be Done at All Costs?"</a>, <i>Hard Questions</i>, Oxford University Press, pp.&#160;98–126, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1093%2Foso%2F9780190919986.003.0005">10.1093/oso/9780190919986.003.0005</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-19-091998-6" title="Special:BookSources/978-0-19-091998-6"><bdi>978-0-19-091998-6</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Hard+Questions&amp;rft.atitle=Must+Justice+Be+Done+at+All+Costs%3F&amp;rft.pages=98-126&amp;rft.date=2019-02-21&amp;rft_id=info%3Adoi%2F10.1093%2Foso%2F9780190919986.003.0005&amp;rft.isbn=978-0-19-091998-6&amp;rft.aulast=Kekes&amp;rft.aufirst=John&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1093%2Foso%2F9780190919986.003.0005&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-243"><span class="mw-cite-backlink"><b><a href="#cite_ref-243">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFForrester2014" class="citation book cs1">Forrester, Kellie (2014). <i>Macroeconomic implications of changes in the composition of the labor force</i>. University of California, Santa Barbara. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-321-34938-2" title="Special:BookSources/978-1-321-34938-2"><bdi>978-1-321-34938-2</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/974418780">974418780</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Macroeconomic+implications+of+changes+in+the+composition+of+the+labor+force&amp;rft.pub=University+of+California%2C+Santa+Barbara&amp;rft.date=2014&amp;rft_id=info%3Aoclcnum%2F974418780&amp;rft.isbn=978-1-321-34938-2&amp;rft.aulast=Forrester&amp;rft.aufirst=Kellie&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-244"><span class="mw-cite-backlink"><b><a href="#cite_ref-244">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChoudhuryRappaport1981" class="citation journal cs1">Choudhury, Gagan L.; Rappaport, Stephen S. (October 1981). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1145/1013879.802667">"Demand assigned multiple access systems using collision type request channels"</a>. <i>ACM SIGCOMM Computer Communication Review</i>. <b>11</b> (4): 136–148. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F1013879.802667">10.1145/1013879.802667</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0146-4833">0146-4833</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=ACM+SIGCOMM+Computer+Communication+Review&amp;rft.atitle=Demand+assigned+multiple+access+systems+using+collision+type+request+channels&amp;rft.volume=11&amp;rft.issue=4&amp;rft.pages=136-148&amp;rft.date=1981-10&amp;rft_id=info%3Adoi%2F10.1145%2F1013879.802667&amp;rft.issn=0146-4833&amp;rft.aulast=Choudhury&amp;rft.aufirst=Gagan+L.&amp;rft.au=Rappaport%2C+Stephen+S.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1145%2F1013879.802667&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-245"><span class="mw-cite-backlink"><b><a href="#cite_ref-245">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCrinson2013" class="citation journal cs1">Crinson, Mark (2013). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1353/cot.2013.0000">"<span class="cs1-kern-left"></span>"Certain Old and Lovely Things, Whose Signified Is Abstract, Out of Date": James Stirling and Nostalgia"</a>. <i>Change over Time</i>. <b>3</b> (1): 116–135. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1353%2Fcot.2013.0000">10.1353/cot.2013.0000</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/2153-0548">2153-0548</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:144451363">144451363</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Change+over+Time&amp;rft.atitle=%22Certain+Old+and+Lovely+Things%2C+Whose+Signified+Is+Abstract%2C+Out+of+Date%22%3A+James+Stirling+and+Nostalgia&amp;rft.volume=3&amp;rft.issue=1&amp;rft.pages=116-135&amp;rft.date=2013&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A144451363%23id-name%3DS2CID&amp;rft.issn=2153-0548&amp;rft_id=info%3Adoi%2F10.1353%2Fcot.2013.0000&amp;rft.aulast=Crinson&amp;rft.aufirst=Mark&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1353%2Fcot.2013.0000&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-246"><span class="mw-cite-backlink"><b><a href="#cite_ref-246">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAhwidyPemberton2016" class="citation book cs1">Ahwidy, Mansour; Pemberton, Lyn (2016). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.5220/0005620400710079">"What Changes Need to be Made within the LNHS for Ehealth Systems to be Successfully Implemented?"</a>. <i>Proceedings of the International Conference on Information and Communication Technologies for Ageing Well and e-Health</i>. Scitepress. pp.&#160;71–79. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.5220%2F0005620400710079">10.5220/0005620400710079</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-989-758-180-9" title="Special:BookSources/978-989-758-180-9"><bdi>978-989-758-180-9</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=What+Changes+Need+to+be+Made+within+the+LNHS+for+Ehealth+Systems+to+be+Successfully+Implemented%3F&amp;rft.btitle=Proceedings+of+the+International+Conference+on+Information+and+Communication+Technologies+for+Ageing+Well+and+e-Health&amp;rft.pages=71-79&amp;rft.pub=Scitepress&amp;rft.date=2016&amp;rft_id=info%3Adoi%2F10.5220%2F0005620400710079&amp;rft.isbn=978-989-758-180-9&amp;rft.aulast=Ahwidy&amp;rft.aufirst=Mansour&amp;rft.au=Pemberton%2C+Lyn&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.5220%2F0005620400710079&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-247"><span class="mw-cite-backlink"><b><a href="#cite_ref-247">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMortimer2010" class="citation book cs1">Mortimer, John (April 2010). <i>Paradise postponed</i>. Penguin Adult. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-14-104952-6" title="Special:BookSources/978-0-14-104952-6"><bdi>978-0-14-104952-6</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/495596392">495596392</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Paradise+postponed&amp;rft.pub=Penguin+Adult&amp;rft.date=2010-04&amp;rft_id=info%3Aoclcnum%2F495596392&amp;rft.isbn=978-0-14-104952-6&amp;rft.aulast=Mortimer&amp;rft.aufirst=John&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-Soriani-248"><span class="mw-cite-backlink">^ <a href="#cite_ref-Soriani_248-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Soriani_248-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCobeyLarremoreGradLipsitch2021" class="citation journal cs1">Cobey, Sarah; Larremore, Daniel B.; Grad, Yonatan H.; Lipsitch, Marc (2021). <a rel="nofollow" class="external text" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8014893">"Concerns about SARS-CoV-2 evolution should not hold back efforts to expand vaccination"</a>. <i>Nature Reviews Immunology</i>. <b>21</b> (5): 330–335. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1038%2Fs41577-021-00544-9">10.1038/s41577-021-00544-9</a>. <a href="/wiki/PMC_(identifier)" class="mw-redirect" title="PMC (identifier)">PMC</a>&#160;<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8014893">8014893</a></span>. <a href="/wiki/PMID_(identifier)" class="mw-redirect" title="PMID (identifier)">PMID</a>&#160;<a rel="nofollow" class="external text" href="https://pubmed.ncbi.nlm.nih.gov/33795856">33795856</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Nature+Reviews+Immunology&amp;rft.atitle=Concerns+about+SARS-CoV-2+evolution+should+not+hold+back+efforts+to+expand+vaccination&amp;rft.volume=21&amp;rft.issue=5&amp;rft.pages=330-335&amp;rft.date=2021&amp;rft_id=https%3A%2F%2Fwww.ncbi.nlm.nih.gov%2Fpmc%2Farticles%2FPMC8014893%23id-name%3DPMC&amp;rft_id=info%3Apmid%2F33795856&amp;rft_id=info%3Adoi%2F10.1038%2Fs41577-021-00544-9&amp;rft.aulast=Cobey&amp;rft.aufirst=Sarah&amp;rft.au=Larremore%2C+Daniel+B.&amp;rft.au=Grad%2C+Yonatan+H.&amp;rft.au=Lipsitch%2C+Marc&amp;rft_id=https%3A%2F%2Fwww.ncbi.nlm.nih.gov%2Fpmc%2Farticles%2FPMC8014893&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-249"><span class="mw-cite-backlink"><b><a href="#cite_ref-249">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFrampton2014" class="citation cs2">Frampton, Michael (December 26, 2014), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1007/978-1-4842-0094-0_4">"Processing Data with Map Reduce"</a>, <i>Big Data Made Easy</i>, Berkeley, CA: Apress, pp.&#160;85–120, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-1-4842-0094-0_4">10.1007/978-1-4842-0094-0_4</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4842-0095-7" title="Special:BookSources/978-1-4842-0095-7"><bdi>978-1-4842-0095-7</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Big+Data+Made+Easy&amp;rft.atitle=Processing+Data+with+Map+Reduce&amp;rft.pages=85-120&amp;rft.date=2014-12-26&amp;rft_id=info%3Adoi%2F10.1007%2F978-1-4842-0094-0_4&amp;rft.isbn=978-1-4842-0095-7&amp;rft.aulast=Frampton&amp;rft.aufirst=Michael&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1007%2F978-1-4842-0094-0_4&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-250"><span class="mw-cite-backlink"><b><a href="#cite_ref-250">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1"><a rel="nofollow" class="external text" href="https://hess.copernicus.org/preprints/hess-2015-520/hess-2015-520-RC2.pdf">"Good study overall, but several procedures need fixing"</a> <span class="cs1-format">(PDF)</span>. <i>Hydrology and Earth System Sciences Discussions</i>. February 23, 2016. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.5194%2Fhess-2015-520-rc2">10.5194/hess-2015-520-rc2</a></span><span class="reference-accessdate">. Retrieved <span class="nowrap">January 18,</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Hydrology+and+Earth+System+Sciences+Discussions&amp;rft.atitle=Good+study+overall%2C+but+several+procedures+need+fixing&amp;rft.date=2016-02-23&amp;rft_id=info%3Adoi%2F10.5194%2Fhess-2015-520-rc2&amp;rft_id=https%3A%2F%2Fhess.copernicus.org%2Fpreprints%2Fhess-2015-520%2Fhess-2015-520-RC2.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-251"><span class="mw-cite-backlink"><b><a href="#cite_ref-251">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHarrisonCraftHillerMcCluskey1996" class="citation web cs1">Harrison, Kent; Craft, Walter M.; Hiller, Jack; McCluskey, Michael R.; BDM Federal Inc Seaside CA (July 1996). <a rel="nofollow" class="external text" href="https://apps.dtic.mil/sti/citations/ADA313949">"Peer Review Coordinating Draft. Task Analysis for Conduct Intelligence Planning (Critical Combat Function 1): As Accomplished by a Battalion Task Force"</a>. <a href="/wiki/DTIC_(identifier)" class="mw-redirect" title="DTIC (identifier)">DTIC</a> <a rel="nofollow" class="external text" href="https://apps.dtic.mil/sti/citations/ADA313949">ADA313949</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Peer+Review+Coordinating+Draft.+Task+Analysis+for+Conduct+Intelligence+Planning+%28Critical+Combat+Function+1%29%3A+As+Accomplished+by+a+Battalion+Task+Force&amp;rft.date=1996-07&amp;rft.aulast=Harrison&amp;rft.aufirst=Kent&amp;rft.au=Craft%2C+Walter+M.&amp;rft.au=Hiller%2C+Jack&amp;rft.au=McCluskey%2C+Michael+R.&amp;rft.au=BDM+Federal+Inc+Seaside+CA&amp;rft_id=https%3A%2F%2Fapps.dtic.mil%2Fsti%2Fcitations%2FADA313949&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-252"><span class="mw-cite-backlink"><b><a href="#cite_ref-252">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.itpi.org/home/visibleops2.php">itpi.org</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20131210081531/http://www.itpi.org/home/visibleops2.php">Archived</a> December 10, 2013, at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></span> </li> <li id="cite_note-253"><span class="mw-cite-backlink"><b><a href="#cite_ref-253">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.wikisummaries.org/wiki/Visible_Ops">"book summary of The Visible Ops Handbook: Implementing ITIL in 4 Practical and Auditable Steps"</a>. wikisummaries.org<span class="reference-accessdate">. Retrieved <span class="nowrap">June 22,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=book+summary+of+The+Visible+Ops+Handbook%3A+Implementing+ITIL+in+4+Practical+and+Auditable+Steps&amp;rft.pub=wikisummaries.org&amp;rft_id=http%3A%2F%2Fwww.wikisummaries.org%2Fwiki%2FVisible_Ops&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-254"><span class="mw-cite-backlink"><b><a href="#cite_ref-254">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBigelow2020" class="citation cs2">Bigelow, Michelle (September 23, 2020), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.4324/9781003126294-17">"Change Control and Change Management"</a>, <i>Implementing Information Security in Healthcare</i>, HIMSS Publishing, pp.&#160;203–214, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.4324%2F9781003126294-17">10.4324/9781003126294-17</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-003-12629-4" title="Special:BookSources/978-1-003-12629-4"><bdi>978-1-003-12629-4</bdi></a>, <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:224866307">224866307</a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Implementing+Information+Security+in+Healthcare&amp;rft.atitle=Change+Control+and+Change+Management&amp;rft.pages=203-214&amp;rft.date=2020-09-23&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A224866307%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.4324%2F9781003126294-17&amp;rft.isbn=978-1-003-12629-4&amp;rft.aulast=Bigelow&amp;rft.aufirst=Michelle&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.4324%2F9781003126294-17&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-255"><span class="mw-cite-backlink"><b><a href="#cite_ref-255">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.3403/30194308"><i>Business continuity management. Guidance on organization recovery following disruptive incidents</i></a>, BSI British Standards, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.3403%2F30194308">10.3403/30194308</a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Business+continuity+management.+Guidance+on+organization+recovery+following+disruptive+incidents&amp;rft.pub=BSI+British+Standards&amp;rft_id=info%3Adoi%2F10.3403%2F30194308&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.3403%2F30194308&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-256"><span class="mw-cite-backlink"><b><a href="#cite_ref-256">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHoanh1996" class="citation book cs1">Hoanh, Chu Thai (1996). <i>Development of a computerized aid to integrated land use planning (cailup) at regional level in irrigated areas&#160;: a case study for the Quan Lo Phung Hiep region in the Mekong Delta, Vietnam</i>. ITC. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/90-6164-120-9" title="Special:BookSources/90-6164-120-9"><bdi>90-6164-120-9</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/906763535">906763535</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Development+of+a+computerized+aid+to+integrated+land+use+planning+%28cailup%29+at+regional+level+in+irrigated+areas+%3A+a+case+study+for+the+Quan+Lo+Phung+Hiep+region+in+the+Mekong+Delta%2C+Vietnam&amp;rft.pub=ITC&amp;rft.date=1996&amp;rft_id=info%3Aoclcnum%2F906763535&amp;rft.isbn=90-6164-120-9&amp;rft.aulast=Hoanh&amp;rft.aufirst=Chu+Thai&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-257"><span class="mw-cite-backlink"><b><a href="#cite_ref-257">^</a></b></span> <span class="reference-text">1<link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHibberd2015" class="citation cs2">Hibberd, Gary (September 11, 2015), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1002/9781119205883.ch2">"Developing a BCM Strategy in Line with Business Strategy"</a>, <i>The Definitive Handbook of Business Continuity Management</i>, Hoboken, NJ, US: John Wiley &amp; Sons, Inc., pp.&#160;23–30, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1002%2F9781119205883.ch2">10.1002/9781119205883.ch2</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-119-20588-3" title="Special:BookSources/978-1-119-20588-3"><bdi>978-1-119-20588-3</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Definitive+Handbook+of+Business+Continuity+Management&amp;rft.atitle=Developing+a+BCM+Strategy+in+Line+with+Business+Strategy&amp;rft.pages=23-30&amp;rft.date=2015-09-11&amp;rft_id=info%3Adoi%2F10.1002%2F9781119205883.ch2&amp;rft.isbn=978-1-119-20588-3&amp;rft.aulast=Hibberd&amp;rft.aufirst=Gary&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1002%2F9781119205883.ch2&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-258"><span class="mw-cite-backlink"><b><a href="#cite_ref-258">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHotchkiss2010" class="citation book cs1">Hotchkiss, Stuart (2010). <i>Business Continuity Management: In Practice</i>. BCS Learning &amp; Development Limited. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-906124-72-4" title="Special:BookSources/978-1-906124-72-4"><bdi>978-1-906124-72-4</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Business+Continuity+Management%3A+In+Practice&amp;rft.pub=BCS+Learning+%26+Development+Limited&amp;rft.date=2010&amp;rft.isbn=978-1-906124-72-4&amp;rft.aulast=Hotchkiss&amp;rft.aufirst=Stuart&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span><sup class="noprint Inline-Template" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Citing_sources" title="Wikipedia:Citing sources"><span title="This citation requires a reference to the specific page or range of pages in which the material appears. (January 2023)">page&#160;needed</span></a></i>&#93;</sup></span> </li> <li id="cite_note-259"><span class="mw-cite-backlink"><b><a href="#cite_ref-259">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.31399/asm.tb.sfa.t52780025">"Identifying Potential Failure Causes"</a>, <i>Systems Failure Analysis</i>, ASM International, pp.&#160;25–33, 2009, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.31399%2Fasm.tb.sfa.t52780025">10.31399/asm.tb.sfa.t52780025</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-62708-268-6" title="Special:BookSources/978-1-62708-268-6"><bdi>978-1-62708-268-6</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Systems+Failure+Analysis&amp;rft.atitle=Identifying+Potential+Failure+Causes&amp;rft.pages=25-33&amp;rft.date=2009&amp;rft_id=info%3Adoi%2F10.31399%2Fasm.tb.sfa.t52780025&amp;rft.isbn=978-1-62708-268-6&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.31399%2Fasm.tb.sfa.t52780025&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-260"><span class="mw-cite-backlink"><b><a href="#cite_ref-260">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFClemens" class="citation book cs1">Clemens, Jeffrey. <i>Risks to the returns to medical innovation&#160;: the case of myriad genetics</i>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/919958196">919958196</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Risks+to+the+returns+to+medical+innovation+%3A+the+case+of+myriad+genetics&amp;rft_id=info%3Aoclcnum%2F919958196&amp;rft.aulast=Clemens&amp;rft.aufirst=Jeffrey&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-261"><span class="mw-cite-backlink"><b><a href="#cite_ref-261">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGoatcher2013" class="citation cs2">Goatcher, Genevieve (2013), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.4135/9781452275956.n204">"Maximum Acceptable Outage"</a>, <i>Encyclopedia of Crisis Management</i>, Thousand Oaks, CA: SAGE Publications, Inc., <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.4135%2F9781452275956.n204">10.4135/9781452275956.n204</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4522-2612-5" title="Special:BookSources/978-1-4522-2612-5"><bdi>978-1-4522-2612-5</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Maximum+Acceptable+Outage&amp;rft.btitle=Encyclopedia+of+Crisis+Management&amp;rft.place=Thousand+Oaks%2C+CA&amp;rft.pub=SAGE+Publications%2C+Inc.&amp;rft.date=2013&amp;rft_id=info%3Adoi%2F10.4135%2F9781452275956.n204&amp;rft.isbn=978-1-4522-2612-5&amp;rft.aulast=Goatcher&amp;rft.aufirst=Genevieve&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.4135%2F9781452275956.n204&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-262"><span class="mw-cite-backlink"><b><a href="#cite_ref-262">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1002/047121664x.ch6">"Segment Design Tradeoffs"</a>, <i>Software Radio Architecture</i>, New York, US: John Wiley &amp; Sons, Inc., pp.&#160;236–243, January 17, 2002, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1002%2F047121664x.ch6">10.1002/047121664x.ch6</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-471-21664-3" title="Special:BookSources/978-0-471-21664-3"><bdi>978-0-471-21664-3</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Software+Radio+Architecture&amp;rft.atitle=Segment+Design+Tradeoffs&amp;rft.pages=236-243&amp;rft.date=2002-01-17&amp;rft_id=info%3Adoi%2F10.1002%2F047121664x.ch6&amp;rft.isbn=978-0-471-21664-3&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1002%2F047121664x.ch6&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-263"><span class="mw-cite-backlink"><b><a href="#cite_ref-263">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBlundell1998" class="citation book cs1">Blundell, S. (1998). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1049/ic:19981090">"IN-EMERGENCY - integrated incident management, emergency healthcare and environmental monitoring in road networks"</a>. <i>IEE Seminar Using ITS in Public Transport and in Emergency Services</i>. Vol.&#160;1998. IEE. p.&#160;9. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1049%2Fic%3A19981090">10.1049/ic:19981090</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=IN-EMERGENCY+-+integrated+incident+management%2C+emergency+healthcare+and+environmental+monitoring+in+road+networks&amp;rft.btitle=IEE+Seminar+Using+ITS+in+Public+Transport+and+in+Emergency+Services&amp;rft.pages=9&amp;rft.pub=IEE&amp;rft.date=1998&amp;rft_id=info%3Adoi%2F10.1049%2Fic%3A19981090&amp;rft.aulast=Blundell&amp;rft.aufirst=S.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1049%2Fic%3A19981090&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-264"><span class="mw-cite-backlink"><b><a href="#cite_ref-264">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKing1993" class="citation journal cs1">King, Jonathan R. (January 1993). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1080/10580539308906959">"Contingency Plans and Business Recovery"</a>. <i>Information Systems Management</i>. <b>10</b> (4): 56–59. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F10580539308906959">10.1080/10580539308906959</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1058-0530">1058-0530</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Information+Systems+Management&amp;rft.atitle=Contingency+Plans+and+Business+Recovery&amp;rft.volume=10&amp;rft.issue=4&amp;rft.pages=56-59&amp;rft.date=1993-01&amp;rft_id=info%3Adoi%2F10.1080%2F10580539308906959&amp;rft.issn=1058-0530&amp;rft.aulast=King&amp;rft.aufirst=Jonathan+R.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1080%2F10580539308906959&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-265"><span class="mw-cite-backlink"><b><a href="#cite_ref-265">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPhillipsLandahl2021" class="citation cs2">Phillips, Brenda D.; Landahl, Mark (2021), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/b978-0-12-813844-1.00001-4">"Strengthening and testing your business continuity plan"</a>, <i>Business Continuity Planning</i>, Elsevier, pp.&#160;131–153, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fb978-0-12-813844-1.00001-4">10.1016/b978-0-12-813844-1.00001-4</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-12-813844-1" title="Special:BookSources/978-0-12-813844-1"><bdi>978-0-12-813844-1</bdi></a>, <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:230582246">230582246</a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Business+Continuity+Planning&amp;rft.atitle=Strengthening+and+testing+your+business+continuity+plan&amp;rft.pages=131-153&amp;rft.date=2021&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A230582246%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1016%2Fb978-0-12-813844-1.00001-4&amp;rft.isbn=978-0-12-813844-1&amp;rft.aulast=Phillips&amp;rft.aufirst=Brenda+D.&amp;rft.au=Landahl%2C+Mark&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2Fb978-0-12-813844-1.00001-4&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-266"><span class="mw-cite-backlink"><b><a href="#cite_ref-266">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSchnurr2009" class="citation cs2">Schnurr, Stephanie (2009), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1057/9780230594692_3">"The 'Other' Side of Leadership Discourse: Humour and the Performance of Relational Leadership Activities"</a>, <i>Leadership Discourse at Work</i>, London: Palgrave Macmillan UK, pp.&#160;42–60, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1057%2F9780230594692_3">10.1057/9780230594692_3</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-349-30001-3" title="Special:BookSources/978-1-349-30001-3"><bdi>978-1-349-30001-3</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Leadership+Discourse+at+Work&amp;rft.atitle=The+%27Other%27+Side+of+Leadership+Discourse%3A+Humour+and+the+Performance+of+Relational+Leadership+Activities&amp;rft.pages=42-60&amp;rft.date=2009&amp;rft_id=info%3Adoi%2F10.1057%2F9780230594692_3&amp;rft.isbn=978-1-349-30001-3&amp;rft.aulast=Schnurr&amp;rft.aufirst=Stephanie&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1057%2F9780230594692_3&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-267"><span class="mw-cite-backlink"><b><a href="#cite_ref-267">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.3403/02011580u"><i>Specified time relays for industrial use</i></a>, BSI British Standards, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.3403%2F02011580u">10.3403/02011580u</a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Specified+time+relays+for+industrial+use&amp;rft.pub=BSI+British+Standards&amp;rft_id=info%3Adoi%2F10.3403%2F02011580u&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.3403%2F02011580u&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-268"><span class="mw-cite-backlink"><b><a href="#cite_ref-268">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation book cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/b978-1-85617-698-9.00025-4">"Sample Generic Plan and Procedure: Disaster Recovery Plan (DRP) for Operations/Data Center"</a>. <i>Workplace Violence</i>. Elsevier. 2010. pp.&#160;253–270. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fb978-1-85617-698-9.00025-4">10.1016/b978-1-85617-698-9.00025-4</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-85617-698-9" title="Special:BookSources/978-1-85617-698-9"><bdi>978-1-85617-698-9</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">June 5,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Sample+Generic+Plan+and+Procedure%3A+Disaster+Recovery+Plan+%28DRP%29+for+Operations%2FData+Center&amp;rft.btitle=Workplace+Violence&amp;rft.pages=253-270&amp;rft.pub=Elsevier&amp;rft.date=2010&amp;rft_id=info%3Adoi%2F10.1016%2Fb978-1-85617-698-9.00025-4&amp;rft.isbn=978-1-85617-698-9&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2Fb978-1-85617-698-9.00025-4&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-269"><span class="mw-cite-backlink"><b><a href="#cite_ref-269">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation book cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/b978-1-84334-730-9.00019-3">"Information Technology Disaster Recovery Plan"</a>. <i>Disaster Planning for Libraries</i>. Chandos Information Professional Series. Elsevier. 2015. pp.&#160;187–197. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fb978-1-84334-730-9.00019-3">10.1016/b978-1-84334-730-9.00019-3</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-84334-730-9" title="Special:BookSources/978-1-84334-730-9"><bdi>978-1-84334-730-9</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">June 5,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Information+Technology+Disaster+Recovery+Plan&amp;rft.btitle=Disaster+Planning+for+Libraries&amp;rft.series=Chandos+Information+Professional+Series&amp;rft.pages=187-197&amp;rft.pub=Elsevier&amp;rft.date=2015&amp;rft_id=info%3Adoi%2F10.1016%2Fb978-1-84334-730-9.00019-3&amp;rft.isbn=978-1-84334-730-9&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2Fb978-1-84334-730-9.00019-3&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-270"><span class="mw-cite-backlink"><b><a href="#cite_ref-270">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.sans.org/reading_room/whitepapers/recovery/disaster-recovery-plan_1164">"The Disaster Recovery Plan"</a>. Sans Institute<span class="reference-accessdate">. Retrieved <span class="nowrap">February 7,</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=The+Disaster+Recovery+Plan&amp;rft.pub=Sans+Institute&amp;rft_id=http%3A%2F%2Fwww.sans.org%2Freading_room%2Fwhitepapers%2Frecovery%2Fdisaster-recovery-plan_1164&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-dx.doi.org-271"><span class="mw-cite-backlink">^ <a href="#cite_ref-dx.doi.org_271-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-dx.doi.org_271-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFOECD2016" class="citation journal cs1">OECD (2016). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1787/888933323807">"Figure 1.10. Regulations in non-manufacturing sector have significant impact on the manufacturing sector"</a>. <i>Economic Policy Reforms 2016: Going for Growth Interim Report</i>. Economic Policy Reforms. Paris: OECD Publishing. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1787%2Fgrowth-2016-en">10.1787/growth-2016-en</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9789264250079" title="Special:BookSources/9789264250079"><bdi>9789264250079</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">June 5,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Economic+Policy+Reforms+2016%3A+Going+for+Growth+Interim+Report&amp;rft.atitle=Figure+1.10.+Regulations+in+non-manufacturing+sector+have+significant+impact+on+the+manufacturing+sector&amp;rft.date=2016&amp;rft_id=info%3Adoi%2F10.1787%2Fgrowth-2016-en&amp;rft.isbn=9789264250079&amp;rft.au=OECD&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1787%2F888933323807&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-272"><span class="mw-cite-backlink"><b><a href="#cite_ref-272">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation book cs1"><i>Ahupuaʻa [electronic resource]&#160;: World Environmental and Water Resources Congress 2008, May 12-16, 2008, Honolulu, Hawaiʻi</i>. American Society of Civil Engineers. 2008. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-7844-0976-3" title="Special:BookSources/978-0-7844-0976-3"><bdi>978-0-7844-0976-3</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/233033926">233033926</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Ahupua%CA%BBa+%5Belectronic+resource%5D+%3A+World+Environmental+and+Water+Resources+Congress+2008%2C+May+12-16%2C+2008%2C+Honolulu%2C+Hawai%CA%BBi&amp;rft.pub=American+Society+of+Civil+Engineers&amp;rft.date=2008&amp;rft_id=info%3Aoclcnum%2F233033926&amp;rft.isbn=978-0-7844-0976-3&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-273"><span class="mw-cite-backlink"><b><a href="#cite_ref-273">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGreat_Britain._Parliament._House_of_Commons2007" class="citation book cs1">Great Britain. Parliament. House of Commons (2007). <i>Data protection [H.L.] A bill [as amended in standing committee d] intituled an act to make new provision for the regulation of the processing of information relating to individuals, including the obtaining, holding, use or disclosure of such information</i>. Proquest LLC. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/877574826">877574826</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Data+protection+%5BH.L.%5D+A+bill+%5Bas+amended+in+standing+committee+d%5D+intituled+an+act+to+make+new+provision+for+the+regulation+of+the+processing+of+information+relating+to+individuals%2C+including+the+obtaining%2C+holding%2C+use+or+disclosure+of+such+information&amp;rft.pub=Proquest+LLC&amp;rft.date=2007&amp;rft_id=info%3Aoclcnum%2F877574826&amp;rft.au=Great+Britain.+Parliament.+House+of+Commons&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-274"><span class="mw-cite-backlink"><b><a href="#cite_ref-274">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.5040/9781784518998.chapter-002">"Data protection, access to personal information and privacy protection"</a>, <i>Government and Information Rights: The Law Relating to Access, Disclosure and their Regulation</i>, Bloomsbury Professional, 2019, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.5040%2F9781784518998.chapter-002">10.5040/9781784518998.chapter-002</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-78451-896-7" title="Special:BookSources/978-1-78451-896-7"><bdi>978-1-78451-896-7</bdi></a>, <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:239376648">239376648</a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Government+and+Information+Rights%3A+The+Law+Relating+to+Access%2C+Disclosure+and+their+Regulation&amp;rft.atitle=Data+protection%2C+access+to+personal+information+and+privacy+protection&amp;rft.date=2019&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A239376648%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.5040%2F9781784518998.chapter-002&amp;rft.isbn=978-1-78451-896-7&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.5040%2F9781784518998.chapter-002&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-275"><span class="mw-cite-backlink"><b><a href="#cite_ref-275">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLehtonen2017" class="citation book cs1">Lehtonen, Lasse A. (July 5, 2017). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.4324/9781315240350-8">"Genetic Information and the Data Protection Directive of the European Union"</a>. <i>The Data Protection Directive and Medical Research Across Europe</i>. Routledge. pp.&#160;103–112. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.4324%2F9781315240350-8">10.4324/9781315240350-8</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-315-24035-0" title="Special:BookSources/978-1-315-24035-0"><bdi>978-1-315-24035-0</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">June 5,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Genetic+Information+and+the+Data+Protection+Directive+of+the+European+Union&amp;rft.btitle=The+Data+Protection+Directive+and+Medical+Research+Across+Europe&amp;rft.pages=103-112&amp;rft.pub=Routledge&amp;rft.date=2017-07-05&amp;rft_id=info%3Adoi%2F10.4324%2F9781315240350-8&amp;rft.isbn=978-1-315-24035-0&amp;rft.aulast=Lehtonen&amp;rft.aufirst=Lasse+A.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.4324%2F9781315240350-8&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-UKDataProtAct-276"><span class="mw-cite-backlink"><b><a href="#cite_ref-UKDataProtAct_276-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.legislation.gov.uk/ukpga/1998/29/contents">"Data Protection Act 1998"</a>. <i>legislation.gov.uk</i>. The National Archives<span class="reference-accessdate">. Retrieved <span class="nowrap">January 25,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=legislation.gov.uk&amp;rft.atitle=Data+Protection+Act+1998&amp;rft_id=http%3A%2F%2Fwww.legislation.gov.uk%2Fukpga%2F1998%2F29%2Fcontents&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-277"><span class="mw-cite-backlink"><b><a href="#cite_ref-277">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation book cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.4324/9780203722763-42">"Computer Misuse Act 1990"</a>. <i>Criminal Law Statutes 2011-2012</i>. Routledge. June 17, 2013. pp.&#160;114–118. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.4324%2F9780203722763-42">10.4324/9780203722763-42</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-203-72276-3" title="Special:BookSources/978-0-203-72276-3"><bdi>978-0-203-72276-3</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">June 5,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Computer+Misuse+Act+1990&amp;rft.btitle=Criminal+Law+Statutes+2011-2012&amp;rft.pages=114-118&amp;rft.pub=Routledge&amp;rft.date=2013-06-17&amp;rft_id=info%3Adoi%2F10.4324%2F9780203722763-42&amp;rft.isbn=978-0-203-72276-3&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.4324%2F9780203722763-42&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-278"><span class="mw-cite-backlink"><b><a href="#cite_ref-278">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDharmapalaHines2006" class="citation web cs1">Dharmapala, Dhammika; Hines, James (December 2006). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.3386/w12802">"Which Countries Become Tax Havens?"</a>. Working Paper Series. Cambridge, MA. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.3386%2Fw12802">10.3386/w12802</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Which+Countries+Become+Tax+Havens%3F&amp;rft.place=Cambridge%2C+MA&amp;rft.series=Working+Paper+Series&amp;rft.date=2006-12&amp;rft_id=info%3Adoi%2F10.3386%2Fw12802&amp;rft.aulast=Dharmapala&amp;rft.aufirst=Dhammika&amp;rft.au=Hines%2C+James&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.3386%2Fw12802&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-279"><span class="mw-cite-backlink"><b><a href="#cite_ref-279">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1787/888933367391">"Figure 1.14. Participation rates have risen but labour force growth has slowed in several countries"</a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1787%2F888933367391">10.1787/888933367391</a><span class="reference-accessdate">. Retrieved <span class="nowrap">June 5,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Figure+1.14.+Participation+rates+have+risen+but+labour+force+growth+has+slowed+in+several+countries&amp;rft_id=info%3Adoi%2F10.1787%2F888933367391&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1787%2F888933367391&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-UKCompMisAct-280"><span class="mw-cite-backlink"><b><a href="#cite_ref-UKCompMisAct_280-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.legislation.gov.uk/ukpga/1990/18/contents">"Computer Misuse Act 1990"</a>. <i>legislation.gov.uk</i>. The National Archives<span class="reference-accessdate">. Retrieved <span class="nowrap">January 25,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=legislation.gov.uk&amp;rft.atitle=Computer+Misuse+Act+1990&amp;rft_id=http%3A%2F%2Fwww.legislation.gov.uk%2Fukpga%2F1990%2F18%2Fcontents&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-EU24EC06-281"><span class="mw-cite-backlink"><b><a href="#cite_ref-EU24EC06_281-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:32006L0024">"Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006"</a>. <i>EUR-Lex</i>. European Union. March 15, 2006<span class="reference-accessdate">. Retrieved <span class="nowrap">January 25,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=EUR-Lex&amp;rft.atitle=Directive+2006%2F24%2FEC+of+the+European+Parliament+and+of+the+Council+of+15+March+2006&amp;rft.date=2006-03-15&amp;rft_id=http%3A%2F%2Feur-lex.europa.eu%2Flegal-content%2FEN%2FALL%2F%3Furi%3DCELEX%3A32006L0024&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-282"><span class="mw-cite-backlink"><b><a href="#cite_ref-282">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation book cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.4324/9780203846940-22">"Defamation, Student Records, and the Federal Family Education Rights and Privacy Act"</a>. <i>Higher Education Law</i>. Routledge. December 14, 2010. pp.&#160;361–394. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.4324%2F9780203846940-22">10.4324/9780203846940-22</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-203-84694-0" title="Special:BookSources/978-0-203-84694-0"><bdi>978-0-203-84694-0</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">June 5,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Defamation%2C+Student+Records%2C+and+the+Federal+Family+Education+Rights+and+Privacy+Act&amp;rft.btitle=Higher+Education+Law&amp;rft.pages=361-394&amp;rft.pub=Routledge&amp;rft.date=2010-12-14&amp;rft_id=info%3Adoi%2F10.4324%2F9780203846940-22&amp;rft.isbn=978-0-203-84694-0&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.4324%2F9780203846940-22&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-ReferenceA-283"><span class="mw-cite-backlink">^ <a href="#cite_ref-ReferenceA_283-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-ReferenceA_283-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1037/e486682006-001">"Alabama Schools Receive NCLB Grant To Improve Student Achievement"</a>. <i>PsycEXTRA Dataset</i>. 2004. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1037%2Fe486682006-001">10.1037/e486682006-001</a><span class="reference-accessdate">. Retrieved <span class="nowrap">June 5,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=PsycEXTRA+Dataset&amp;rft.atitle=Alabama+Schools+Receive+NCLB+Grant+To+Improve+Student+Achievement&amp;rft.date=2004&amp;rft_id=info%3Adoi%2F10.1037%2Fe486682006-001&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1037%2Fe486682006-001&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-284"><span class="mw-cite-backlink"><b><a href="#cite_ref-284">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFTurner-Gottschang1987" class="citation book cs1">Turner-Gottschang, Karen (1987). <i>China bound&#160;: a guide to academic life and work in the PRC&#160;: for the Committee on Scholarly Communication with the People's Republic of China, National Academy of Sciences, American Council of Learned Societies, Social Science Research Council</i>. National Academy Press. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0-309-56739-4" title="Special:BookSources/0-309-56739-4"><bdi>0-309-56739-4</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/326709779">326709779</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=China+bound+%3A+a+guide+to+academic+life+and+work+in+the+PRC+%3A+for+the+Committee+on+Scholarly+Communication+with+the+People%27s+Republic+of+China%2C+National+Academy+of+Sciences%2C+American+Council+of+Learned+Societies%2C+Social+Science+Research+Council&amp;rft.pub=National+Academy+Press&amp;rft.date=1987&amp;rft_id=info%3Aoclcnum%2F326709779&amp;rft.isbn=0-309-56739-4&amp;rft.aulast=Turner-Gottschang&amp;rft.aufirst=Karen&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-FERPA-285"><span class="mw-cite-backlink"><b><a href="#cite_ref-FERPA_285-0">^</a></b></span> <span class="reference-text">Codified at <a href="/wiki/Title_20_of_the_United_States_Code" title="Title 20 of the United States Code">20&#160;U.S.C.</a>&#160;<a rel="nofollow" class="external text" href="https://www.law.cornell.edu/uscode/text/20/1232g">§&#160;1232g</a>, with implementing regulations in title 34, part 99 of the <a href="/wiki/Code_of_Federal_Regulations" title="Code of Federal Regulations">Code of Federal Regulations</a></span> </li> <li id="cite_note-FFIECAudit-286"><span class="mw-cite-backlink"><b><a href="#cite_ref-FFIECAudit_286-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://ithandbook.ffiec.gov/it-booklets/audit.aspx">"Audit Booklet"</a>. <i>Information Technology Examination Handbook</i>. FFIEC<span class="reference-accessdate">. Retrieved <span class="nowrap">January 25,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Information+Technology+Examination+Handbook&amp;rft.atitle=Audit+Booklet&amp;rft_id=https%3A%2F%2Fithandbook.ffiec.gov%2Fit-booklets%2Faudit.aspx&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-287"><span class="mw-cite-backlink"><b><a href="#cite_ref-287">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRay2004" class="citation encyclopaedia cs1">Ray, Amy W. (2004). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.4135/9781412950602.n369">"Health Insurance Portability and Accountability Act (HIPAA)"</a>. <i>Encyclopedia of Health Care Management</i>. Thousand Oaks, CA: SAGE Publications, Inc. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.4135%2F9781412950602.n369">10.4135/9781412950602.n369</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-7619-2674-0" title="Special:BookSources/978-0-7619-2674-0"><bdi>978-0-7619-2674-0</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">June 5,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Health+Insurance+Portability+and+Accountability+Act+%28HIPAA%29&amp;rft.btitle=Encyclopedia+of+Health+Care+Management&amp;rft.place=Thousand+Oaks%2C+CA&amp;rft.pub=SAGE+Publications%2C+Inc.&amp;rft.date=2004&amp;rft_id=info%3Adoi%2F10.4135%2F9781412950602.n369&amp;rft.isbn=978-0-7619-2674-0&amp;rft.aulast=Ray&amp;rft.aufirst=Amy+W.&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.4135%2F9781412950602.n369&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-HIPAAGPO-288"><span class="mw-cite-backlink"><b><a href="#cite_ref-HIPAAGPO_288-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.gpo.gov/fdsys/pkg/PLAW-104publ191/content-detail.html">"Public Law 104 - 191 - Health Insurance Portability and Accountability Act of 1996"</a>. U.S. Government Publishing Office<span class="reference-accessdate">. Retrieved <span class="nowrap">January 25,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Public+Law+104+-+191+-+Health+Insurance+Portability+and+Accountability+Act+of+1996&amp;rft.pub=U.S.+Government+Publishing+Office&amp;rft_id=http%3A%2F%2Fwww.gpo.gov%2Ffdsys%2Fpkg%2FPLAW-104publ191%2Fcontent-detail.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-GLBAGPO-289"><span class="mw-cite-backlink"><b><a href="#cite_ref-GLBAGPO_289-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.gpo.gov/fdsys/pkg/STATUTE-113/pdf/STATUTE-113-Pg1338.pdf">"Public Law 106 - 102 - Gramm–Leach–Bliley Act of 1999"</a> <span class="cs1-format">(PDF)</span>. U.S. Government Publishing Office<span class="reference-accessdate">. Retrieved <span class="nowrap">January 25,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Public+Law+106+-+102+-+Gramm%E2%80%93Leach%E2%80%93Bliley+Act+of+1999&amp;rft.pub=U.S.+Government+Publishing+Office&amp;rft_id=https%3A%2F%2Fwww.gpo.gov%2Ffdsys%2Fpkg%2FSTATUTE-113%2Fpdf%2FSTATUTE-113-Pg1338.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-290"><span class="mw-cite-backlink"><b><a href="#cite_ref-290">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAlase2016" class="citation thesis cs1">Alase, Abayomi Oluwatosin (2016). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.17760/d20204801"><i>The impact of the Sarbanes-Oxley Act (SOX) on small-sized publicly traded companies and their communities</i></a> (Thesis). Northeastern University Library. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.17760%2Fd20204801">10.17760/d20204801</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adissertation&amp;rft.title=The+impact+of+the+Sarbanes-Oxley+Act+%28SOX%29+on+small-sized+publicly+traded+companies+and+their+communities&amp;rft.inst=Northeastern+University+Library&amp;rft.date=2016&amp;rft_id=info%3Adoi%2F10.17760%2Fd20204801&amp;rft.aulast=Alase&amp;rft.aufirst=Abayomi+Oluwatosin&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.17760%2Fd20204801&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-291"><span class="mw-cite-backlink"><b><a href="#cite_ref-291">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSolis2019" class="citation thesis cs1">Solis, Lupita (2019). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.15760/honors.763"><i>Educational and Professional Trends of Chief Financial Officers</i></a> (Thesis). Portland State University Library. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.15760%2Fhonors.763">10.15760/honors.763</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adissertation&amp;rft.title=Educational+and+Professional+Trends+of+Chief+Financial+Officers&amp;rft.inst=Portland+State+University+Library&amp;rft.date=2019&amp;rft_id=info%3Adoi%2F10.15760%2Fhonors.763&amp;rft.aulast=Solis&amp;rft.aufirst=Lupita&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.15760%2Fhonors.763&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-SOAGPO-292"><span class="mw-cite-backlink"><b><a href="#cite_ref-SOAGPO_292-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.gpo.gov/fdsys/pkg/PLAW-107publ204/html/PLAW-107publ204.htm">"Public Law 107 - 204 - Sarbanes-Oxley Act of 2002"</a>. U.S. Government Publishing Office<span class="reference-accessdate">. Retrieved <span class="nowrap">January 25,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Public+Law+107+-+204+-+Sarbanes-Oxley+Act+of+2002&amp;rft.pub=U.S.+Government+Publishing+Office&amp;rft_id=https%3A%2F%2Fwww.gpo.gov%2Ffdsys%2Fpkg%2FPLAW-107publ204%2Fhtml%2FPLAW-107publ204.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-293"><span class="mw-cite-backlink"><b><a href="#cite_ref-293">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1002/9781119197218.gloss">"Pci Dss Glossary, Abbreviations, and Acronyms"</a>, <i>Payment Card Industry Data Security Standard Handbook</i>, Hoboken, NJ, US: John Wiley &amp; Sons, Inc., pp.&#160;185–199, September 18, 2015, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1002%2F9781119197218.gloss">10.1002/9781119197218.gloss</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-119-19721-8" title="Special:BookSources/978-1-119-19721-8"><bdi>978-1-119-19721-8</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Payment+Card+Industry+Data+Security+Standard+Handbook&amp;rft.atitle=Pci+Dss+Glossary%2C+Abbreviations%2C+and+Acronyms&amp;rft.pages=185-199&amp;rft.date=2015-09-18&amp;rft_id=info%3Adoi%2F10.1002%2F9781119197218.gloss&amp;rft.isbn=978-1-119-19721-8&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1002%2F9781119197218.gloss&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-294"><span class="mw-cite-backlink"><b><a href="#cite_ref-294">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1002/9781119197218.part2">"PCI Breakdown (Control Objectives and Associated Standards)"</a>, <i>Payment Card Industry Data Security Standard Handbook</i>, Hoboken, NJ, US: John Wiley &amp; Sons, Inc., p.&#160;61, September 18, 2015, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1002%2F9781119197218.part2">10.1002/9781119197218.part2</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-119-19721-8" title="Special:BookSources/978-1-119-19721-8"><bdi>978-1-119-19721-8</bdi></a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Payment+Card+Industry+Data+Security+Standard+Handbook&amp;rft.atitle=PCI+Breakdown+%28Control+Objectives+and+Associated+Standards%29&amp;rft.pages=61&amp;rft.date=2015-09-18&amp;rft_id=info%3Adoi%2F10.1002%2F9781119197218.part2&amp;rft.isbn=978-1-119-19721-8&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1002%2F9781119197218.part2&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-295"><span class="mw-cite-backlink"><b><a href="#cite_ref-295">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRavallionChen2017" class="citation web cs1">Ravallion, Martin; Chen, Shaohua (August 2017). <a rel="nofollow" class="external text" href="https://www.nber.org/papers/w23739">"Welfare-Consistent Global Poverty Measures"</a>. Working Paper Series. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.3386%2Fw23739">10.3386/w23739</a><span class="reference-accessdate">. Retrieved <span class="nowrap">January 18,</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Welfare-Consistent+Global+Poverty+Measures&amp;rft.series=Working+Paper+Series&amp;rft.date=2017-08&amp;rft_id=info%3Adoi%2F10.3386%2Fw23739&amp;rft.aulast=Ravallion&amp;rft.aufirst=Martin&amp;rft.au=Chen%2C+Shaohua&amp;rft_id=https%3A%2F%2Fwww.nber.org%2Fpapers%2Fw23739&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-PCIDSS3.2-296"><span class="mw-cite-backlink"><b><a href="#cite_ref-PCIDSS3.2_296-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2.pdf">"Payment Card Industry (PCI) Data Security Standard: Requirements and Security Assessment Procedures - Version 3.2"</a> <span class="cs1-format">(PDF)</span>. Security Standards Council. April 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">January 25,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Payment+Card+Industry+%28PCI%29+Data+Security+Standard%3A+Requirements+and+Security+Assessment+Procedures+-+Version+3.2&amp;rft.pub=Security+Standards+Council&amp;rft.date=2016-04&amp;rft_id=https%3A%2F%2Fwww.pcisecuritystandards.org%2Fdocuments%2FPCI_DSS_v3-2.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-NCSLStateSecBreach17-297"><span class="mw-cite-backlink"><b><a href="#cite_ref-NCSLStateSecBreach17_297-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-laws.aspx">"Security Breach Notification Laws"</a>. National Conference of State Legislatures. April 12, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">January 25,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Security+Breach+Notification+Laws&amp;rft.pub=National+Conference+of+State+Legislatures&amp;rft.date=2017-04-12&amp;rft_id=http%3A%2F%2Fwww.ncsl.org%2Fresearch%2Ftelecommunications-and-information-technology%2Fsecurity-breach-notification-laws.aspx&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-298"><span class="mw-cite-backlink"><b><a href="#cite_ref-298">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSteinSchabergBiddle2015" class="citation book cs1">Stein, Stuart G.; Schaberg, Richard A.; Biddle, Laura R., eds. (June 23, 2015). <i>Financial institutions answer book, 2015&#160;: law, governance, compliance</i>. Practising Law Institute. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4024-2405-2" title="Special:BookSources/978-1-4024-2405-2"><bdi>978-1-4024-2405-2</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/911952833">911952833</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Financial+institutions+answer+book%2C+2015+%3A+law%2C+governance%2C+compliance&amp;rft.pub=Practising+Law+Institute&amp;rft.date=2015-06-23&amp;rft_id=info%3Aoclcnum%2F911952833&amp;rft.isbn=978-1-4024-2405-2&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-299"><span class="mw-cite-backlink"><b><a href="#cite_ref-299">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.5040/9781509924882.ch-002">"Personal Information and Data Protection"</a>, <i>Protecting Personal Information</i>, Hart Publishing, 2019, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.5040%2F9781509924882.ch-002">10.5040/9781509924882.ch-002</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-5099-2485-1" title="Special:BookSources/978-1-5099-2485-1"><bdi>978-1-5099-2485-1</bdi></a>, <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:239275871">239275871</a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Protecting+Personal+Information&amp;rft.atitle=Personal+Information+and+Data+Protection&amp;rft.date=2019&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A239275871%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.5040%2F9781509924882.ch-002&amp;rft.isbn=978-1-5099-2485-1&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.5040%2F9781509924882.ch-002&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-300"><span class="mw-cite-backlink"><b><a href="#cite_ref-300">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation book cs1"><i>Chapter 5. An Act to support and promote electronic commerce by protecting personal information that is collected, used or disclosed in certain circumstances, by providing for the use of electronic means to communicate or record information or transactions and by amending the Canada Evidence Act, the Statutory Instruments Act and the Statute Revision Act</i>. Queen's Printer for Canada. 2000. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/61417862">61417862</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Chapter+5.+An+Act+to+support+and+promote+electronic+commerce+by+protecting+personal+information+that+is+collected%2C+used+or+disclosed+in+certain+circumstances%2C+by+providing+for+the+use+of+electronic+means+to+communicate+or+record+information+or+transactions+and+by+amending+the+Canada+Evidence+Act%2C+the+Statutory+Instruments+Act+and+the+Statute+Revision+Act&amp;rft.pub=Queen%27s+Printer+for+Canada&amp;rft.date=2000&amp;rft_id=info%3Aoclcnum%2F61417862&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-301"><span class="mw-cite-backlink"><b><a href="#cite_ref-301">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1"><a rel="nofollow" class="external text" href="https://dx.doi.org/10.1093/slr/5.1.184">"Comments"</a>. <i>Statute Law Review</i>. <b>5</b> (1): 184–188. 1984. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1093%2Fslr%2F5.1.184">10.1093/slr/5.1.184</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0144-3593">0144-3593</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Statute+Law+Review&amp;rft.atitle=Comments&amp;rft.volume=5&amp;rft.issue=1&amp;rft.pages=184-188&amp;rft.date=1984&amp;rft_id=info%3Adoi%2F10.1093%2Fslr%2F5.1.184&amp;rft.issn=0144-3593&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1093%2Fslr%2F5.1.184&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-PIPEDA-302"><span class="mw-cite-backlink"><b><a href="#cite_ref-PIPEDA_302-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://laws-lois.justice.gc.ca/PDF/P-8.6.pdf">"Personal Information Protection and Electronic Documents Act"</a> <span class="cs1-format">(PDF)</span>. Canadian Minister of Justice<span class="reference-accessdate">. Retrieved <span class="nowrap">January 25,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Personal+Information+Protection+and+Electronic+Documents+Act&amp;rft.pub=Canadian+Minister+of+Justice&amp;rft_id=http%3A%2F%2Flaws-lois.justice.gc.ca%2FPDF%2FP-8.6.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-303"><span class="mw-cite-backlink"><b><a href="#cite_ref-303">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWerner2011" class="citation journal cs1">Werner, Martin (May 11, 2011). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1002/sec.330">"Privacy-protected communication for location-based services"</a>. <i>Security and Communication Networks</i>. <b>9</b> (2): 130–138. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1002%2Fsec.330">10.1002/sec.330</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1939-0114">1939-0114</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Security+and+Communication+Networks&amp;rft.atitle=Privacy-protected+communication+for+location-based+services&amp;rft.volume=9&amp;rft.issue=2&amp;rft.pages=130-138&amp;rft.date=2011-05-11&amp;rft_id=info%3Adoi%2F10.1002%2Fsec.330&amp;rft.issn=1939-0114&amp;rft.aulast=Werner&amp;rft.aufirst=Martin&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1002%2Fsec.330&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-RACEC-304"><span class="mw-cite-backlink"><b><a href="#cite_ref-RACEC_304-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20130625211034/http://www.adae.gr/fileadmin/docs/nomoi/kanonismoi/ADAE_REGULATION_165.2011.pdf">"Regulation for the Assurance of Confidentiality in Electronic Communications"</a> <span class="cs1-format">(PDF)</span>. <i>Government Gazette of the Hellenic Republic</i>. Hellenic Authority for Communication Security and Privacy. November 17, 2011. Archived from <a rel="nofollow" class="external text" href="http://www.adae.gr/fileadmin/docs/nomoi/kanonismoi/ADAE_REGULATION_165.2011.pdf">the original</a> <span class="cs1-format">(PDF)</span> on June 25, 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">January 25,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Government+Gazette+of+the+Hellenic+Republic&amp;rft.atitle=Regulation+for+the+Assurance+of+Confidentiality+in+Electronic+Communications&amp;rft.date=2011-11-17&amp;rft_id=http%3A%2F%2Fwww.adae.gr%2Ffileadmin%2Fdocs%2Fnomoi%2Fkanonismoi%2FADAE_REGULATION_165.2011.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-305"><span class="mw-cite-backlink"><b><a href="#cite_ref-305">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFde_Guise2020" class="citation cs2">de Guise, Preston (April 29, 2020), <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1201/9780367463496-9">"Security, Privacy, Ethical, and Legal Considerations"</a>, <i>Data Protection</i>, Auerbach Publications, pp.&#160;91–108, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1201%2F9780367463496-9">10.1201/9780367463496-9</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-367-46349-6" title="Special:BookSources/978-0-367-46349-6"><bdi>978-0-367-46349-6</bdi></a>, <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:219013948">219013948</a><span class="reference-accessdate">, retrieved <span class="nowrap">June 5,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Data+Protection&amp;rft.atitle=Security%2C+Privacy%2C+Ethical%2C+and+Legal+Considerations&amp;rft.pages=91-108&amp;rft.date=2020-04-29&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A219013948%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1201%2F9780367463496-9&amp;rft.isbn=978-0-367-46349-6&amp;rft.aulast=de+Guise&amp;rft.aufirst=Preston&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1201%2F9780367463496-9&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-205/2013-306"><span class="mw-cite-backlink"><b><a href="#cite_ref-205/2013_306-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20190204010458/http://www.adae.gr/fileadmin/docs/nomoi/kanonismoi/Kanonismos_FEK_1742_B_15_07_2013_asfaleia_akeraiotita__ADAE_205_2013.pdf">"Αριθμ. απόφ. 205/2013"</a> <span class="cs1-format">(PDF)</span>. <i>Government Gazette of the Hellenic Republic</i>. Hellenic Authority for Communication Security and Privacy. July 15, 2013. Archived from <a rel="nofollow" class="external text" href="http://www.adae.gr/fileadmin/docs/nomoi/kanonismoi/Kanonismos_FEK_1742_B_15_07_2013_asfaleia_akeraiotita__ADAE_205_2013.pdf">the original</a> <span class="cs1-format">(PDF)</span> on February 4, 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">January 25,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Government+Gazette+of+the+Hellenic+Republic&amp;rft.atitle=%CE%91%CF%81%CE%B9%CE%B8%CE%BC.+%CE%B1%CF%80%CF%8C%CF%86.+205%2F2013&amp;rft.date=2013-07-15&amp;rft_id=http%3A%2F%2Fwww.adae.gr%2Ffileadmin%2Fdocs%2Fnomoi%2Fkanonismoi%2FKanonismos_FEK_1742_B_15_07_2013_asfaleia_akeraiotita&#95;_ADAE_205_2013.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-307"><span class="mw-cite-backlink"><b><a href="#cite_ref-307">^</a></b></span> <span class="reference-text">Andersson and Reimers, 2019, CYBER SECURITY EMPLOYMENT POLICY AND WORKPLACE DEMAND IN THE U.S. GOVERNMENT, EDULEARN19 Proceedings, Publication year: 2019 Pages: 7858-7866 <a rel="nofollow" class="external free" href="https://library.iated.org/view/ANDERSON2019CYB">https://library.iated.org/view/ANDERSON2019CYB</a></span> </li> <li id="cite_note-308"><span class="mw-cite-backlink"><b><a href="#cite_ref-308">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20190127205759/https://securitycultureframework.net/definition-of-security-culture/">"Definition of Security Culture"</a>. <i>The Security Culture Framework</i>. April 9, 2014. Archived from <a rel="nofollow" class="external text" href="https://securitycultureframework.net/definition-of-security-culture/">the original</a> on January 27, 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">January 27,</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=The+Security+Culture+Framework&amp;rft.atitle=Definition+of+Security+Culture&amp;rft.date=2014-04-09&amp;rft_id=https%3A%2F%2Fsecuritycultureframework.net%2Fdefinition-of-security-culture%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-309"><span class="mw-cite-backlink"><b><a href="#cite_ref-309">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRoerPetric2017" class="citation book cs1">Roer, Kai; Petric, Gregor (2017). <i>The 2017 Security Culture Report - In depth insights into the human factor</i>. CLTRe North America, Inc. pp.&#160;42–43. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1544933948" title="Special:BookSources/978-1544933948"><bdi>978-1544933948</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=The+2017+Security+Culture+Report+-+In+depth+insights+into+the+human+factor&amp;rft.pages=42-43&amp;rft.pub=CLTRe+North+America%2C+Inc&amp;rft.date=2017&amp;rft.isbn=978-1544933948&amp;rft.aulast=Roer&amp;rft.aufirst=Kai&amp;rft.au=Petric%2C+Gregor&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-310"><span class="mw-cite-backlink"><b><a href="#cite_ref-310">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAkhtar2018" class="citation book cs1">Akhtar, Salman, ed. (March 21, 2018). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.4324/9780429475313"><i>Good Feelings</i></a>. Routledge. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.4324%2F9780429475313">10.4324/9780429475313</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9780429475313" title="Special:BookSources/9780429475313"><bdi>9780429475313</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Good+Feelings&amp;rft.pub=Routledge&amp;rft.date=2018-03-21&amp;rft_id=info%3Adoi%2F10.4324%2F9780429475313&amp;rft.isbn=9780429475313&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.4324%2F9780429475313&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-Andersson_&amp;_Reimers_2014-311"><span class="mw-cite-backlink"><b><a href="#cite_ref-Andersson_&amp;_Reimers_2014_311-0">^</a></b></span> <span class="reference-text">Anderson, D., Reimers, K. and Barretto, C. (March 2014). Post-Secondary Education Network Security: Results of Addressing the End-User Challenge.publication date Mar 11, 2014 publication description INTED2014 (International Technology, Education, and Development Conference)</span> </li> <li id="cite_note-Schlienger,_Thomas_2003-312"><span class="mw-cite-backlink">^ <a href="#cite_ref-Schlienger,_Thomas_2003_312-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Schlienger,_Thomas_2003_312-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSchliengerTeufel2003" class="citation journal cs1">Schlienger, Thomas; Teufel, Stephanie (December 2003). "Information security culture - from analysis to change". <i>South African Computer Society (SAICSIT)</i>. <b>2003</b> (31): 46–52. <a href="/wiki/Hdl_(identifier)" class="mw-redirect" title="Hdl (identifier)">hdl</a>:<a rel="nofollow" class="external text" href="https://hdl.handle.net/10520%2FEJC27949">10520/EJC27949</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=South+African+Computer+Society+%28SAICSIT%29&amp;rft.atitle=Information+security+culture+-+from+analysis+to+change&amp;rft.volume=2003&amp;rft.issue=31&amp;rft.pages=46-52&amp;rft.date=2003-12&amp;rft_id=info%3Ahdl%2F10520%2FEJC27949&amp;rft.aulast=Schlienger&amp;rft.aufirst=Thomas&amp;rft.au=Teufel%2C+Stephanie&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-Cherdantseva_Y_2013-313"><span class="mw-cite-backlink"><b><a href="#cite_ref-Cherdantseva_Y_2013_313-0">^</a></b></span> <span class="reference-text">Cherdantseva Y. and Hilton J.: "Information Security and Information Assurance. The Discussion about the Meaning, Scope and Goals". In: <i>Organizational, Legal, and Technological Dimensions of Information System Administrator</i>. Almeida F., Portela, I. (eds.). IGI Global Publishing. (2013)</span> </li> <li id="cite_note-314"><span class="mw-cite-backlink"><b><a href="#cite_ref-314">^</a></b></span> <span class="reference-text">ISO/IEC 27000:2018 (E). (2018). Information technology – Security techniques – Information security management systems – Overview and vocabulary. ISO/IEC.</span> </li> <li id="cite_note-315"><span class="mw-cite-backlink"><b><a href="#cite_ref-315">^</a></b></span> <span class="reference-text"><a href="/wiki/Committee_on_National_Security_Systems" title="Committee on National Security Systems">Committee on National Security Systems</a>: National Information Assurance (IA) Glossary, CNSS Instruction No. 4009, 26 April 2010.</span> </li> <li id="cite_note-316"><span class="mw-cite-backlink"><b><a href="#cite_ref-316">^</a></b></span> <span class="reference-text">ISACA. (2008). Glossary of terms, 2008. Retrieved from <a rel="nofollow" class="external free" href="http://www.isaca.org/Knowledge-Center/Documents/Glossary/glossary.pdf">http://www.isaca.org/Knowledge-Center/Documents/Glossary/glossary.pdf</a></span> </li> <li id="cite_note-317"><span class="mw-cite-backlink"><b><a href="#cite_ref-317">^</a></b></span> <span class="reference-text">Pipkin, D. (2000). <i>Information security: Protecting the global enterprise</i>. New York: Hewlett-Packard Company.</span> </li> <li id="cite_note-318"><span class="mw-cite-backlink"><b><a href="#cite_ref-318">^</a></b></span> <span class="reference-text">B., McDermott, E., &amp; Geer, D. (2001). Information security is information risk management. In Proceedings of the 2001 Workshop on New Security Paradigms NSPW ‘01, (pp. 97 – 104). ACM. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F508171.508187">10.1145/508171.508187</a></span> </li> <li id="cite_note-319"><span class="mw-cite-backlink"><b><a href="#cite_ref-319">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAnderson2003" class="citation journal cs1">Anderson, J. M. (2003). "Why we need a new definition of information security". <i>Computers &amp; Security</i>. <b>22</b> (4): 308–313. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2FS0167-4048%2803%2900407-3">10.1016/S0167-4048(03)00407-3</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Computers+%26+Security&amp;rft.atitle=Why+we+need+a+new+definition+of+information+security&amp;rft.volume=22&amp;rft.issue=4&amp;rft.pages=308-313&amp;rft.date=2003&amp;rft_id=info%3Adoi%2F10.1016%2FS0167-4048%2803%2900407-3&amp;rft.aulast=Anderson&amp;rft.aufirst=J.+M.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-320"><span class="mw-cite-backlink"><b><a href="#cite_ref-320">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFVenterEloff2003" class="citation journal cs1">Venter, H. S.; Eloff, J. H. P. (2003). "A taxonomy for information security technologies". <i>Computers &amp; Security</i>. <b>22</b> (4): 299–307. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2FS0167-4048%2803%2900406-1">10.1016/S0167-4048(03)00406-1</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Computers+%26+Security&amp;rft.atitle=A+taxonomy+for+information+security+technologies&amp;rft.volume=22&amp;rft.issue=4&amp;rft.pages=299-307&amp;rft.date=2003&amp;rft_id=info%3Adoi%2F10.1016%2FS0167-4048%2803%2900406-1&amp;rft.aulast=Venter&amp;rft.aufirst=H.+S.&amp;rft.au=Eloff%2C+J.+H.+P.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-321"><span class="mw-cite-backlink"><b><a href="#cite_ref-321">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGold2004" class="citation journal cs1">Gold, S (December 2004). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1016/s1363-4127(04)00047-0">"Threats looming beyond the perimeter"</a>. <i>Information Security Technical Report</i>. <b>9</b> (4): 12–14. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fs1363-4127%2804%2900047-0">10.1016/s1363-4127(04)00047-0</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1363-4127">1363-4127</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Information+Security+Technical+Report&amp;rft.atitle=Threats+looming+beyond+the+perimeter&amp;rft.volume=9&amp;rft.issue=4&amp;rft.pages=12-14&amp;rft.date=2004-12&amp;rft_id=info%3Adoi%2F10.1016%2Fs1363-4127%2804%2900047-0&amp;rft.issn=1363-4127&amp;rft.aulast=Gold&amp;rft.aufirst=S&amp;rft_id=http%3A%2F%2Fdx.doi.org%2F10.1016%2Fs1363-4127%2804%2900047-0&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> <li id="cite_note-322"><span class="mw-cite-backlink"><b><a href="#cite_ref-322">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFБучикЮдінНетребко2016" class="citation journal cs1">Бучик, С. С.; Юдін, О. К.; Нетребко, Р. В. (December 21, 2016). <a rel="nofollow" class="external text" href="https://doi.org/10.18372%2F2073-4751.4.13135">"The analysis of methods of determination of functional types of security of the information-telecommunication system from an unauthorized access"</a>. <i>Problems of Informatization and Management</i>. <b>4</b> (56). <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.18372%2F2073-4751.4.13135">10.18372/2073-4751.4.13135</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/2073-4751">2073-4751</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Problems+of+Informatization+and+Management&amp;rft.atitle=The+analysis+of+methods+of+determination+of+functional+types+of+security+of+the+information-telecommunication+system+from+an+unauthorized+access&amp;rft.volume=4&amp;rft.issue=56&amp;rft.date=2016-12-21&amp;rft_id=info%3Adoi%2F10.18372%2F2073-4751.4.13135&amp;rft.issn=2073-4751&amp;rft.aulast=%D0%91%D1%83%D1%87%D0%B8%D0%BA&amp;rft.aufirst=%D0%A1.+%D0%A1.&amp;rft.au=%D0%AE%D0%B4%D1%96%D0%BD%2C+%D0%9E.+%D0%9A.&amp;rft.au=%D0%9D%D0%B5%D1%82%D1%80%D0%B5%D0%B1%D0%BA%D0%BE%2C+%D0%A0.+%D0%92.&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.18372%252F2073-4751.4.13135&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></span> </li> </ol></div></div> <div class="mw-heading mw-heading2"><h2 id="Bibliography">Bibliography</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=30" title="Edit section: Bibliography"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239549316">.mw-parser-output .refbegin{margin-bottom:0.5em}.mw-parser-output .refbegin-hanging-indents>ul{margin-left:0}.mw-parser-output .refbegin-hanging-indents>ul>li{margin-left:0;padding-left:3.2em;text-indent:-3.2em}.mw-parser-output .refbegin-hanging-indents ul,.mw-parser-output .refbegin-hanging-indents ul li{list-style:none}@media(max-width:720px){.mw-parser-output .refbegin-hanging-indents>ul>li{padding-left:1.6em;text-indent:-1.6em}}.mw-parser-output .refbegin-columns{margin-top:0.3em}.mw-parser-output .refbegin-columns ul{margin-top:0}.mw-parser-output .refbegin-columns li{page-break-inside:avoid;break-inside:avoid-column}@media screen{.mw-parser-output .refbegin{font-size:90%}}</style><div class="refbegin refbegin-columns references-column-width" style="column-width: 35em"> <ul><li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAllen2001" class="citation book cs1">Allen, Julia H. (2001). <a rel="nofollow" class="external text" href="https://archive.org/details/certguidetosyste00alle"><i>The CERT Guide to System and Network Security Practices</i></a>. Boston, MA: Addison-Wesley. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-201-73723-3" title="Special:BookSources/978-0-201-73723-3"><bdi>978-0-201-73723-3</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=The+CERT+Guide+to+System+and+Network+Security+Practices&amp;rft.place=Boston%2C+MA&amp;rft.pub=Addison-Wesley&amp;rft.date=2001&amp;rft.isbn=978-0-201-73723-3&amp;rft.aulast=Allen&amp;rft.aufirst=Julia+H.&amp;rft_id=https%3A%2F%2Farchive.org%2Fdetails%2Fcertguidetosyste00alle&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKrutzRussell_Dean_Vines2003" class="citation book cs1">Krutz, Ronald L.; Russell Dean Vines (2003). <i>The CISSP Prep Guide</i> (Gold&#160;ed.). Indianapolis, IN: Wiley. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-471-26802-4" title="Special:BookSources/978-0-471-26802-4"><bdi>978-0-471-26802-4</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=The+CISSP+Prep+Guide&amp;rft.place=Indianapolis%2C+IN&amp;rft.edition=Gold&amp;rft.pub=Wiley&amp;rft.date=2003&amp;rft.isbn=978-0-471-26802-4&amp;rft.aulast=Krutz&amp;rft.aufirst=Ronald+L.&amp;rft.au=Russell+Dean+Vines&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLayton2007" class="citation book cs1">Layton, Timothy P. (2007). <i>Information Security: Design, Implementation, Measurement, and Compliance</i>. Boca Raton, FL: Auerbach publications. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-8493-7087-8" title="Special:BookSources/978-0-8493-7087-8"><bdi>978-0-8493-7087-8</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Information+Security%3A+Design%2C+Implementation%2C+Measurement%2C+and+Compliance&amp;rft.place=Boca+Raton%2C+FL&amp;rft.pub=Auerbach+publications&amp;rft.date=2007&amp;rft.isbn=978-0-8493-7087-8&amp;rft.aulast=Layton&amp;rft.aufirst=Timothy+P.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMcNab2004" class="citation book cs1">McNab, Chris (2004). <i>Network Security Assessment</i>. Sebastopol, CA: O'Reilly. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-596-00611-2" title="Special:BookSources/978-0-596-00611-2"><bdi>978-0-596-00611-2</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Network+Security+Assessment&amp;rft.place=Sebastopol%2C+CA&amp;rft.pub=O%27Reilly&amp;rft.date=2004&amp;rft.isbn=978-0-596-00611-2&amp;rft.aulast=McNab&amp;rft.aufirst=Chris&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPeltier2001" class="citation book cs1">Peltier, Thomas R. (2001). <i>Information Security Risk Analysis</i>. Boca Raton, FL: Auerbach publications. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-8493-0880-2" title="Special:BookSources/978-0-8493-0880-2"><bdi>978-0-8493-0880-2</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Information+Security+Risk+Analysis&amp;rft.place=Boca+Raton%2C+FL&amp;rft.pub=Auerbach+publications&amp;rft.date=2001&amp;rft.isbn=978-0-8493-0880-2&amp;rft.aulast=Peltier&amp;rft.aufirst=Thomas+R.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPeltier2002" class="citation book cs1">Peltier, Thomas R. (2002). <i>Information Security Policies, Procedures, and Standards: guidelines for effective information security management</i>. Boca Raton, FL: Auerbach publications. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-8493-1137-6" title="Special:BookSources/978-0-8493-1137-6"><bdi>978-0-8493-1137-6</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Information+Security+Policies%2C+Procedures%2C+and+Standards%3A+guidelines+for+effective+information+security+management&amp;rft.place=Boca+Raton%2C+FL&amp;rft.pub=Auerbach+publications&amp;rft.date=2002&amp;rft.isbn=978-0-8493-1137-6&amp;rft.aulast=Peltier&amp;rft.aufirst=Thomas+R.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWhite2003" class="citation book cs1">White, Gregory (2003). <i>All-in-one Security+ Certification Exam Guide</i>. Emeryville, CA: McGraw-Hill/Osborne. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-07-222633-1" title="Special:BookSources/978-0-07-222633-1"><bdi>978-0-07-222633-1</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=All-in-one+Security%2B+Certification+Exam+Guide&amp;rft.place=Emeryville%2C+CA&amp;rft.pub=McGraw-Hill%2FOsborne&amp;rft.date=2003&amp;rft.isbn=978-0-07-222633-1&amp;rft.aulast=White&amp;rft.aufirst=Gregory&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDhillon2007" class="citation book cs1">Dhillon, Gurpreet (2007). <span class="id-lock-registration" title="Free registration required"><a rel="nofollow" class="external text" href="https://archive.org/details/principlesofinfo0000dhil"><i>Principles of Information Systems Security: text and cases</i></a></span>. NY: John Wiley &amp; Sons. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-471-45056-6" title="Special:BookSources/978-0-471-45056-6"><bdi>978-0-471-45056-6</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Principles+of+Information+Systems+Security%3A+text+and+cases&amp;rft.place=NY&amp;rft.pub=John+Wiley+%26+Sons&amp;rft.date=2007&amp;rft.isbn=978-0-471-45056-6&amp;rft.aulast=Dhillon&amp;rft.aufirst=Gurpreet&amp;rft_id=https%3A%2F%2Farchive.org%2Fdetails%2Fprinciplesofinfo0000dhil&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWhitmanMattord2017" class="citation book cs1">Whitman, Michael; Mattord, Herbert (2017). <i>Principles of Information Security</i>. <a href="/wiki/Cengage" class="mw-redirect" title="Cengage">Cengage</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1337102063" title="Special:BookSources/978-1337102063"><bdi>978-1337102063</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Principles+of+Information+Security&amp;rft.pub=Cengage&amp;rft.date=2017&amp;rft.isbn=978-1337102063&amp;rft.aulast=Whitman&amp;rft.aufirst=Michael&amp;rft.au=Mattord%2C+Herbert&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AInformation+security" class="Z3988"></span></li></ul> </div> <div class="mw-heading mw-heading2"><h2 id="Further_reading">Further reading</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=31" title="Edit section: Further reading"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239549316"><div class="refbegin refbegin-columns references-column-width" style="column-width: 35em"> <ul><li>Anderson, K., "<a rel="nofollow" class="external text" href="https://web.archive.org/web/20080402234040/http://www.scmagazineus.com/IT-security-professionals-must-evolve-for-changing-market/article/33990/">IT Security Professionals Must Evolve for Changing Market</a>", <i>SC Magazine</i>, October 12, 2006.</li> <li>Aceituno, V., "On Information Security Paradigms", <i>ISSA Journal</i>, September 2005.</li> <li><a href="/wiki/Chuck_Easttom" title="Chuck Easttom">Easttom, C.</a>, <i>Computer Security Fundamentals (2nd Edition)</i> <a href="/wiki/Pearson_Education" title="Pearson Education">Pearson Education</a>, 2011.</li> <li>Lambo, T., "ISO/IEC 27001: The future of infosec certification", <i>ISSA Journal</i>, November 2006.</li> <li>Dustin, D., " <a rel="nofollow" class="external text" href="http://blog.brisbanedatarecovery.com.au/2017/05/awareness-of-how-your-data-is-being.html">Awareness of How Your Data is Being Used and What to Do About It</a>", "CDR Blog", May 2017.</li> <li>Dhillon, G., "<a rel="nofollow" class="external text" href="https://www.jissec.org/Contents/V19/N2/V19N2-Dhillon-p91.pdf">The intellectual core of Information Systems Security</a>", <i>Journal of Information Systems Security</i>, Vol. 19, No 2.</li></ul> </div> <div class="mw-heading mw-heading2"><h2 id="External_links">External links</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Information_security&amp;action=edit&amp;section=32" title="Edit section: External links"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1235681985">.mw-parser-output .side-box{margin:4px 0;box-sizing:border-box;border:1px solid #aaa;font-size:88%;line-height:1.25em;background-color:var(--background-color-interactive-subtle,#f8f9fa);display:flow-root}.mw-parser-output .side-box-abovebelow,.mw-parser-output .side-box-text{padding:0.25em 0.9em}.mw-parser-output .side-box-image{padding:2px 0 2px 0.9em;text-align:center}.mw-parser-output .side-box-imageright{padding:2px 0.9em 2px 0;text-align:center}@media(min-width:500px){.mw-parser-output .side-box-flex{display:flex;align-items:center}.mw-parser-output .side-box-text{flex:1;min-width:0}}@media(min-width:720px){.mw-parser-output .side-box{width:238px}.mw-parser-output .side-box-right{clear:right;float:right;margin-left:1em}.mw-parser-output .side-box-left{margin-right:1em}}</style><style data-mw-deduplicate="TemplateStyles:r1237033735">@media print{body.ns-0 .mw-parser-output .sistersitebox{display:none!important}}@media screen{html.skin-theme-clientpref-night .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}</style><div class="side-box side-box-right plainlinks sistersitebox"><style data-mw-deduplicate="TemplateStyles:r1126788409">.mw-parser-output .plainlist ol,.mw-parser-output .plainlist ul{line-height:inherit;list-style:none;margin:0;padding:0}.mw-parser-output .plainlist ol li,.mw-parser-output .plainlist ul li{margin-bottom:0}</style> <div class="side-box-flex"> <div class="side-box-image"><span class="noviewer" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/30px-Commons-logo.svg.png" decoding="async" width="30" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/45px-Commons-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/59px-Commons-logo.svg.png 2x" data-file-width="1024" data-file-height="1376" /></span></span></div> <div class="side-box-text plainlist">Wikimedia Commons has media related to <span style="font-weight: bold; font-style: italic;"><a href="https://commons.wikimedia.org/wiki/Category:Information_security" class="extiw" title="commons:Category:Information security">Information security</a></span>.</div></div> </div> <ul><li><a rel="nofollow" class="external text" href="http://iac.dtic.mil/iatac/ia_policychart.html">DoD IA Policy Chart</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20110906012808/http://iac.dtic.mil/iatac/ia_policychart.html">Archived</a> 2011-09-06 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a> on the DoD Information Assurance Technology Analysis Center web site.</li> <li><a rel="nofollow" class="external text" href="http://msdn2.microsoft.com/en-us/library/ms998382.aspx">patterns &amp; practices Security Engineering Explained</a></li> <li><a rel="nofollow" class="external text" href="http://www.iwar.org.uk/comsec/">IWS – Information Security Chapter</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20191108164220/http://www.iwar.org.uk/comsec/">Archived</a> 2019-11-08 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></li> <li><a rel="nofollow" class="external text" href="http://www.cl.cam.ac.uk/~rja14/book.html">Ross Anderson's book "Security Engineering"</a></li></ul> <div class="navbox-styles"><style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style></div><div role="navigation" class="navbox" aria-labelledby="Computer_science" style="padding:3px"><table class="nowraplinks hlist mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Computer_science" title="Template:Computer science"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Computer_science" title="Template talk:Computer science"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Computer_science" title="Special:EditPage/Template:Computer science"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Computer_science" style="font-size:114%;margin:0 4em"><a href="/wiki/Computer_science" title="Computer science">Computer science</a></div></th></tr><tr><td class="navbox-abovebelow" colspan="2"><div>Note: This template roughly follows the 2012 <a href="/wiki/ACM_Computing_Classification_System" title="ACM Computing Classification System">ACM Computing Classification System</a>.</div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Computer_hardware" title="Computer hardware">Hardware</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Printed_circuit_board" title="Printed circuit board">Printed circuit board</a></li> <li><a href="/wiki/Peripheral" title="Peripheral">Peripheral</a></li> <li><a href="/wiki/Integrated_circuit" title="Integrated circuit">Integrated circuit</a></li> <li><a href="/wiki/Very_Large_Scale_Integration" class="mw-redirect" title="Very Large Scale Integration">Very Large Scale Integration</a></li> <li><a href="/wiki/System_on_a_chip" title="System on a chip">Systems on Chip (SoCs)</a></li> <li><a href="/wiki/Green_computing" title="Green computing">Energy consumption (Green computing)</a></li> <li><a href="/wiki/Electronic_design_automation" title="Electronic design automation">Electronic design automation</a></li> <li><a href="/wiki/Hardware_acceleration" title="Hardware acceleration">Hardware acceleration</a></li> <li><a href="/wiki/Processor_(computing)" title="Processor (computing)">Processor</a></li> <li><a href="/wiki/List_of_computer_size_categories" title="List of computer size categories">Size</a> / <a href="/wiki/Form_factor_(design)" title="Form factor (design)">Form</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Computer systems organization</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Computer_architecture" title="Computer architecture">Computer architecture</a></li> <li><a href="/wiki/Computational_complexity" title="Computational complexity">Computational complexity</a></li> <li><a href="/wiki/Dependability" title="Dependability">Dependability</a></li> <li><a href="/wiki/Embedded_system" title="Embedded system">Embedded system</a></li> <li><a href="/wiki/Real-time_computing" title="Real-time computing">Real-time computing</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Computer_network" title="Computer network">Networks</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Network_architecture" title="Network architecture">Network architecture</a></li> <li><a href="/wiki/Network_protocol" class="mw-redirect" title="Network protocol">Network protocol</a></li> <li><a href="/wiki/Networking_hardware" title="Networking hardware">Network components</a></li> <li><a href="/wiki/Network_scheduler" title="Network scheduler">Network scheduler</a></li> <li><a href="/wiki/Network_performance" title="Network performance">Network performance evaluation</a></li> <li><a href="/wiki/Network_service" title="Network service">Network service</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Software organization</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Interpreter_(computing)" title="Interpreter (computing)">Interpreter</a></li> <li><a href="/wiki/Middleware" title="Middleware">Middleware</a></li> <li><a href="/wiki/Virtual_machine" title="Virtual machine">Virtual machine</a></li> <li><a href="/wiki/Operating_system" title="Operating system">Operating system</a></li> <li><a href="/wiki/Software_quality" title="Software quality">Software quality</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Programming_language_theory" title="Programming language theory">Software notations</a> and <a href="/wiki/Programming_tool" title="Programming tool">tools</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Programming_paradigm" title="Programming paradigm">Programming paradigm</a></li> <li><a href="/wiki/Programming_language" title="Programming language">Programming language</a></li> <li><a href="/wiki/Compiler_construction" class="mw-redirect" title="Compiler construction">Compiler</a></li> <li><a href="/wiki/Domain-specific_language" title="Domain-specific language">Domain-specific language</a></li> <li><a href="/wiki/Modeling_language" title="Modeling language">Modeling language</a></li> <li><a href="/wiki/Software_framework" title="Software framework">Software framework</a></li> <li><a href="/wiki/Integrated_development_environment" title="Integrated development environment">Integrated development environment</a></li> <li><a href="/wiki/Software_configuration_management" title="Software configuration management">Software configuration management</a></li> <li><a href="/wiki/Library_(computing)" title="Library (computing)">Software library</a></li> <li><a href="/wiki/Software_repository" title="Software repository">Software repository</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Software_development" title="Software development">Software development</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Control_variable_(programming)" class="mw-redirect" title="Control variable (programming)">Control variable</a></li> <li><a href="/wiki/Software_development_process" title="Software development process">Software development process</a></li> <li><a href="/wiki/Requirements_analysis" title="Requirements analysis">Requirements analysis</a></li> <li><a href="/wiki/Software_design" title="Software design">Software design</a></li> <li><a href="/wiki/Software_construction" title="Software construction">Software construction</a></li> <li><a href="/wiki/Software_deployment" title="Software deployment">Software deployment</a></li> <li><a href="/wiki/Software_engineering" title="Software engineering">Software engineering</a></li> <li><a href="/wiki/Software_maintenance" title="Software maintenance">Software maintenance</a></li> <li><a href="/wiki/Programming_team" title="Programming team">Programming team</a></li> <li><a href="/wiki/Open-source_software" title="Open-source software">Open-source model</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Theory_of_computation" title="Theory of computation">Theory of computation</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Model_of_computation" title="Model of computation">Model of computation</a> <ul><li><a href="/wiki/Stochastic_computing" title="Stochastic computing">Stochastic</a></li></ul></li> <li><a href="/wiki/Formal_language" title="Formal language">Formal language</a></li> <li><a href="/wiki/Automata_theory" title="Automata theory">Automata theory</a></li> <li><a href="/wiki/Computability_theory" title="Computability theory">Computability theory</a></li> <li><a href="/wiki/Computational_complexity_theory" title="Computational complexity theory">Computational complexity theory</a></li> <li><a href="/wiki/Logic_in_computer_science" title="Logic in computer science">Logic</a></li> <li><a href="/wiki/Semantics_(computer_science)" title="Semantics (computer science)">Semantics</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Algorithm" title="Algorithm">Algorithms</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Algorithm_design" class="mw-redirect" title="Algorithm design">Algorithm design</a></li> <li><a href="/wiki/Analysis_of_algorithms" title="Analysis of algorithms">Analysis of algorithms</a></li> <li><a href="/wiki/Algorithmic_efficiency" title="Algorithmic efficiency">Algorithmic efficiency</a></li> <li><a href="/wiki/Randomized_algorithm" title="Randomized algorithm">Randomized algorithm</a></li> <li><a href="/wiki/Computational_geometry" title="Computational geometry">Computational geometry</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Mathematics of <a href="/wiki/Computing" title="Computing">computing</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Discrete_mathematics" title="Discrete mathematics">Discrete mathematics</a></li> <li><a href="/wiki/Probability" title="Probability">Probability</a></li> <li><a href="/wiki/Statistics" title="Statistics">Statistics</a></li> <li><a href="/wiki/Mathematical_software" title="Mathematical software">Mathematical software</a></li> <li><a href="/wiki/Information_theory" title="Information theory">Information theory</a></li> <li><a href="/wiki/Mathematical_analysis" title="Mathematical analysis">Mathematical analysis</a></li> <li><a href="/wiki/Numerical_analysis" title="Numerical analysis">Numerical analysis</a></li> <li><a href="/wiki/Theoretical_computer_science" title="Theoretical computer science">Theoretical computer science</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Information_system" title="Information system">Information systems</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Database" title="Database">Database management system</a></li> <li><a href="/wiki/Computer_data_storage" title="Computer data storage">Information storage systems</a></li> <li><a href="/wiki/Enterprise_information_system" title="Enterprise information system">Enterprise information system</a></li> <li><a href="/wiki/Social_software" title="Social software">Social information systems</a></li> <li><a href="/wiki/Geographic_information_system" title="Geographic information system">Geographic information system</a></li> <li><a href="/wiki/Decision_support_system" title="Decision support system">Decision support system</a></li> <li><a href="/wiki/Process_control" class="mw-redirect" title="Process control">Process control system</a></li> <li><a href="/wiki/Multimedia_database" title="Multimedia database">Multimedia information system</a></li> <li><a href="/wiki/Data_mining" title="Data mining">Data mining</a></li> <li><a href="/wiki/Digital_library" title="Digital library">Digital library</a></li> <li><a href="/wiki/Computing_platform" title="Computing platform">Computing platform</a></li> <li><a href="/wiki/Digital_marketing" title="Digital marketing">Digital marketing</a></li> <li><a href="/wiki/World_Wide_Web" title="World Wide Web">World Wide Web</a></li> <li><a href="/wiki/Information_retrieval" title="Information retrieval">Information retrieval</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Computer_security" title="Computer security">Security</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Cryptography" title="Cryptography">Cryptography</a></li> <li><a href="/wiki/Formal_methods" title="Formal methods">Formal methods</a></li> <li><a href="/wiki/Security_hacker" title="Security hacker">Security hacker</a></li> <li><a href="/wiki/Security_service_(telecommunication)" title="Security service (telecommunication)">Security services</a></li> <li><a href="/wiki/Intrusion_detection_system" title="Intrusion detection system">Intrusion detection system</a></li> <li><a href="/wiki/Hardware_security" title="Hardware security">Hardware security</a></li> <li><a href="/wiki/Network_security" title="Network security">Network security</a></li> <li><a class="mw-selflink selflink">Information security</a></li> <li><a href="/wiki/Application_security" title="Application security">Application security</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Human%E2%80%93computer_interaction" title="Human–computer interaction">Human–computer interaction</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Interaction_design" title="Interaction design">Interaction design</a></li> <li><a href="/wiki/Social_computing" title="Social computing">Social computing</a></li> <li><a href="/wiki/Ubiquitous_computing" title="Ubiquitous computing">Ubiquitous computing</a></li> <li><a href="/wiki/Visualization_(graphics)" title="Visualization (graphics)">Visualization</a></li> <li><a href="/wiki/Computer_accessibility" title="Computer accessibility">Accessibility</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Concurrency_(computer_science)" title="Concurrency (computer science)">Concurrency</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Concurrent_computing" title="Concurrent computing">Concurrent computing</a></li> <li><a href="/wiki/Parallel_computing" title="Parallel computing">Parallel computing</a></li> <li><a href="/wiki/Distributed_computing" title="Distributed computing">Distributed computing</a></li> <li><a href="/wiki/Multithreading_(computer_architecture)" title="Multithreading (computer architecture)">Multithreading</a></li> <li><a href="/wiki/Multiprocessing" title="Multiprocessing">Multiprocessing</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Artificial_intelligence" title="Artificial intelligence">Artificial intelligence</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Natural_language_processing" title="Natural language processing">Natural language processing</a></li> <li><a href="/wiki/Knowledge_representation_and_reasoning" title="Knowledge representation and reasoning">Knowledge representation and reasoning</a></li> <li><a href="/wiki/Computer_vision" title="Computer vision">Computer vision</a></li> <li><a href="/wiki/Automated_planning_and_scheduling" title="Automated planning and scheduling">Automated planning and scheduling</a></li> <li><a href="/wiki/Mathematical_optimization" title="Mathematical optimization">Search methodology</a></li> <li><a href="/wiki/Control_theory" title="Control theory">Control method</a></li> <li><a href="/wiki/Philosophy_of_artificial_intelligence" title="Philosophy of artificial intelligence">Philosophy of artificial intelligence</a></li> <li><a href="/wiki/Distributed_artificial_intelligence" title="Distributed artificial intelligence">Distributed artificial intelligence</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Machine_learning" title="Machine learning">Machine learning</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Supervised_learning" title="Supervised learning">Supervised learning</a></li> <li><a href="/wiki/Unsupervised_learning" title="Unsupervised learning">Unsupervised learning</a></li> <li><a href="/wiki/Reinforcement_learning" title="Reinforcement learning">Reinforcement learning</a></li> <li><a href="/wiki/Multi-task_learning" title="Multi-task learning">Multi-task learning</a></li> <li><a href="/wiki/Cross-validation_(statistics)" title="Cross-validation (statistics)">Cross-validation</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Computer_graphics" title="Computer graphics">Graphics</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Computer_animation" title="Computer animation">Animation</a></li> <li><a href="/wiki/Rendering_(computer_graphics)" title="Rendering (computer graphics)">Rendering</a></li> <li><a href="/wiki/Photograph_manipulation" title="Photograph manipulation">Photograph manipulation</a></li> <li><a href="/wiki/Graphics_processing_unit" title="Graphics processing unit">Graphics processing unit</a></li> <li><a href="/wiki/Mixed_reality" title="Mixed reality">Mixed reality</a></li> <li><a href="/wiki/Virtual_reality" title="Virtual reality">Virtual reality</a></li> <li><a href="/wiki/Image_compression" title="Image compression">Image compression</a></li> <li><a href="/wiki/Solid_modeling" title="Solid modeling">Solid modeling</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Applied computing</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Quantum_Computing" class="mw-redirect" title="Quantum Computing">Quantum Computing</a></li> <li><a href="/wiki/E-commerce" title="E-commerce">E-commerce</a></li> <li><a href="/wiki/Enterprise_software" title="Enterprise software">Enterprise software</a></li> <li><a href="/wiki/Computational_mathematics" title="Computational mathematics">Computational mathematics</a></li> <li><a href="/wiki/Computational_physics" title="Computational physics">Computational physics</a></li> <li><a href="/wiki/Computational_chemistry" title="Computational chemistry">Computational chemistry</a></li> <li><a href="/wiki/Computational_biology" title="Computational biology">Computational biology</a></li> <li><a href="/wiki/Computational_social_science" title="Computational social science">Computational social science</a></li> <li><a href="/wiki/Computational_engineering" title="Computational engineering">Computational engineering</a></li> <li><a href="/wiki/Template:Differentiable_computing" title="Template:Differentiable computing">Differentiable computing</a></li> <li><a href="/wiki/Health_informatics" title="Health informatics">Computational healthcare</a></li> <li><a href="/wiki/Digital_art" title="Digital art">Digital art</a></li> <li><a href="/wiki/Electronic_publishing" title="Electronic publishing">Electronic publishing</a></li> <li><a href="/wiki/Cyberwarfare" title="Cyberwarfare">Cyberwarfare</a></li> <li><a href="/wiki/Electronic_voting" title="Electronic voting">Electronic voting</a></li> <li><a href="/wiki/Video_game" title="Video game">Video games</a></li> <li><a href="/wiki/Word_processor" title="Word processor">Word processing</a></li> <li><a href="/wiki/Operations_research" title="Operations research">Operations research</a></li> <li><a href="/wiki/Educational_technology" title="Educational technology">Educational technology</a></li> <li><a href="/wiki/Document_management_system" title="Document management system">Document management</a></li></ul> </div></td></tr><tr><td class="navbox-abovebelow" colspan="2"><div> <ul><li><span class="noviewer" typeof="mw:File"><span title="Category"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/16px-Symbol_category_class.svg.png" decoding="async" width="16" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/23px-Symbol_category_class.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/31px-Symbol_category_class.svg.png 2x" data-file-width="180" data-file-height="185" /></span></span> <a href="/wiki/Category:Computer_science" title="Category:Computer science">Category</a></li> <li><span class="noviewer" typeof="mw:File"><span title="Outline"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/4/41/Global_thinking.svg/10px-Global_thinking.svg.png" decoding="async" width="10" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/4/41/Global_thinking.svg/15px-Global_thinking.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/4/41/Global_thinking.svg/21px-Global_thinking.svg.png 2x" data-file-width="130" data-file-height="200" /></span></span> <a href="/wiki/Outline_of_computer_science" title="Outline of computer science">Outline</a></li> <li><span class="noviewer" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/e/e0/Symbol_question.svg/16px-Symbol_question.svg.png" decoding="async" width="16" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/e/e0/Symbol_question.svg/23px-Symbol_question.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/e/e0/Symbol_question.svg/31px-Symbol_question.svg.png 2x" data-file-width="180" data-file-height="185" /></span></span> <a href="/wiki/Template:Glossaries_of_computers" title="Template:Glossaries of computers">Glossaries</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox" aria-labelledby="Security_Type" style="padding:3px"><table class="nowraplinks hlist mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:SecurityType" title="Template:SecurityType"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/w/index.php?title=Template_talk:SecurityType&amp;action=edit&amp;redlink=1" class="new" title="Template talk:SecurityType (page does not exist)"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:SecurityType" title="Special:EditPage/Template:SecurityType"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Security_Type" style="font-size:114%;margin:0 4em">Security Type</div></th></tr><tr><td colspan="2" class="navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Application_security" title="Application security">Application security</a></li> <li><a href="/wiki/Biosecurity" title="Biosecurity">Biosecurity</a></li> <li><a href="/wiki/Collective_security" title="Collective security">Collective security</a></li> <li><a href="/wiki/Computer_security" title="Computer security">Computer security</a></li> <li><a href="/wiki/Control_system_security" title="Control system security">Control system security</a></li> <li><a href="/wiki/Corporate_security" class="mw-redirect" title="Corporate security">Corporate security</a></li> <li><a href="/wiki/Economic_security" title="Economic security">Economic security</a></li> <li><a href="/wiki/Emotional_security" class="mw-redirect" title="Emotional security">Emotional security</a></li> <li><a href="/wiki/Energy_security" title="Energy security">Energy security</a></li> <li><a href="/w/index.php?title=Event_security&amp;action=edit&amp;redlink=1" class="new" title="Event security (page does not exist)">Event security</a></li> <li><a href="/wiki/Food_security" title="Food security">Food security</a></li> <li><a href="/wiki/Health_security" title="Health security">Health security</a></li> <li><a class="mw-selflink selflink">Information security</a></li> <li><a href="/wiki/Internal_security" title="Internal security">Internal security</a></li> <li><a href="/wiki/International_security" title="International security">International security</a></li> <li><a href="/wiki/Job_security" title="Job security">Job security</a></li> <li><a href="/wiki/National_security" title="National security">National security</a></li> <li><a href="/wiki/Operations_security" title="Operations security">Operations security</a></li> <li><a href="/wiki/Physical_security" title="Physical security">Physical security</a></li> <li><a href="/wiki/Public_security" title="Public security">Public security</a></li> <li><a href="/wiki/Social_security" class="mw-redirect" title="Social security">Social security</a></li></ul> </div></td></tr><tr><td class="navbox-abovebelow" colspan="2"><div> <ul><li><a href="/wiki/Security_engineering" title="Security engineering">Security engineering</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox" aria-labelledby="Information_security" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="3"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Information_security" title="Template:Information security"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Information_security" title="Template talk:Information security"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Information_security" title="Special:EditPage/Template:Information security"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Information_security" style="font-size:114%;margin:0 4em"><a class="mw-selflink selflink">Information security</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Related security categories</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Computer_security" title="Computer security">Computer security</a></li> <li><a href="/wiki/Automotive_security" title="Automotive security">Automotive security</a></li> <li><a href="/wiki/Cybercrime" title="Cybercrime">Cybercrime</a> <ul><li><a href="/wiki/Cybersex_trafficking" title="Cybersex trafficking">Cybersex trafficking</a></li> <li><a href="/wiki/Computer_fraud" title="Computer fraud">Computer fraud</a></li></ul></li> <li><a href="/wiki/Cybergeddon" title="Cybergeddon">Cybergeddon</a></li> <li><a href="/wiki/Cyberterrorism" title="Cyberterrorism">Cyberterrorism</a></li> <li><a href="/wiki/Cyberwarfare" title="Cyberwarfare">Cyberwarfare</a></li> <li><a href="/wiki/Electromagnetic_warfare" class="mw-redirect" title="Electromagnetic warfare">Electromagnetic warfare</a></li> <li><a href="/wiki/Information_warfare" title="Information warfare">Information warfare</a></li> <li><a href="/wiki/Internet_security" title="Internet security">Internet security</a></li> <li><a href="/wiki/Mobile_security" title="Mobile security">Mobile security</a></li> <li><a href="/wiki/Network_security" title="Network security">Network security</a></li> <li><a href="/wiki/Copy_protection" title="Copy protection">Copy protection</a></li> <li><a href="/wiki/Digital_rights_management" title="Digital rights management">Digital rights management</a></li></ul> </div></td><td class="noviewer navbox-image" rowspan="3" style="width:1px;padding:0 0 0 2px"><div><figure class="mw-halign-center" typeof="mw:File"><a href="/wiki/File:CIAJMK1209-en.svg" class="mw-file-description" title="vectorial version"><img alt="vectorial version" src="//upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/150px-CIAJMK1209-en.svg.png" decoding="async" width="150" height="150" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/225px-CIAJMK1209-en.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/300px-CIAJMK1209-en.svg.png 2x" data-file-width="496" data-file-height="496" /></a><figcaption>vectorial version</figcaption></figure></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Threat_(computer)" class="mw-redirect" title="Threat (computer)">Threats</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Adware" title="Adware">Adware</a></li> <li><a href="/wiki/Advanced_persistent_threat" title="Advanced persistent threat">Advanced persistent threat</a></li> <li><a href="/wiki/Arbitrary_code_execution" title="Arbitrary code execution">Arbitrary code execution</a></li> <li><a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">Backdoors</a></li> <li>Bombs <ul><li><a href="/wiki/Fork_bomb" title="Fork bomb">Fork</a></li> <li><a href="/wiki/Logic_bomb" title="Logic bomb">Logic</a></li> <li><a href="/wiki/Time_bomb_(software)" title="Time bomb (software)">Time</a></li> <li><a href="/wiki/Zip_bomb" title="Zip bomb">Zip</a></li></ul></li> <li><a href="/wiki/Hardware_backdoor" title="Hardware backdoor">Hardware backdoors</a></li> <li><a href="/wiki/Code_injection" title="Code injection">Code injection</a></li> <li><a href="/wiki/Crimeware" title="Crimeware">Crimeware</a></li> <li><a href="/wiki/Cross-site_scripting" title="Cross-site scripting">Cross-site scripting</a></li> <li><a href="/wiki/Cross-site_leaks" title="Cross-site leaks">Cross-site leaks</a></li> <li><a href="/wiki/DOM_clobbering" title="DOM clobbering">DOM clobbering</a></li> <li><a href="/wiki/History_sniffing" title="History sniffing">History sniffing</a></li> <li><a href="/wiki/Cryptojacking" title="Cryptojacking">Cryptojacking</a></li> <li><a href="/wiki/Botnet" title="Botnet">Botnets</a></li> <li><a href="/wiki/Data_breach" title="Data breach">Data breach</a></li> <li><a href="/wiki/Drive-by_download" title="Drive-by download">Drive-by download</a></li> <li><a href="/wiki/Browser_Helper_Object" title="Browser Helper Object">Browser Helper Objects</a></li> <li><a href="/wiki/Computer_virus" title="Computer virus">Viruses</a></li> <li><a href="/wiki/Data_scraping" title="Data scraping">Data scraping</a></li> <li><a href="/wiki/Denial-of-service_attack" title="Denial-of-service attack">Denial-of-service attack</a></li> <li><a href="/wiki/Eavesdropping" title="Eavesdropping">Eavesdropping</a></li> <li><a href="/wiki/Email_fraud" title="Email fraud">Email fraud</a></li> <li><a href="/wiki/Email_spoofing" title="Email spoofing">Email spoofing</a></li> <li><a href="/wiki/Exploit_(computer_security)" title="Exploit (computer security)">Exploits</a></li> <li><a href="/wiki/Dialer#Fraudulent_dialer" title="Dialer">Fraudulent dialers</a></li> <li><a href="/wiki/Hacktivism" title="Hacktivism">Hacktivism</a></li> <li><a href="/wiki/Infostealer" title="Infostealer">Infostealer</a></li> <li><a href="/wiki/Insecure_direct_object_reference" title="Insecure direct object reference">Insecure direct object reference</a></li> <li><a href="/wiki/Keystroke_logging" title="Keystroke logging">Keystroke loggers</a></li> <li><a href="/wiki/Malware" title="Malware">Malware</a></li> <li><a href="/wiki/Payload_(computing)" title="Payload (computing)">Payload</a></li> <li><a href="/wiki/Phishing" title="Phishing">Phishing</a> <ul><li><a href="/wiki/Voice_phishing" title="Voice phishing">Voice</a></li></ul></li> <li><a href="/wiki/Polymorphic_engine" title="Polymorphic engine">Polymorphic engine</a></li> <li><a href="/wiki/Privilege_escalation" title="Privilege escalation">Privilege escalation</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Rootkit" title="Rootkit">Rootkits</a></li> <li><a href="/wiki/Scareware" title="Scareware">Scareware</a></li> <li><a href="/wiki/Shellcode" title="Shellcode">Shellcode</a></li> <li><a href="/wiki/Spamming" title="Spamming">Spamming</a></li> <li><a href="/wiki/Social_engineering_(security)" title="Social engineering (security)">Social engineering</a></li> <li><a href="/wiki/Spyware" title="Spyware">Spyware</a></li> <li><a href="/wiki/Software_bug" title="Software bug">Software bugs</a></li> <li><a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">Trojan horses</a></li> <li><a href="/wiki/Hardware_Trojan" title="Hardware Trojan">Hardware Trojans</a></li> <li><a href="/wiki/Remote_access_trojan" class="mw-redirect" title="Remote access trojan">Remote access trojans</a></li> <li><a href="/wiki/Vulnerability_(computing)" class="mw-redirect" title="Vulnerability (computing)">Vulnerability</a></li> <li><a href="/wiki/Web_shell" title="Web shell">Web shells</a></li> <li><a href="/wiki/Wiper_(malware)" title="Wiper (malware)">Wiper</a></li> <li><a href="/wiki/Computer_worm" title="Computer worm">Worms</a></li> <li><a href="/wiki/SQL_injection" title="SQL injection">SQL injection</a></li> <li><a href="/wiki/Rogue_security_software" title="Rogue security software">Rogue security software</a></li> <li><a href="/wiki/Zombie_(computing)" title="Zombie (computing)">Zombie</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Defenses</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Application_security" title="Application security">Application security</a> <ul><li><a href="/wiki/Secure_coding" title="Secure coding">Secure coding</a></li> <li>Secure by default</li> <li><a href="/wiki/Secure_by_design" title="Secure by design">Secure by design</a> <ul><li><a href="/wiki/Misuse_case" title="Misuse case">Misuse case</a></li></ul></li></ul></li> <li><a href="/wiki/Computer_access_control" title="Computer access control">Computer access control</a> <ul><li><a href="/wiki/Authentication" title="Authentication">Authentication</a> <ul><li><a href="/wiki/Multi-factor_authentication" title="Multi-factor authentication">Multi-factor authentication</a></li></ul></li> <li><a href="/wiki/Authorization" title="Authorization">Authorization</a></li></ul></li> <li><a href="/wiki/Computer_security_software" title="Computer security software">Computer security software</a> <ul><li><a href="/wiki/Antivirus_software" title="Antivirus software">Antivirus software</a></li> <li><a href="/wiki/Security-focused_operating_system" title="Security-focused operating system">Security-focused operating system</a></li></ul></li> <li><a href="/wiki/Data-centric_security" title="Data-centric security">Data-centric security</a></li> <li><a href="/wiki/Code_obfuscation" class="mw-redirect" title="Code obfuscation">Obfuscation (software)</a></li> <li><a href="/wiki/Data_masking" title="Data masking">Data masking</a></li> <li><a href="/wiki/Encryption" title="Encryption">Encryption</a></li> <li><a href="/wiki/Firewall_(computing)" title="Firewall (computing)">Firewall</a></li> <li><a href="/wiki/Intrusion_detection_system" title="Intrusion detection system">Intrusion detection system</a> <ul><li><a href="/wiki/Host-based_intrusion_detection_system" title="Host-based intrusion detection system">Host-based intrusion detection system</a> (HIDS)</li> <li><a href="/wiki/Anomaly_detection" title="Anomaly detection">Anomaly detection</a></li></ul></li> <li><a href="/wiki/Information_security_management" title="Information security management">Information security management</a> <ul><li><a href="/wiki/Information_risk_management" class="mw-redirect" title="Information risk management">Information risk management</a></li> <li><a href="/wiki/Security_information_and_event_management" title="Security information and event management">Security information and event management</a> (SIEM)</li></ul></li> <li><a href="/wiki/Runtime_application_self-protection" title="Runtime application self-protection">Runtime application self-protection</a></li> <li><a href="/wiki/Site_isolation" title="Site isolation">Site isolation</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"><style data-mw-deduplicate="TemplateStyles:r1038841319">.mw-parser-output .tooltip-dotted{border-bottom:1px dotted;cursor:help}</style><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1038841319"></div><div role="navigation" class="navbox authority-control" aria-label="Navbox" style="padding:3px"><table class="nowraplinks hlist navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Help:Authority_control" title="Help:Authority control">Authority control databases</a>: National <span class="mw-valign-text-top noprint" typeof="mw:File/Frameless"><a href="https://www.wikidata.org/wiki/Q189900#identifiers" title="Edit this at Wikidata"><img alt="Edit this at Wikidata" src="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/10px-OOjs_UI_icon_edit-ltr-progressive.svg.png" decoding="async" width="10" height="10" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/15px-OOjs_UI_icon_edit-ltr-progressive.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/20px-OOjs_UI_icon_edit-ltr-progressive.svg.png 2x" data-file-width="20" data-file-height="20" /></a></span></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"><ul><li><span class="uid"><span class="rt-commentedText tooltip tooltip-dotted" title="Informationssicherheit"><a rel="nofollow" class="external text" href="https://d-nb.info/gnd/1217680330">Germany</a></span></span></li><li><span class="uid"><span class="rt-commentedText tooltip tooltip-dotted" title="informační bezpečnost"><a rel="nofollow" class="external text" href="https://aleph.nkp.cz/F/?func=find-c&amp;local_base=aut&amp;ccl_term=ica=ph136652&amp;CON_LNG=ENG">Czech Republic</a></span></span></li><li><span class="uid"><a rel="nofollow" class="external text" href="https://kopkatalogs.lv/F?func=direct&amp;local_base=lnc10&amp;doc_number=000340184&amp;P_CON_LNG=ENG">Latvia</a></span></li></ul></div></td></tr></tbody></table></div> <!-- NewPP limit report Parsed by mw‐api‐ext.codfw.main‐7556f8b5dd‐46hdx Cached time: 20241123054619 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 2.644 seconds Real time usage: 2.853 seconds Preprocessor visited node count: 17395/1000000 Post‐expand include size: 710680/2097152 bytes Template argument size: 4776/2097152 bytes Highest expansion depth: 19/100 Expensive parser function count: 15/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 1204846/5000000 bytes Lua time usage: 1.756/10.000 seconds Lua memory usage: 8576100/52428800 bytes Lua Profile: ? 300 ms 16.3% MediaWiki\Extension\Scribunto\Engines\LuaSandbox\LuaSandboxCallback::callParserFunction 280 ms 15.2% dataWrapper <mw.lua:672> 220 ms 12.0% MediaWiki\Extension\Scribunto\Engines\LuaSandbox\LuaSandboxCallback::match 160 ms 8.7% recursiveClone <mwInit.lua:45> 100 ms 5.4% MediaWiki\Extension\Scribunto\Engines\LuaSandbox\LuaSandboxCallback::plain 80 ms 4.3% MediaWiki\Extension\Scribunto\Engines\LuaSandbox\LuaSandboxCallback::getExpandedArgument 60 ms 3.3% MediaWiki\Extension\Scribunto\Engines\LuaSandbox\LuaSandboxCallback::gsub 60 ms 3.3% concat 60 ms 3.3% MediaWiki\Extension\Scribunto\Engines\LuaSandbox\LuaSandboxCallback::find 60 ms 3.3% [others] 460 ms 25.0% Number of Wikibase entities loaded: 1/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 2481.106 1 -total 69.48% 1723.901 1 Template:Reflist 19.62% 486.841 84 Template:Cite_journal 16.64% 412.880 95 Template:Cite_book 15.23% 377.798 81 Template:Citation 7.64% 189.442 46 Template:Cite_web 5.94% 147.328 4 Template:Sfn 4.54% 112.625 3 Template:Navbox 4.34% 107.768 1 Template:Computer_science 2.85% 70.712 1 Template:Short_description --> <!-- Saved in parser cache with key enwiki:pcache:idhash:15036-0!canonical and timestamp 20241123054620 and revision id 1259072286. Rendering was triggered because: edit-page --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?type=1x1" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Information_security&amp;oldid=1259072286">https://en.wikipedia.org/w/index.php?title=Information_security&amp;oldid=1259072286</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Categories</a>: <ul><li><a href="/wiki/Category:Data_security" title="Category:Data security">Data security</a></li><li><a href="/wiki/Category:Security" title="Category:Security">Security</a></li><li><a href="/wiki/Category:Crime_prevention" title="Category:Crime prevention">Crime prevention</a></li><li><a href="/wiki/Category:National_security" title="Category:National security">National security</a></li><li><a href="/wiki/Category:Cryptography" title="Category:Cryptography">Cryptography</a></li><li><a href="/wiki/Category:Information_governance" title="Category:Information governance">Information governance</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:CS1_maint:_DOI_inactive_as_of_November_2024" title="Category:CS1 maint: DOI inactive as of November 2024">CS1 maint: DOI inactive as of November 2024</a></li><li><a href="/wiki/Category:Webarchive_template_wayback_links" title="Category:Webarchive template wayback links">Webarchive template wayback links</a></li><li><a href="/wiki/Category:Wikipedia_articles_needing_page_number_citations_from_January_2023" title="Category:Wikipedia articles needing page number citations from January 2023">Wikipedia articles needing page number citations from January 2023</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_is_different_from_Wikidata" title="Category:Short description is different from Wikidata">Short description is different from Wikidata</a></li><li><a href="/wiki/Category:Use_mdy_dates_from_November_2023" title="Category:Use mdy dates from November 2023">Use mdy dates from November 2023</a></li><li><a href="/wiki/Category:Articles_to_be_merged_from_November_2024" title="Category:Articles to be merged from November 2024">Articles to be merged from November 2024</a></li><li><a href="/wiki/Category:All_articles_to_be_merged" title="Category:All articles to be merged">All articles to be merged</a></li><li><a href="/wiki/Category:All_articles_with_unsourced_statements" title="Category:All articles with unsourced statements">All articles with unsourced statements</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_June_2021" title="Category:Articles with unsourced statements from June 2021">Articles with unsourced statements from June 2021</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_November_2023" title="Category:Articles with unsourced statements from November 2023">Articles with unsourced statements from November 2023</a></li><li><a href="/wiki/Category:Commons_category_link_from_Wikidata" title="Category:Commons category link from Wikidata">Commons category link from Wikidata</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 23 November 2024, at 05:46<span class="anonymous-show">&#160;(UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=Information_security&amp;mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/static/images/footer/wikimedia-button.svg" width="84" height="29" alt="Wikimedia Foundation" loading="lazy"></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/w/resources/assets/poweredby_mediawiki.svg" alt="Powered by MediaWiki" width="88" height="31" loading="lazy"></a></li> </ul> </footer> </div> </div> </div> <div class="vector-settings" id="p-dock-bottom"> <ul></ul> </div><script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-f69cdc8f6-blxk6","wgBackendResponseTime":193,"wgPageParseReport":{"limitreport":{"cputime":"2.644","walltime":"2.853","ppvisitednodes":{"value":17395,"limit":1000000},"postexpandincludesize":{"value":710680,"limit":2097152},"templateargumentsize":{"value":4776,"limit":2097152},"expansiondepth":{"value":19,"limit":100},"expensivefunctioncount":{"value":15,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":1204846,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 2481.106 1 -total"," 69.48% 1723.901 1 Template:Reflist"," 19.62% 486.841 84 Template:Cite_journal"," 16.64% 412.880 95 Template:Cite_book"," 15.23% 377.798 81 Template:Citation"," 7.64% 189.442 46 Template:Cite_web"," 5.94% 147.328 4 Template:Sfn"," 4.54% 112.625 3 Template:Navbox"," 4.34% 107.768 1 Template:Computer_science"," 2.85% 70.712 1 Template:Short_description"]},"scribunto":{"limitreport-timeusage":{"value":"1.756","limit":"10.000"},"limitreport-memusage":{"value":8576100,"limit":52428800},"limitreport-logs":"anchor_id_list = table#1 {\n [\"CITEREFAbolhassan2003\"] = 1,\n [\"CITEREFAceituno\"] = 1,\n [\"CITEREFAhwidyPemberton2016\"] = 1,\n [\"CITEREFAkhtar2018\"] = 1,\n [\"CITEREFAkpeninor2013\"] = 1,\n [\"CITEREFAlase2016\"] = 1,\n [\"CITEREFAllen2001\"] = 1,\n [\"CITEREFAlmehmadiEl-Khatib2013\"] = 1,\n [\"CITEREFAnderson2003\"] = 1,\n [\"CITEREFAndress,_J.2014\"] = 1,\n [\"CITEREFAtkins2021\"] = 1,\n [\"CITEREFAuckland2017\"] = 1,\n [\"CITEREFBacigalupoDixonGubbinsKucharski2020\"] = 1,\n [\"CITEREFBaxter2010\"] = 1,\n [\"CITEREFBayuk,_J.2009\"] = 1,\n [\"CITEREFBeckers,_K.2015\"] = 1,\n [\"CITEREFBelimBogachenkoKabanov2018\"] = 1,\n [\"CITEREFBell1983\"] = 1,\n [\"CITEREFBider,_D.2018\"] = 1,\n [\"CITEREFBigelow2020\"] = 1,\n [\"CITEREFBiswasBiswas1981\"] = 1,\n [\"CITEREFBlum2020\"] = 1,\n [\"CITEREFBlundell1998\"] = 1,\n [\"CITEREFBoncardo2018\"] = 1,\n [\"CITEREFBonneau2016\"] = 1,\n [\"CITEREFBoritz2005\"] = 1,\n [\"CITEREFBragg2016\"] = 1,\n [\"CITEREFBraun2015\"] = 1,\n [\"CITEREFCampbell,_T.2016\"] = 1,\n [\"CITEREFCannon2016\"] = 1,\n [\"CITEREFCheck2004\"] = 1,\n [\"CITEREFChen_Liang2011\"] = 1,\n [\"CITEREFChengZhangHan2013\"] = 1,\n [\"CITEREFCho_KimKhansaJames2011\"] = 1,\n [\"CITEREFChoudhuryRappaport1981\"] = 1,\n [\"CITEREFChristofori2014\"] = 1,\n [\"CITEREFClemens\"] = 1,\n [\"CITEREFCobeyLarremoreGradLipsitch2021\"] = 1,\n [\"CITEREFColemanAndron2015\"] = 1,\n [\"CITEREFCrinson2013\"] = 1,\n [\"CITEREFCrooks2006\"] = 1,\n [\"CITEREFDanielTitman2006\"] = 1,\n [\"CITEREFDanzigNational_Defense_University_Washington_DC_Inst_for_National_Strategic_Studies1995\"] = 1,\n [\"CITEREFDawson2020\"] = 1,\n [\"CITEREFDeNardis,_L.2007\"] = 1,\n [\"CITEREFDekar,_Paul_R.2012\"] = 1,\n [\"CITEREFDewi2020\"] = 1,\n [\"CITEREFDharmapalaHines2006\"] = 1,\n [\"CITEREFDhillon2007\"] = 1,\n [\"CITEREFDibattistaReimerStatMasucci2019\"] = 1,\n [\"CITEREFDoe1960\"] = 1,\n [\"CITEREFDuncanson1982\"] = 1,\n [\"CITEREFEasttom2021\"] = 1,\n [\"CITEREFEllis_Ormrod2012\"] = 1,\n [\"CITEREFFanWangChengLi2013\"] = 1,\n [\"CITEREFFetzerHighfillHossisoHowells2018\"] = 1,\n [\"CITEREFFienbergSlavković2011\"] = 1,\n [\"CITEREFFink2004\"] = 1,\n [\"CITEREFFollman2014\"] = 1,\n [\"CITEREFForrester2014\"] = 1,\n [\"CITEREFFowler2016\"] = 1,\n [\"CITEREFFrampton2014\"] = 1,\n [\"CITEREFFuginiMartella1988\"] = 1,\n [\"CITEREFGiriBaruaSrivastavaJana2010\"] = 1,\n [\"CITEREFGlatthaar2011\"] = 1,\n [\"CITEREFGoatcher2013\"] = 1,\n [\"CITEREFGold2004\"] = 1,\n [\"CITEREFGordonLoeb2002\"] = 1,\n [\"CITEREFGrama,_J.L.2014\"] = 1,\n [\"CITEREFGreat_Britain._Parliament._House_of_Commons2007\"] = 1,\n [\"CITEREFGrewer,_C.Balani,_P.Weidenfeller,_C.Bartusel,_T.2005\"] = 1,\n [\"CITEREFHall1917\"] = 1,\n [\"CITEREFHam2021\"] = 1,\n [\"CITEREFHarrisonCraftHillerMcCluskey1996\"] = 1,\n [\"CITEREFHibberd2015\"] = 1,\n [\"CITEREFHoanh1996\"] = 1,\n [\"CITEREFHotchkiss2010\"] = 1,\n [\"CITEREFHryshko2020\"] = 1,\n [\"CITEREFIgelnikZurada2013\"] = 1,\n [\"CITEREFIngrahamBan1984\"] = 1,\n [\"CITEREFIqbalSoroyaMahmood2023\"] = 1,\n [\"CITEREFJenner1995\"] = 1,\n [\"CITEREFJensen2020\"] = 1,\n [\"CITEREFJohnson,_L.2015\"] = 1,\n [\"CITEREFJohnson1997\"] = 1,\n [\"CITEREFJohnson2014\"] = 1,\n [\"CITEREFJoshiSingh2017\"] = 1,\n [\"CITEREFKadlec2012\"] = 1,\n [\"CITEREFKampfner1985\"] = 1,\n [\"CITEREFKavanagh1994\"] = 1,\n [\"CITEREFKekes2019\"] = 1,\n [\"CITEREFKeyser2018\"] = 1,\n [\"CITEREFKhairuddinSidekAbdul_MajeedRazman2021\"] = 1,\n [\"CITEREFKim2000\"] = 1,\n [\"CITEREFKim2006\"] = 1,\n [\"CITEREFKing1993\"] = 1,\n [\"CITEREFKiountouzisKokolakis1996\"] = 1,\n [\"CITEREFKirchmerScheer2003\"] = 1,\n [\"CITEREFKirkWall2011\"] = 1,\n [\"CITEREFKissell\"] = 1,\n [\"CITEREFKitchen2008\"] = 1,\n [\"CITEREFKoppelman2011\"] = 1,\n [\"CITEREFKramer2018\"] = 1,\n [\"CITEREFKrutzRussell_Dean_Vines2003\"] = 1,\n [\"CITEREFKumarMahtoKumariRavi2016\"] = 1,\n [\"CITEREFLandrock2005\"] = 2,\n [\"CITEREFLarsen2019\"] = 1,\n [\"CITEREFLawrence_Livermore_National_Laboratory._United_States._Department_of_Energy._Office_of_Scientific_and_Technical_Information1995\"] = 1,\n [\"CITEREFLayton2007\"] = 1,\n [\"CITEREFLe_May2003\"] = 1,\n [\"CITEREFLee2017\"] = 1,\n [\"CITEREFLeech1996\"] = 1,\n [\"CITEREFLehtonen2017\"] = 1,\n [\"CITEREFLequiller,_F.Blades,_D.2014\"] = 1,\n [\"CITEREFLientz2002\"] = 1,\n [\"CITEREFLoukasOke2010\"] = 1,\n [\"CITEREFLundgren2018\"] = 1,\n [\"CITEREFLyuLau2000\"] = 1,\n [\"CITEREFMaerGay2008\"] = 1,\n [\"CITEREFMazikana2020\"] = 1,\n [\"CITEREFMcAuliffe1987\"] = 1,\n [\"CITEREFMcCarthy,_C.2006\"] = 1,\n [\"CITEREFMcCormick,_Douglas_P.2016\"] = 1,\n [\"CITEREFMcNab2004\"] = 1,\n [\"CITEREFMoreStieberLiu2016\"] = 1,\n [\"CITEREFMortimer2010\"] = 1,\n [\"CITEREFMurphy2009\"] = 1,\n [\"CITEREFNewsome,_B.2013\"] = 1,\n [\"CITEREFNijmeijer2003\"] = 1,\n [\"CITEREFNohKimKwonCho2016\"] = 1,\n [\"CITEREFOECD2016\"] = 1,\n [\"CITEREFOhtaFujii2011\"] = 1,\n [\"CITEREFParker1994\"] = 1,\n [\"CITEREFParrishImpagliazzoRajSantos2018\"] = 1,\n [\"CITEREFPeiss2020\"] = 1,\n [\"CITEREFPeltier2001\"] = 1,\n [\"CITEREFPeltier2002\"] = 1,\n [\"CITEREFPerrin2008\"] = 1,\n [\"CITEREFPevnev2018\"] = 1,\n [\"CITEREFPhillipsLandahl2021\"] = 1,\n [\"CITEREFPournelle2004\"] = 1,\n [\"CITEREFPriest2019\"] = 1,\n [\"CITEREFRahim2006\"] = 1,\n [\"CITEREFRamanadham\"] = 1,\n [\"CITEREFRandall2011\"] = 1,\n [\"CITEREFRavallionChen2017\"] = 1,\n [\"CITEREFRay2004\"] = 1,\n [\"CITEREFReason2017\"] = 1,\n [\"CITEREFRenes1999\"] = 1,\n [\"CITEREFReynolds1995\"] = 1,\n [\"CITEREFRichards2012\"] = 1,\n [\"CITEREFRoerPetric2017\"] = 1,\n [\"CITEREFRowan1967\"] = 1,\n [\"CITEREFRuppert,_K.2011\"] = 1,\n [\"CITEREFSalazar2006\"] = 1,\n [\"CITEREFSamonas,_S.Coss,_D.2014\"] = 1,\n [\"CITEREFSantos2015\"] = 1,\n [\"CITEREFSchliengerTeufel2003\"] = 1,\n [\"CITEREFSchnurr2009\"] = 1,\n [\"CITEREFSchuler1995\"] = 1,\n [\"CITEREFSchumacher2016\"] = 1,\n [\"CITEREFSebag–Montefiore,_H.2011\"] = 1,\n [\"CITEREFShaoSkarlicki2014\"] = 1,\n [\"CITEREFShon_Harris2003\"] = 1,\n [\"CITEREFSingh2000\"] = 1,\n [\"CITEREFSingh2015\"] = 1,\n [\"CITEREFSlade\"] = 1,\n [\"CITEREFSmeets2009\"] = 1,\n [\"CITEREFSodjahinChampagneCogginsGillet2017\"] = 1,\n [\"CITEREFSolis2019\"] = 1,\n [\"CITEREFSpagnolettiResca_A.2008\"] = 1,\n [\"CITEREFStandaertEthgenEmerson2012\"] = 1,\n [\"CITEREFSteinSchabergBiddle2015\"] = 1,\n [\"CITEREFStewart2012\"] = 1,\n [\"CITEREFStone,_Edward\"] = 1,\n [\"CITEREFStoneburnerGoguenFeringa2002\"] = 1,\n [\"CITEREFStoneburnerHaydenFeringa2004\"] = 1,\n [\"CITEREFSuetonius_Tranquillus2008\"] = 1,\n [\"CITEREFSuttonCherneyWhite2008\"] = 1,\n [\"CITEREFTakach2016\"] = 1,\n [\"CITEREFTan2017\"] = 1,\n [\"CITEREFTaylor,_J.2008\"] = 1,\n [\"CITEREFThomas2017\"] = 1,\n [\"CITEREFToms1992\"] = 1,\n [\"CITEREFTurner-Gottschang1987\"] = 1,\n [\"CITEREFUnited_States._Department_of_Energy._Office_of_Inspector_General._Office_of_Scientific_and_Technical_Information2009\"] = 1,\n [\"CITEREFVallabhaneni,_S.R.2008\"] = 1,\n [\"CITEREFVan_Buren1990\"] = 1,\n [\"CITEREFVenterEloff2003\"] = 1,\n [\"CITEREFVile2013\"] = 1,\n [\"CITEREFWei2000\"] = 1,\n [\"CITEREFWeik2000\"] = 2,\n [\"CITEREFWeiss2004\"] = 1,\n [\"CITEREFWendel-PerssonRonnhed2017\"] = 1,\n [\"CITEREFWerner2011\"] = 1,\n [\"CITEREFWhite2003\"] = 1,\n [\"CITEREFWhitman,_M.E.Mattord,_H.J.2016\"] = 1,\n [\"CITEREFWhitmanMattord2017\"] = 1,\n [\"CITEREFWilbyOrrHedgerForrow2006\"] = 1,\n [\"CITEREFWilding2017\"] = 1,\n [\"CITEREFWillison,_M.2018\"] = 1,\n [\"CITEREFYoung2018\"] = 1,\n [\"CITEREFYusoffYusof2009\"] = 1,\n [\"CITEREFZhuangChenShengHong2020\"] = 1,\n [\"CITEREFZoccaliMallamaciTripepi2007\"] = 1,\n [\"CITEREFde_Guise2020\"] = 1,\n [\"CITEREFde_SouzaLynch2012\"] = 1,\n [\"CITEREFБучикЮдінНетребко2016\"] = 1,\n}\ntemplate_list = table#1 {\n [\"!\"] = 1,\n [\"Authority control\"] = 1,\n [\"Citation\"] = 81,\n [\"Citation needed\"] = 3,\n [\"Cite book\"] = 95,\n [\"Cite encyclopedia\"] = 2,\n [\"Cite journal\"] = 84,\n [\"Cite preprint\"] = 1,\n [\"Cite report\"] = 2,\n [\"Cite thesis\"] = 5,\n [\"Cite video\"] = 1,\n [\"Cite web\"] = 46,\n [\"Colbegin\"] = 1,\n [\"Colend\"] = 1,\n [\"Commons category\"] = 1,\n [\"Computer science\"] = 1,\n [\"DTIC\"] = 2,\n [\"Doi\"] = 1,\n [\"Information security\"] = 1,\n [\"Main\"] = 9,\n [\"Merge from\"] = 1,\n [\"Page needed\"] = 1,\n [\"Refbegin\"] = 2,\n [\"Refend\"] = 2,\n [\"Reflist\"] = 1,\n [\"SecurityType\"] = 1,\n [\"Sfn\"] = 4,\n [\"Short description\"] = 1,\n [\"Sic\"] = 1,\n [\"UnitedStatesCode\"] = 1,\n [\"Usc\"] = 1,\n [\"Use mdy dates\"] = 1,\n [\"Webarchive\"] = 3,\n}\narticle_whitelist = table#1 {\n}\n","limitreport-profile":[["?","300","16.3"],["MediaWiki\\Extension\\Scribunto\\Engines\\LuaSandbox\\LuaSandboxCallback::callParserFunction","280","15.2"],["dataWrapper \u003Cmw.lua:672\u003E","220","12.0"],["MediaWiki\\Extension\\Scribunto\\Engines\\LuaSandbox\\LuaSandboxCallback::match","160","8.7"],["recursiveClone \u003CmwInit.lua:45\u003E","100","5.4"],["MediaWiki\\Extension\\Scribunto\\Engines\\LuaSandbox\\LuaSandboxCallback::plain","80","4.3"],["MediaWiki\\Extension\\Scribunto\\Engines\\LuaSandbox\\LuaSandboxCallback::getExpandedArgument","60","3.3"],["MediaWiki\\Extension\\Scribunto\\Engines\\LuaSandbox\\LuaSandboxCallback::gsub","60","3.3"],["concat","60","3.3"],["MediaWiki\\Extension\\Scribunto\\Engines\\LuaSandbox\\LuaSandboxCallback::find","60","3.3"],["[others]","460","25.0"]]},"cachereport":{"origin":"mw-api-ext.codfw.main-7556f8b5dd-46hdx","timestamp":"20241123054619","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Information security","url":"https:\/\/en.wikipedia.org\/wiki\/Information_security","sameAs":"http:\/\/www.wikidata.org\/entity\/Q189900","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q189900","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2001-10-31T17:53:01Z","dateModified":"2024-11-23T05:46:17Z","headline":"protecting information by mitigating information risks"}</script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10