Editörler Prof. Dr. Şeref Sağıroğlu Prof. Dr. Mustafa Alkan Sağıroğlu / Alkan grafik



Yüklə 3,91 Mb.
Pdf görüntüsü
səhifə105/219
tarix20.11.2023
ölçüsü3,91 Mb.
#163459
1   ...   101   102   103   104   105   106   107   108   ...   219
siber-guvenlik-kitap-basila-04-01-2019

Kaynaklar
[1] Green, Jeremy Swinfen. Cyber Security: An Introduction for Non-
Technical Managers. Routledge, 2016.
[2] Jaeger, Trent. “Configuring Software and Systems for Defense-in-
Depth.” Proceedings of the 2016 ACM Workshop on Automated 
Decision Making for Active Cyber Defense. ACM, 2016.
[3] Levillain, Olivier, Baptiste Gourdin, and Hervé Debar. “TLS record 
protocol: Security analysis and defense-in-depth countermeasures 
for HTTPS.” Proceedings of the 10th ACM Symposium on 
Information, Computer and Communications Security. ACM, 2015.
[4] Joinson, Adam, and Tommy van Steen. “Human aspects of cyber 
security: Behaviour or culture change?.” Cyber Security: A Peer-
Reviewed Journal 1.4 (2018): 351-360.
[5] Banfield, James Michael. A Study of Information Security Awareness 


A T I L A B O S T A N - G Ö K H A N Ş E N G Ü L
160
Program Effectiveness in Predicting End-User Security Behavior. 
Eastern Michigan University, 2016.
[6] Arachchilage, Nalin Asanka Gamagedara, and Steve Love. “Security 
awareness of computer users: A phishing threat avoidance 
perspective.” Computers in Human Behavior 38 (2014): 304-312.
[7] Cisco, Cisco 2018 Annual Cybersecurity Report, 20.07.2018 tarihinde 
“https://www.cisco.com/c/en/us/products/security/security-reports. 
html#~download-the-report” internet adresinden erişilmiştir.
[8] Symantec, 2018 Internet Security Threat Report, 20.07.2018 
tarihinde“https://www.symantec.com/security-center/threat-
report?inid= globalnav_scflyout_istr” internet adresinden 
erişilmiştir.
[9] McIlwraith, Angus. Information security and employee behaviour: how 
to reduce risk through employee education, training and awareness. 
Routledge, 2016.
[10] Anthony Zurcher, Hillary Clinton emails - what’s it all about?,
20.07.2018 
tarihinde 
“https://www.bbc.com/news/world-us-
canada-31806907” internet adresinden erişilmiştir.
[11] Bostan, Atila. “Implicit learning with certificate warning messages 
on SSL web pages: what are they teaching?.” Security and 
Communication Networks 9.17 (2016): 4295-4300.
[12] Tarazan, Şafak, and Atila Bostan. “Customizing SSL Certificate 
Extensions to Reduce False-Positive Certificate Error/Warning 
Messages.” International Journal of Information Security Science 5.2 
(2016): 21-28.
[13] Reeder, Robert W., et al. “An Experience Sampling Study of User 
Reactions to Browser Warnings in the Field.” Proceedings of the 
2018 CHI Conference on Human Factors in Computing Systems. 
ACM, 2018.
[14] Felt, Adrienne Porter, et al. “Improving SSL warnings: Comprehension 
and adherence.” Proceedings of the 33rd Annual ACM Conference 
on Human Factors in Computing Systems. ACM, 2015.
[15] Carvalho, Marco, et al. “Heartbleed 101.” IEEE Security & Privacy 12.4 
(2014): 63-67.
[16] Sinn, Richard. Software security technologies. Cengage Learning, 2015.
[17] Aljawarneh, Shadi A., and Muneer O. Bani Yassein. “A conceptual 
security framework for cloud computing issues.” International 


S İ B E R G Ü V E N L İ K F A R K I N D A L I Ğ I O L U Ş T U R M A
161
Journal of Intelligent Information Technologies (IJIIT) 12.2 (2016): 
12-24.
[18] Stobert, Elizabeth, and Robert Biddle. “The password life cycle: user 
behaviour in managing passwords.” Proc. SOUPS. 2014.
[19] McIlwraith, Angus. Information security and employee behaviour: 
how to reduce risk through employee education, training and 
awareness. Routledge, 2016.
[20] Bostan, Atila, and İbrahim Akman. “Bilişim Güvenliği: Kullanıcı 
Açısından bir Durum Tespiti.” Bildiriler Kitabı: 51.
[21] Alotaibi, Fayez, Nathan Clarke, and Steven Furnell. “An analysis of 
home user security awareness & education.” Internet Technology 
and Secured Transactions (ICITST), 2017 12th International 
Conference for. IEEE, 2017.
[22] McIlwraith, Angus. Information security and employee behaviour: 
how to reduce risk through employee education, training and 
awareness. Routledge, 2016.
[23] Abawajy, Jemal. “User preference of cyber security awareness delivery 
methods.” Behaviour & Information Technology 33.3 (2014): 237-
248.




Yüklə 3,91 Mb.

Dostları ilə paylaş:
1   ...   101   102   103   104   105   106   107   108   ...   219




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin