Kaynaklar
[1] Green, Jeremy Swinfen. Cyber Security: An Introduction for Non-
Technical Managers. Routledge, 2016.
[2] Jaeger, Trent. “Configuring Software and Systems for Defense-in-
Depth.” Proceedings of the 2016 ACM Workshop on Automated
Decision Making for Active Cyber Defense. ACM, 2016.
[3] Levillain, Olivier, Baptiste Gourdin, and Hervé Debar. “TLS record
protocol: Security analysis and defense-in-depth countermeasures
for HTTPS.” Proceedings of the 10th ACM Symposium on
Information, Computer and Communications Security. ACM, 2015.
[4] Joinson, Adam, and Tommy van Steen. “Human aspects of cyber
security: Behaviour or culture change?.” Cyber Security: A Peer-
Reviewed Journal 1.4 (2018): 351-360.
[5] Banfield, James Michael. A Study of Information Security Awareness
A T I L A B O S T A N - G Ö K H A N Ş E N G Ü L
160
Program Effectiveness in Predicting End-User Security Behavior.
Eastern Michigan University, 2016.
[6] Arachchilage, Nalin Asanka Gamagedara, and Steve Love. “Security
awareness of computer users: A phishing threat avoidance
perspective.” Computers in Human Behavior 38 (2014): 304-312.
[7] Cisco, Cisco 2018 Annual Cybersecurity Report, 20.07.2018 tarihinde
“https://www.cisco.com/c/en/us/products/security/security-reports.
html#~download-the-report” internet adresinden erişilmiştir.
[8] Symantec, 2018 Internet Security Threat Report, 20.07.2018
tarihinde“https://www.symantec.com/security-center/threat-
report?inid= globalnav_scflyout_istr” internet adresinden
erişilmiştir.
[9] McIlwraith, Angus. Information security and employee behaviour: how
to reduce risk through employee education, training and awareness.
Routledge, 2016.
[10] Anthony Zurcher, Hillary Clinton emails - what’s it all about?,
20.07.2018
tarihinde
“https://www.bbc.com/news/world-us-
canada-31806907” internet adresinden erişilmiştir.
[11] Bostan, Atila. “Implicit learning with certificate warning messages
on SSL web pages: what are they teaching?.” Security and
Communication Networks 9.17 (2016): 4295-4300.
[12] Tarazan, Şafak, and Atila Bostan. “Customizing SSL Certificate
Extensions to Reduce False-Positive Certificate Error/Warning
Messages.” International Journal of Information Security Science 5.2
(2016): 21-28.
[13] Reeder, Robert W., et al. “An Experience Sampling Study of User
Reactions to Browser Warnings in the Field.” Proceedings of the
2018 CHI Conference on Human Factors in Computing Systems.
ACM, 2018.
[14] Felt, Adrienne Porter, et al. “Improving SSL warnings: Comprehension
and adherence.” Proceedings of the 33rd Annual ACM Conference
on Human Factors in Computing Systems. ACM, 2015.
[15] Carvalho, Marco, et al. “Heartbleed 101.” IEEE Security & Privacy 12.4
(2014): 63-67.
[16] Sinn, Richard. Software security technologies. Cengage Learning, 2015.
[17] Aljawarneh, Shadi A., and Muneer O. Bani Yassein. “A conceptual
security framework for cloud computing issues.” International
S İ B E R G Ü V E N L İ K F A R K I N D A L I Ğ I O L U Ş T U R M A
161
Journal of Intelligent Information Technologies (IJIIT) 12.2 (2016):
12-24.
[18] Stobert, Elizabeth, and Robert Biddle. “The password life cycle: user
behaviour in managing passwords.” Proc. SOUPS. 2014.
[19] McIlwraith, Angus. Information security and employee behaviour:
how to reduce risk through employee education, training and
awareness. Routledge, 2016.
[20] Bostan, Atila, and İbrahim Akman. “Bilişim Güvenliği: Kullanıcı
Açısından bir Durum Tespiti.” Bildiriler Kitabı: 51.
[21] Alotaibi, Fayez, Nathan Clarke, and Steven Furnell. “An analysis of
home user security awareness & education.” Internet Technology
and Secured Transactions (ICITST), 2017 12th International
Conference for. IEEE, 2017.
[22] McIlwraith, Angus. Information security and employee behaviour:
how to reduce risk through employee education, training and
awareness. Routledge, 2016.
[23] Abawajy, Jemal. “User preference of cyber security awareness delivery
methods.” Behaviour & Information Technology 33.3 (2014): 237-
248.
|