Ce module est une ressource pour les enseignants

Lectures essentielles

Cette section fournit une liste de documents (partiellement en libre accès) que l’enseignant ou enseignante peut demander aux étudiants de lire avant de suivre un cours basé sur ce module.

  • Adams, Anne, Martina Angela Sasse, and Peter Lunt. (1997). Making passwords secure and usable. In: People and Computers XII - Proc. of the 7th International Conference on Human-Computer Interaction (HCI'97), Springer.
  • Arora, Ashish, Anand Nandkumar, and Rahul Telang. (2006). Does information security attack frequency increase with vulnerability disclosure? An empirical analysis. Information Systems Frontiers, Vol. 8 (5), 350-362.
  • Beebe, Nicole Lang and V. Srinivasan Rao. (2005). Using Situational Crime Prevention Theory to Explain the Effectiveness of Information Systems Security. Proceedings of the 2005 SoftWars Conference, Las Vegas, NV, Dec 2005.
  • Collins, J. D., Vincenzo A. Sainato, and David N. Khey. (2011). Organizational Data Breaches 2005-2010: Applying SCP to the Healthcare and Education Sectors. International Journal of Cyber Criminology Vol. 5(1), 794-810.
  • Cornish, Derek B., & Clarke, R. V. G. (2003). Opportunities, precipitators, and criminal decisions: A reply to Wortley's critique of situational crime prevention. In: Martha J. Smith and Derek B. Cornish (Guest Eds.). Theory for practice in situational crime. Willan.
  • Dali, Alex and Christopher Lajtha. (2012). ISO 31000 Risk Management - "The Gold Standard." EDPACS, Vol. 45(5), 1-8.
  • Eloff, M. M. and J. H. P. Eloff. (2002). Human Computer Interaction: An Information Security Perspectives. In: M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi and Heba K. Aslan. Security in the Information Society: Visions and perspectives. Springer.
  • ENISA. (2017). Hardware Threat Landscape and Good Practice Guide , Version 1.
  • Luko, Stephen N. (2013). Risk Management Terminology. Quality Engineering, Vol. 25 (3), 292-297.
  • NIST. (2018). Framework for Improving Critical Infrastructure Cybersecurity . National Institute of Standards and Technology.
  • UNODC. (2010). Handbook on the crime prevention guidelines: Making them work .
Section suivante : Lectures avancées
Haut de page