Open Access
Issue
SHS Web of Conferences
Volume 10, 2014
4th International Interdisciplinary Scientific Conference SOCIETY, HEALTH, WELFARE
Article Number 00007
Number of page(s) 7
DOI https://doi.org/10.1051/shsconf/20141000007
Published online 08 September 2014
  1. Down P. (2012). Monitor All Employee Activity Across PCs, Laptops & the Internet, SpectorSoft Corp., published at http://www.frontiertechnology.co.uk/wp-content/uploads/2012/10/SpectorSoft-Presentation-24-Oct-2012.pdf. [Google Scholar]
  2. Harris, S. (2003). All-in-one CISSP Certification Exam Guide (2nd Ed. ed.). Emeryville, California: McGraw-Hill/Osborne. ISBN 0-07-222966-7. [Google Scholar]
  3. Kroes N. (2012). European commissioner for digital agenda, speech video published at youtube.com http://www.youtube.com/watch?v=hnzrJyNWgDE. [Google Scholar]
  4. Llinás M. (2012). Moving Towards a European Cyber Security Strategy, European Network & Information Security Agency (ENISA), published at enisa.europa.eu. [Google Scholar]
  5. Seybert H. (2011). Internet use in households and by individuals in 2011, Eurostat, published at http://epp.eurostat.ec.europa.eu/cache/ITY_OFFPUB/KS-SF-11-066/EN/KS-SF-11-066-EN.PDF. [Google Scholar]
  6. Vegetius, (4-5th century). Epitome of military science. Google Books. Books.google.com. Vegetius has: Igitur qui desiderat pacem, praeparet bellum. [Google Scholar]
  7. AS/NZS (2009). AS/NZS 31000:2009 Risk management – Principles and guidelines. Australian and New Zealand risk management standard. [Google Scholar]
  8. ISO/IEC (2005). 27001:2005 Information technology – Security techniques – Information security management systems – Requirements. International Organization for Standardization and the International Electrotechnical Commission. [Google Scholar]
  9. LETA (2012). Rıga grimst tumsā datorsistēmu klūdas dēl [Due to mistakes in the system, Riga's many street lights did not work] Latvia: The National News Agency LETA published at http://nra.lv/latvija/riga/83842-riga-grimst-tumsa-datorsistemu-kludas-del.htm. [Google Scholar]
  10. Verizonbusiness (2012). Dat breach investigation report 2012. published at http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf. [Google Scholar]
  11. Anonymous (2013). CERT.LV re‘gistrētie zemas prioritātes incidenti no 01.01.2013. lıdz 31.03.2013. [Security incident reports on 2013 Q1] Latvia: Information Technologies Security Incidents Response Institution published at https://cert.lv/resource/show/354. [Google Scholar]
  12. Anonymous (2011). European principles and guidelines for Internet resilience and stability. European Commission: published at http://ec.europa.eu/information_society/policy/nis/docs/principles_ciip/guidelines_internet_fin.pdf. [Google Scholar]
  13. Anonymous (2012). Pamatnostādnu projekts “Latvijas Informācijas tehnolonijas drošıbas stratē‘gija 2013–2018” [Draft Guidelines “Latvian Information Technology Security Strategy 2013–2018”] Latvia: Ministry of Transport published at http://www.mk.gov.lv/lv/mk/tap/?pid=40267912. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.