References
1.Ganesh, B., & Bright, J. (2020). Extreme digital speech: Contexts, responses and solutions. Vox-Pol: https://www.voxpol.eu/new-vox-pol-report-extreme-digital-speech-contexts-responses-and-solutions/
2.Rapoport, A., & Chammah, A. (1965). Prisoner’s dilemma. Ann Arbor: University of Michigan Press.
3.Kelley, H. H., & Thibaut, J. (1978). Interpersonal relations: A theory of interdependence. New York: Wiley.
4.Sallhammar, K., Helvik, B. E., & Knapskog, S. J. (2005). Incorporating attacker behavior in stochastic models of security. Proceedings of the World Conference on Security Management and Applied Computing, 122–134. Las Vegas, NV.
5.Scheibe, E. (1973). The logical analysis of quantum mechanics. Oxford: Pergamon.
6.Kahneman, D., ...
Get Information Security Management, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.