Skip to content

Commit

Permalink
Fixing compilation errors due to the bibliography. References #8
Browse files Browse the repository at this point in the history
  • Loading branch information
unintendedbear committed Jun 14, 2017
1 parent 7f88fa3 commit 43c81e5
Show file tree
Hide file tree
Showing 3 changed files with 16 additions and 56 deletions.
2 changes: 2 additions & 0 deletions compilar
Original file line number Diff line number Diff line change
@@ -1,5 +1,7 @@
#!/bin/sh

clear

rm *.mtc
rm *.aux
rm *.bbl
Expand Down
15 changes: 1 addition & 14 deletions review_muses.bib
Original file line number Diff line number Diff line change
Expand Up @@ -233,7 +233,7 @@ @article{SecPolComp14
author = {Mikko T. Siponen and
M. Adam Mahmood and
Seppo Pahnila},
title = {Employees' adherence to information security policies: An exploratory
title = {Employees\'{} adherence to information security policies: An exploratory
field study},
journal = {Information {\&} Management},
volume = {51},
Expand Down Expand Up @@ -840,19 +840,6 @@ @mastersthesis{Samaras13SaaS
month = 8,
}

@article{Miller12Privacy,
author = {Keith W. Miller and
Jeffrey M. Voas and
George F. Hurlburt},
title = {{BYOD:} Security and Privacy Considerations},
journal = {{IT} Professional},
volume = {14},
number = {5},
pages = {53--55},
year = {2012},
doi = {10.1109/MITP.2012.93},
}

@article{Romer14BestPractices,
title = "Best practices for {BYOD} security ",
journal = "Computer Fraud \& Security ",
Expand Down
55 changes: 13 additions & 42 deletions tesis.bib
Original file line number Diff line number Diff line change
Expand Up @@ -43,13 +43,14 @@ @article{singh2012byod
}

@article{miller2012byod,
title={BYOD: Security and Privacy Considerations.},
title={{BYOD:} Security and Privacy Considerations.},
author={Miller, Keith W and Voas, Jeffrey M and Hurlburt, George F},
journal={It Professional},
journal={{IT} Professional},
volume={14},
number={5},
pages={53--55},
year={2012}
year={2012},
doi={10.1109/MITP.2012.93}
}

@inproceedings{lennon2012changing,
Expand All @@ -69,7 +70,7 @@ @inproceedings{lennon2012changing
@article{rios2015mobile,
title={A mobile business information system for the control of local and remote workforce through reactive and behavior-based monitoring},
author={R{\'\i}os-Aguilar, Sergio and Llor{\'e}ns-Montes, Francisco-Javier},
author={R{\'\i}os-Aguilar and Sergio and Llor{\'e}ns-Montes and Francisco-Javier},
journal={Expert Systems with Applications},
volume={42},
number={7},
Expand All @@ -81,7 +82,7 @@ @article{rios2015mobile
% User behaviour
@article{Adams_users99,
author = {Adams, A., Sasse, A.},
author = {Adams, A. and Sasse, A.},
title = {Users are not the enemy},
journal = {Communications of the ACM Magazine.},
issue_date = {December 1999},
Expand All @@ -97,7 +98,7 @@ @article{Adams_users99
}

@Book{Schum_SecPat05,
author = {Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad, P.},
author = {Schumacher, M. and Fernandez-Buglioni and E., Hybertson and D., Buschmann and F., Sommerlad, P.},
title = {Security Patterns: Integrating Security and Systems Engineering},
publisher = {John Wiley \& sons},
year = 2005
Expand All @@ -109,18 +110,18 @@ @incollection{Sip_SecPriv07
booktitle={New Approaches for Security, Privacy and Trust in Complex Environments},
volume={232},
series={IFIP International Federation for Information Processing},
editor={Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R.},
editor={Venter, H. and Eloff, M. and Labuschagne, L. and Eloff, J. and von Solms, R.},
issn={1571-5736},
title={Employees Adherence to Information Security Policies: An Empirical Study},
publisher={Springer US},
author={Siponen, M., Pahnila, S., Mahmood, A.},
author={Siponen, M. and Pahnila, S. and Mahmood, A.},
pages={133-144},
numpages = {11},
doi = {10.1007/978-0-387-72367-9_12}
}

@article{Bulg_SecPol10,
author = {Bulgurcu, B., Cavusoglu, H., Benbasat, I.},
author = {Bulgurcu, B. and Cavusoglu, H. and Benbasat, I.},
title = {Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness},
journal = {MIS Quarterly.},
issue_date = {September 2010},
Expand All @@ -145,7 +146,7 @@ @inproceedings{AlOmari_SecPol12
}

@article{Shaw_SecAware09,
author = {Shaw, R.S., Chen, C.C., Harris, A.L., Huang, H.-J.},
author = {Shaw, R.S. and Chen, C.C. and Harris, A.L. and Huang, H.-J.},
title = {The impact of information richness on information security awareness training effectiveness},
journal = {Computers \& Education.},
issue_date = {January 2009},
Expand All @@ -160,7 +161,7 @@ @article{Shaw_SecAware09
}

@article{Her_SecPol09,
author = {Herath, T., Rao, H.R.},
author = {Herath, T. and Rao, H.R.},
title = {Protection motivation and deterrence: a framework for security policy compliance in organisations},
journal = {European Journal of Information Systems},
issue_date = {April 2009},
Expand Down Expand Up @@ -235,24 +236,6 @@ @book{freitas2002data
publisher={Springer Science \& Business Media}
}

@inproceedings{sec_policy_evolution_gp_08,
author = {Lim, Yow Tzu and Cheng, Pau Chen and Rohatgi, Pankaj and Clark, John Andrew},
title = {MLS Security Policy Evolution with Genetic Programming},
booktitle = {Proceedings of the 10th Annual Conference on Genetic and Evolutionary Computation},
series = {GECCO '08},
year = {2008},
isbn = {978-1-60558-130-9},
location = {Atlanta, GA, USA},
pages = {1571--1578},
numpages = {8},
url = {http://doi.acm.org/10.1145/1389095.1389395},
doi = {10.1145/1389095.1389395},
acmid = {1389395},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {MLS, genetic programming, policy inference, security policy},
}
@inproceedings{pol_evol_gp_3_approaches_08,
author={Yow Tzu Lim and Pau Chen Cheng and Clark, J.A. and Rohatgi, P.},
booktitle={Evolutionary Computation, 2008. CEC 2008. (IEEE World Congress on Computational Intelligence). IEEE Congress on},
Expand Down Expand Up @@ -320,21 +303,17 @@ @article{Shalaginov2017359
volume={52},
pages={359-375},
doi={10.1016/j.asoc.2016.10.029},
note={cited By 0},
url={https://www.scopus.com/inward/record.uri?eid=2-s2.0-85009892768&doi=10.1016%2fj.asoc.2016.10.029&partnerID=40&md5=0ca12c58d835dba41c7b29fe6fa83e15},
document_type={Article},
source={Scopus},
}

@conference{Jaswal2015,
author={Jaswal, K. and Kumar, P. and Rawat, S.},
title={Design and development of a prototype application for intrusion detection using data mining},
journal={2015 4th International Conference on Reliability, Infocom Technologies and Optimization: Trends and Future Directions, ICRITO 2015},
booktitle={Reliability, Infocom Technologies and Optimization (ICRITO)(Trends and Future Directions), 2015 4th International Conference on},
year={2015},
doi={10.1109/ICRITO.2015.7359266},
art_number={7359266},
note={cited By 1},
url={https://www.scopus.com/inward/record.uri?eid=2-s2.0-84961833562&doi=10.1109%2fICRITO.2015.7359266&partnerID=40&md5=59b06a52024682bf3dc916d006bb5e2e},
document_type={Conference Paper},
source={Scopus},
}
Expand All @@ -348,8 +327,6 @@ @article{Murdoch20131351
number={13},
pages={1351-1352},
doi={10.1001/jama.2013.393},
note={cited By 247},
url={https://www.scopus.com/inward/record.uri?eid=2-s2.0-84875646817&doi=10.1001%2fjama.2013.393&partnerID=40&md5=513ce0af6da26a159f681a7d6275de35},
document_type={Short Survey},
source={Scopus},
}
Expand All @@ -363,8 +340,6 @@ @article{Poria201445
number={1},
pages={45-63},
doi={10.1016/j.knosys.2014.05.005},
note={cited By 83},
url={https://www.scopus.com/inward/record.uri?eid=2-s2.0-84924582748&doi=10.1016%2fj.knosys.2014.05.005&partnerID=40&md5=d84b2b670b3ff204f3d102064c7048b8},
document_type={Article},
source={Scopus},
}
Expand All @@ -377,8 +352,6 @@ @article{Ravi201514
volume={89},
pages={14-46},
doi={10.1016/j.knosys.2015.06.015},
note={cited By 73},
url={https://www.scopus.com/inward/record.uri?eid=2-s2.0-84944355103&doi=10.1016%2fj.knosys.2015.06.015&partnerID=40&md5=07e41c9e52589c04f8db935a8fac695b},
document_type={Article},
source={Scopus},
}
Expand All @@ -392,8 +365,6 @@ @article{Kosinski20135802
number={15},
pages={5802-5805},
doi={10.1073/pnas.1218772110},
note={cited By 303},
url={https://www.scopus.com/inward/record.uri?eid=2-s2.0-84876061994&doi=10.1073%2fpnas.1218772110&partnerID=40&md5=bf2a7e6dde703f281ac3fbc04f24310e},
document_type={Article},
source={Scopus},
}
Expand Down

0 comments on commit 43c81e5

Please sign in to comment.