Internet Security Readiness: The Influence of Internet Usage Level and Awareness on Internet Security Readiness Capital, Skill, and Actual Uptake/Use of Infrastructure
暂无分享,去创建一个
[1] Janet Morahan-Martin,et al. Internet Abuse , 2005 .
[2] 서정연,et al. Journal of Computing Science and Engineering(JCSE)의 국제화 작업 , 2010 .
[3] Gustavo A. Santana Torrellas. A Framework for Multi-Agent System Engineering using Ontology Domain Modelling for Security Architecture Risk Assessment in E-Commerce Security Services , 2004, NCA.
[4] Mehdi Khosrow-Pour,et al. The Social and Cognitive Impacts of E-Commerce on Modern Organizations , 2003 .
[5] Erik Bohlin,et al. Global Economy and Digital Society , 2004 .
[6] Claire A. Simmers,et al. Internet user satisfaction, job satisfaction and internet background: an exploratory study , 2002 .
[7] Kevin McLean,et al. Information Security Awareness - Selling the Cause , 1992, IFIP International Information Security Conference.
[8] Nahid Shahmehri,et al. Security Issues in E-Home Network and Software Infrastructures , 2001 .
[9] Steven Furnell,et al. Assessing the security perceptions of personal Internet users , 2007, Comput. Secur..
[10] Marianne Swanson,et al. Security metrics guide for information technology systems , 2003 .
[11] Phil Spurling,et al. Promoting security awareness and commitment , 1995, Inf. Manag. Comput. Secur..
[12] Leon Reznik,et al. Notice of Violation of IEEE Publication PrinciplesWhich models should be applied to measure computer security and information assurance? , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..
[13] Herbert J. Mattord,et al. Principles of Information Security, 4th Edition , 2011 .
[14] E. Rabinovitch. Security On The Net , 1997, IEEE Communications Magazine.
[15] R. LaRose,et al. Understanding Internet Usage , 2001 .
[16] Michael H. Kutner. Applied Linear Statistical Models , 1974 .
[17] David Wright,et al. Towards Operational Measures of Computer Security , 1993, J. Comput. Secur..
[18] Sang Hyuk Son,et al. Applying Formal Methods to Modeling and Analysis of Real-time Data Streams , 2011, J. Comput. Sci. Eng..
[19] A. Agresti,et al. Statistical Methods for the Social Sciences , 1979 .
[20] Magid Igbaria,et al. An exploratory investigation of the antecedents and impact of Internet usage: an individual perspective , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.
[21] Richard Hackworth,et al. OECD 'Guidelines for the Security of Information Systems" , 1993, Security and Control of Information Technology in Society.
[22] V. Barnett,et al. Applied Linear Statistical Models , 1975 .
[23] David Kotz,et al. Identifying Unusual Days , 2011, J. Comput. Sci. Eng..
[24] A. Jones,et al. A framework for the management of information security risks , 2007 .
[25] Herbert J. Mattord,et al. Principles of Information Security , 2004 .
[26] Shirley C. Payne,et al. A Guide to Security Metrics , 2007 .
[27] Magid Igbaria,et al. An exploratory investigation of the antecedents and impact of internet usage: An individual perspective , 2000, Behav. Inf. Technol..
[28] Thompson S. H. Teo,et al. Intrinsic and extrinsic motivation in Internet usage , 1999 .
[29] Rossouw von Solms,et al. Information security awareness: educating your users effectively , 1998, Inf. Manag. Comput. Secur..
[30] Mikko T. Siponen,et al. A conceptual foundation for organizational information security awareness , 2000, Inf. Manag. Comput. Secur..