Security Strategies for Hindering Watering Hole Cyber Crime Attack
暂无分享,去创建一个
Manmeet Mahinderjit Singh | Pantea Keikhosrokiani | Zakiah Zulkefli | Khairun Ashikin Ismail | Norlia Mustaffa
[1] Rex B. Kline,et al. Book Review: Psychometric theory (3rd ed.) , 1999 .
[2] Eden Dahlstrom,et al. ECAR Study of Undergraduate Students and Information Technology, 2014. , 2014 .
[3] R. W. Rogers,et al. A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.
[4] H. Raghav Rao,et al. Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..
[5] Ashwin Pillay,et al. Does BYOD increase risks or drive benefits , 2013 .
[6] Edgar R. Weippl,et al. Advanced social engineering attacks , 2015, J. Inf. Secur. Appl..
[7] Daniele Sgandurra,et al. A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.
[8] Azman Samsudin,et al. Trusted Security Policies for Tackling Advanced Persistent Threat via Spear Phishing in BYOD Environment , 2015 .
[9] Scott Emery. Factors for Consideration when Developing a Bring Your Own Device (BYOD) Strategy in Higher Education , 2012 .
[10] Mikko T. Siponen,et al. Motivating IS security compliance: Insights from Habit and Protection Motivation Theory , 2012, Inf. Manag..
[11] E. Seydel,et al. Protection Motivation Theory , 2022 .
[12] Siddhi Pittayachawan,et al. Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach , 2015, Comput. Secur..