A Case Study on E-Banking Security â When Security BecomesToo Sophisticated for the User to Access Their Information
暂无分享,去创建一个
[1] Mikko T. Siponen,et al. Five dimensions of information security awareness , 2001, CSOC.
[2] Mark B. Desman. The Ten Commandments of Information Security Awareness Training , 2003, Inf. Secur. J. A Glob. Perspect..
[3] John Leach,et al. Improving user security behaviour , 2003, Comput. Secur..
[4] Gurpreet Dhillon,et al. Technical opinion: Information system security management in the new millennium , 2000, CACM.
[5] Kamini Singh. Innovated Technology in Banking Services , 2011 .
[6] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[7] Mikko T. Siponen,et al. Ontology of organizational IT security awareness-from theoretical foundations to practical framework , 1998, Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253).
[8] Michael E. Whitman. Enemy at the gate: threats to information security , 2003, CACM.
[9] Lawrence A. Gordon,et al. The economics of information security investment , 2002, TSEC.
[10] Carl E. Landwehr,et al. Computer security , 2001, International Journal of Information Security.
[11] Garry Dinnie. The Second Annual Global Information Security Survey , 1999, Inf. Manag. Comput. Secur..
[12] L. R. Chao,et al. An empirical study of information security policy on information security elevation in Taiwan , 2006, Inf. Manag. Comput. Secur..
[13] Anne Powell,et al. Information Systems Management , 1997 .
[14] Dawn Song,et al. Hash Visualization: a New Technique to improve Real-World Security , 1999 .
[15] Houston H. Carr,et al. Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..
[16] K. Mccrohan. Facing the threats to electronic commerce , 2003 .
[17] Dennis F. Galletta,et al. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..
[18] Tzvi Raz,et al. Analysis of active intrusion prevention data for predicting hostile activity in computer networks , 2007, CACM.
[19] Jean-Marc Robert,et al. Security and usability: the case of the user authentication methods , 2006, IHM '06.
[20] Morris Sloman,et al. Policy driven management for distributed systems , 1994, Journal of Network and Systems Management.
[21] Atreyi Kankanhalli,et al. Impact of Security Measures on the Usefulness of Knowledge Management Systems , 2005, PACIS.
[22] Anat Hovav,et al. Deterring internal information systems misuse , 2007, CACM.
[23] Rolf Oppliger. IT security: in search of the Holy Grail , 2007, CACM.