Fuzzy Logic Application to Link National Culture and Cybersecurity Maturity
暂无分享,去创建一个
Jongkil Jay Jeong | Marthie Grobler | M.A.P. Chamikara | Carsten Rudolph | C. Rudolph | M. Grobler | Pathum Chamikara Mahawaga Arachchige | J. Jeong
[1] G. Hofstede. Dimensionalizing cultures: The Hofstede model in context , 2011 .
[2] Xiaolan Fu,et al. The Impact of Individualism—Collectivism, Social Presence, and Group Diversity on Group Decision Making Under Majority Influence , 2007, J. Manag. Inf. Syst..
[3] G. White,et al. The Community Cyber Security Maturity Model , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[4] Rossouw von Solms,et al. An Ontology for a National Cyber-Security Culture Environment , 2015, HAISA.
[5] Kevin F. McCrohan,et al. Influence of Awareness and Training on Cyber Security , 2010 .
[6] D. Henshel,et al. Integrating Cultural Factors into Human Factors Framework and Ontology for Cyber Attackers , 2016 .
[7] L. Hadlington. Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours , 2017, Heliyon.
[8] Tomás San Feliu Gilabert,et al. Comparative Study of Cybersecurity Capability Maturity Models , 2017, SPICE.
[9] Elmarie Kritzinger,et al. The influence of national culture on information security culture , 2016, 2016 IST-Africa Week Conference.
[10] Minxin Pei,et al. The Paradoxes of American Nationalism , 2003 .
[11] Helen Petrie,et al. Cultural and Gender Differences in Password Behaviors: Evidence from China, Turkey and the UK , 2016, NordiCHI.
[12] G. Hofstede. The Cultural Relativity of Organizational Practices and Theories , 1983 .
[13] Ruey-Lin Hsiao,et al. Technology fears: distrust and cultural persistence in electronic marketplace adoption , 2003, J. Strateg. Inf. Syst..
[14] Süleyman Kardas,et al. Examination of a New Defense Mechanism: Honeywords , 2017, IACR Cryptol. ePrint Arch..
[15] Ulrich Remus,et al. The Role of Cultural Differences and Cultural Intelligence in Controlling IS Offshoring Projects: A Theoretical Model , 2011, AMCIS.
[16] L. Myers,et al. Spearman Correlation Coefficients, Differences between , 2004 .