An extended perspective on cybersecurity education
暂无分享,去创建一个
[1] Xu Sun,et al. An Augmented Cybersecurity Behavioral Research Model , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).
[2] Cormac Herley,et al. More Is Not the Answer , 2014, IEEE Security & Privacy.
[3] J. Manyika. Big data: The next frontier for innovation, competition, and productivity , 2011 .
[4] John Anderson,et al. Minimalist User Modelling in a Complex Commercial Software System , 2000, User Modeling and User-Adapted Interaction.
[5] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[6] Princely Ifinedo,et al. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory , 2012, Comput. Secur..
[7] Hanudin Amin. Journal of Internet Banking and Commerce Internet Banking Adoption among Young Intellectuals , 2022 .
[8] Zinta S. Byrne,et al. The Psychology of Security for the Home Computer User , 2012, 2012 IEEE Symposium on Security and Privacy.
[9] Nuray Aykin,et al. Individual differences in human-computer interaction: a survey , 1991 .
[10] T. Ramayah,et al. Doing e-Research with e-Library: Determinants of Perceived Ease of Use of e-Library , 2006 .
[11] Clare-Marie Karat,et al. Usable security and privacy: a case study of developing privacy management tools , 2005, SOUPS '05.
[12] Shari Lawrence Pfleeger,et al. Guest Editors' Introduction: Shouldn't All Security Be Usable? , 2011, IEEE Secur. Priv..
[13] Chaomei Chen,et al. Individual differences in virtual environments-introduction and overview , 2000 .
[14] Patrick Y. K. Chau,et al. Influence of Computer Attitude and Self-Efficacy on IT Usage Behavior , 2001, J. Organ. End User Comput..
[15] André P. Calitz,et al. The evaluation of an adaptive user interface model , 2010, SAICSIT '10.
[16] Sadie Creese,et al. Guidelines for usable cybersecurity: Past and present , 2011, 2011 Third International Workshop on Cyberspace Safety and Security (CSS).
[17] Hassan Jameel Asghar,et al. Design and analysis of human identification protocols , 2012 .
[18] Mohd Salehuddin Mohd Zahari,et al. Individual Differences, Perceived Ease of Use, and Perceived Usefulness in the E-Library Usage , 2009, Comput. Inf. Sci..
[19] Adel Mahfoudhi,et al. Bayesian networks for user modeling: Predicting the user's preferences , 2013, 13th International Conference on Hybrid Intelligent Systems (HIS 2013).
[20] Kar Yan Tam,et al. What leads to user acceptance of digital libraries? , 2004, CACM.
[21] Bassam Hasan,et al. Delineating the effects of general and system-specific computer self-efficacy beliefs on IS acceptance , 2006, Inf. Manag..
[22] Jeffrey M. Stanton,et al. Analysis of end user security behaviors , 2005, Comput. Secur..
[23] Giuseppe Di Modica,et al. Dynamically Adaptable User Interface Generation for Heterogeneous Computing Devices , 2005, HPCC.
[24] Kar Yan Tam,et al. Determinants of User Acceptance of Digital Libraries: An Empirical Examination of Individual Differences and System Characteristics , 2002, J. Manag. Inf. Syst..
[25] Mikko T. Siponen,et al. Motivating IS security compliance: Insights from Habit and Protection Motivation Theory , 2012, Inf. Manag..
[26] Cristina Conati,et al. What role can adaptive support play in an adaptable system? , 2004, IUI '04.
[27] Shari Lawrence Pfleeger,et al. Leveraging behavioral science to mitigate cyber security risk , 2012, Comput. Secur..
[28] Gabriele Lenzini,et al. Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security , 2015, NSPW.