Information Security Activities of College Students: An Exploratory Study
暂无分享,去创建一个
[1] Waiman Cheung,et al. Proposing a framework to assess Internet usage in university education: an empirical investigation from a student's perspective , 2005, Br. J. Educ. Technol..
[2] Dennis Guster,et al. Weak Password Security: An Empirical Study , 2008, Inf. Secur. J. A Glob. Perspect..
[3] Jacob Cohen. Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.
[4] D. Timm,et al. Privacy and Social Networking Sites , 2008 .
[5] Grace Salas,et al. Technology for institutional enrollment, communication, and student success , 2008 .
[6] Susan B. Barnes,et al. A privacy paradox: Social networking in the United States , 2006, First Monday.
[7] Päivi Jokela,et al. Learning with Security , 2007, J. Inf. Technol. Educ..
[8] L. Foley,et al. Identity Theft: The Aftermath 2008 , 2009 .
[9] Mark Zuckerberg. Making Control Simple , 2010 .
[10] K. Ruben Gabriel,et al. A Simple Method of Multiple Comparisons of Means , 1978 .
[11] Keum-Suk Lee,et al. A mobile agent security management , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..
[12] J. M. McConnell,et al. National Training Standard for Information Systems Security (INFOSEC) Professionals , 1994 .
[13] Linda Price,et al. Learners and learning in the twenty‐first century: what do we know about students’ attitudes towards and experiences of information and communication technologies that will help us design courses? , 2005 .
[14] Steve Mansfield-Devine,et al. Social Networking: Anti-social networking: exploiting the trusting environment of Web 2.0 , 2008 .
[15] John S. Camp,et al. Top 10 IT Issues, 2007 , 2007 .
[16] Joshua Fogel,et al. Internet social network communities: Risk taking, trust, and privacy concerns , 2009, Comput. Hum. Behav..
[17] Charles Nelson,et al. Web 2.0: A New Generation of Learners and Education , 2008 .
[18] Jeffrey R. Young. Top 10 Threats to Computer Systems Include Professors and Students. , 2008 .
[19] Robert O. Weagley,et al. College Students, Internet Use, and Protection from Online Identity Theft , 2006 .
[20] Lorne Olfman,et al. Improving End User Behaviour in Password Utilization: An Action Research Initiative , 2008 .
[21] Thomas J. Owens,et al. On the Anatomy of Human Hacking , 2007, Inf. Secur. J. A Glob. Perspect..
[22] Brian L. Hawkins,et al. EDUCAUSE Core Data Service: Fiscal Year 2005 Summary Report. , 2006 .
[23] Sanjaya Mishra,et al. Research methods in the social sciences , 2005 .
[24] R. Darlington,et al. Factor Analysis , 2008 .
[25] Tracy Mitrano. A Wider World: Youth, Privacy, and Social Networking Technologies. , 2006 .
[26] D. Spence. The art of deception , 2013, BMJ.
[27] Xin Luo,et al. Awareness Education as the Key to Ransomware Prevention , 2007, Inf. Secur. J. A Glob. Perspect..
[28] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[29] P. Lachenbruch. Statistical Power Analysis for the Behavioral Sciences (2nd ed.) , 1989 .
[30] J. Calder. Survey research methods , 1998, Medical education.
[31] M. Weiss,et al. E-Mail in Academia: Expectations, Use, and Instructional Impact. , 2008 .
[32] Kelly S. Ervin,et al. Gender and the Internet: Women Communicating and Men Searching , 2001 .
[33] Marilyn Gilroy. Higher Education Migrates to YouTube and Social Networks. , 2010 .
[34] Fowler,et al. Survey research methods, 2nd ed. , 2009 .
[35] D. Elliott Bell. Secure Computer Systems: A Refinement of the Mathematical Model , 1974 .
[36] Mathieu Gorge,et al. Security for third level education organizations and other educational bodies , 2007 .
[37] Herbert J. Mattord,et al. Principles of Information Security , 2004 .
[38] Martin P. Loeb,et al. CSI/FBI Computer Crime and Security Survey , 2004 .
[39] Bill Ashraf,et al. Teaching the Google–Eyed YouTube Generation , 2009 .
[40] Charles P. Pfleeger,et al. Security in computing , 1988 .
[41] K J Biba,et al. Integrity Considerations for Secure Computer Systems , 1977 .
[42] John E. Anderson,et al. Why users (fail to) read computer usage policies , 2008, Ind. Manag. Data Syst..
[43] Annie I. Antón,et al. Balancing Good Intentions : Protecting the Privacy of Electronic Health Information , 2010 .
[44] Peter J. Denning,et al. Protection: principles and practice , 1972, AFIPS '72 (Spring).
[45] Steven G. Jones,et al. The internet landscape in college , 2007 .
[46] Biju Issac,et al. Mobile Technologies and its Impact - An Analysis in Higher Education Context , 2008, Int. J. Interact. Mob. Technol..
[47] Janet C. Moore,et al. The Sloan Consortium , 2005 .
[48] James G. Jones. Issues and Concerns of Directors of Postsecondary Distance Learning Programs Regarding Online Methods and Technologies , 2008 .
[49] Samuel C. McQuade. We Must Educate Young People about Cybercrime before They Start College. , 2007 .
[50] I. E. Allen,et al. Learning on Demand: Online Education in the United States, 2009. , 2010 .
[51] Richard Haas,et al. special report. , 1975, The Physician and sportsmedicine.
[52] Eirik Albrechtsen,et al. The information security digital divide between information security managers and users , 2009, Comput. Secur..
[53] J. Cooper,et al. The digital divide: the special case of gender , 2006, J. Comput. Assist. Learn..
[54] Shane Nackerud,et al. Blogging in the academy , 2008 .
[55] Michele H. Jackson. Exploring Gender, Feminism and Technology from a Communication Perspective: An Introduction and Commentary , 2007 .