A Study of Cyber Security Awareness in Educational Environment in the Middle East
暂无分享,去创建一个
[1] Nathan L. Clarke,et al. Power to the people? The evolving recognition of human aspects of security , 2012, Comput. Secur..
[2] Chung-Ren Ou,et al. SETNR/A: an agent-based secure payment protocol for mobile commerce , 2010, Int. J. Intell. Inf. Database Syst..
[3] Christopher Bronk,et al. The Cyber Attack on Saudi Aramco , 2013 .
[4] Merrill Warkentin,et al. Beyond Deterrence: An Expanded View of Employee Computer Abuse , 2013, MIS Q..
[5] Eyong B. Kim,et al. Recommendations for information security awareness training for college students , 2014, Inf. Manag. Comput. Secur..
[6] Yacine Rezgui,et al. Information security awareness in higher education: An exploratory study , 2008, Comput. Secur..
[7] F. Aloul. The Need for Effective Information Security Awareness , 2011 .
[8] Tamara Dinev,et al. Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture , 2012, Decis. Sci..
[9] Hennie A. Kruger,et al. A Vocabulary Test to Assess Information Security Awareness , 2010, Inf. Manag. Comput. Secur..
[10] Elizabeth A. McDaniel. Securing the Information and Communications Technology Global Supply Chain from Exploitation: Developing a Strategy for Education, Training, and Awareness , 2013 .
[11] F. Nelson Ford,et al. Information security: management's effect on culture and policy , 2006, Inf. Manag. Comput. Secur..
[12] Sameera Mubarak,et al. Significance of Information Security Awareness in the Higher Education Sector , 2012 .
[13] Ladislav Hudec,et al. On Identifying Proper Security Mechanisms , 2013, ICT-EurAsia.
[14] Julian Jang,et al. A survey of emerging threats in cybersecurity , 2014, J. Comput. Syst. Sci..
[15] Jens Myrup Pedersen,et al. A novel methodology towards a trusted environment in mashup web applications , 2015, Comput. Secur..