Can perceptual differences account for enigmatic information security behaviour in an organisation?
暂无分享,去创建一个
[1] Spyros Kokolakis,et al. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon , 2017, Comput. Secur..
[2] Nigel Martin,et al. Expectations of privacy and trust: examining the views of IT professionals , 2016, Behav. Inf. Technol..
[3] Steven Furnell,et al. Information security policy compliance model in organizations , 2016, Comput. Secur..
[4] Steven Furnell,et al. Information security conscious care behaviour formation in organizations , 2015, Comput. Secur..
[5] H. J. Smith,et al. Exploring information privacy regulation, risks, trust, and behavior , 2015, Inf. Manag..
[6] Areej AlHogail,et al. Design and validation of information security culture framework , 2015, Comput. Hum. Behav..
[7] Bahadir K. Akcam,et al. Exploring Business Student Perception of Information and Technology , 2015 .
[8] Aggeliki Tsohou,et al. Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs , 2015, Comput. Secur..
[9] Adéle da Veiga,et al. An Information Security Training and Awareness Approach (ISTAAP) to Instil an Information Security-Positive Culture , 2015, HAISA.
[10] H. Keser,et al. DEVELOPMENT OF INFORMATION SECURITY AWARENESS SCALE , 2015 .
[11] Rahul Gupta,et al. Role of Information Security Awareness in Success of an Organization , 2015 .
[12] Gordon Hull,et al. Successful failure: what Foucault can teach us about privacy self-management in a world of Facebook and big data , 2015, Ethics and Information Technology.
[13] Mathias Ekstedt,et al. Investigating personal determinants of phishing and the effect of national culture , 2015, Inf. Comput. Secur..
[14] Mohammed A. Alnatheer,et al. Information Security Culture Critical Success Factors , 2015, 2015 12th International Conference on Information Technology - New Generations.
[15] Nico Martins,et al. Improving the information security culture through monitoring and implementation actions illustrated through a case study , 2015, Comput. Secur..
[16] Antonio Carlos Gastaud Maçada,et al. Measuring user satisfaction with information security practices , 2015, Comput. Secur..
[17] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[18] Bladimiros Spandonidis. Linking Information Security Awareness to Information Security Management Strategy.A Study in an IT Company , 2015 .
[19] M. Sasikumar,et al. Trust Model for Measuring Security Strength of Cloud Computing Service , 2015 .
[20] Hennie A. Kruger,et al. Considering the influence of human trust in practical social engineering exercises , 2014, 2014 Information Security for South Africa.
[21] Areej AlHogail,et al. Information security culture: A definition and a literature review , 2014, 2014 World Congress on Computer Applications and Information Systems (WCCAIS).
[22] Teodor Sommestad,et al. Variables influencing information security policy compliance: A systematic review of quantitative studies , 2014, Inf. Manag. Comput. Secur..
[23] Tom L. Roberts,et al. Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders , 2014, Inf. Manag..
[24] Paul P. Tallon. Do you see what I see? The search for consensus among executives’ perceptions of IT business value , 2014, Eur. J. Inf. Syst..
[25] Malcolm Robert Pattinson,et al. Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q) , 2014, Comput. Secur..
[26] Princely Ifinedo,et al. Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition , 2014, Inf. Manag..
[27] Mariki M. Eloff,et al. Human Aspects of Information Assurance: A Questionnaire-based Quantitative Approach to Assessment , 2014, HAISA.
[28] France Bélanger,et al. Religiosity and Information Security Policy Compliance , 2013, AMCIS.
[29] Hennie A. Kruger,et al. Phishing and Organisational Learning , 2013, SEC.
[30] Rossouw von Solms,et al. Phishing for phishing awareness , 2013, Behav. Inf. Technol..
[31] James Cox,et al. Information systems user security: A structured model of the knowing-doing gap , 2012, Comput. Hum. Behav..
[32] M. Butavicius,et al. Why Do Some People Manage Phishing Emails Better Than Others? , 2012, Inf. Manag. Comput. Secur..
[33] Charalampos Manifavas,et al. How Effective Is Your Security Awareness Program? An Evaluation Methodology , 2012, Inf. Secur. J. A Glob. Perspect..
[34] Gavriel Salvendy,et al. Factors affecting perception of information security and their impacts on IT adoption and security practices , 2011, Int. J. Hum. Comput. Stud..
[35] Marcus A. Butavicius,et al. Human Factors and Information Security: Individual, Culture and Security Environment , 2010 .
[36] Stewart Kowalski,et al. Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study , 2010, SEC.
[37] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[38] Antonio Lioy,et al. A psychological approach to information technology security , 2010, 3rd International Conference on Human System Interaction.
[39] Ponnurangam Kumaraguru,et al. Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions , 2010, CHI.
[40] Pieter H. Hartel. Review of "P. Kumaraguru, J. Cranshaw, A. Acquisti, L. Cranor, J. Hong, M. Blair, T. Pham, School of phish: a real-world evaluation of anti-phishing training" , 2010 .
[41] Wang Tao,et al. An empirical study of customers' perceptions of security and trust in e-payment systems , 2010, Electron. Commer. Res. Appl..
[42] Eirik Albrechtsen,et al. The information security digital divide between information security managers and users , 2009, Comput. Secur..
[43] Tyler Moore,et al. Information security: where computer science, economics and psychology meet , 2009, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[44] Steven Furnell,et al. From culture to disobedience: Recognising the varying user acceptance of IT security , 2009 .
[45] Alessandro Acquisti,et al. School of Phish: A Real-Word Evaluation of Anti-Phishing Training (CMU-CyLab-09-002) , 2009 .
[46] Markus Huber,et al. Measuring Readiness for Automated Social Engineering , 2008 .
[47] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[48] Herbert J. Mattord,et al. Principles of Information Security , 2004 .
[49] S. Ellis,et al. Practical significance (effect sizes) versus or in combination with statistical significance (p-values) : research note , 2003 .
[50] Jacob Cohen. Statistical Power Analysis , 1992 .