A Study on User Perceptions of ICT Security
暂无分享,去创建一个
Stefan Schauer | Gerald Quirchmayr | Andreas Peer | Christine Schuster | Johannes Göllner | Martin Latzenhofer | Christian Meurers | Thomas Benesch | Peter Prah | G. Quirchmayr | Andreas Peer | S. Schauer | Martin Latzenhofer | Johannes Göllner | Christian Meurers | Christine Schuster | Peter Prah | T. Benesch
[1] Michael Baram,et al. Safety culture and behavioral change at the workplace , 2007 .
[2] Stefan Schauer,et al. Implementation of a Generic ICT Risk Model using Graph Databases , 2015, SECURWARE 2015.
[3] A. Munshi. A study of insider threat behaviour: developing a holistic insider threat model , 2013 .
[4] Leslie Kish,et al. A Procedure for Objective Respondent Selection within the Household , 1949 .
[5] Babette Fahlbruch,et al. SOL – Safety through organizational learning: A method for event analysis , 2011 .
[6] Carl Colwill,et al. Human factors in information security: The insider threat - Who can you trust these days? , 2009, Inf. Secur. Tech. Rep..
[7] Christian Suchan,et al. Analyse und Gestaltung leistungsfähiger IS-Architekturen , 2012 .
[8] Frank W. Guldenmund,et al. The use of questionnaires in safety culture research – an evaluation , 2007 .
[9] Steven Furnell,et al. A preliminary model of end user sophistication for insider threat prediction in IT systems , 2005, Comput. Secur..
[10] Torsten Eymann,et al. Risikofaktor Mensch in mobilen Ökosystemen , 2014, HMD Praxis der Wirtschaftsinformatik.
[11] Sadie Creese,et al. Understanding Insider Threat: A Framework for Characterising Attacks , 2014, 2014 IEEE Security and Privacy Workshops.