Developing and Using Evidence-based E-learning Videos for Cybersecurity Education
暂无分享,去创建一个
Wu He | Xin Tian | Mohd Anwar
[1] Rossouw von Solms,et al. Information security awareness: educating your users effectively , 1998, Inf. Manag. Comput. Secur..
[2] Merrill Warkentin,et al. Behavioral and policy issues in information systems security: the insider threat , 2009, Eur. J. Inf. Syst..
[3] Atreyi Kankanhalli,et al. Studying users' computer security behavior: A health belief perspective , 2009, Decis. Support Syst..
[4] Merrill Warkentin,et al. Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..
[5] P. W. Singer,et al. Cybersecurity and Cyberwar: What Everyone Needs to Know® , 2013 .
[6] Wu He,et al. The Self-Efficacy Variable in Behavioral Information Security Research , 2014, 2014 Enterprise Systems Conference.
[7] Wu He. A Study of Employees' Self-Reported Cybersecurity Behaviors , 2016, AMCIS.