-
4
-
-
56249148616
-
-
Claburn, T. (2005). Machine wars: The battle between good and evil in cyberspace is increasingly fought with automated tools. Information Week, January 17, pp. 54-63.
-
Claburn, T. (2005). Machine wars: The battle between good and evil in cyberspace is increasingly fought with automated tools. Information Week, January 17, pp. 54-63.
-
-
-
-
6
-
-
0029004440
-
Toward a theory of situation awareness in dynamic systems
-
Endsley M.R. Toward a theory of situation awareness in dynamic systems. Human Factors Journal 37 1 (1995) 32-64
-
(1995)
Human Factors Journal
, vol.37
, Issue.1
, pp. 32-64
-
-
Endsley, M.R.1
-
7
-
-
56249129381
-
-
Endsley M.R., and Garland D.J. (Eds), Lawrence Erlbrum Associates, Mahwah, NJ
-
In: Endsley M.R., and Garland D.J. (Eds). Theoretical underpinnings of situation awareness: A critical review. Situational analysis awareness and measurement (2000), Lawrence Erlbrum Associates, Mahwah, NJ
-
(2000)
Situational analysis awareness and measurement
-
-
-
8
-
-
33748513056
-
A comparison between concept maps, mind, maps conceptual diagrams, and visual metaphors as complementary tools for knowledge construction and sharing
-
Eppler M.J. A comparison between concept maps, mind, maps conceptual diagrams, and visual metaphors as complementary tools for knowledge construction and sharing. Information Visualization 5 3 (2006) 202
-
(2006)
Information Visualization
, vol.5
, Issue.3
, pp. 202
-
-
Eppler, M.J.1
-
9
-
-
84976711185
-
Video as a technology for informal communication
-
Fish R.S., Kraut R.E., Root R.W., and Rice R.E. Video as a technology for informal communication. Communications of the ACM, New York 36 1 (1993) 48
-
(1993)
Communications of the ACM, New York
, vol.36
, Issue.1
, pp. 48
-
-
Fish, R.S.1
Kraut, R.E.2
Root, R.W.3
Rice, R.E.4
-
11
-
-
56249138376
-
Security awareness and the persuasion of managers
-
Highland H.J. Security awareness and the persuasion of managers. Computers & Security 14 1 (1995) 27
-
(1995)
Computers & Security
, vol.14
, Issue.1
, pp. 27
-
-
Highland, H.J.1
-
12
-
-
84992897913
-
Ten pointers for enhancing learners' motivation
-
Huang L. Ten pointers for enhancing learners' motivation. Business Communication Quarterly, New York 66 4 (2003) 88-95
-
(2003)
Business Communication Quarterly, New York
, vol.66
, Issue.4
, pp. 88-95
-
-
Huang, L.1
-
13
-
-
33751161222
-
A longitudinal study of information system threat categories: the enduring problem of human error
-
Im J.J., and L Baskerville R. A longitudinal study of information system threat categories: the enduring problem of human error. Database for Advances in Information Systems 36 4 (2005) 68-79
-
(2005)
Database for Advances in Information Systems
, vol.36
, Issue.4
, pp. 68-79
-
-
Im, J.J.1
L Baskerville, R.2
-
16
-
-
0034144894
-
Incorporating learner experience into the design of multimedia instruction
-
Kalyuga S., Chandler P., and Sweller J. Incorporating learner experience into the design of multimedia instruction. Journal of Educational Psychology 92 (2000) 126-136
-
(2000)
Journal of Educational Psychology
, Issue.92
, pp. 126-136
-
-
Kalyuga, S.1
Chandler, P.2
Sweller, J.3
-
17
-
-
33746994612
-
A prototype for assessing information security awareness
-
Kruger H.A., and Kearney W.D. A prototype for assessing information security awareness. Computers & Security 25 4 (2006) 289-296
-
(2006)
Computers & Security
, vol.25
, Issue.4
, pp. 289-296
-
-
Kruger, H.A.1
Kearney, W.D.2
-
18
-
-
3242808612
-
-
Computer Security Institute, 2006
-
Lawrence A., Gordon L.A., Loeb M.P., Lucyshyn W., and Richardson R. CSI/FBI Computer Crime and Security Survey (2006), Computer Security Institute, 2006
-
(2006)
CSI/FBI Computer Crime and Security Survey
-
-
Lawrence, A.1
Gordon, L.A.2
Loeb, M.P.3
Lucyshyn, W.4
Richardson, R.5
-
19
-
-
0345764837
-
Improving user security behaviour
-
Leach J. Improving user security behaviour. Computers & Security 22 8 (2003) 685-692
-
(2003)
Computers & Security
, vol.22
, Issue.8
, pp. 685-692
-
-
Leach, J.1
-
20
-
-
39749093168
-
The magical number seven, plus or minus two: some limits on our capacity for processing information
-
Miller G.A. The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychological Review 63 (1956) 81-97
-
(1956)
Psychological Review
, Issue.63
, pp. 81-97
-
-
Miller, G.A.1
-
22
-
-
56249144585
-
-
NIST SP 800-50 (2003). National Institute of Standards and Technology (NIST). Building an information technology security awareness and training program (NIST SP 800-50). Washington, DC: US Department of Commerce.
-
NIST SP 800-50 (2003). National Institute of Standards and Technology (NIST). Building an information technology security awareness and training program (NIST SP 800-50). Washington, DC: US Department of Commerce.
-
-
-
-
23
-
-
56249131203
-
-
NIST SP 800-16 (1998). National Institute of Standards and Technology (NIST) information technology training requirements: A role- and performance-based model (NIST Special Publication 800-16). Washington, DC: US Department of Commerce.
-
NIST SP 800-16 (1998). National Institute of Standards and Technology (NIST) information technology training requirements: A role- and performance-based model (NIST Special Publication 800-16). Washington, DC: US Department of Commerce.
-
-
-
-
24
-
-
56249136028
-
-
Nielsen, J. (2000). Hard-to-use sites will fail. The Irish Times, January 2000.
-
Nielsen, J. (2000). Hard-to-use sites will fail. The Irish Times, January 2000.
-
-
-
-
25
-
-
0002914557
-
Concept maps and Vee diagrams: Two metacognitive tools for science and mathematics education
-
Novak J.D. Concept maps and Vee diagrams: Two metacognitive tools for science and mathematics education. Instructional Science 19 (1990) 29-52
-
(1990)
Instructional Science
, Issue.19
, pp. 29-52
-
-
Novak, J.D.1
-
26
-
-
33744544943
-
Case study: A bold new approach to awareness and education, and how it met an ignoble fate
-
Power R., and Forte D. Case study: A bold new approach to awareness and education, and how it met an ignoble fate. Computer Fraud & Security 5 (2006) 7-10
-
(2006)
Computer Fraud & Security
, Issue.5
, pp. 7-10
-
-
Power, R.1
Forte, D.2
-
27
-
-
33745176081
-
Contextual information access and storytelling in mixed reality using hypermedia
-
Romero L., Santiago J., and Correia N. Contextual information access and storytelling in mixed reality using hypermedia. Computers in Entertainment, New York 2 3 (2004)
-
(2004)
Computers in Entertainment, New York
, vol.2
, Issue.3
-
-
Romero, L.1
Santiago, J.2
Correia, N.3
-
28
-
-
56249114939
-
-
Schlienger, T., & Teufel, S. (2003). Information security culture - From analysis to change. In 3rd annual information security South Africa conference, 9-11 July 2003, information security South Africa - Proceedings of ISSA 2003, Johannesburg, South Africa.
-
Schlienger, T., & Teufel, S. (2003). Information security culture - From analysis to change. In 3rd annual information security South Africa conference, 9-11 July 2003, information security South Africa - Proceedings of ISSA 2003, Johannesburg, South Africa.
-
-
-
-
29
-
-
56249085342
-
-
Schneider, E. C., & Therkalsen, G. W. (1990). How secure are your system? Avenues to Automation, November 1990, pp. 68-72.
-
Schneider, E. C., & Therkalsen, G. W. (1990). How secure are your system? Avenues to Automation, November 1990, pp. 68-72.
-
-
-
-
31
-
-
0009034712
-
Misleading theoretical assumptions in hypertext/hypermedia research
-
Tergan S. Misleading theoretical assumptions in hypertext/hypermedia research. Journal of Educational Multimedia and Hypermedia 6 (1997) 257-283
-
(1997)
Journal of Educational Multimedia and Hypermedia
, Issue.6
, pp. 257-283
-
-
Tergan, S.1
-
32
-
-
33745500491
-
Enhancing the employee security awareness model
-
Valentine J.A. Enhancing the employee security awareness model. Computer Fraud & Security 6 (2006) 17-19
-
(2006)
Computer Fraud & Security
, Issue.6
, pp. 17-19
-
-
Valentine, J.A.1
-
33
-
-
56249102173
-
-
Wilson, M., & Hash, J. (2003). Build awareness and training program. National Institute of Standards and Technology (NIST).
-
Wilson, M., & Hash, J. (2003). Build awareness and training program. National Institute of Standards and Technology (NIST).
-
-
-
-
34
-
-
56249100789
-
-
Wireless News "Cisco Study: Despite Claiming Security Awareness, Many Remote Workers Engage in Risky Online Behavior" (2006). Wireless News, October 10, p. 1.
-
Wireless News "Cisco Study: Despite Claiming Security Awareness, Many Remote Workers Engage in Risky Online Behavior" (2006). Wireless News, October 10, p. 1.
-
-
-
|