-
1
-
-
34249871944
-
A qualitative study of users' views on information security
-
Albrechtsen E. A qualitative study of users' views on information security. Computers and Security 26 (2007) 276-289
-
(2007)
Computers and Security
, Issue.26
, pp. 276-289
-
-
Albrechtsen, E.1
-
2
-
-
74449093050
-
Fighting the enemy within
-
April
-
Andric M. Fighting the enemy within. IT WEB Special Report, vol. 95; April 2007. p. 54.
-
(2007)
IT WEB Special Report
, vol.95
, pp. 54
-
-
Andric, M.1
-
3
-
-
34249864109
-
Creating a culture of security
-
Baggett W.O. Creating a culture of security. The Internal Auditor 3 60 (2003) 37-41
-
(2003)
The Internal Auditor
, vol.3
, Issue.60
, pp. 37-41
-
-
Baggett, W.O.1
-
5
-
-
74449090955
-
Enterprise strategies: advice for a secure enterprise: implement the basics and see that everyone uses them
-
November
-
Borck J.R. Enterprise strategies: advice for a secure enterprise: implement the basics and see that everyone uses them. InfoWorld 22 46 (2000) November
-
(2000)
InfoWorld
, vol.22
, Issue.46
-
-
Borck, J.R.1
-
7
-
-
0347405262
-
Reinforcing our moral vision: examining the relationship between unethical behaviour and computer crime
-
Cardinali R. Reinforcing our moral vision: examining the relationship between unethical behaviour and computer crime. Work Study 44 8 (1995) 11-18
-
(1995)
Work Study
, vol.44
, Issue.8
, pp. 11-18
-
-
Cardinali, R.1
-
10
-
-
33745869216
-
Security starts from within
-
Connolly P.J. Security starts from within. InfoWorld 22 28 (2000) 39-40
-
(2000)
InfoWorld
, vol.22
, Issue.28
, pp. 39-40
-
-
Connolly, P.J.1
-
12
-
-
74449084015
-
Information security culture - validation of an assessment instrument
-
Da Veiga A., Martins N., and Eloff J.H.P. Information security culture - validation of an assessment instrument. Southern African Business Review 11 1 (2007) 146-166
-
(2007)
Southern African Business Review
, vol.11
, Issue.1
, pp. 146-166
-
-
Da Veiga, A.1
Martins, N.2
Eloff, J.H.P.3
-
13
-
-
0034335593
-
Framework for linking culture and improvement initiatives in organisations
-
Detert J.R., Schroeder J., and Mauriel A. Framework for linking culture and improvement initiatives in organisations. The Academy of Management Review 25 4 (2000) 850-863
-
(2000)
The Academy of Management Review
, vol.25
, Issue.4
, pp. 850-863
-
-
Detert, J.R.1
Schroeder, J.2
Mauriel, A.3
-
16
-
-
33749469542
-
Malicious or misinformed? Exploring a contributor to the insider threat
-
Furnell S. Malicious or misinformed? Exploring a contributor to the insider threat. Computer Fraud and Security 9 (2006) 8-12
-
(2006)
Computer Fraud and Security
, Issue.9
, pp. 8-12
-
-
Furnell, S.1
-
17
-
-
28644433426
-
Integrated Information Security Architecture
-
Eloff J.H.P., and Eloff M. Integrated Information Security Architecture. Computer Fraud and Security 11 (2005) 10-16
-
(2005)
Computer Fraud and Security
, Issue.11
, pp. 10-16
-
-
Eloff, J.H.P.1
Eloff, M.2
-
18
-
-
33846869993
-
IFIP workshop - information security culture
-
Furnell S. IFIP workshop - information security culture. Computers and Security 26 (2007) 35
-
(2007)
Computers and Security
, Issue.26
, pp. 35
-
-
Furnell, S.1
-
20
-
-
74449093030
-
-
Retrieved online on 16 January 2006 from
-
Grant R. Building a strong security culture. Retrieved online on 16 January 2006 from (2005). http://www.citec.com.au/news/featureNews/2005/April/security_culture.sht ml?rate
-
(2005)
Building a strong security culture
-
-
Grant, R.1
-
23
-
-
74449084986
-
-
Information Security Forum. Information Security Culture - A preliminary investigation. s.l. 2000.
-
Information Security Forum. Information Security Culture - A preliminary investigation. s.l. 2000.
-
-
-
-
24
-
-
28044457328
-
Information technology. Security techniques. Code of practice for information security management; 2005
-
ISO/IEC 27002
-
ISO/IEC 27002:2005. Information technology. Security techniques. Code of practice for information security management; 2005.
-
(2005)
-
-
-
26
-
-
33750513188
-
Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists
-
Kraemer S., and Carayon P. Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists. Applied Ergonomics 38 (2007) 143-154
-
(2007)
Applied Ergonomics
, vol.38
, pp. 143-154
-
-
Kraemer, S.1
Carayon, P.2
-
30
-
-
33746994612
-
A prototype for assessing information security awareness
-
Kruger H.A., and Kearney W.D. A prototype for assessing information security awareness. Computers and Security 25 (2006) 289-296
-
(2006)
Computers and Security
, vol.25
, pp. 289-296
-
-
Kruger, H.A.1
Kearney, W.D.2
-
33
-
-
74449086668
-
A preliminary model of end user sophistication for insider threat prediction in IT systems
-
Magklaras G.B., and Furnell S.M. A preliminary model of end user sophistication for insider threat prediction in IT systems. Computers and Security 25 (2006) 27-35
-
(2006)
Computers and Security
, vol.25
, pp. 27-35
-
-
Magklaras, G.B.1
Furnell, S.M.2
-
34
-
-
84870529816
-
Information security culture
-
IFIP/SEC2002, Kluwer Academic, Boston
-
Martins A., and Eloff J.H.P. Information security culture. IFIP/SEC2002. Security in the information society (2002), Kluwer Academic, Boston 203-214
-
(2002)
Security in the information society
, pp. 203-214
-
-
Martins, A.1
Eloff, J.H.P.2
-
35
-
-
74449092147
-
-
Martins EC. Die invloed van organisasiekultuur op kreatiwiteit en innovasie in 'n universiteitbiblioteek. Pretoria: Universiteit van Suid Afrika; 2000 (M.Com thesis).
-
Martins EC. Die invloed van organisasiekultuur op kreatiwiteit en innovasie in 'n universiteitbiblioteek. Pretoria: Universiteit van Suid Afrika; 2000 (M.Com thesis).
-
-
-
-
36
-
-
84870529816
-
-
Master's dissertation. Johannesburg: Rand Afrikaans University;
-
Martins A. Information security culture. Master's dissertation. Johannesburg: Rand Afrikaans University; 2002.
-
(2002)
Information security culture
-
-
Martins, A.1
-
44
-
-
33846849570
-
Organisational security culture: extending the end-user perspective
-
Ruighaver A.B., Maynard S.B., and Chang S. Organisational security culture: extending the end-user perspective. Computers and Security 2007 26 (2006) 56-62
-
(2006)
Computers and Security
, vol.2007
, Issue.26
, pp. 56-62
-
-
Ruighaver, A.B.1
Maynard, S.B.2
Chang, S.3
-
46
-
-
2542553531
-
Evaluating the fit of structural equation models: test of significance and descriptive goodness-of-fit measures
-
Schermelleh-Engel K., Moosbrugger H., and Muller H. Evaluating the fit of structural equation models: test of significance and descriptive goodness-of-fit measures. Methods of Psychological Research Online 8 2 (2003) 23-74
-
(2003)
Methods of Psychological Research Online
, vol.8
, Issue.2
, pp. 23-74
-
-
Schermelleh-Engel, K.1
Moosbrugger, H.2
Muller, H.3
-
48
-
-
36248967046
-
Employees' adherence to information security policies: An empirical study
-
Sandton, South Africa;
-
Siponen M, Pahnila S, Mahmood A. Employees' adherence to information security policies: an empirical study. In Proceedings of new approaches to security, privacy and trust in complex environments, FIP/SEC2007. Sandton, South Africa; 2007. pp. 133-44.
-
(2007)
Proceedings of new approaches to security, privacy and trust in complex environments, FIP/SEC2007
, pp. 133-144
-
-
Siponen, M.1
Pahnila, S.2
Mahmood, A.3
-
49
-
-
17844366573
-
Analysis of end user security behaviours
-
Stanton J.M., Stam K.R., Mastrangelo P., and Jolton J. Analysis of end user security behaviours. Computers and Security 2005 24 (2005) 124-133
-
(2005)
Computers and Security
, vol.2005
, Issue.24
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
51
-
-
0000280419
-
Effective IS security: an empirical study
-
Straub D.W. Effective IS security: an empirical study. Information Systems Research 1 3 (1990) 255-276
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
53
-
-
74449087878
-
-
Retrieved online on 23 January 2008 from
-
Survey tracker. Retrieved online on 23 January 2008 from (2008). http://www.surveytracker.com
-
(2008)
Survey tracker
-
-
-
55
-
-
74449091408
-
Cyber-baddies make jay as CIOs snooze
-
Van der Merwe P., and Cantale S. Cyber-baddies make jay as CIOs snooze. Brainstorm 6 9 (2007) 59-66
-
(2007)
Brainstorm
, vol.6
, Issue.9
, pp. 59-66
-
-
Van der Merwe, P.1
Cantale, S.2
-
56
-
-
74449088680
-
-
Information Security South Africa - Proceedings of ISSA 2005, 4th Annual Information Security South Africa Conference. South Africa. Retrieved online on 16 March 2008 from
-
Van Niekerk J., and Von Solms R. A holistic framework for the fostering of an information security sub-culture in organizations. Information Security South Africa - Proceedings of ISSA 2005, 4th Annual Information Security South Africa Conference. South Africa. Retrieved online on 16 March 2008 from (2005). http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/041_Article.pdf
-
(2005)
A holistic framework for the fostering of an information security sub-culture in organizations
-
-
Van Niekerk, J.1
Von Solms, R.2
-
57
-
-
84869141956
-
-
Retrieved online on 9 July 2009 from
-
Verizon. Data breach investigations report. Retrieved online on 9 July 2009 from (2009). http://www.verizonbusiness.com/resources/security/reports/2009databreach rp.pdf
-
(2009)
Data breach investigations report
-
-
Verizon1
-
58
-
-
2342475711
-
Towards information security behavioural compliance
-
Vroom C., and Von Solms R. Towards information security behavioural compliance. Computers and Security 23 3 (2004) 191-198
-
(2004)
Computers and Security
, vol.23
, Issue.3
, pp. 191-198
-
-
Vroom, C.1
Von Solms, R.2
|