-
3
-
-
84883226997
-
"Risk Communication, Risk Perception and Information Security"
-
Dowland P., Furnell S., Thuraisingham B., and Wang X.S. (Eds), Springer, New York
-
Pattinson M., and Anderson G. "Risk Communication, Risk Perception and Information Security". In: Dowland P., Furnell S., Thuraisingham B., and Wang X.S. (Eds). Security Management, Integrity, and Internal Control in Information Systems (2005), Springer, New York 175-184
-
(2005)
Security Management, Integrity, and Internal Control in Information Systems
, pp. 175-184
-
-
Pattinson, M.1
Anderson, G.2
-
4
-
-
77950581344
-
Public sector staff 'ignore IT security'
-
11 December
-
Grant, Ian. 2007. "Public sector staff 'ignore IT security'", Computer Weekly, 11 December 2007, p7.
-
(2007)
Computer Weekly
, vol.2007
, pp. 7
-
-
Grant, I.1
-
6
-
-
61349200300
-
From culture to disobedience: Recognising the varying user acceptance of IT security
-
February
-
Furnell, S. and Thomson, K. 2009. "From culture to disobedience: Recognising the varying user acceptance of IT security", Computer Fraud & Security, February 2009, pp5-10.
-
(2009)
Computer Fraud & Security
, vol.2009
, pp. 5-10
-
-
Furnell, S.1
Thomson, K.2
-
10
-
-
77950571198
-
-
For reference, the dichotomies are: Extraversion - Introversion; Sensing - iNtuition, Thinking - Feeling; and Judging - Perceiving. Examples of resulting Myers-Briggs Type Indicator would then be ENFP or ISFJ.
-
For reference, the dichotomies are: Extraversion - Introversion; Sensing - iNtuition, Thinking - Feeling; and Judging - Perceiving. Examples of resulting Myers-Briggs Type Indicator would then be ENFP or ISFJ.
-
-
-
-
11
-
-
58149425798
-
"A Theory of Human Motivation"
-
Maslow A.H. "A Theory of Human Motivation". Psychological Review 50 4 (1943) 370-396
-
(1943)
Psychological Review
, vol.50
, Issue.4
, pp. 370-396
-
-
Maslow, A.H.1
-
12
-
-
77950580667
-
-
BERR. 2008. 2008 Information Security Breaches Survey - Technical Report. Department for Business Enterprise & Regulatory Reform. April 2008. URN 08/788.
-
BERR. 2008. 2008 Information Security Breaches Survey - Technical Report. Department for Business Enterprise & Regulatory Reform. April 2008. URN 08/788.
-
-
-
-
14
-
-
72949106747
-
Scare tactics - A viable weapon in the security war?
-
December
-
Furnell, S., Papadaki, M. and Thomson, K. 2009. "Scare tactics - A viable weapon in the security war?", Computer Fraud & Security, December 2009, pp6-10.
-
(2009)
Computer Fraud & Security
, vol.2009
, pp. 6-10
-
-
Furnell, S.1
Papadaki, M.2
Thomson, K.3
|