-
1
-
-
9544241345
-
Hacking gains momentum
-
S. Hinde, "Hacking gains momentum," Computer Fraud & Security, vol. 2004, pp. 13-15, 2004.
-
(2004)
Computer Fraud & Security
, vol.2004
, pp. 13-15
-
-
Hinde, S.1
-
4
-
-
0003487308
-
-
Indiana: Wiley Publishing, Inc.
-
B. Schneier, Secrets and lies. Indiana: Wiley Publishing, Inc., 2000.
-
(2000)
Secrets and Lies
-
-
Schneier, B.1
-
6
-
-
78049400376
-
-
BERR Department for Business Enterprise and Regulatory Reform & Pricewaterhouse Coopers, United Kingdom
-
BERR, "The 9th information security breaches survey," Department for Business Enterprise and Regulatory Reform & Pricewaterhouse Coopers, United Kingdom 2008.
-
(2008)
The 9th Information Security Breaches Survey
-
-
-
11
-
-
33750302951
-
Information security governance: Due care
-
R. von Solms and S. H. von Solms, "Information security governance: Due care," Computers & Security, vol. 25, pp. 494-497, 2006.
-
(2006)
Computers & Security
, vol.25
, pp. 494-497
-
-
Von Solms, R.1
Von Solms, S.H.2
-
12
-
-
63049137706
-
Information security: The moving target
-
M. T. Dlamini, J. H. P. Eloff, and M. M. Eloff, "Information security: The moving target," Computers & Security, vol. 28, pp. 189-198, 2009.
-
(2009)
Computers & Security
, vol.28
, pp. 189-198
-
-
Dlamini, M.T.1
Eloff, J.H.P.2
Eloff, M.M.3
-
13
-
-
77952381412
-
How to create a security culture in your organization
-
G. Rotvold, "How to Create a Security Culture in Your Organization," Information Management Journal, vol. 42, pp. 32-38, 11 2008.
-
(2008)
Information Management Journal
, vol.42
, Issue.11
, pp. 32-38
-
-
Rotvold, G.1
-
14
-
-
61349200300
-
From culture to disobedience: Recognising the varying user acceptance of IT security
-
S. Furnell and K.-L. Thomson, "From culture to disobedience: Recognising the varying user acceptance of IT security," Computer Fraud & Security, vol. 2009, pp. 5-10, 2009.
-
(2009)
Computer Fraud & Security
, vol.2009
, pp. 5-10
-
-
Furnell, S.1
Thomson, K.-L.2
-
15
-
-
0033657872
-
Information security - The third wave?
-
B. von Solms, "Information Security - The Third Wave?," Computers & Security, vol. 19, pp. 615-620, 2000.
-
(2000)
Computers & Security
, vol.19
, pp. 615-620
-
-
Von Solms, B.1
-
16
-
-
84862925338
-
Understanding organizational security culture
-
Japan
-
P. A. Chia, S. B. Maynard, and A. B. Ruighaver, "Understanding organizational security culture," in Sixth Pacific Asia Conference on Information Systems Tokyo, Japan, 2002, pp. 731-740.
-
(2002)
Sixth Pacific Asia Conference on Information Systems Tokyo
, pp. 731-740
-
-
Chia, P.A.1
Maynard, S.B.2
Ruighaver, A.B.3
-
21
-
-
0043219327
-
Information security awareness raising methods
-
C. C. Wood, "Information security awareness raising methods," Computer Fraud & Security Bulletin, vol. 1995, pp. 13-15, 1995.
-
(1995)
Computer Fraud & Security Bulletin
, vol.1995
, pp. 13-15
-
-
Wood, C.C.1
-
23
-
-
0043249504
-
Awareness and challenges of internet security
-
S. Hawkins, D. C. Yen, and D. C. Chou, "Awareness and challenges of Internet security," Information Management & Computer Security, vol. 8, pp. 131-143, 2000.
-
(2000)
Information Management & Computer Security
, vol.8
, pp. 131-143
-
-
Hawkins, S.1
Yen, D.C.2
Chou, D.C.3
-
24
-
-
33846783259
-
A video game for cyber security training and awareness
-
B. D. Cone, C. E. Irvine, M. F. Thompson, and T. D. Nguyen, "A video game for cyber security training and awareness," Computers & Security, vol. 26, pp. 63-72, 2007.
-
(2007)
Computers & Security
, vol.26
, pp. 63-72
-
-
Cone, B.D.1
Irvine, C.E.2
Thompson, M.F.3
Nguyen, T.D.4
-
25
-
-
77952379395
-
The new users' guide: How to raise information security awareness
-
ENISA
-
ENISA, "The new users' guide: How to raise information security awareness," European Network and Information Security Agency 2008.
-
(2008)
European Network and Information Security Agency
-
-
-
27
-
-
54949138901
-
A cross-cultural investigation of situational information security awareness programs
-
C. C. Chen, B. D. Medlin, and R. S. Shaw, "A cross-cultural investigation of situational information security awareness programs," Information Management & Computer Security, vol. 16, pp. 360-376, 2008.
-
(2008)
Information Management & Computer Security
, vol.16
, pp. 360-376
-
-
Chen, C.C.1
Medlin, B.D.2
Shaw, R.S.3
-
28
-
-
34249871944
-
A qualitative study of users' view on information security
-
E. Albrechtsen, "A qualitative study of users' view on information security," Computers & Security, vol. 26, pp. 276-289, 2007.
-
(2007)
Computers & Security
, vol.26
, pp. 276-289
-
-
Albrechtsen, E.1
|