-
1
-
-
64749096011
-
Friend or foe? Information security management of employees
-
PhD dissertation, Theses No. 2008: 101 Norwegian University of Science and Technology (NTNU) Trondheim
-
Albrechtsen, E. (2008), “Friend or foe? Information security management of employees”, PhD dissertation, Theses No. 2008: 101, Norwegian University of Science and Technology (NTNU), Trondheim.
-
(2008)
-
-
Albrechtsen, E.1
-
3
-
-
84993023523
-
Organizational learning and communities-of-practise: toward a unified view of working, learning and innovation
-
Brown, J.S. and Duguid, P. (1991), “Organizational learning and communities-of-practise: toward a unified view of working, learning and innovation”, Organizational Science, Vol. 2 No. 1, pp. 40-57.
-
(1991)
Organizational Science
, vol.2
, Issue.1
, pp. 40-57
-
-
Brown, J.S.1
Duguid, P.2
-
4
-
-
33846783259
-
A video game for cyber security training and awareness
-
Cone, B.D., Irvine, C.E., Thompson, M.F. and Nguyen, T.D. (2007), “A video game for cyber security training and awareness”, Computers and Security, Vol. 26, pp. 63-72.
-
(2007)
Computers and Security
, vol.26
, pp. 63-72
-
-
Cone, B.D.1
Irvine, C.E.2
Thompson, M.F.3
Nguyen, T.D.4
-
5
-
-
77953485878
-
Motivation-driven educational game design: applying best practices to music education
-
ACM Press New York, NY
-
Denis, G. and Jouvelot, P. (2005), “Motivation-driven educational game design: applying best practices to music education”, in Ed. Lee, N. (Ed.), Proceedings of the International Conference on Advances in Computer Entertainment Technology, ACM Press, New York, NY.
-
(2005)
Proceedings of the International Conference on Advances in Computer Entertainment Technology
-
-
Denis, G.1
Jouvelot, P.2
Lee, N.3
-
6
-
-
42549132969
-
The impact of employee participation on the use of an electronic process guide: a longitudinal case study
-
Dings⊘yr, T. and Moe, N.B. (2008), “The impact of employee participation on the use of an electronic process guide: a longitudinal case study”, IEEE Transactions on Software Engineering, Vol. 34 No. 2, pp. 212-226.
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.2
, pp. 212-226
-
-
Dings⊘yr, T.1
Moe, N.B.2
-
8
-
-
67549103767
-
Games, motivation and learning: a research and practice model
-
Garris, R., Ahlers, R. and Driskell, J. (2002), “Games, motivation and learning: a research and practice model”, Simulation and Gaming, Vol. 33 No. 4, pp. 441-7.
-
(2002)
Simulation and Gaming
, vol.33
, Issue.4
, pp. 441-447
-
-
Garris, R.1
Ahlers, R.2
Driskell, J.3
-
9
-
-
0028245888
-
Intervention research in occupational health and safety
-
Goldenhar, L.M. and Schulte, P.A. (1994), “Intervention research in occupational health and safety”, Journal of Occupational Medicine, Vol. 36 No. 7, pp. 763-775.
-
(1994)
Journal of Occupational Medicine
, vol.36
, Issue.7
, pp. 763-775
-
-
Goldenhar, L.M.1
Schulte, P.A.2
-
10
-
-
76649089191
-
How do employees comply with security policy? A comparative case study of four organizations under the Norwegian Security Act
-
Evaluating the Effectiveness of Organizational Information Security Measures and Employees' Contributions to Security, Doctoral dissertation Faculty of Mathematics and Natural Science, University of Oslo Oslo
-
Hagen, J. (2009 a), “How do employees comply with security policy? A comparative case study of four organizations under the Norwegian Security Act”, The Human Factor Behind the Security Perimenter, Evaluating the Effectiveness of Organizational Information Security Measures and Employees' Contributions to Security, Doctoral dissertation, Faculty of Mathematics and Natural Science, University of Oslo, Oslo.
-
(2009)
The Human Factor Behind the Security Perimenter
-
-
Hagen, J.1
-
11
-
-
70349327744
-
Human relationships: a never-ending security education challenge?
-
Hagen, J. (2009 b), “Human relationships: a never-ending security education challenge?”, IEEE Security and Privacy, pp. 72-74.
-
(2009)
IEEE Security and Privacy
, pp. 72-74
-
-
Hagen, J.1
-
12
-
-
76649144189
-
Effects on employees' information security abilities by e-learning
-
Hagen, J. and Albrechtsen, E. (2009), “Effects on employees' information security abilities by e-learning”, Information Management & Computer Security, Vol. 17 No. 5, pp. 388-407.
-
(2009)
Information Management & Computer Security
, vol.17
, Issue.5
, pp. 388-407
-
-
Hagen, J.1
Albrechtsen, E.2
-
13
-
-
79960792360
-
A preliminary study of barriers to engagement in cybersiege
-
Technical Report, NPS-CS-09-006 Naval Postgraduate School Monterey, CA
-
Hagen, J., Irvine, C. and Thompson, A. (2009), “A preliminary study of barriers to engagement in cybersiege”, Technical Report, NPS-CS-09-006, Naval Postgraduate School, Monterey, CA.
-
(2009)
-
-
Hagen, J.1
Irvine, C.2
Thompson, A.3
-
14
-
-
14544293554
-
Intervention studies in occupational epidemiology
-
Kristensen, T.S. (2005), “Intervention studies in occupational epidemiology”, Occupational and Environmental Medicine, Vol. 62 No. 3, pp. 205-210.
-
(2005)
Occupational and Environmental Medicine
, vol.62
, Issue.3
, pp. 205-210
-
-
Kristensen, T.S.1
-
16
-
-
33750513178
-
Motivation to e-learn without organizational settings: an exploratory factor structure
-
Rentroia, M.A., Jorge, J. and Ghauoui, C. (2006), “Motivation to e-learn without organizational settings: an exploratory factor structure”, International Journal Distance Education Technologies, Vol. 4 No. 3, pp. 24-35.
-
(2006)
International Journal Distance Education Technologies
, vol.4
, Issue.3
, pp. 24-35
-
-
Rentroia, M.A.1
Jorge, J.2
Ghauoui, C.3
-
18
-
-
0004057348
-
-
NIOSH Cincinnati, OH (NIOSH Publication No. 2001-119)
-
Robson, L.S., Shannon, H.S., Goldenhar, L.M. and Hale, A.R. (2001), Guide to Evaluating the Effectiveness of Strategies for Preventing Work Injuries: How to Show Whether a Safety Intervention Really Works, NIOSH, Cincinnati, OH (NIOSH Publication No. 2001-119).
-
(2001)
Guide to Evaluating the Effectiveness of Strategies for Preventing Work Injuries: How to Show Whether a Safety Intervention Really Works
-
-
Robson, L.S.1
Shannon, H.S.2
Goldenhar, L.M.3
Hale, A.R.4
-
20
-
-
24644438691
-
The human factor in security
-
Schultz, E. (2005), “The human factor in security”, Computers and Security, Vol. 24 No. 6, pp. 425-6.
-
(2005)
Computers and Security
, vol.24
, Issue.6
, pp. 425-426
-
-
Schultz, E.1
-
21
-
-
84993001110
-
Building reusable information security courseware
-
paper presented at the Information Security Curriculum Development Conference, Kennesaw, GA, 23-24 September
-
Wang, A.J.A. and Yestko, K. (2005), “Building reusable information security courseware”, paper presented at the Information Security Curriculum Development Conference, Kennesaw, GA, 23-24 September.
-
(2005)
-
-
Wang, A.J.A.1
Yestko, K.2
-
22
-
-
0036299647
-
The development of access control policies for information technology systems
-
Ward, P. and Smith, C.L. (2002), “The development of access control policies for information technology systems”, Computers and Security, Vol. 21 No. 4, pp. 365-371.
-
(2002)
Computers and Security
, vol.21
, Issue.4
, pp. 365-371
-
-
Ward, P.1
Smith, C.L.2
-
23
-
-
0000539976
-
The non-traditional quality of organizational learning
-
Weick, K.E. (1991), “The non-traditional quality of organizational learning”, Organizational Science, Vol. 2 No. 1, pp. 116-124.
-
(1991)
Organizational Science
, vol.2
, Issue.1
, pp. 116-124
-
-
Weick, K.E.1
-
24
-
-
79960819064
-
Leadership and organizational learning
-
Yuiki, G. (2009), “Leadership and organizational learning”, The Leadership Quarterly, Vol. 20 No. 1, pp. 49-53.
-
(2009)
The Leadership Quarterly
, vol.20
, Issue.1
, pp. 49-53
-
-
Yuiki, G.1
|