-
1
-
-
77956620263
-
The positive outcomes of information security awareness training in companies-A case study
-
M. Eminagaoglu, E. Uçar and S. Eren, "The positive outcomes of information security awareness training in companies-A case study," Information Security Technical Report, vol. 14, pp. 223-229, 2009.
-
(2009)
Information Security Technical Report
, vol.14
, pp. 223-229
-
-
Eminagaoglu, M.1
Uçar, E.2
Eren, S.3
-
2
-
-
55849105212
-
Information security awareness in higher education: An exploratory study
-
Y. Rezgui and A. Marks, "Information security awareness in higher education: An exploratory study," Computers & Security, vol. 27, pp. 241-253, 2008.
-
(2008)
Computers & Security
, vol.27
, pp. 241-253
-
-
Rezgui, Y.1
Marks, A.2
-
3
-
-
78449305755
-
Cyber Security for home users: A New Way of Protection through Awareness Enforcement
-
November
-
E. Kritzinger and S.H. von Solms, "Cyber Security for home users: A New Way of Protection through Awareness Enforcement," Computers & Security, vol. 29, pp. 840-847, November. 2010.
-
(2010)
Computers & Security
, vol.29
, pp. 840-847
-
-
Kritzinger, E.1
Von Solms, S.H.2
-
4
-
-
77951204516
-
Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study
-
6
-
E. Albrechtsen and J. Hovden, "Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study," Computers & Security, vol. 29, pp. 432-445, 6. 2010.
-
(2010)
Computers & Security
, vol.29
, pp. 432-445
-
-
Albrechtsen, E.1
Hovden, J.2
-
5
-
-
33846794868
-
Phishing for user security awareness
-
R.C. Dodge, "Phishing for user security awareness," Computers & Security, vol. 26, pp. 73-80, 2007.
-
(2007)
Computers & Security
, vol.26
, pp. 73-80
-
-
Dodge, R.C.1
-
6
-
-
56249140028
-
The impact of information richness on information security awareness training effectiveness
-
1
-
R.S. Shaw, C.C. Chen, A.L. Harris and H. Huang, "The impact of information richness on information security awareness training effectiveness," Computers & Education, vol. 52, pp. 92-100, 1. 2009.
-
(2009)
Computers & Education
, vol.52
, pp. 92-100
-
-
Shaw, R.S.1
Chen, C.C.2
Harris, A.L.3
Huang, H.4
-
7
-
-
33746994612
-
A prototype for assessing information security awareness
-
DOI 10.1016/j.cose.2006.02.008, PII S0167404806000563
-
H.A. Kruger and W.D. Kearney, "A prototype for assessing information security awareness," Computers & Security, vol. 25, pp. 289-296, 2006. (Pubitemid 44202198)
-
(2006)
Computers and Security
, vol.25
, Issue.4
, pp. 289-296
-
-
Kruger, H.A.1
Kearney, W.D.2
-
8
-
-
2342622104
-
Why do people play on-line games? An extended TAM with social influences and flow experience
-
C.L. Hsu and H.P. Lu, "Why do people play on-line games? An extended TAM with social influences and flow experience," Information & Management, vol. 41, pp. 853-868, 2004.
-
(2004)
Information & Management
, vol.41
, pp. 853-868
-
-
Hsu, C.L.1
Lu, H.P.2
-
10
-
-
0347025921
-
Security and human computer interfaces
-
12
-
J. Johnston, J.H.P. Eloff and L. Labuschagne, "Security and human computer interfaces," Computers & Security, vol. 22, pp. 675-684, 12. 2003.
-
(2003)
Computers & Security
, vol.22
, pp. 675-684
-
-
Johnston, J.1
Eloff, J.H.P.2
Labuschagne, L.3
-
11
-
-
80053940314
-
The game layer on top of the world
-
vol.
-
S. Priebatsch, "The game layer on top of the world," vol. Podcast, 2010.
-
(2010)
Podcast
-
-
Priebatsch, S.1
-
12
-
-
80053950420
-
Internet Threats Trend Report
-
I. Commtouch, "Internet Threats Trend Report," Commtouch., 2011.
-
(2011)
Commtouch.
-
-
Commtouch, I.1
-
15
-
-
0000430606
-
Extending the TAM for a World-Wide-Web context
-
J.W. Moon and Y.G. Kim, "Extending the TAM for a World-Wide-Web context," Information & Management, vol. 38, pp. 217-230, 2001.
-
(2001)
Information & Management
, vol.38
, pp. 217-230
-
-
Moon, J.W.1
Kim, Y.G.2
-
19
-
-
33846783259
-
A video game for cyber security training and awareness
-
2
-
B.D. Cone, C.E. Irvine, M.F. Thompson and T.D. Nguyen, "A video game for cyber security training and awareness," Computers &.Security., vol. 26, pp. 63-72, 2. 2007.
-
(2007)
Computers &.Security
, vol.26
, pp. 63-72
-
-
Cone, B.D.1
Irvine, C.E.2
Thompson, M.F.3
Nguyen, T.D.4
-
20
-
-
80053991259
-
-
"CyberCIEGE Educational Video Game," Available at: Accessed 20110110
-
The Center for Information Systems Security Studies and Research, INC., "CyberCIEGE Educational Video Game," "CyberCIEGE Educational Video Game," Available at: http://www.cisr.us/cyberciege/,Accessed 20110110.
-
CyberCIEGE Educational Video Game
-
-
-
21
-
-
80053997590
-
-
Department of Defence (United States of America), DOD., Available at Accessed 20110110
-
Department of Defence (United States of America), DOD., "CyberProtect," Available at http://iase.disa.mil/eta/cyberprotect/ launchpage.htm., Accessed 20110110.
-
CyberProtect
-
-
-
22
-
-
84880439537
-
-
Availabe at Accessed 20110121
-
S. Khan, "Let's use video to reinvent education," Availabe at http://www.ted.com/talks/salman-khan-let-s-use-video-to-reinvent-ed ucation.html, Accessed 20110121.,
-
Let's Use Video to Reinvent Education
-
-
Khan, S.1
|