-
2
-
-
34249871944
-
A qualitative study of users' view on information security
-
DOI 10.1016/j.cose.2006.11.004, PII S0167404806002033
-
E. Albrechtsen A qualitative study of users' view on information security Computers and Security 26 4 2007 276 289 (Pubitemid 46873753)
-
(2007)
Computers and Security
, vol.26
, Issue.4
, pp. 276-289
-
-
Albrechtsen, E.1
-
4
-
-
85044813771
-
Enhancing national development and growth through combating cybercrime/Internet fraud: A comparative approach
-
M.O. Asokhia Enhancing national development and growth through combating cybercrime/Internet fraud: a comparative approach Journal of Social Sciences 23 1 2010 13 19
-
(2010)
Journal of Social Sciences
, vol.23
, Issue.1
, pp. 13-19
-
-
Asokhia, M.O.1
-
5
-
-
30744434347
-
An analysis of the growth of computer and Internet security breaches
-
K. Bagchi, and G. Udo An analysis of the growth of computer and Internet security breaches Communications of AIS 12 2003 684 700
-
(2003)
Communications of AIS
, vol.12
, pp. 684-700
-
-
Bagchi, K.1
Udo, G.2
-
7
-
-
84962052143
-
Identity theft, social security numbers, and the web
-
H. Bergel Identity theft, social security numbers, and the web Communications of the ACM 43 2 2000 17 21
-
(2000)
Communications of the ACM
, vol.43
, Issue.2
, pp. 17-21
-
-
Bergel, H.1
-
8
-
-
33745188425
-
State and local law enforcement is not ready for a cyber katrina
-
R. Bhaskar State and local law enforcement is not ready for a cyber katrina Communications of the ACM 49 2 2006 81 83
-
(2006)
Communications of the ACM
, vol.49
, Issue.2
, pp. 81-83
-
-
Bhaskar, R.1
-
10
-
-
70249139442
-
Cyber-bullying: Developing a policy to direct responses that are equitable and effective in addressing this special form of bullying
-
K. Brown, M. Jackson, and W. Cassidy Cyber-bullying: developing a policy to direct responses that are equitable and effective in addressing this special form of bullying Canadian Journal of Educational Administration and Policy 57 2006 1 35
-
(2006)
Canadian Journal of Educational Administration and Policy
, vol.57
, pp. 1-35
-
-
Brown, K.1
Jackson, M.2
Cassidy, W.3
-
11
-
-
4344607488
-
Assessing law enforcement preparedness to address Internet fraud
-
DOI 10.1016/j.jcrimjus.2004.06.008, PII S0047235204000662
-
R.G. Burns, K.H. Whitworth, and C.Y. Thompson Assessing law enforcement preparedness to address Internet fraud Journal of Criminal Justice 32 5 2004 477 493 (Pubitemid 39159523)
-
(2004)
Journal of Criminal Justice
, vol.32
, Issue.5
, pp. 477-493
-
-
Burns, R.G.1
Whitworth, K.H.2
Thompson, C.Y.3
-
12
-
-
80955133770
-
-
Available from: The Melbourne Age Australia [accessed 05.04.11]
-
S. Butcher Brodie's suicide prompts law on bullying Available from: 2011 The Melbourne Age Australia http://www.theage.com.au/small-business/brodies- suicide-prompts-law-on-bullying-20110405-1czub.html [accessed 05.04.11]
-
(2011)
Brodie's Suicide Prompts Law on Bullying
-
-
Butcher, S.1
-
14
-
-
0027027253
-
Bead: Explorations in information visualisation
-
published as a special issue of sigir forum N.J. Belkin, P. Ingwersen, A.M. Pejtersen, ACM Press Copenhagen, Denmark, New York, NY
-
M. Chalmers, and P. Chitson Bead: explorations in information visualisation published as a special issue of sigir forum N.J. Belkin, P. Ingwersen, A.M. Pejtersen, Proceedings of the 15th annual ACM SIGIR conference on research and development in information retrieval, June 1992 1992 ACM Press Copenhagen, Denmark, New York, NY 330 337
-
(1992)
Proceedings of the 15th Annual ACM SIGIR Conference on Research and Development in Information Retrieval, June 1992
, pp. 330-337
-
-
Chalmers, M.1
Chitson, P.2
-
16
-
-
84924707734
-
-
Cambridge University Press Cambridge, UK
-
J. Clough Principles of cybercrime 2010 Cambridge University Press Cambridge, UK
-
(2010)
Principles of Cybercrime
-
-
Clough, J.1
-
17
-
-
0023294949
-
Computer viruses: Theory and experiments
-
F. Cohen Computer viruses: theory and experiments Computers and Security 6 1 1987 22 35
-
(1987)
Computers and Security
, vol.6
, Issue.1
, pp. 22-35
-
-
Cohen, F.1
-
18
-
-
33750215146
-
-
Commonwealth of Australia
-
Commonwealth of Australia Criminal Code Act 1995
-
(1995)
Criminal Code Act
-
-
-
19
-
-
80955133771
-
-
Commonwealth of Australia
-
Commonwealth of Australia Cybercrime Act 2001
-
(2001)
Cybercrime Act
-
-
-
21
-
-
80955133774
-
-
Commonwealth of Australia Available from: [accessed 01.06.11]
-
Commonwealth of Australia Inquiry into cyber-safety, joint select committee on cyber-safety Available from: 2010 http://www.aph.gov.au/house/ committee/jscc/index.htm [accessed 01.06.11]
-
(2010)
Inquiry into Cyber-safety, Joint Select Committee on Cyber-safety
-
-
-
23
-
-
3242808612
-
-
Computer Security Institute (CSI) 5th ed. CSI New York, NY
-
Computer Security Institute (CSI) CSI/FBI computer crime and security survey 5th ed. 2000 CSI New York, NY
-
(2000)
CSI/FBI Computer Crime and Security Survey
-
-
-
24
-
-
3242808612
-
-
Computer Security Institute (CSI) 14th ed. CSI New York, NY
-
Computer Security Institute (CSI) CSI/FBI computer crime and security survey 14th ed. 2009 CSI New York, NY
-
(2009)
CSI/FBI Computer Crime and Security Survey
-
-
-
25
-
-
80955156122
-
-
Council of Europe Available from: [accessed 08.08.10]
-
Council of Europe Convention on cybercrime Available from: 2004 http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT=185&CM= 8&DF=09/11/2010&CL=ENG [accessed 08.08.10]
-
(2004)
Convention on Cybercrime
-
-
-
27
-
-
77956750862
-
-
Available from: Child Health Promotion Research Centre, Edith Cowan University Perth [accessed 18.05.10]
-
D. Cross, T. Shaw, L. Hearn, M. Epstein, H. Monks, and L. Lester Australian covert bullying prevalence study (ACBPS) Available from: 2009 Child Health Promotion Research Centre, Edith Cowan University Perth http://www.deewr.gov.au/schooling/nationalsafeschools/pages/research.aspx [accessed 18.05.10]
-
(2009)
Australian Covert Bullying Prevalence Study (ACBPS)
-
-
Cross, D.1
Shaw, T.2
Hearn, L.3
Epstein, M.4
Monks, H.5
Lester, L.6
-
28
-
-
10944254818
-
Mobile phones as computing devices: The viruses are coming!
-
DOI 10.1109/MPRV.2004.21
-
D. Dagon, T. Martin, and T. Starner Mobile phones as computing devices: the viruses are coming! IEEE Pervasive Computing 3 4 2004 11 15 (Pubitemid 40010893)
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
, pp. 11-15
-
-
Dagon, D.1
Martin, T.2
Starner, T.3
-
29
-
-
0037784738
-
Construct validity in measurement: A pattern matching approach
-
J. Davis Construct validity in measurement: a pattern matching approach Evaluation and Program Planning 12 1 1989 31 36
-
(1989)
Evaluation and Program Planning
, vol.12
, Issue.1
, pp. 31-36
-
-
Davis, J.1
-
31
-
-
21844463321
-
The stakeholder theory of the corporation: Concepts, evidence and implications
-
T. Donaldson, and L.E. Preston The stakeholder theory of the corporation: concepts, evidence and implications Academy of Management Review 20 1995 65 91
-
(1995)
Academy of Management Review
, vol.20
, pp. 65-91
-
-
Donaldson, T.1
Preston, L.E.2
-
32
-
-
85105809948
-
Inductive learning algorithms and representations for text categorisations
-
G. Gadarin, J.C. French, N. Pissinou, K. Makki, J. Bougamin, ACM Press Bethesda, Maryland, New York, NY
-
S.T. Dumais, J. Platt, D. Heckerman, and M. Sahami Inductive learning algorithms and representations for text categorisations G. Gadarin, J.C. French, N. Pissinou, K. Makki, J. Bougamin, CIKM '98: proceedings of the 7th international conference on information and knowledge management 1998 ACM Press Bethesda, Maryland, New York, NY 148 155
-
(1998)
CIKM '98: Proceedings of the 7th International Conference on Information and Knowledge Management
, pp. 148-155
-
-
Dumais, S.T.1
Platt, J.2
Heckerman, D.3
Sahami, M.4
-
33
-
-
3142712929
-
Stakeholder theory and "the corporate objective revisited"
-
R.E. Freeman, A.C. Wicks, and B. Parmar Stakeholder theory and "the corporate objective revisited" Organization Science 15 2004 364 369
-
(2004)
Organization Science
, vol.15
, pp. 364-369
-
-
Freeman, R.E.1
Wicks, A.C.2
Parmar, B.3
-
34
-
-
35248861486
-
Categorising cybercrime and cybercriminals: The problem and potential approaches
-
S.M. Furnell Categorising cybercrime and cybercriminals: the problem and potential approaches Journal of Information Warfare 1 2 2001 35 44
-
(2001)
Journal of Information Warfare
, vol.1
, Issue.2
, pp. 35-44
-
-
Furnell, S.M.1
-
37
-
-
17844404852
-
Malicious bots threaten network security
-
D. Geer Malicious bots threaten network security Computer 38 2005 18 20 (Pubitemid 40583538)
-
(2005)
Computer
, vol.38
, Issue.1
, pp. 18-20
-
-
Geer, D.1
-
38
-
-
23344439017
-
Spyware was inevitable
-
DOI 10.1145/1076211.1076236
-
S. Gibson Spyware was inevitable Communications of the ACM 48 8 2005 37 39 (Pubitemid 41101411)
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 37-39
-
-
Gibson, S.1
-
41
-
-
34247605968
-
When web browsers turn bad
-
J. Hecht When web browsers turn bad New Scientist 194 2602 2007 60
-
(2007)
New Scientist
, vol.194
, Issue.2602
, pp. 60
-
-
Hecht, J.1
-
42
-
-
34249008392
-
New attack tricks antivirus software
-
K. Heyman New attack tricks antivirus software Computer 40 5 2007 18 21
-
(2007)
Computer
, vol.40
, Issue.5
, pp. 18-21
-
-
Heyman, K.1
-
44
-
-
77957082458
-
Trends in cybercrime: The darkside of the Internet
-
S.B. Hoar Trends in cybercrime: the darkside of the Internet Criminal Justice 20 3 2005 4 13
-
(2005)
Criminal Justice
, vol.20
, Issue.3
, pp. 4-13
-
-
Hoar, S.B.1
-
45
-
-
0036388121
-
Concept mapping as an alternative approach for the analysis of open-ended survey responses
-
K. Jackson, and W.K.M. Trochim Concept mapping as an alternative approach for the analysis of open-ended survey responses Organizational Research Methods 5 4 2002 307 336
-
(2002)
Organizational Research Methods
, vol.5
, Issue.4
, pp. 307-336
-
-
Jackson, K.1
Trochim, W.K.M.2
-
46
-
-
34848911641
-
Social phishing
-
DOI 10.1145/1290958.1290968, 1290968
-
T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer Social phishing Communications of the ACM 5 10 2007 94 100 (Pubitemid 47505005)
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
51
-
-
33644755338
-
Security awareness: Switch to a better programme
-
DOI 10.1016/S1353-4858(06)70337-3, PII S1353485806703373
-
E. Johnson Security awareness: switch to a better programme Network Security Feb 2006 15 18 (Pubitemid 43343971)
-
(2006)
Network Security
, vol.2006
, Issue.2
, pp. 15-18
-
-
Johnson, E.C.1
-
52
-
-
80955156118
-
-
Available from: Daily Telegraph Australia [accessed 21.03.11]
-
N. Klein Casey heynes breaks silence over bully video from chifley college and thoughts of suicide Available from: 2011 Daily Telegraph Australia http://www.dailytelegraph.com.au/news/casey-heynes-breaks-silence-over-bully- video-from-chifley-college-and-thoughts-of-suicide/story-e6freuy9-1226024997247 [accessed 21.03.11]
-
(2011)
Casey Heynes Breaks Silence over Bully Video from Chifley College and Thoughts of Suicide
-
-
Klein, N.1
-
56
-
-
17544394392
-
Computer security in the real world
-
B. Lampson Computer security in the real world IEEE Computer 37 6 2004 37 46
-
(2004)
IEEE Computer
, vol.37
, Issue.6
, pp. 37-46
-
-
Lampson, B.1
-
57
-
-
18144370814
-
Mobile phones: The next frontier for hackers?
-
N. Leavitt Mobile phones: the next frontier for hackers? IEEE Computer 38 4 2005 20 23 (Pubitemid 40608419)
-
(2005)
Computer
, vol.38
, Issue.4
, pp. 20-23
-
-
Leavitt, N.1
-
58
-
-
80955126551
-
-
Leximancer Leximancer Brisbane, Australia
-
Leximancer Leximancer user manual version 2.25 2005 Leximancer Brisbane, Australia
-
(2005)
Leximancer User Manual Version 2.25
-
-
-
59
-
-
77956877221
-
Cybercrime & cybercriminals: An overview of the Taiwan experience
-
C. Lu, W. Jen, W. Chang, and S. Chou Cybercrime & cybercriminals: an overview of the Taiwan experience Journal of Computers 1 6 2006 11 18
-
(2006)
Journal of Computers
, vol.1
, Issue.6
, pp. 11-18
-
-
Lu, C.1
Jen, W.2
Chang, W.3
Chou, S.4
-
62
-
-
74549178599
-
Profiling enterprise risks in large computer companies using the Leximancer software tool
-
N.J. Martin, and J.L. Rice Profiling enterprise risks in large computer companies using the Leximancer software tool Risk Management: International Journal 9 3 2007 188 206
-
(2007)
Risk Management: International Journal
, vol.9
, Issue.3
, pp. 188-206
-
-
Martin, N.J.1
Rice, J.L.2
-
63
-
-
84979837868
-
Identity theft in an online world
-
DOI 10.1016/j.clsr.2005.02.004, PII S0267364905000683
-
A.M. Marshall, and B.C. Tompsett Identity theft in an online world Computer Law and Security Report 21 2 2005 128 137 (Pubitemid 40480163)
-
(2005)
Computer Law and Security Report
, vol.21
, Issue.2
, pp. 128-137
-
-
Marshall, A.M.1
Tompsett, B.C.2
-
64
-
-
3042784584
-
Botnets: Big and bigger
-
B. McCarty Botnets: big and bigger IEEE Security and Privacy 1 4 2003 87 90
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 87-90
-
-
McCarty, B.1
-
65
-
-
23944454354
-
Automated identity theft
-
DOI 10.1109/MSECP.2003.1236244
-
B. McCarty Automated identity theft IEEE Security and Privacy 1 5 2003 89 92 (Pubitemid 41270176)
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.5
, pp. 89-92
-
-
McCarty, B.1
-
66
-
-
0034269416
-
Attacking malicious code: A report to the Infosec research council
-
G. McGraw, and G. Morrisett Attacking malicious code: a report to the Infosec research council IEEE Software 17 5 2000 33 41
-
(2000)
IEEE Software
, vol.17
, Issue.5
, pp. 33-41
-
-
McGraw, G.1
Morrisett, G.2
-
68
-
-
33745893541
-
Scoping identity theft
-
Two Decades of the Language-action Perspective
-
R. Mercuri Scoping identity theft Communications of the ACM 49 2 2006 17 21 (Pubitemid 44046397)
-
(2006)
Communications of the ACM
, vol.49
, Issue.5
, pp. 17-21
-
-
Mercuri, R.T.1
-
72
-
-
80855141387
-
The managers guide to understanding, detecting and thwarting computer crime: An international performance issue
-
N. Nykodym, L. Kahle-Piasecki, and E. Marsillac The managers guide to understanding, detecting and thwarting computer crime: an international performance issue Performance Improvement Journal 49 5 2010 42 47
-
(2010)
Performance Improvement Journal
, vol.49
, Issue.5
, pp. 42-47
-
-
Nykodym, N.1
Kahle-Piasecki, L.2
Marsillac, E.3
-
74
-
-
84979835616
-
Criminal profiling and insider cyber crime
-
DOI 10.1016/j.clsr.2005.07.001, PII S0267364905001433
-
N. Nykodym, R. Taylor, and J. Vilela Criminal profiling and insider cyber crime CLSR Computer Law and Security Report 21 2005 408 414 (Pubitemid 41313062)
-
(2005)
Computer Law and Security Report
, vol.21
, Issue.5
, pp. 408-414
-
-
Nykodym, N.1
Taylor, R.2
Vilela, J.3
-
77
-
-
0034818913
-
Trends in cybercrime - an overview of current financial crimes on the Internet
-
DOI 10.1016/S0167-4048(01)01021-5
-
S. Philippsohn Trends in cybercrime: an overview of current financial crimes on the Internet Computers and Security 20 2001 53 69 (Pubitemid 32874121)
-
(2001)
Computers and Security
, vol.20
, Issue.1
, pp. 53-69
-
-
Philippsohn, S.1
-
78
-
-
0034960975
-
Cyber crime: The backdrop to the Council of Europe Convention
-
DOI 10.1016/S0167-4048(01)00406-0
-
C. Pounder Cybercrime: backdrop to the Council of Europe convention Computers and Security 20 2001 311 315 (Pubitemid 32585904)
-
(2001)
Computers and Security
, vol.20
, Issue.4
, pp. 311-315
-
-
Pounder, C.1
-
80
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
DOI 10.1145/1177080.1177086, Proceedings of the 2006 ACM SIGCOMM Internet Measurement Conference, IMC 2006
-
Rajab MA, Zarfoss J, Monrose F, Terzis A. A multifaceted approach to understanding the botnet phenomenon. In: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, October 25-27, Rio de Janeiro, Brazil 2006; pp. 41-52. (Pubitemid 47165587)
-
(2006)
Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC
, pp. 41-52
-
-
Abu Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
82
-
-
0012828167
-
Cybercrimes of the 21st century
-
A. Riem Cybercrimes of the 21st century Computer Fraud and Security 3 2001 13 15
-
(2001)
Computer Fraud and Security
, vol.3
, pp. 13-15
-
-
Riem, A.1
-
83
-
-
0012828167
-
Cybercrimes of the 21st century
-
A. Riem Cybercrimes of the 21st century Computer Fraud and Security 4 2001 12 15
-
(2001)
Computer Fraud and Security
, vol.4
, pp. 12-15
-
-
Riem, A.1
-
84
-
-
0012828167
-
Cybercrimes of the 21st century: Crimes against the individual - Part 1
-
A. Riem Cybercrimes of the 21st century: crimes against the individual - part 1 Computer Fraud and Security 6 2001 13 17
-
(2001)
Computer Fraud and Security
, vol.6
, pp. 13-17
-
-
Riem, A.1
-
88
-
-
1242263792
-
Security training and awareness - Fitting a square peg in a round hole
-
E. Schultz Security training and awareness - fitting a square peg in a round hole Computers and Security 26 1 2004 1 2
-
(2004)
Computers and Security
, vol.26
, Issue.1
, pp. 1-2
-
-
Schultz, E.1
-
89
-
-
24644438691
-
The human factor in security
-
DOI 10.1016/j.cose.2005.07.002, PII S0167404805001045
-
E. Schultz The human factor in security Computers and Security 24 6 2005 425 426 (Pubitemid 41277028)
-
(2005)
Computers and Security
, vol.24
, Issue.6
, pp. 425-426
-
-
Schultz, E.1
-
91
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
M.T. Siponen A conceptual foundation for organizational information security awareness Information Management and Computer Security 8 1 2000 31 41
-
(2000)
Information Management and Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.T.1
-
92
-
-
53049103906
-
Five dimensions of information security awareness
-
M.T. Siponen Five dimensions of information security awareness Computers and Society 31 2 2001 24 29
-
(2001)
Computers and Society
, vol.31
, Issue.2
, pp. 24-29
-
-
Siponen, M.T.1
-
94
-
-
0036036094
-
Issues in cybersecurity: Understanding the potential risks associated with hackers/crackers
-
DOI 10.1108/09685220210436976
-
A.D. Smith, and W.T. Rupp Issues in cybersecurity: understanding the potential risks associated with hackers/crackers Information Management and Computer Security 10 4 2002 178 183 (Pubitemid 35010223)
-
(2002)
Information Management and Computer Security
, vol.10
, Issue.4
, pp. 178-183
-
-
Smith, A.D.1
Rupp, W.T.2
-
95
-
-
33748991451
-
Evaluation of unsupervised semantic mapping of natural language with Leximancer concept mapping
-
A.E. Smith, and M.S. Humphreys Evaluation of unsupervised semantic mapping of natural language with Leximancer concept mapping Behaviour Research Methods 38 2 2006 262 279
-
(2006)
Behaviour Research Methods
, vol.38
, Issue.2
, pp. 262-279
-
-
Smith, A.E.1
Humphreys, M.S.2
-
96
-
-
41149168739
-
Cyberbullying: Its nature and impact in secondary school pupils
-
DOI 10.1111/j.1469-7610.2007.01846.x
-
P.K. Smith, J. Mahdavi, M. Carvalho, S. Fisher, S. Russell, and N. Tippett Cyberbullying: its nature and impact in secondary school pupils Journal of Child Psychology and Psychiatry 49 2008 376 385 (Pubitemid 351432216)
-
(2008)
Journal of Child Psychology and Psychiatry and Allied Disciplines
, vol.49
, Issue.4
, pp. 376-385
-
-
Smith, P.K.1
Mahdavi, J.2
Carvalho, M.3
Fisher, S.4
Russell, S.5
Tippett, N.6
-
98
-
-
1642566053
-
The future for the policing of cybercrime
-
DOI 10.1016/S1361-3723(04)00017-X, PII S136137230400017X
-
P. Sommer The future for the policing of cybercrime Computer Fraud and Security 1 2004 8 12 (Pubitemid 38128121)
-
(2004)
Computer Fraud and Security
, vol.2004
, Issue.1
, pp. 8-12
-
-
Sommer, P.1
-
99
-
-
0012068216
-
Computer viruses as artificial life
-
E.H. Spafford Computer viruses as artificial life Journal of Artificial Life 1 3 1994 249 265
-
(1994)
Journal of Artificial Life
, vol.1
, Issue.3
, pp. 249-265
-
-
Spafford, E.H.1
-
100
-
-
77956790843
-
-
Available from: Hawke Research Institute for Sustainable Societies, University of South Australia [accessed 23.12.09]
-
B. Spears, P. Slee, L. Owens, and B. Johnson Behind the scenes: insights into the human dimension of covert bullying Available from: 2008 Hawke Research Institute for Sustainable Societies, University of South Australia http://www.deewr.gov.au/schooling/nationalsafeschools/pages/research.aspx [accessed 23.12.09]
-
(2008)
Behind the Scenes: Insights into the Human Dimension of Covert Bullying
-
-
Spears, B.1
Slee, P.2
Owens, L.3
Johnson, B.4
-
101
-
-
0034288049
-
Redefining borders: The challenges of cybercrime
-
D.L. Speer Redefining borders: the challenges of cybercrime Crime, Law and Social Change 34 3 2000 259 273
-
(2000)
Crime, Law and Social Change
, vol.34
, Issue.3
, pp. 259-273
-
-
Speer, D.L.1
-
103
-
-
17844366573
-
Analysis of end user security behaviors
-
DOI 10.1016/j.cose.2004.07.001, PII S0167404804001841
-
J.M. Stanton, K.R. Stam, P. Mastrangelo, and J. Jolton Analysis of end user security behaviours Computers and Security 24 2 2005 124 133 (Pubitemid 40583824)
-
(2005)
Computers and Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
106
-
-
23344447680
-
Why Spyware poses multiple threats to security
-
DOI 10.1145/1076211.1076237
-
R. Thompson Why spyware poses multiple threats to security Communications of the ACM 48 8 2005 41 43 (Pubitemid 41101412)
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 41-43
-
-
Thompson, R.1
-
108
-
-
0242517401
-
Information security awareness: Educating your users effectively
-
M.E. Thomson, and R. von Solms Information security awareness: educating your users effectively Information Management and Computer Security 6 4 1998 167 173 (Pubitemid 128623423)
-
(1998)
Information Management and Computer Security
, vol.6
, Issue.4
, pp. 167-173
-
-
Thomson, M.E.1
Von Solms, R.2
-
109
-
-
34248627452
-
An introduction to concept mapping for planning and evaluation
-
W.K.M. Trochim An introduction to concept mapping for planning and evaluation Evaluation and Program Planning 12 1 1989 1 16
-
(1989)
Evaluation and Program Planning
, vol.12
, Issue.1
, pp. 1-16
-
-
Trochim, W.K.M.1
-
110
-
-
0027938361
-
Using concept mapping to develop a conceptual framework of staff's views of a supported employment program for individuals with severe mental illness
-
DOI 10.1037//0022-006X.62.4.766
-
W.K.M. Trochim, J. Cook, and R. Setze Using concept mapping to develop a conceptual framework of staff's views of a supported employment program for persons with severe mental illness Consulting and Clinical Psychology 62 4 1994 766 775 (Pubitemid 24268719)
-
(1994)
Journal of Consulting and Clinical Psychology
, vol.62
, Issue.4
, pp. 766-775
-
-
Trochim, W.M.K.1
Cook, J.A.2
Setze, R.J.3
-
111
-
-
1442330920
-
Setting objectives for community and systems change: An application of concept mapping for planning a statewide health improvement initiative
-
W.K.M. Trochim, B. Milstein, B. Wood, S. Jackson, and V. Pressler Setting objectives for community and systems change: an application of concept mapping for planning a statewide health improvement initiative Health Promotion Practice 5 1 2004 8 19
-
(2004)
Health Promotion Practice
, vol.5
, Issue.1
, pp. 8-19
-
-
Trochim, W.K.M.1
Milstein, B.2
Wood, B.3
Jackson, S.4
Pressler, V.5
-
112
-
-
68849083729
-
-
Prentice Hall Upper Saddle River, NJ
-
J.R. Vacca Identity theft 2003 Prentice Hall Upper Saddle River, NJ
-
(2003)
Identity Theft
-
-
Vacca, J.R.1
-
113
-
-
4243198165
-
Enemy at the gate: Threats to information security
-
M.E. Whitman Enemy at the gate: threats to information security Communications of the ACM 46 8 2003 91 95
-
(2003)
Communications of the ACM
, vol.46
, Issue.8
, pp. 91-95
-
-
Whitman, M.E.1
|