-
1
-
-
0043232732
-
Users are not the enemy
-
Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42 (12), 40-46.
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
2
-
-
23944472255
-
-
(2nd ed.). Amsterdam: Emerald Group Publishing
-
Case, D. O. (2007). Looking for information (2nd ed.). Amsterdam: Emerald Group Publishing.
-
(2007)
Looking for information
-
-
Case, D.O.1
-
3
-
-
0012671648
-
Cultural differences in the online behavior of consumers: Understanding how different cultures use the net -As well as perceive the same web sites -can translate to truly global e-commerce
-
Chau, P. Y. K., Cole, M., Massey, A. P., Montoya-Weiss, M., & O'Keefe, R. M. (2002). Cultural differences in the online behavior of consumers: Understanding how different cultures use the net -As well as perceive the same Web sites -can translate to truly global e-commerce. Communications of the ACM, 45(10), 138-143.
-
(2002)
Communications of the ACM
, vol.45
, Issue.10
, pp. 138-143
-
-
Chau, P.Y.K.1
Cole, M.2
Massey, A.P.3
Montoya-Weiss, M.4
O'Keefe, R.M.5
-
4
-
-
79952080587
-
-
Cisco Systems. ( Retrieved from Cisco Systems, Inc. Web site
-
Cisco Systems. (2008a). Data leakage worldwide: Common risks and mistakes employees make . Retrieved from Cisco Systems, Inc. Web site: http://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/ white-paper-c11-499060.html.
-
(2008)
Data leakage worldwide: Common risks and mistakes employees make
-
-
-
5
-
-
79952074033
-
-
Cisco Systems. (Retrieved from Cisco Systems, Inc. Web site
-
Cisco Systems. (2008b). Data leakage worldwider: The high cost of insider threats . Retrieved from Cisco Systems, Inc. Web site: http://www.cisco.com/en/ US/solutions/collateral/ns170/ns896/ns895/white-paper-c11-506224.html.
-
(2008)
Data leakage worldwider: The high cost of insider threats
-
-
-
6
-
-
79952093275
-
-
Cisco Systems. (Retrieved from Cisco Systems, Inc. Web site
-
Cisco Systems. (2008c). Data leakage worldwide: The effectiveness of security policies . Retrieved from Cisco Systems, Inc. Web site: http://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/ white-paper-c11-503131.html.
-
(2008)
Data leakage worldwide: The effectiveness of security policies
-
-
-
7
-
-
59849106332
-
Information needs and information-seeking behavior in developing countries: A review of the research
-
doi:10.1016/j.iilr.2008.12.001
-
Dutta, R. (2008). Information needs and information-seeking behavior in developing countries: A review of the research . The International Information and Library Review, 2009 (41), 41-51. doi:10.1016/j.iilr.2008.12.001.
-
(2008)
The International Information and Library Review
, vol.2009
, Issue.41
, pp. 41-51
-
-
Dutta, R.1
-
8
-
-
67349144062
-
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
-
doi:10.1016/j.dss.2009.02.005
-
Herath, T., & Rao, H. R. (2009). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154-165. doi:10.1016/j.dss.2009. 02.005.
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 154-165
-
-
Herath, T.1
Rao, H.R.2
-
9
-
-
84861424318
-
-
InsightExpress. ( Retrieved from Cisco Systems, Inc. Web site
-
InsightExpress. ( 2008a). The challenge of data leakage for businesses and employees around the world. Retrieved from Cisco Systems, Inc. Web site: http://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/ Cisco-STL-Data-Leakage-2008-PR1.pdf.
-
(2008)
The challenge of data leakage for businesses and employees around the world
-
-
-
10
-
-
79952093275
-
-
InsightExpress. (Retrieved from Cisco Systems, Inc. Web site
-
InsightExpress. (2008b). Data leakage worldwide: The effectiveness of corporate security policies. Retrieved from Cisco Systems, Inc. Web site: http://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/ Cisco-STL-Data-Leakage-2008-.pdf.
-
(2008)
Data leakage worldwide: The effectiveness of corporate security policies
-
-
-
11
-
-
84861418099
-
-
InsightExpress. (Retrieved from Cisco Systems, Inc. Web site
-
InsightExpress. (2008c). Data leakage worldwide: The insider threat and the cost of data loss. Retrieved from Cisco Systems, Inc. Web site: http://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/ Cisco-STL-Data-Leakage-2008.pdf.
-
(2008)
Data leakage worldwide: The insider threat and the cost of data loss
-
-
-
12
-
-
70449816069
-
The global network organization of the future: Information management opportunities and challenges
-
Jarvenpaa, S. L., & Ives, B. (1994). The global network organization of the future: Information management opportunities and challenges. Journal of Management Information Systems, 10 (4), 25-57.
-
(1994)
Journal of Management Information Systems
, vol.10
, Issue.4
, pp. 25-57
-
-
Jarvenpaa, S.L.1
Ives, B.2
-
13
-
-
35548991869
-
A model for understanding collaborative information behavior in context: A study of two healthcare teams
-
doi:10.1016/j.ipm.2006.12.010
-
Reddy, M. C., & Jansen, B. J. (2008). A model for understanding collaborative information behavior in context: A study of two healthcare teams. Information Processing and Management, 44(1), 256-273. doi:10.1016/j.ipm.2006. 12.010.
-
(2008)
Information Processing and Management
, vol.44
, Issue.1
, pp. 256-273
-
-
Reddy, M.C.1
Jansen, B.J.2
-
14
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Siponen, M. T. (2000). A conceptual foundation for organizational information security awareness. Information Management & Computer Security, 8(1), 31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.T.1
-
15
-
-
33645290233
-
Human information behavior: Integrating diverse approaches and information use
-
Spink, A., & Cole, C. (2006). Human information behavior: Integrating diverse approaches and information use. Journal of the American Society for Information Science and Technology, 57 (1), 25-35.
-
(2006)
Journal of the American Society for Information Science and Technology
, vol.57
, Issue.1
, pp. 25-35
-
-
Spink, A.1
Cole, C.2
-
16
-
-
17844366573
-
Analysis of end user security behaviors
-
doi:10.1016/j.cose.2004.07.001
-
Stanton, J. M., Stam, K. R., Mastrangelo, P., & Jolton, J. (2005). Analysis of end user security behaviors. Computers and Security, 24(2), 124-133. doi:10.1016/j.cose.2004.07.001.
-
(2005)
Computers and Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
17
-
-
0242517401
-
Information security awareness: Educating your users effectively
-
Thomson, M. E., & von Solms, R. (1998). Information security awareness: educating your users effectively. Information Management & Computer Security, 6(4), 167-173.
-
(1998)
Information Management & Computer Security
, vol.6
, Issue.4
, pp. 167-173
-
-
Thomson, M.E.1
Von Solms, R.2
-
19
-
-
84861453131
-
Towards information security behavioral compliance
-
Vroom, C., & von Solms, R. (2004). Towards information security behavioral compliance. Information Management & Computer Security, 6(4), 167-173.
-
(2004)
Information Management & Computer Security
, vol.6
, Issue.4
, pp. 167-173
-
-
Vroom, C.1
Von Solms, R.2
-
20
-
-
38249040223
-
Information use and needs in manufacturing organizations: Organizational factors in information behavior
-
White, D. A. (1986). Information use and needs in manufacturing organizations: Organizational factors in information behavior. International Journal of Information Management, 1986(6), 157-170.
-
(1986)
International Journal of Information Management
, vol.1986
, Issue.6
, pp. 157-170
-
-
White, D.A.1
-
21
-
-
0031190395
-
Information behavior: An interdisciplinary perspective
-
Wilson, T. D. (1997). Information behavior: An interdisciplinary perspective. Information Processing and Management, 33(4), 551-572.
-
(1997)
Information Processing and Management
, vol.33
, Issue.4
, pp. 551-572
-
-
Wilson, T.D.1
-
22
-
-
33750706249
-
On user studies and information needs
-
Wilson, T. D. (2006). On user studies and information needs. Journal of Documentation, 62(6), 658-670.
-
(2006)
Journal of Documentation
, vol.62
, Issue.6
, pp. 658-670
-
-
Wilson, T.D.1
-
23
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
doi:10.1016/j.chb.2008.04.005
-
Workman, M., Bommer, W. H., & Straub, D. (2008). Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior, 24(6), 2799-2816. doi:10.1016/j.chb.2008.04.005.
-
(2008)
Computers in Human Behavior
, vol.24
, Issue.6
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.H.2
Straub, D.3
-
24
-
-
0031488129
-
Country effects on information seeking in global electronic networks
-
Zaheer, S., & Zaheer, A. (1997). Country effects on information seeking in global electronic networks. Journal of International Business Studies, 28(1), 77-100.
-
(1997)
Journal of International Business Studies
, vol.28
, Issue.1
, pp. 77-100
-
-
Zaheer, S.1
Zaheer, A.2
|