-
1
-
-
77956906456
-
An overview of social engineering malware: Trends, tactics, and implications
-
Abraham, S. and Chengalur-Smith, I. (2010), "An overview of social engineering malware: trends, tactics, and implications", Technology in Society, Vol. 32 No. 3, pp. 183-196.
-
(2010)
Technology in Society
, vol.32
, Issue.3
, pp. 183-196
-
-
Abraham, S.1
Chengalur-Smith, I.2
-
2
-
-
2642549662
-
Computer security and risky computing practices: A rational choice perspective
-
Aytes, K. and Terry, C. (2004), "Computer security and risky computing practices: a rational choice perspective", Journal of Organizational and End User Computing, Vol. 16 No. 3, pp. 22-40.
-
(2004)
Journal of Organizational and End User Computing
, vol.16
, Issue.3
, pp. 22-40
-
-
Aytes, K.1
Terry, C.2
-
3
-
-
67651021787
-
Social engineering: Assessing vulnerabilities in practice
-
Bakhski, T., Papadaki, M. and Furnell, S. (2009), "Social engineering: assessing vulnerabilities in practice", Information Management & Computer Security, Vol. 17 No. 1, pp. 53-63.
-
(2009)
Information Management & Computer Security
, vol.17
, Issue.1
, pp. 53-63
-
-
Bakhski, T.1
Papadaki, M.2
Furnell, S.3
-
4
-
-
6744255767
-
Penetration testing through social engineering
-
Ceraolo, J.P. (1996), "Penetration testing through social engineering", Information Systems Security, Vol. 4 No. 4, pp. 37-48.
-
(1996)
Information Systems Security
, vol.4
, Issue.4
, pp. 37-48
-
-
Ceraolo, J.P.1
-
7
-
-
84893668597
-
-
DBIR, Data Breach Investigation Report (accessed 10 December 2012)
-
DBIR (2011), Verizon, Data Breach Investigation Report, available at: www.verizonbusiness.com/resources/reports/rp-data-breach-investigations-report- 2011-en-xg.pdf (accessed 10 December 2012).
-
(2011)
Verizon
-
-
-
9
-
-
63049137706
-
Information security: The moving target
-
Dlamini, M.T., Eloff, J.H.P. and Eloff, M.M. (2009), "Information security: the moving target", Computer & Security, Vol. 28 Nos 3/4, pp. 189-198.
-
(2009)
Computer & Security
, vol.28
, Issue.3-4
, pp. 189-198
-
-
Dlamini, M.T.1
Eloff, J.H.P.2
Eloff, M.M.3
-
10
-
-
33846794868
-
Phishing for user security awareness
-
Dodge, R.C., Carver, C. and Ferguson, A.J. (2007), "Phishing for user security awareness", Computers and Security, Vol. 26 No. 1, pp. 73-80.
-
(2007)
Computers and Security
, vol.26
, Issue.1
, pp. 73-80
-
-
Dodge, R.C.1
Carver, C.2
Ferguson, A.J.3
-
11
-
-
33744996371
-
-
Ernst & Young, Ernst & Young, London
-
Ernst & Young (2008), Global Information Security Survey, Ernst & Young, London.
-
(2008)
Global Information Security Survey
-
-
-
13
-
-
0003539077
-
-
4th ed., Wadsworth, Belmont, CA
-
Goldstein, I.L. and Ford, J.K. (2002), Training in Organizations: Needs Assessment, Development, and Evaluation, 4th ed., Wadsworth, Belmont, CA.
-
(2002)
Training in Organizations: Needs Assessment, Development, and Evaluation
-
-
Goldstein, I.L.1
Ford, J.K.2
-
14
-
-
84893679757
-
-
Defcon 18 Social Engineering CTF
-
Hadnagy, C.J., Aharoni, M. and O'Gorman, J. (2010), Social Engineering Capture the Flag Results, Defcon 18 Social Engineering CTF, available at: www.social-engineer.org/resources/sectf/Social-Engineer-CTF-Report.pdf
-
(2010)
Social Engineering Capture the Flag Results
-
-
Hadnagy, C.J.1
Aharoni, M.2
O'Gorman, J.3
-
15
-
-
85003712015
-
Designing a security awareness program: Part 1
-
January/February
-
Hansche, S. (2001), "Designing a security awareness program: part 1", Information Systems Security, January/February, pp. 14-22.
-
(2001)
Information Systems Security
, pp. 14-22
-
-
Hansche, S.1
-
16
-
-
84886247304
-
Top 10 IT issues 2011
-
May/June
-
Ingerman, B.L. and Yang, C. (2011), "Top 10 IT issues 2011", Educause Review, May/June, pp. 26-40.
-
(2011)
Educause Review
, pp. 26-40
-
-
Ingerman, B.L.1
Yang, C.2
-
17
-
-
34250922831
-
The varimax criterion for analytic rotation in factor analysis
-
Kaiser, H.F. (1958), "The varimax criterion for analytic rotation in factor analysis", Psychometrika, Vol. 23, pp. 187-200.
-
(1958)
Psychometrika
, vol.23
, pp. 187-200
-
-
Kaiser, H.F.1
-
18
-
-
43249095597
-
An assessment of end user vulnerability to phishing attacks
-
Karakasiliotis, A., Furnell, S. and Papadaki, M. (2007), "An assessment of end user vulnerability to phishing attacks", Journal of Information Warfare, Vol. 6 No. 1, pp. 17-28.
-
(2007)
Journal of Information Warfare
, vol.6
, Issue.1
, pp. 17-28
-
-
Karakasiliotis, A.1
Furnell, S.2
Papadaki, M.3
-
19
-
-
37749008219
-
-
AMACOM: A Division of American Management Association, New York, NY
-
King, S.B., King, M. and Rothwell, W.J. (2001), The Complete Guide to Training Delivery, AMACOM: A Division of American Management Association, New York, NY.
-
(2001)
The Complete Guide to Training Delivery
-
-
King, S.B.1
King, M.2
Rothwell, W.J.3
-
20
-
-
33746994612
-
A prototype for assessing information security awareness
-
Kruger, H.A. and Kearney, W.D. (2006), "A prototype for assessing information security awareness", Computers & Security, Vol. 25 No. 4, pp. 289-296.
-
(2006)
Computers & Security
, vol.25
, Issue.4
, pp. 289-296
-
-
Kruger, H.A.1
Kearney, W.D.2
-
21
-
-
77951706526
-
-
Association for Computing Machinery (ACM) IEEE Computer Society, New York, NY
-
Lunt, B.M., Ekstrom, J.J., Gorka, S., Hislop, G., Kamali, R., Lawson, E., LeBlanc, R., Miller, J. and Reichgelt, H. (2008), Curriculum Guidelines for Undergraduate Degree Programs in Information Technology, Association for Computing Machinery (ACM) IEEE Computer Society, New York, NY.
-
(2008)
Curriculum Guidelines for Undergraduate Degree Programs in Information Technology
-
-
Lunt, B.M.1
Ekstrom, J.J.2
Gorka, S.3
Hislop, G.4
Kamali, R.5
Lawson, E.6
Leblanc, R.7
Miller, J.8
Reichgelt, H.9
-
22
-
-
2442701031
-
A model for information assurance: An integrated approach
-
United States Military Academy, West Point, NY, 5-6 June
-
Maconachy, W.V., Schou, C.D., Ragsdale, D. and Welch, D. (2001), "A model for information assurance: an integrated approach", Proceedings of the 2001 IEEEWorkshop on Information Assurance and Security, United States Military Academy, West Point, NY, 5-6 June.
-
(2001)
Proceedings of the 2001 IEEEWorkshop on Information Assurance and Security
-
-
Maconachy, W.V.1
Schou, C.D.2
Ragsdale, D.3
Welch, D.4
-
23
-
-
84893698734
-
-
March 9 (accessed December 10, 2012)
-
Microsoft (2010), "P2P file sharing: know the risks, security for your home", March 9, available at: www.microsoft.com/canada/protect/ protect-yourself/protect-your-data/article.aspx?article=p2p-file-sharing-know- the-risks (accessed December 10, 2012).
-
(2010)
P2P File Sharing: Know the Risks, Security for Your Home
-
-
-
26
-
-
0003528130
-
-
2nd ed., McGraw-Hill, New York, NY
-
Nunnally, J.C. (1978), Psychometric Theory, 2nd ed., McGraw-Hill, New York, NY.
-
(1978)
Psychometric Theory
-
-
Nunnally, J.C.1
-
27
-
-
85015895149
-
On the anatomy of human hacking
-
Okenyi, P.O. and Owens, T.J. (2007), "On the anatomy of human hacking", Information Systems Security, Vol. 16, pp. 302-314.
-
(2007)
Information Systems Security
, vol.16
, pp. 302-314
-
-
Okenyi, P.O.1
Owens, T.J.2
-
28
-
-
78650770842
-
Improving employees' compliance through information systems security training: An action research study
-
Puhakainen, P. and Siponen, M.T. (2010), "Improving employees' compliance through information systems security training: an action research study", MIS Quarterly, Vol. 34 No. 4, pp. 757-778.
-
(2010)
MIS Quarterly
, vol.34
, Issue.4
, pp. 757-778
-
-
Puhakainen, P.1
Siponen, M.T.2
-
30
-
-
56249140028
-
The impact of information richness on information security awareness training effectiveness
-
Shaw, R.S., Chen, C.C., Harris, A.L. and Huang, H.J. (2009), "The impact of information richness on information security awareness training effectiveness", Computers & Education, Vol. 52, pp. 92-100.
-
(2009)
Computers & Education
, vol.52
, pp. 92-100
-
-
Shaw, R.S.1
Chen, C.C.2
Harris, A.L.3
Huang, H.J.4
-
31
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Siponen, M.T. (2000), "A conceptual foundation for organizational information security awareness", Information Management & Computer Security, Vol. 8 No. 1, pp. 31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.T.1
-
32
-
-
36248967046
-
Employees' adherence to information security policies: An empirical study
-
Siponen, M.T., Pahnila, S. and Mahmood, A. (2007), "Employees' adherence to information security policies: an empirical study", New Approaches for Security, Privacy and Trust in Complex Environments Proceedings of the 22nd International Federation for Information Processing Conference, pp. 133-144.
-
(2007)
New Approaches for Security, Privacy and Trust in Complex Environments Proceedings of the 22nd International Federation for Information Processing Conference
, pp. 133-144
-
-
Siponen, M.T.1
Pahnila, S.2
Mahmood, A.3
-
33
-
-
84991176343
-
Training needs assessment at work: A dynamic process
-
Sleezer, C.M. (1993), "Training needs assessment at work: a dynamic process", Human Resource Development Quarterly, Vol. 4, pp. 247-264.
-
(1993)
Human Resource Development Quarterly
, vol.4
, pp. 247-264
-
-
Sleezer, C.M.1
-
34
-
-
0000280419
-
Effective is security: An empirical study
-
Straub, D.W. (1990), "Effective is security: an empirical study", Information Systems Research, Vol. 1 No. 3, pp. 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
35
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D.W. and Welke, R.J. (1998), "Coping with systems risk: security planning models for management decision making", MIS Quarterly, Vol. 22 No. 4, pp. 441-464.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-464
-
-
Straub, D.W.1
Welke, R.J.2
-
36
-
-
8844242857
-
Personalize training: Determine learning styles, personality types and multiple intelligences online
-
Vincent, A. and Ross, D. (2001), "Personalize training: determine learning styles, personality types and multiple intelligences online", The Learning Organization, Vol. 8 No. 1, pp. 36-43.
-
(2001)
The Learning Organization
, vol.8
, Issue.1
, pp. 36-43
-
-
Vincent, A.1
Ross, D.2
-
37
-
-
3042812983
-
The 10 deadly sins of information security management
-
von Solms, B. and von Solms, R. (2004), "The 10 deadly sins of information security management", Computers & Security, Vol. 23, pp. 371-376.
-
(2004)
Computers & Security
, vol.23
, pp. 371-376
-
-
Von Solms, B.1
Von Solms, R.2
-
38
-
-
84995871700
-
Gaining access with social engineering: An empirical study of the threat
-
Workman, M. (2007), "Gaining access with social engineering: an empirical study of the threat", Information Systems Security, Vol. 16, pp. 315-331.
-
(2007)
Information Systems Security
, vol.16
, pp. 315-331
-
-
Workman, M.1
-
39
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
Workman, M., Bommer, W.H. and Straub, D. (2008), "Security lapses and the omission of information security measures: a threat control model and empirical test", Computers in Human Behavior, Vol. 24 No. 6, pp. 2799-2816.
-
(2008)
Computers in Human Behavior
, vol.24
, Issue.6
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.H.2
Straub, D.3
-
40
-
-
0003344181
-
Training needs assessment: The broadening focus of a simple construct
-
Howard, A. (Ed.), Guilford Press, New York, NY
-
Zemke, R.E. (1994), "Training needs assessment: the broadening focus of a simple construct", in Howard, A. (Ed.), Diagnosis for Organizational Change: Methods and Models, Guilford Press, New York, NY, pp. 139-151.
-
(1994)
Diagnosis for Organizational Change: Methods and Models
, pp. 139-151
-
-
Zemke, R.E.1
-
41
-
-
0036884659
-
The human firewall manifesto
-
Wood, C.C. (2002),"The human firewall manifesto",Computer Security Journal, Vol. 18 No.1,pp.15-18.
-
(2002)
Computer Security Journal
, vol.18
, Issue.1
, pp. 15-18
-
-
Wood, C.C.1
|