-
1
-
-
77951204516
-
Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study
-
E. Albrechsten, and J. Hovden Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study Comput Secur 29 1 2010 432 445
-
(2010)
Comput Secur
, vol.29
, Issue.1
, pp. 432-445
-
-
Albrechsten, E.1
Hovden, J.2
-
2
-
-
34249871944
-
A qualitative study of users' view on information security
-
DOI 10.1016/j.cose.2006.11.004, PII S0167404806002033
-
E. Albrechtsen Qualitative study of users' view on information security Comput Secur 26 1 2007 276 289 (Pubitemid 46873753)
-
(2007)
Computers and Security
, vol.26
, Issue.4
, pp. 276-289
-
-
Albrechtsen, E.1
-
4
-
-
63049091681
-
From desktop to mobile: Examining the security experience
-
R. Botha, S. Furnell, and N. Clarke From desktop to mobile: examining the security experience Comput Secur 28 3-4 2009 130 137
-
(2009)
Comput Secur
, vol.28
, Issue.34
, pp. 130-137
-
-
Botha, R.1
Furnell, S.2
Clarke, N.3
-
5
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
B. Bulgurcu, H. Cavusoglu, and I. Benbasat Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness MIS Q 34 3 2010 523 548
-
(2010)
MIS Q
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
6
-
-
79955442931
-
Smart security
-
T. Caldwell Smart security Netw Secur 9 1 2011 5 9
-
(2011)
Netw Secur
, vol.9
, Issue.1
, pp. 5-9
-
-
Caldwell, T.1
-
7
-
-
84894129752
-
-
Retrieved from Cisco mConcierge
-
Cisco BYOD insights 2013 2013, March Retrieved from Cisco mConcierge: http://www.ciscomcon.com/sw/swchannel/registration/internet/registration.cfm? SWAPPID=91&RegPageID=350200&SWTHEMEID=12949
-
(2013)
BYOD Insights 2013
-
-
Cisco1
-
8
-
-
77956620263
-
The positive outcomes of information security awareness training in companies a case study
-
M. Eminagaoglu, E. Ucar, and S. Eren The positive outcomes of information security awareness training in companies:- a case study Inf Secur Tech Rep 14 1 2009 223 229
-
(2009)
Inf Secur Tech Rep
, vol.14
, Issue.1
, pp. 223-229
-
-
Eminagaoglu, M.1
Ucar, E.2
Eren, S.3
-
9
-
-
33746994612
-
A prototype for assessing information security awareness
-
DOI 10.1016/j.cose.2006.02.008, PII S0167404806000563
-
H. Kruger, and W. Kearney A prototype for assessing information security awareness Comput Secur 25 1 2006 289 296 (Pubitemid 44202198)
-
(2006)
Computers and Security
, vol.25
, Issue.4
, pp. 289-296
-
-
Kruger, H.A.1
Kearney, W.D.2
-
11
-
-
84894109655
-
Managing and securing business networks in the smartphone era
-
Paper 5 Sam Houston State University Huntsville
-
S. Mahesh, and A. Hooter Managing and securing business networks in the smartphone era Paper 5 Annual general business conference 2013 Sam Houston State University Huntsville 1 17
-
(2013)
Annual General Business Conference
, pp. 1-17
-
-
Mahesh, S.1
Hooter, A.2
-
12
-
-
84879164107
-
Q & A: Colin Tankard - Raising security awareness
-
S. Mansfield Q & A: Colin Tankard - raising security awareness Netw Secur 2013 6 2013, June 16 19
-
(2013)
Netw Secur
, vol.2013
, Issue.6
, pp. 16-19
-
-
Mansfield, S.1
-
13
-
-
84891843335
-
Delegate the smartphone users? Security awareness in smartphone platforms
-
A. Mylonas, A. Kastania, and D. Gritzalis Delegate the smartphone users? Security awareness in smartphone platforms Comput Secur 34 1 2013 47 66
-
(2013)
Comput Secur
, vol.34
, Issue.1
, pp. 47-66
-
-
Mylonas, A.1
Kastania, A.2
Gritzalis, D.3
-
14
-
-
84888864676
-
-
Ponemon Institute LLC Traverse City, Michigan
-
Ponemon Institute 2013 state of the endpoint 2012 Ponemon Institute LLC Traverse City, Michigan
-
(2012)
2013 State of the Endpoint
-
-
Institute, P.1
-
16
-
-
3142720692
-
-
Retrieved 30.07.12from:http://www.pwc.co.uk/audit-assurance/publications/ uk-information-security-breaches-survey-results-2012.jhtml
-
PricewaterhouseCoopers Information security breaches survey 2012, April Retrieved 30.07.12, from: http://www.pwc.co.uk http://www.pwc.co.uk/audit- assurance/publications/uk-information-security-breaches-survey-results-2012. jhtml
-
(2012)
Information Security Breaches Survey
-
-
Pricewaterhousecoopers1
-
17
-
-
0031279121
-
Risk management in a dynamic society: A modelling problem
-
DOI 10.1016/S0925-7535(97)00052-0, PII S0925753597000520
-
J. Rasmussen Risk management in a dynamic society: a modelling problem Saftey Sci 27 2 1997 183 213 (Pubitemid 28020542)
-
(1997)
Safety Science
, vol.27
, Issue.2-3
, pp. 183-213
-
-
Rasmussen, J.1
-
19
-
-
73149086369
-
An outline of general system theory
-
L. Von Bertalanffy An outline of general system theory Br J Phil Sci 1 2 1950 134 165
-
(1950)
Br J Phil Sci
, vol.1
, Issue.2
, pp. 134-165
-
-
Von Bertalanffy, L.1
-
20
-
-
84861648347
-
Validation of theory: Exploring and reframing poppers worlds
-
S. Wallis Validation of theory: exploring and reframing poppers worlds Integral Rev 4 2 2008 71 91
-
(2008)
Integral Rev
, vol.4
, Issue.2
, pp. 71-91
-
-
Wallis, S.1
-
21
-
-
84862276983
-
Evaluating and developing theories in the information systems discipline
-
R. Weber Evaluating and developing theories in the information systems discipline J Assoc Inf Syst 13 1 2012 1 30
-
(2012)
J Assoc Inf Syst
, vol.13
, Issue.1
, pp. 1-30
-
-
Weber, R.1
|