-
1
-
-
0022916427
-
Health promotion and the knowledge-attitude-behavior continuum
-
Bettinghaus, E.P. (1986), "Health promotion and the knowledge-attitude-behavior continuum", Preventive Medicine, Vol. 15 No. 5, pp. 475-491.
-
(1986)
Preventive Medicine
, vol.15
, Issue.5
, pp. 475-491
-
-
Bettinghaus, E.P.1
-
2
-
-
65049090177
-
Using the case method to teach online classes: Promoting Socratic dialogue and critical thinking skills
-
Brooke, S.L. (2006), "Using the case method to teach online classes: promoting Socratic dialogue and critical thinking skills", International Journal of Teaching and Learning in Higher Education, Vol. 18 No. 2, pp. 142-149.
-
(2006)
International Journal of Teaching and Learning in Higher Education
, vol.18
, Issue.2
, pp. 142-149
-
-
Brooke, S.L.1
-
3
-
-
0002091824
-
The relationship between the judged desirability of a trait and the probability that the trait will be endorsed
-
Edwards, A.L. (1953), "The relationship between the judged desirability of a trait and the probability that the trait will be endorsed", Journal of Applied Psychology, Vol. 37 No. 2, pp. 90-93.
-
(1953)
Journal of Applied Psychology
, vol.37
, Issue.2
, pp. 90-93
-
-
Edwards, A.L.1
-
4
-
-
0003692393
-
-
3rd ed., Sage, Thousand Oaks, CA
-
Fowler, F.J. (2002), Survey Research Methods, 3rd ed., Sage, Thousand Oaks, CA.
-
(2002)
Survey Research Methods
-
-
Fowler, F.J.1
-
5
-
-
33749051841
-
Experiences from conducting semi-structured interviews in empirical software engineering research
-
IEEE, Como
-
Howe, S.E. and Anda, B. (2005), "Experiences from conducting semi-structured interviews in empirical software engineering research", Software Metrics, 2005, 11th IEEE International Symposium, IEEE, Como, p. 10.
-
(2005)
Software Metrics, 2005, 11th IEEE International Symposium
, pp. 10
-
-
Howe, S.E.1
Anda, B.2
-
7
-
-
33746994612
-
A prototype for assessing information security awareness
-
Kruger, H. and Kearney, W. (2006), "A prototype for assessing information security awareness", Computers & Security, Vol. 25 No. 4, pp. 289-296.
-
(2006)
Computers & Security
, vol.25
, Issue.4
, pp. 289-296
-
-
Kruger, H.1
Kearney, W.2
-
8
-
-
63049132678
-
How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management
-
Liginlal, D., Sim, I. and Khansa, L. (2009), "How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management", Computers & Security, Vol. 28 No. 3, pp. 215-228.
-
(2009)
Computers & Security
, vol.28
, Issue.3
, pp. 215-228
-
-
Liginlal, D.1
Sim, I.2
Khansa, L.3
-
9
-
-
84897913950
-
-
Defence Science and Technology Organisation, Edinburgh, SA
-
Parsons, K., McCormac, A., Butavicius, M. and Ferguson, L. (2010), Human Factors and Information Security: Individual, Culture and Security Environment, Defence Science and Technology Organisation, Edinburgh, SA.
-
(2010)
Human Factors and Information Security: Individual, Culture and Security Environment
-
-
Parsons, K.1
McCormac, A.2
Butavicius, M.3
Ferguson, L.4
-
10
-
-
84918563920
-
-
Defence Science & Technology Organisation, Edinburgh, SA
-
Parsons, K., McCormac, A. and Butavicius, M. (2011), Don't Judge a (Face) Book by its Cover: A critical Review of The Implications of Social Networking Sites, Defence Science & Technology Organisation, Edinburgh, SA.
-
(2011)
Don't Judge A (Face) Book by Its Cover: A Critical Review of the Implications of Social Networking Sites
-
-
Parsons, K.1
McCormac, A.2
Butavicius, M.3
-
11
-
-
34948822955
-
How well are information risks being communicated to your computer end-users?
-
Pattinson, M.R. and Anderson, G. (2007), "How well are information risks being communicated to your computer end-users?", Information Management & Computer Security, Vol. 15 No. 5, pp. 362-371.
-
(2007)
Information Management & Computer Security
, vol.15
, Issue.5
, pp. 362-371
-
-
Pattinson, M.R.1
Anderson, G.2
-
12
-
-
84985273082
-
Method bias: The importance of theory and measurement
-
Schmitt, N. (1994), "Method bias: the importance of theory and measurement", Journal of Organizational Behavior, Vol. 15 No. 5, pp. 393-398.
-
(1994)
Journal of Organizational Behavior
, vol.15
, Issue.5
, pp. 393-398
-
-
Schmitt, N.1
-
14
-
-
24644438691
-
The human factor in security
-
Schultz, E. (2005), "The human factor in security", Computers & Security, Vol. 24 No. 6, pp. 425-426.
-
(2005)
Computers & Security
, vol.24
, Issue.6
, pp. 425-426
-
-
Schultz, E.1
-
15
-
-
84985286296
-
Using self-report questionnaires in OB research: A comment on the use of a controversial method
-
Spector, P.E. (1994), "Using self-report questionnaires in OB research: a comment on the use of a controversial method", Journal of Organizational Behavior, Vol. 15, pp. 385-392.
-
(1994)
Journal of Organizational Behavior
, vol.15
, pp. 385-392
-
-
Spector, P.E.1
-
16
-
-
17844366573
-
Analysis of end user security behaviors
-
Stanton, J.M., Stam, K.R., Mastrangelo, P. and Jolton, J. (2005), "Analysis of end user security behaviors", Computers & Security, Vol. 24 No. 2, pp. 124-133.
-
(2005)
Computers & Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
18
-
-
33745446307
-
-
NIST Security Publication, National Institute of Standards and Technology, Gaithersburg, MD
-
Wilson, M. and Hash, J. (2003), Computer Security: Building an Information Technology Awareness and Training Program, NIST Security Publication, National Institute of Standards and Technology, Gaithersburg, MD, pp. 800-850.
-
(2003)
Computer Security: Building An Information Technology Awareness and Training Program
, pp. 800-850
-
-
Wilson, M.1
Hash, J.2
-
19
-
-
0027542748
-
Human error: An overlooked but significant information security problem
-
Wood, C.C. and Banks, W.W. (1993), "Human error: an overlooked but significant information security problem", Computers & Security, Vol. 12 No. 1, pp. 51-60.
-
(1993)
Computers & Security
, vol.12
, Issue.1
, pp. 51-60
-
-
Wood, C.C.1
Banks, W.W.2
|