-
1
-
-
53049103906
-
Five dimensions of information security awareness
-
Jun
-
M. T. Siponen, "Five dimensions of information security awareness, " Computers and Society, vol. 31, no. 2, pp. 24-29, Jun. 2001.
-
(2001)
Computers and Society
, vol.31
, Issue.2
, pp. 24-29
-
-
Siponen, M.T.1
-
2
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
Sep
-
B. Bulgurcu, H. Cavusoglu, and I. Benbasat, "Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness, " MIS Quarterly, vol. 34, no. 3, pp. 523-548, Sep. 2010.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
3
-
-
0027002105
-
Awareness and coordination in shared workspaces
-
ser. CSCW'92. New York, NY: ACM
-
P. Dourish and V. Bellotti, "Awareness and coordination in shared workspaces, " in Proceedings of the 1992 ACM Conference on Computer-Supported Cooperative Work, ser. CSCW'92. New York, NY: ACM, 1992, pp. 107-114.
-
(1992)
Proceedings of the 1992 ACM Conference on Computer-Supported Cooperative Work
, pp. 107-114
-
-
Dourish, P.1
Bellotti, V.2
-
4
-
-
19944394275
-
Bridging the gap between organizational and user perspectives of security in the clinical domain
-
Jul
-
A. Adams and A. Blandford, "Bridging the gap between organizational and user perspectives of security in the clinical domain, " International Journal of Human-Computer Studies, vol. 63, no. 1-2, pp. 175-202, Jul. 2005.
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, Issue.1-2
, pp. 175-202
-
-
Adams, A.1
Blandford, A.2
-
5
-
-
0043232732
-
Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures
-
Dec
-
A. Adams and M. A. Sasse, "Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures, " Communications of the ACM, vol. 42, no. 12, pp. 40-46, Dec. 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
6
-
-
32444433117
-
The challenges of understanding and using security: A survey of end-users
-
Feb
-
S. M. Furnell, A. Jusoh, and D. Katsabas, "The challenges of understanding and using security: A survey of end-users, " Computers & Security, vol. 25, no. 1, pp. 27-35, Feb. 2006.
-
(2006)
Computers & Security
, vol.25
, Issue.1
, pp. 27-35
-
-
Furnell, S.M.1
Jusoh, A.2
Katsabas, D.3
-
7
-
-
67349144062
-
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
-
May
-
T. Herath and H. R. Rao, "Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness, " Decision Support Systems, vol. 47, no. 2, pp. 154-165, May 2009.
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 154-165
-
-
Herath, T.1
Rao, H.R.2
-
8
-
-
84870299131
-
Power to the people? the evolving recognition of human aspects of security
-
Nov
-
S. M. Furnell and N. Clarke, "Power to the people? The evolving recognition of human aspects of security, " Computers & Security, vol. 31, no. 8, pp. 983-988, Nov. 2012.
-
(2012)
Computers & Security
, vol.31
, Issue.8
, pp. 983-988
-
-
Furnell, S.M.1
Clarke, N.2
-
9
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
Sep
-
M. Workman, W. H. Bommer, and D. Straub, "Security lapses and the omission of information security measures: A threat control model and empirical test, " Computers in Human Behavior, vol. 24, no. 6, pp. 2799-2816, Sep. 2008.
-
(2008)
Computers in Human Behavior
, vol.24
, Issue.6
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.H.2
Straub, D.3
-
10
-
-
61349092288
-
Studying users' computer security behavior: A health belief perspective
-
Mar
-
B.-Y. Ng, A. Kankanhalli, and Y. C. Xu, "Studying users' computer security behavior: A health belief perspective, " Decision Support Systems, vol. 46, no. 4, pp. 815-825, Mar. 2009.
-
(2009)
Decision Support Systems
, vol.46
, Issue.4
, pp. 815-825
-
-
Ng, B.-Y.1
Kankanhalli, A.2
Xu, Y.C.3
-
11
-
-
84926001904
-
User-centered security
-
ser. NSPW'96. New York, NY: ACM
-
M. E. Zurko and R. T. Simon, "User-centered security, " in Proceedings of the 1996 New Security Paradigms Workshop, ser. NSPW'96. New York, NY: ACM, 1996, pp. 27-33.
-
(1996)
Proceedings of the 1996 New Security Paradigms Workshop
, pp. 27-33
-
-
Zurko, M.E.1
Simon, R.T.2
-
12
-
-
33846277633
-
User-centered security: Stepping up to the grand challenge
-
ser. ACSAC'05. Washington, DC: IEEE Computer Society
-
M. E. Zurko, "User-centered security: Stepping up to the grand challenge, " in Proceedings of the 21st Annual Computer Security Applications Conference, ser. ACSAC'05. Washington, DC: IEEE Computer Society, 2005, pp. 187-200.
-
(2005)
Proceedings of the 21st Annual Computer Security Applications Conference
, pp. 187-200
-
-
Zurko, M.E.1
-
13
-
-
67349280492
-
Does one size fit all? Examining the differential effects of is security countermeasures
-
May
-
J. D'Arcy and A. Hovav, "Does one size fit all? Examining the differential effects of IS security countermeasures, " Journal of Business Ethics, vol. 89, no. 1, pp. 59-71, May 2009.
-
(2009)
Journal of Business Ethics
, vol.89
, Issue.1
, pp. 59-71
-
-
D'Arcy, J.1
Hovav, A.2
-
14
-
-
84875493546
-
Employees' information security awareness and behavior: A literature review
-
ser. HICSS'13. Washington, DC: IEEE Computer Society
-
B. Lebek, J. Uffen, M. H. Breitner, M. Neumann, and B. Hohler, "Employees' information security awareness and behavior: A literature review, " in Proceedings of the 2013 46th Hawaii International Conference on System Sciences, ser. HICSS'13. Washington, DC: IEEE Computer Society, 2013, pp. 2978-2987.
-
(2013)
Proceedings of the 2013 46th Hawaii International Conference on System Sciences
, pp. 2978-2987
-
-
Lebek, B.1
Uffen, J.2
Breitner, M.H.3
Neumann, M.4
Hohler, B.5
-
15
-
-
85016075946
-
Investigating information security awareness: Research and practice gaps
-
Sep
-
A. Tsohou, S. Kokolakis, M. Karyda, and E. Kiountouzis, "Investigating information security awareness: Research and practice gaps, " Information Security Journal: A Global Perspective, vol. 17, no. 5-6, pp. 207-227, Sep. 2008.
-
(2008)
Information Security Journal: A Global Perspective
, vol.17
, Issue.5-6
, pp. 207-227
-
-
Tsohou, A.1
Kokolakis, S.2
Karyda, M.3
Kiountouzis, E.4
-
17
-
-
34249871944
-
A qualitative study of users' view on information security
-
Jun
-
E. Albrechtsen, "A qualitative study of users' view on information security, " Computers & Security, vol. 26, no. 4, pp. 276-289, Jun. 2007.
-
(2007)
Computers & Security
, vol.26
, Issue.4
, pp. 276-289
-
-
Albrechtsen, E.1
-
18
-
-
84891789669
-
Employees' adherence to information security policies: An exploratory field study
-
Mar
-
M. Siponen, M. A. Mahmood, and S. Pahnila, "Employees' adherence to information security policies: an exploratory field study, " Information & Management, vol. 51, no. 2, pp. 217-224, Mar. 2014.
-
(2014)
Information & Management
, vol.51
, Issue.2
, pp. 217-224
-
-
Siponen, M.1
Mahmood, M.A.2
Pahnila, S.3
-
19
-
-
85084161247
-
Why johnny can't encrypt: A usability evaluation of pgp 5.0
-
ser. SSYM'99. Berkeley, CA: USENIX Association
-
A. Whitten and J. D. Tygar, "Why Johnny can't encrypt: A usability evaluation of PGP 5.0, " in Proceedings of the 8th USENIX Security Symposium, ser. SSYM'99. Berkeley, CA: USENIX Association, 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
-
-
Whitten, A.1
Tygar, J.D.2
-
20
-
-
0030543337
-
Unrealistic optimism: Present and future
-
Mar
-
N. D. Weinstein and W. M. Klein, "Unrealistic optimism: Present and future, " Journal of Social and Clinical Psychology, vol. 15, no. 1, pp. 1-8, Mar. 1996.
-
(1996)
Journal of Social and Clinical Psychology
, vol.15
, Issue.1
, pp. 1-8
-
-
Weinstein, N.D.1
Klein, W.M.2
-
21
-
-
0030535841
-
Self-favoring biases for positive and negative characteristics: Independent phenomena?
-
Mar
-
V. Hoorens, "Self-favoring biases for positive and negative characteristics: Independent phenomena?" Journal of Social and Clinical Psychology, vol. 15, no. 1, pp. 53-67, Mar. 1996.
-
(1996)
Journal of Social and Clinical Psychology
, vol.15
, Issue.1
, pp. 53-67
-
-
Hoorens, V.1
-
22
-
-
84857359642
-
Unrealistic optimism on information security management
-
Mar
-
H.-S. Rhee, Y. U. Ryu, and C.-T. Kim, "Unrealistic optimism on information security management, " Computers & Security, vol. 31, no. 2, pp. 221-232, Mar. 2012.
-
(2012)
Computers & Security
, vol.31
, Issue.2
, pp. 221-232
-
-
Rhee, H.-S.1
Ryu, Y.U.2
Kim, C.-T.3
-
23
-
-
42149161709
-
The psychology of security: Why do good users make bad decisions?
-
Apr
-
R. West, "The psychology of security: Why do good users make bad decisions?" Communications of the ACM, vol. 51, no. 4, pp. 34-40, Apr. 2008.
-
(2008)
Communications of the ACM
, vol.51
, Issue.4
, pp. 34-40
-
-
West, R.1
-
25
-
-
23044525969
-
Current directions in is security research: Towards socio-organizational perspectives
-
Apr
-
G. Dhillon and J. Backhouse, "Current directions in IS security research: towards socio-organizational perspectives, " Information Systems Journal, vol. 11, no. 2, pp. 127-153, Apr. 2001.
-
(2001)
Information Systems Journal
, vol.11
, Issue.2
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
26
-
-
17844366573
-
Analysis of end user security behaviors
-
Mar
-
J. M. Stanton, K. R. Stam, P. Mastrangelo, and J. Jolton, "Analysis of end user security behaviors, " Computers & Security, vol. 24, no. 2, pp. 124-133, Mar. 2005.
-
(2005)
Computers & Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
27
-
-
84876570327
-
Future directions for behavioral information security research
-
Feb
-
R. E. Crossler, A. C. Johnston, P. B. Lowry, Q. Hu, M. Warkentin, and R. Baskerville, "Future directions for behavioral information security research, " Computers & Security, vol. 32, no. 1, pp. 90-101, Feb. 2013.
-
(2013)
Computers & Security
, vol.32
, Issue.1
, pp. 90-101
-
-
Crossler, R.E.1
Johnston, A.C.2
Lowry, P.B.3
Hu, Q.4
Warkentin, M.5
Baskerville, R.6
-
28
-
-
44949276843
-
Restating the foundation of information security
-
Oct
-
D. B. Parker, "Restating the foundation of information security, " Computer Audit Update, vol. 1991, no. 10, pp. 2-15, Oct. 1991.
-
(1991)
Computer Audit Update
, vol.1991
, Issue.10
, pp. 2-15
-
-
Parker, D.B.1
-
29
-
-
84900482702
-
Security in the wild: User strategies for managing security as an everyday, practical problem
-
Nov
-
P. Dourish, R. E. Grinter, J. Delgado de la Flor, and M. Joseph, "Security in the wild: user strategies for managing security as an everyday, practical problem, " Personal and Ubiquitous Computing, vol. 8, no. 6, pp. 391-401, Nov. 2004.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 391-401
-
-
Dourish, P.1
Grinter, R.E.2
Flor De La J.Delgado3
Joseph, M.4
|