-
1
-
-
77951204516
-
Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study
-
E. Albrechtsen, and J. Hovden Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study Comput Secur 29 2010 432 445
-
(2010)
Comput Secur
, vol.29
, pp. 432-445
-
-
Albrechtsen, E.1
Hovden, J.2
-
2
-
-
57649097311
-
Information security management: A human challenge?
-
D. Ashenden Information security management: a human challenge? Inf Secur Tech Rep 13 2008 195 201
-
(2008)
Inf Secur Tech Rep
, vol.13
, pp. 195-201
-
-
Ashenden, D.1
-
3
-
-
84888884622
-
CISOs and organisational culture: Their own worst enemy?
-
D. Ashenden, and A. Sasse CISOs and organisational culture: their own worst enemy? Comput Secur 39 2013 396 405
-
(2013)
Comput Secur
, vol.39
, pp. 396-405
-
-
Ashenden, D.1
Sasse, A.2
-
6
-
-
84876570327
-
Future directions for behavioral information security
-
R.E. Crossler, A.C. Johnston, P.B. Lowry, Q. Hud, M. Warkentin, and R. Baskerville Future directions for behavioral information security Comput Secur 32 2013 90 101
-
(2013)
Comput Secur
, vol.32
, pp. 90-101
-
-
Crossler, R.E.1
Johnston, A.C.2
Lowry, P.B.3
Hud, Q.4
Warkentin, M.5
Baskerville, R.6
-
7
-
-
35148886676
-
An information security governance framework
-
A. Da Veiga, and J.H.P. Eloff An information security governance framework Inf Syst Manag 24 4 2007 361 372
-
(2007)
Inf Syst Manag
, vol.24
, Issue.4
, pp. 361-372
-
-
Da Veiga, A.1
Eloff, J.H.P.2
-
8
-
-
74449092722
-
A framework and assessment instrument for Information Security Culture
-
A. Da Veiga, and J.H.P. Eloff A framework and assessment instrument for Information Security Culture Comput Secur 29 2010 196 207
-
(2010)
Comput Secur
, vol.29
, pp. 196-207
-
-
Da Veiga, A.1
Eloff, J.H.P.2
-
9
-
-
74449084015
-
Information security culture - Validation of an assessment instrument
-
A. Da Veiga, N. Martins, and J.H.P. Eloff Information security culture - validation of an assessment instrument South Afr Bus Rev 11 1 2007 147 166
-
(2007)
South Afr Bus Rev
, vol.11
, Issue.1
, pp. 147-166
-
-
Da Veiga, A.1
Martins, N.2
Eloff, J.H.P.3
-
11
-
-
70350590572
-
Fostering information security culture in small and medium size enterprises: An interpretive study in Australia
-
Paper 120, from
-
S. Dojkovski, S. Lichtenstein, and M.J. Warren Fostering information security culture in small and medium size enterprises: an interpretive study in Australia ECIS 2007 Proceedings 2007 Paper 120, from http://aisel.aisnet.org/ecis2007/120
-
(2007)
ECIS 2007 Proceedings
-
-
Dojkovski, S.1
Lichtenstein, S.2
Warren, M.J.3
-
12
-
-
33846807812
-
Value-focused assessment of ICT security awareness in an academic environment
-
L. Drevin, H.A. Kruger, and T. Steyn Value-focused assessment of ICT security awareness in an academic environment Comput Secur 26 2007 36 43
-
(2007)
Comput Secur
, vol.26
, pp. 36-43
-
-
Drevin, L.1
Kruger, H.A.2
Steyn, T.3
-
13
-
-
84898078970
-
Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture
-
W.R. Flores, E. Antonsen, and M. Ekstedt Information security knowledge sharing in organizations: investigating the effect of behavioral information security governance and national culture Comput Secur 43 2014 90 110
-
(2014)
Comput Secur
, vol.43
, pp. 90-110
-
-
Flores, W.R.1
Antonsen, E.2
Ekstedt, M.3
-
14
-
-
84870299131
-
Power to the people? the evolving recognition of human aspects of security
-
S. Furnell, and N. Clarke Power to the people? the evolving recognition of human aspects of security Comput Secur 31 2012 983 988
-
(2012)
Comput Secur
, vol.31
, pp. 983-988
-
-
Furnell, S.1
Clarke, N.2
-
15
-
-
84862128773
-
Understanding the influences on information security behavior
-
S. Furnell, and A. Rajendran Understanding the influences on information security behavior Comput Fraud Secur 2012; March 12 15
-
(2012)
Comput Fraud Secur
, pp. 12-15
-
-
Furnell, S.1
Rajendran, A.2
-
16
-
-
61349200300
-
From culture to disobedience: Recognising the varying user acceptance of IT security
-
S. Furnell, and K. Thomson From culture to disobedience: recognising the varying user acceptance of IT security Comput Fraud Secur Feb 2009 5 10
-
(2009)
Comput Fraud Secur
, pp. 5-10
-
-
Furnell, S.1
Thomson, K.2
-
17
-
-
0034318873
-
Practical approaches to creating a security culture
-
N. Gaunt Practical approaches to creating a security culture Int J Med Inform 60 2 2000 151 157
-
(2000)
Int J Med Inform
, vol.60
, Issue.2
, pp. 151-157
-
-
Gaunt, N.1
-
18
-
-
67349144062
-
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
-
T. Herath, and H.R. Rao Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness Decis Support Syst 47 2009 154 165
-
(2009)
Decis Support Syst
, vol.47
, pp. 154-165
-
-
Herath, T.1
Rao, H.R.2
-
22
-
-
84887852395
-
Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition
-
P. Ifinedo Information systems security policy compliance: an empirical study of the effects of socialisation, influence, and cognition Inf Manag 51 2014 69 79
-
(2014)
Inf Manag
, vol.51
, pp. 69-79
-
-
Ifinedo, P.1
-
25
-
-
84897443241
-
An exploratory investigation of message person congruence in information security awareness campaigns
-
M. Kajzer, J. D'Arcy, C.R. Crowell, A. Striegel, and D. Van Bruggen An exploratory investigation of message person congruence in information security awareness campaigns Comput Secur 43 2014 64 76
-
(2014)
Comput Secur
, vol.43
, pp. 64-76
-
-
Kajzer, M.1
D'Arcy, J.2
Crowell, C.R.3
Striegel, A.4
Van Bruggen, D.5
-
26
-
-
70349448077
-
Human and organizational factors in computer and information security: Pathways to vulnerabilities
-
S. Kraemer, P. Carayon, and J. Clem Human and organizational factors in computer and information security: pathways to vulnerabilities Comput Secur 28 2009 509 520
-
(2009)
Comput Secur
, vol.28
, pp. 509-520
-
-
Kraemer, S.1
Carayon, P.2
Clem, J.3
-
27
-
-
0000629876
-
Determining sample size for research activities
-
R.V. Krejcie, and D.W. Morgan Determining sample size for research activities Educ Psychol Meas 30 1970 607 610
-
(1970)
Educ Psychol Meas
, vol.30
, pp. 607-610
-
-
Krejcie, R.V.1
Morgan, D.W.2
-
28
-
-
53049084670
-
Information security management: An information security retrieval and awareness model for industry
-
E. Kritzinger, and E. Smith Information security management: an information security retrieval and awareness model for industry Comput Secur 27 2008 224 231
-
(2008)
Comput Secur
, vol.27
, pp. 224-231
-
-
Kritzinger, E.1
Smith, E.2
-
29
-
-
78650858558
-
Information security culture in small and medium-sized enterprises
-
R. Kuusisto, and I. Ilvonen Information security culture in small and medium-sized enterprises Front E-business Res 2003 from http://www.academia.edu/1075891/Information-security-culture-in-small-and-medium-size-enterprises
-
(2003)
Front E-business Res
-
-
Kuusisto, R.1
Ilvonen, I.2
-
30
-
-
84870529816
-
-
(M.Com thesis) Rand Afrikaans University Johannesburg
-
A. Martins Information security culture (M.Com thesis) 2002 Rand Afrikaans University Johannesburg
-
(2002)
Information Security Culture
-
-
Martins, A.1
-
33
-
-
0033745439
-
Implementing information security in the 21st century - Do you have the balancing factors?
-
J.D. Nosworthy Implementing information security in the 21st century - do you have the balancing factors? Comput Secur 19 4 2000 337 347
-
(2000)
Comput Secur
, vol.19
, Issue.4
, pp. 337-347
-
-
Nosworthy, J.D.1
-
35
-
-
84925652050
-
-
Oxford. See the Concise Oxford Dictionary
-
Oxford. See the Concise Oxford Dictionary.
-
-
-
-
36
-
-
84862271726
-
Taxonomy of compliant information security behavior
-
K. Padayachee Taxonomy of compliant information security behavior Comput Secur 31 2012 673 680
-
(2012)
Comput Secur
, vol.31
, pp. 673-680
-
-
Padayachee, K.1
-
37
-
-
84897913950
-
-
Control, Communications and Intelligence Division. Defence Science and Technology Organisation
-
K. Parsons, A. McCormac, M. Butavicius, and L. Ferguson Command human factors and information Security: individual, culture and security environment 2010 Control, Communications and Intelligence Division. Defence Science and Technology Organisation
-
(2010)
Command Human Factors and Information Security: Individual, Culture and Security Environment
-
-
Parsons, K.1
McCormac, A.2
Butavicius, M.3
Ferguson, L.4
-
38
-
-
84897916714
-
Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q)
-
K. Parsons, A. McCormac, M. Butavicius, M. Pattinson, and C. Jerram Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q) Comput Secur 42 2014 165 176
-
(2014)
Comput Secur
, vol.42
, pp. 165-176
-
-
Parsons, K.1
McCormac, A.2
Butavicius, M.3
Pattinson, M.4
Jerram, C.5
-
40
-
-
85027371331
-
-
Pricewaterhousecoopers (pwc)
-
PricewaterhouseCoopers (PwC) The global state of information security survey 2014 from http://www.pwc.com/gx/en/consulting-services/information-security-survey/download.jhtml
-
(2014)
The Global State of Information Security Survey
-
-
-
41
-
-
55849105212
-
Information security awareness in higher education: An exploratory study
-
Y. Rezgui, and A. Marks Information security awareness in higher education: an exploratory study Comput Secur 27 2008 241 253
-
(2008)
Comput Secur
, vol.27
, pp. 241-253
-
-
Rezgui, Y.1
Marks, A.2
-
44
-
-
78650874414
-
Information security culture. in security in the Information Society
-
Kluwer Academic Boston
-
T. Schlienger, and S. Teufel Information security culture. In security in the Information Society IFIP/SEC2002 2002 Kluwer Academic Boston 191 201
-
(2002)
IFIP/SEC2002
, pp. 191-201
-
-
Schlienger, T.1
Teufel, S.2
-
46
-
-
36248967046
-
Employees' adherence to information security policies: An empirical study
-
M. Siponen, S. Pahnila, and A. Mahmood Employees' adherence to information security policies: an empirical study Proceedings of New Approaches to Security, Privacy and Trust in Complex Environments. Sandton, South Africa: FIP/SEC2007 2007 133 144
-
(2007)
Proceedings of New Approaches to Security, Privacy and Trust in Complex Environments. Sandton, South Africa: FIP/SEC2007
, pp. 133-144
-
-
Siponen, M.1
Pahnila, S.2
Mahmood, A.3
-
48
-
-
84911969074
-
-
IBM Software Group, ATTN Licensing, 200 W. Madison St. Chicago, IL; 60606, U.S.A
-
SPSS version 22 2013 IBM Software Group, ATTN Licensing, 200 W. Madison St. Chicago, IL; 60606, U.S.A
-
(2013)
SPSS Version 22
-
-
-
50
-
-
0000280419
-
Effective is security: An empirical study
-
D.W. Straub Effective IS security: an empirical study Inf Syst Res 1 1990 255 276
-
(1990)
Inf Syst Res
, vol.1
, pp. 255-276
-
-
Straub, D.W.1
-
51
-
-
13244286108
-
Validation guidelines for is positivist research
-
D. Straub, M. Boudreau, and D. Gefen Validation guidelines for IS positivist research Commun Assoc Inf Syst 13 24 2004 380 427
-
(2004)
Commun Assoc Inf Syst
, vol.13
, Issue.24
, pp. 380-427
-
-
Straub, D.1
Boudreau, M.2
Gefen, D.3
-
52
-
-
84925676791
-
-
Training Technologies Inc from
-
Survey tracker 2014 Training Technologies Inc from https://www.surveytracker.com/
-
(2014)
Survey Tracker
-
-
-
54
-
-
15744368808
-
Information security obedience: A definition
-
K. Thomson, and R. Von Solms Information security obedience: a definition Comput Secur 24 1 2005 69 75
-
(2005)
Comput Secur
, vol.24
, Issue.1
, pp. 69-75
-
-
Thomson, K.1
Von Solms, R.2
-
55
-
-
33750923703
-
Cultivating an organisational information security culture
-
K. Thomson, R. Van Solms, and L. Louw Cultivating an organisational information security culture Comput Fraud Secur 2006; October 7 11
-
(2006)
Comput Fraud Secur
, pp. 7-11
-
-
Thomson, K.1
Van Solms, R.2
Louw, L.3
-
57
-
-
77951209282
-
Information security culture: A management perspective
-
J. Van Niekerk, and R. Von Solms Information security culture: a management perspective Comput Secur 29 2010 476 486
-
(2010)
Comput Secur
, vol.29
, pp. 476-486
-
-
Van Niekerk, J.1
Von Solms, R.2
-
60
-
-
2342475711
-
Towards information security behavioural compliance
-
C. Vroom, and R. Von Solms Towards information security behavioural compliance Comput Secur 23 3 2004 191 198
-
(2004)
Comput Secur
, vol.23
, Issue.3
, pp. 191-198
-
-
Vroom, C.1
Von Solms, R.2
-
61
-
-
0002763032
-
The high-performance organizational climate: How workers describe top-performing units
-
N.M. Ashkanasy, C.P.M. Wilderom, M.F. Peterson, Sage Publications California
-
C.P.M. Wiley, and S.M. Brooks The high-performance organizational climate: how workers describe top-performing units N.M. Ashkanasy, C.P.M. Wilderom, M.F. Peterson, Handbook of organisational culture and climate 2000 Sage Publications California p117 192
-
(2000)
Handbook of Organisational Culture and Climate
, pp. p117-192
-
-
Wiley, C.P.M.1
Brooks, S.M.2
|