메뉴 건너뛰기




Volumn , Issue , 2010, Pages 13-22

The use of an information security vocabulary test to assess information security awareness - An exploratory study

Author keywords

Information security awareness; Vocabulary test

Indexed keywords

BEHAVIORAL RESEARCH; MOBILE SECURITY; SOFTWARE TESTING; TESTING;

EID: 84926192795     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (14)
  • 5
    • 78049400376 scopus 로고    scopus 로고
    • Technical report. Available at Accessed: 25 November 2009
    • PriceWaterhouseCoopers. 2008. Information Security Breaches Survey. Technical report. Available at www.security-survey.gov.uk. Accessed: 25 November 2009.
    • (2008) Information Security Breaches Survey
  • 8
    • 78650390225 scopus 로고    scopus 로고
    • SANS Institute InfoSec Reading Room
    • SANS. 2005. E-mail Security Threats, SANS Institute InfoSec Reading Room.
    • (2005) E-mail Security Threats
    • SANS1
  • 9
    • 33747019602 scopus 로고    scopus 로고
    • Information security culture - From analysis to change
    • Schlienger, T. & Teufel, S. 2003. Information security culture - from analysis to change, South African Computer Journal, 31:46-52.
    • (2003) South African Computer Journal , vol.31 , pp. 46-52
    • Schlienger, T.1    Teufel, S.2
  • 11
    • 78049460970 scopus 로고    scopus 로고
    • A mathematics vocabulary questionnaire for use in the intermediate phase
    • Van der Walt, M., Maree, K. & Ellis, S. 2008. A mathematics vocabulary questionnaire for use in the intermediate phase, South African Journal of Education, 28:489-504.
    • (2008) South African Journal of Education , vol.28 , pp. 489-504
    • Van Der Walt, M.1    Maree, K.2    Ellis, S.3
  • 14
    • 0011586156 scopus 로고    scopus 로고
    • Information security management (3): The code of practice for information security management (BS7799)
    • Von Solms, R. 1998. Information Security Management (3): The Code of Practice for Information Security Management (BS7799), Information Management & Computer Security, 6(5):224-225.
    • (1998) Information Management & Computer Security , vol.6 , Issue.5 , pp. 224-225
    • Von Solms, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.