-
1
-
-
84870387706
-
Understanding the factors of information leakage through online social networking to safeguard organizational information
-
Paper presented at the, Brisbane, Australia
-
Abdul Molok, N.N., Ahmad, A. & Chang, S. (2010). Understanding the factors of information leakage through online social networking to safeguard organizational information. Paper presented at the 21st Australasian Conference on Information Systems (ACIS2010), Brisbane, Australia.
-
(2010)
21st Australasian Conference on Information Systems (ACIS2010)
-
-
Abdul Molok, N.N.1
Ahmad, A.2
Chang, S.3
-
2
-
-
84869109416
-
Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks
-
Paper presented at the, Sydney, Australia
-
Abdul Molok, N.N., Ahmad, A. & Chang, S. (2011). Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks. Paper presented at the 22nd Australasian Conference on Information Systems (ACIS2011), Sydney, Australia.
-
(2011)
22nd Australasian Conference on Information Systems (ACIS2011)
-
-
Abdul Molok, N.N.1
Ahmad, A.2
Chang, S.3
-
3
-
-
84928478579
-
Information leakage through online social networking: Opening the doorway for advanced persistence threats
-
Abdul Molok, N.N., Chang, S. & Ahmad, A. (2011). Information leakage through online social networking: Opening the doorway for advanced persistence threats. The Journal of the Australian Institute of Professional Intelligence Officers (AIPIO), 19(2), 38-55.
-
(2011)
The Journal of the Australian Institute of Professional Intelligence Officers (AIPIO)
, vol.19
, Issue.2
, pp. 38-55
-
-
Abdul Molok, N.N.1
Chang, S.2
Ahmad, A.3
-
4
-
-
84880885221
-
-
Alexa Internet, Inc. Retrieved 13 April 2013
-
Alexa. (2013). Alexa top 500 global sites. Alexa Internet, Inc. Retrieved 13 April 2013, from http://www.alexa.com/topsites
-
(2013)
Alexa Top 500 Global Sites
-
-
Alexa.1
-
5
-
-
77950128950
-
Antisocial networks: Turning a social network into a botnet
-
Paper presented at the, Taipei, Taiwan
-
Athanasopoulos, E., Makridakis, A., Antonatos, S., Ioannidis, S., Anagnostakis, K. & Markatos, E. (2008). Antisocial networks: Turning a social network into a botnet. Paper presented at the 11th Information Security Conference (ISC 2008), Taipei, Taiwan.
-
(2008)
11th Information Security Conference (ISC 2008)
-
-
Athanasopoulos, E.1
Makridakis, A.2
Antonatos, S.3
Ioannidis, S.4
Anagnostakis, K.5
Markatos, E.6
-
6
-
-
70350728911
-
Social applications: Exploring a more secure framework
-
Paper presented at the California
-
Besmer, A., Lipford, H. R., Shehab, M., & Cheek, G. (2009). Social Applications: Exploring A More Secure Framework. Paper presented at the Symposium On Usable Privacy and Security (SOUPS), California.
-
(2009)
Symposium On Usable Privacy and Security (SOUPS)
-
-
Besmer, A.1
Lipford, H.R.2
Shehab, M.3
Cheek, G.4
-
8
-
-
37249053884
-
Social network sites: Definition, history, and scholarship
-
Boyd, D. & Ellison, N. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 210-230.
-
(2007)
Journal of Computer-Mediated Communication
, vol.13
, Issue.1
, pp. 210-230
-
-
Boyd, D.1
Ellison, N.2
-
9
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
Bulgurcu, B., Cavusoglu, H. & Benbasat, I. (2010). Information Security Policy Compliance: An Empirical Study of Rationality-based Beliefs and Information Security Awareness. MIS Quarterly, 34(3), 523-548.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
10
-
-
77956652072
-
Human factors in information security: The insider threat-Who can you trust these days?
-
Colwill, C. (2009). Human factors in information security: The insider threat-Who can you trust these days? Information Security Technical Report, 14(4), 186-196.
-
(2009)
Information Security Technical Report
, vol.14
, Issue.4
, pp. 186-196
-
-
Colwill, C.1
-
11
-
-
77950821999
-
Motivations for social networking at work
-
November 8-12, 2008, Paper presented at the, San Diego, CA
-
DiMicco, J., Millen, D.R., Geyer, W., Dugan, C., Brownholtz, B. & Muller, M. (2008, November 8-12, 2008). Motivations for Social Networking at Work. Paper presented at the CSCW '08, San Diego, CA.
-
(2008)
CSCW '08
-
-
Dimicco, J.1
Millen, D.R.2
Geyer, W.3
Dugan, C.4
Brownholtz, B.5
Muller, M.6
-
17
-
-
84870433973
-
Online social networks: A survey of a global phenomenon
-
Heidemann, J., Klier, M. & Probst, F. (2012). Online social networks: A survey of a global phenomenon. Computer Networks, 56, 3866-3878.
-
(2012)
Computer Networks
, vol.56
, pp. 3866-3878
-
-
Heidemann, J.1
Klier, M.2
Probst, F.3
-
22
-
-
34848911641
-
Social phishing
-
Jagatic, T., Johnson, N., Jakobsson, M. & Menczer, F. (2007). Social phishing. Communications of the ACM, 20(10), 94-100.
-
(2007)
Communications of the ACM
, vol.20
, Issue.10
, pp. 94-100
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
23
-
-
0242267471
-
A perspective on jugdment and choice: Mapping bounded rationality
-
Kahneman, D. (2003). A perspective on jugdment and choice: Mapping bounded rationality. American Psychologist, 58(9), 697-720.
-
(2003)
American Psychologist
, vol.58
, Issue.9
, pp. 697-720
-
-
Kahneman, D.1
-
24
-
-
84924444643
-
Government information leaks and the First Amendment
-
Katz, A.M. (1976). Government information leaks and the First Amendment. California Law Review, 64(108), 108-145.
-
(1976)
California Law Review
, vol.64
, Issue.108
, pp. 108-145
-
-
Katz, A.M.1
-
25
-
-
0001399707
-
Qualitative research in organizational and vocational psychology, 1979-1999
-
Lee, T.W., Mitchell, T.R. & Sablynski, C.J. (1999). Qualitative research in organizational and vocational psychology, 1979-1999. Journal of Vocational Behavior, 55(161-187).
-
(1999)
Journal of Vocational Behavior
, vol.55
, pp. 161-187
-
-
Lee, T.W.1
Mitchell, T.R.2
Sablynski, C.J.3
-
27
-
-
0000133760
-
Threats to information systems: Today's reality, yesterday's understanding
-
Loch, K.D., Carr, H.H. & Warkentin, M.E. (1992). Threats to Information Systems: Today's Reality, Yesterday's Understanding. MIS Quarterly, 16(2), 173-186.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
28
-
-
77952714260
-
-
Mayfield, A. (2008). What is social media?, Available from http://www.icrossing.com/research/whatis-social-media.php
-
(2008)
What is Social Media?
-
-
Mayfield, A.1
-
29
-
-
76949093866
-
All about me: Disclosure in online social networking profiles: The case of FACEBOOK
-
Nosko, A., Wood, E., & Molema, S. (2010). All about me: Disclosure in online social networking profiles: The case of FACEBOOK. Computers in Human Behavior, 26, 406-418.
-
(2010)
Computers in Human Behavior
, vol.26
, pp. 406-418
-
-
Nosko, A.1
Wood, E.2
Molema, S.3
-
31
-
-
84861101642
-
Leveraging behavioral science to mitigate cyber security risk
-
Pfleeger, S.L. & Caputo, D.D. (2012). Leveraging behavioral science to mitigate cyber security risk. Computers & Security, 31, 597-611.
-
(2012)
Computers & Security
, vol.31
, pp. 597-611
-
-
Pfleeger, S.L.1
Caputo, D.D.2
-
33
-
-
84928499326
-
The psychology of security
-
Schneier, B. (2008). The Psychology of Security. Schneier on Security, from http://www.schneier.com/essay-155.html
-
(2008)
Schneier on Security
-
-
Schneier, B.1
-
34
-
-
84862930210
-
Case study: Using security awareness to combat the advanced persistent threat
-
Paper presented at the, University of Alaska, Fairbanks, Seattle
-
Smith, A.M. & Toppel, N.Y. (2009). Case study: Using security awareness to combat the advanced persistent threat. Paper presented at the 13th Colloquium for Information Systems Security Education (CISSE), University of Alaska, Fairbanks, Seattle.
-
(2009)
13th Colloquium for Information Systems Security Education (CISSE)
-
-
Smith, A.M.1
Toppel, N.Y.2
-
37
-
-
0000280419
-
Effective is security
-
Straub, D. (1990). Effective IS Security. Information Systems Research, 1(3), 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.1
-
40
-
-
84876846718
-
Facebook: The making of 1 billion users
-
Retrieved 15 February 2013, from
-
Vance, A. (2012). Facebook: The making of 1 billion users. Business Week Retrieved 15 February 2013, from http://www.businessweek.com/printer/articles/74602-facebook-the-making-of-1-billion-users
-
(2012)
Business Week
-
-
Vance, A.1
-
41
-
-
42149161709
-
The psychology of security: Why do good users make bad decisions?
-
West, R. (2008). The psychology of security: Why do good users make bad decisions? Communications of the ACM, 51(4), 34-40.
-
(2008)
Communications of the ACM
, vol.51
, Issue.4
, pp. 34-40
-
-
West, R.1
-
43
-
-
67650083389
-
Social networking: The business case
-
June 2009
-
Wilson, J. (2009). Social Networking: The Business Case. Engineering & Technology, June 2009, 54-56.
-
(2009)
Engineering & Technology
, pp. 54-56
-
-
Wilson, J.1
|