-
1
-
-
51349093342
-
Investigation of stakeholders commitment to information security awareness programs
-
Abawajy, J., Thatcher, K. and Kim, T. (2008), “Investigation of stakeholders commitment to information security awareness programs”, 2008 International Conference on Information Security and Assurance (ISA 2008), pp. 472-476.
-
(2008)
2008 International Conference on Information Security and Assurance (ISA 2008)
, pp. 472-476
-
-
Abawajy, J.1
Thatcher, K.2
Kim, T.3
-
2
-
-
80052099747
-
The ultimate invasion of privacy: Identity theft
-
Aimeur, E. and Schonfeld, D. (2011), “The ultimate invasion of privacy: identity theft”, 2011 Ninth Annual International Conference on Privacy, Security and Trust, pp. 24-31.
-
(2011)
2011 Ninth Annual International Conference on Privacy, Security and Trust
, pp. 24-31
-
-
Aimeur, E.1
Schonfeld, D.2
-
3
-
-
34249871944
-
A qualitative study of users view on information security”
-
Albrechtsen, E. (2007), “A qualitative study of users’ view on information security”, Computers & Security, Vol. 26 No. 4, pp. 276-289.
-
(2007)
Computers &Amp; Security
, vol.26
, Issue.4
, pp. 276-289
-
-
Albrechtsen, E.1
-
4
-
-
67651148484
-
Securing the next generation: Enhancing e-safety awareness among young people
-
Atkinson, S., Furnell, S. and Phippen, A. (2009), “Securing the next generation: enhancing e-safety awareness among young people”, Computer Fraud & Security, Vol. 2009 No. 7, pp. 13-19.
-
(2009)
Computer Fraud &Amp; Security
, vol.2009
, Issue.7
, pp. 13-19
-
-
Atkinson, S.1
Furnell, S.2
Phippen, A.3
-
5
-
-
4444284631
-
A critical analysis of evaluation practice: The Kirkpatrick model and the principle of beneficence
-
Bates, R. (2004), “A critical analysis of evaluation practice: the Kirkpatrick model and the principle of beneficence”, Evaluation and Program Planning, Vol. 27 No. 3, pp. 341-347.
-
(2004)
Evaluation and Program Planning
, vol.27
, Issue.3
, pp. 341-347
-
-
Bates, R.1
-
6
-
-
37249018138
-
Why youth (Heart) social network sites: The role of networked publics in teenage social life
-
Identity, and Digital Media Volume
-
Boyd, D. (2007), “Why youth (heart) social network sites: the role of networked publics in teenage social life”, MacArthur Foundation Series on Digital Learning – Youth, Identity, and Digital Media Volume, pp. 119-142.
-
(2007)
Macarthur Foundation Series on Digital Learning – Youth
, pp. 119-142
-
-
Boyd, D.1
-
7
-
-
84930815688
-
-
Springer, New York
-
Broadhurst, R. and Chang, L.Y. (2013), Cybercrime in Asia: Trends and Challenges, Handbook of Asian Criminology, Springer, New York, pp. 49-63.
-
(2013)
Cybercrime in Asia: Trends and Challenges, Handbook of Asian Criminology
, pp. 49-63
-
-
Broadhurst, R.1
Chang, L.Y.2
-
8
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
Bulgurcu, B., Cavusoglu, H. and Benbasat, I. (2010), “Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness”, MIS Quarterly, Vol. 34 No. 3, pp. 523-548.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
9
-
-
84896486103
-
Going spear phishing: Exploring embedded training and awareness
-
Caputo, D.D., Pfleeger, S.L., Freeman, J.D. and Johnson, M.E. (2014), “Going spear phishing: exploring embedded training and awareness”, IEEE Security & Privacy, Vol. 12 No. 1, pp. 28-38.
-
(2014)
IEEE Security &Amp; Privacy
, vol.12
, Issue.1
, pp. 28-38
-
-
Caputo, D.D.1
Pfleeger, S.L.2
Freeman, J.D.3
Johnson, M.E.4
-
10
-
-
37749015799
-
Improving end user behaviour in password utilization: An action research initiative
-
Charoen, D., Raman, M. and Olfman, L. (2007), “Improving end user behaviour in password utilization: an action research initiative”, Systemic Practice and Action Research, Vol. 21 No. 1, pp. 55-72.
-
(2007)
Systemic Practice and Action Research
, vol.21
, Issue.1
, pp. 55-72
-
-
Charoen, D.1
Raman, M.2
Olfman, L.3
-
11
-
-
60049085275
-
Mitigating information security risks by increasing user security awareness: A case study of an information security awareness system
-
Chen, C.C., Shaw, R.S. and Yang, S.C. (2006), “Mitigating information security risks by increasing user security awareness: a case study of an information security awareness system”, Information Technology, Learning and Performance Journal, Vol. 24 No. 1, pp. 1-15.
-
(2006)
Information Technology, Learning and Performance Journal
, vol.24
, Issue.1
, pp. 1-15
-
-
Chen, C.C.1
Shaw, R.S.2
Yang, S.C.3
-
12
-
-
80955142795
-
The cyber threat landscape: Challenges and future research directions
-
Choo, K.-K.R. (2011), “The cyber threat landscape: challenges and future research directions”, Computers & Security, Vol. 30 No. 8, pp. 719-731.
-
(2011)
Computers &Amp; Security
, vol.30
, Issue.8
, pp. 719-731
-
-
Choo, K.-K.R.1
-
13
-
-
84906809488
-
-
Center for the Digital Future, Los Angeles, CA
-
Cole, J.I., Suman, M., Schramm, P., Zhou, L. and Salvador, L. (2013), The Digital Future Project, Center for the Digital Future, Los Angeles, CA.
-
(2013)
The Digital Future Project
-
-
Cole, J.I.1
Suman, M.2
Schramm, P.3
Zhou, L.4
Salvador, L.5
-
14
-
-
33846783259
-
A video game for cyber security training and awareness
-
Cone, B.D., Irvine, C.E., Thompson, M.F. and Nguyen, T.D. (2007), “A video game for cyber security training and awareness”, Computers & Security, Vol. 26 No. 1, pp. 63-72.
-
(2007)
Computers &Amp; Security
, vol.26
, Issue.1
, pp. 63-72
-
-
Cone, B.D.1
Irvine, C.E.2
Thompson, M.F.3
Nguyen, T.D.4
-
15
-
-
63049137706
-
Information security: The moving target
-
Dlamini, M.T., Eloff, J.H.P. and Eloff, M.M. (2009), “Information security: the moving target”, Computers & Security, Vol. 28 Nos 3-4, pp. 189-198.
-
(2009)
Computers &Amp; Security
, vol.28
, Issue.3-4
, pp. 189-198
-
-
Dlamini, M.T.1
Eloff, J.2
Eloff, M.M.3
-
16
-
-
33846807812
-
Value-focused assessment of ICT security awareness in an academic environment
-
Drevin, L., Kruger, H.A. and Steyn, T. (2007), “Value-focused assessment of ICT security awareness in an academic environment”, Computers & Security, Vol. 26 No. 1, pp. 36-43.
-
(2007)
Computers &Amp; Security
, vol.26
, Issue.1
, pp. 36-43
-
-
Drevin, L.1
Kruger, H.A.2
Steyn, T.3
-
17
-
-
84859705285
-
Basing cybersecurity training on user perceptions
-
Furman, S., Theofanos, M.F., Choong, Y.Y. and Stanton, B. (2012), “Basing cybersecurity training on user perceptions”, IEEE Security and Privacy, Vol. 10 No. 2, pp. 40-49.
-
(2012)
IEEE Security and Privacy
, vol.10
, Issue.2
, pp. 40-49
-
-
Furman, S.1
Theofanos, M.F.2
Choong, Y.Y.3
Stanton, B.4
-
18
-
-
41749105994
-
End-user security culture: A lesson that will never be learnt ?
-
Furnell, S. (2008), “End-user security culture: a lesson that will never be learnt ?”, Computer Fraud & Security, Vol. 2008 No. 40, pp. 6-9.
-
(2008)
Computer Fraud &Amp; Security
, vol.2008
, Issue.40
, pp. 6-9
-
-
Furnell, S.1
-
19
-
-
77955390059
-
Jumping security hurdles
-
Furnell, S. (2010), “Jumping security hurdles”, Computer Fraud & Security, Vol. 2010 No. 6, pp. 10-14.
-
(2010)
Computer Fraud &Amp; Security
, vol.2010
, Issue.6
, pp. 10-14
-
-
Furnell, S.1
-
20
-
-
61349200300
-
From culture to disobedience: Recognising the varying user acceptance of IT security
-
Furnell, S. and Thomson, K.-L. (2009), “From culture to disobedience: recognising the varying user acceptance of IT security”, Computer Fraud & Security, Vol. 2009 No. 2, pp. 5-10.
-
(2009)
Computer Fraud &Amp; Security
, vol.2009
, Issue.2
, pp. 5-10
-
-
Furnell, S.1
Thomson, K.-L.2
-
21
-
-
34447503284
-
Assessing the security perceptions of personal internet users
-
Furnell, S.M., Bryant, P. and Phippen, A. (2007), “Assessing the security perceptions of personal internet users”, Computers & Security, Vol. 26 No. 5, pp. 410-417.
-
(2007)
Computers &Amp; Security
, vol.26
, Issue.5
, pp. 410-417
-
-
Furnell, S.M.1
Bryant, P.2
Phippen, A.3
-
22
-
-
55649114179
-
Security beliefs and barriers for novice Internet users
-
Furnell, S., Tsaganidi, V. and Phippen, A. (2008), “Security beliefs and barriers for novice Internet users”, Computers & Security, Vol. 27 Nos 7-8, pp. 235-240.
-
(2008)
Computers &Amp; Security
, vol.27
, Issue.7-8
, pp. 235-240
-
-
Furnell, S.1
Tsaganidi, V.2
Phippen, A.3
-
23
-
-
77953034467
-
Looking for trouble
-
ACM Press, New York, NY
-
Gross, J.B. and Rosson, M.B. (2007), “Looking for trouble”, Proceedings of the 2007 Symposium on Computer Human Interaction for the Management of Information Technology – CHIMIT’07, ACM Press, New York, NY, p. 10.
-
(2007)
Proceedings of the 2007 Symposium on Computer Human Interaction for the Management of Information Technology – CHIMIT’07
-
-
Gross, J.B.1
Rosson, M.B.2
-
24
-
-
79960754088
-
The long-term effects of information security e-learning on organizational learning
-
Hagen, J., Albrechtsen, E. and Ole Johnsen, S. (2010), “The long-term effects of information security e-learning on organizational learning”, Information Management & Computer Security, Vol. 19 No. 3, pp. 140-154.
-
(2010)
Information Management &Amp; Computer Security
, vol.19
, Issue.3
, pp. 140-154
-
-
Hagen, J.1
Albrechtsen, E.2
Ole Johnsen, S.3
-
25
-
-
84946144286
-
The world in 2014: ICT facts and figures
-
ITU, accessed 29 April 2015
-
ITU (2014), “The world in 2014: ICT facts and figures”, International Telecommunication Union, available at: www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2014-e.pdf (accessed 29 April 2015).
-
(2014)
International Telecommunication Union
-
-
-
26
-
-
3442882530
-
Internet addiction: Characteristics of a questionnaire and prevalence in norwegian youth (12-18 years)
-
Johansson, A. and Götestam, K.G. (2004), “Internet addiction: characteristics of a questionnaire and prevalence in norwegian youth (12-18 years)”, Scandinavian Journal of Psychology, Vol. 45 No. 3, pp. 223-229.
-
(2004)
Scandinavian Journal of Psychology
, vol.45
, Issue.3
, pp. 223-229
-
-
Johansson, A.1
Götestam, K.G.2
-
27
-
-
33644755338
-
Security awareness : Switch to a better programme
-
Johnson, E.C. (2006), “Security awareness : switch to a better programme”, Network Security, February, Vol. 2006 No. 2, pp. 15-18.
-
(2006)
Network Security, February
, vol.2006
, Issue.2
, pp. 15-18
-
-
Johnson, E.C.1
-
28
-
-
80052902327
-
Toward a new meta-theory for designing information systems (IS) security training approaches
-
Karjalainen, M. and Siponen, M. (2011), “Toward a new meta-theory for designing information systems (IS) security training approaches”, Journal of the Association for Information Systems, Vol. 12 No. 8, pp. 518-555.
-
(2011)
Journal of the Association for Information Systems
, vol.12
, Issue.8
, pp. 518-555
-
-
Karjalainen, M.1
Siponen, M.2
-
29
-
-
84893649270
-
Recommendations for information security awareness training for college students
-
Kim, E.B. (2013), “Recommendations for information security awareness training for college students”, Information Management & Computer Security, Vol. 22 No. 1, pp. 115-126.
-
(2013)
Information Management &Amp; Computer Security
, vol.22
, Issue.1
, pp. 115-126
-
-
Kim, E.B.1
-
31
-
-
78449305755
-
Cyber security for home users: A new way of protection through awareness enforcement
-
Kritzinger, E. and von Solms, S.H. (2010), “Cyber security for home users: a new way of protection through awareness enforcement”, Computer & Security, Vol. 29 No. 8, pp. 840-847.
-
(2010)
Computer &Amp; Security
, vol.29
, Issue.8
, pp. 840-847
-
-
Kritzinger, E.1
Von Solms, S.H.2
-
32
-
-
33746994612
-
A prototype for assessing information security awareness
-
Kruger, H.A. and Kearney, W.D. (2006), “A prototype for assessing information security awareness”, Computers & Security, Vol. 25 No. 4, pp. 289-296.
-
(2006)
Computers &Amp; Security
, vol.25
, Issue.4
, pp. 289-296
-
-
Kruger, H.A.1
Kearney, W.D.2
-
33
-
-
78650328614
-
A vocabulary test to assess information security awareness
-
Kruger, H., Drevin, L. and Steyn, T. (2010), “A vocabulary test to assess information security awareness”, Information Management & Computer Security, Vol. 18 No. 5, pp. 316-327.
-
(2010)
Information Management &Amp; Computer Security
, vol.18
, Issue.5
, pp. 316-327
-
-
Kruger, H.1
Drevin, L.2
Steyn, T.3
-
34
-
-
80053992653
-
Design of cyber security awareness game utilizing a social media framework
-
15-17 August, Johannesburg
-
Labuschagne, W.A., Veerasamy, N., Burke, I. and Eloff, M.M. (2011), “Design of cyber security awareness game utilizing a social media framework”, Information Security South Africa (ISSA), 15-17 August, Johannesburg, pp. 1-9.
-
(2011)
Information Security South Africa (ISSA)
, pp. 1-9
-
-
Labuschagne, W.A.1
Veerasamy, N.2
Burke, I.3
Eloff, M.M.4
-
35
-
-
33845367600
-
A systems approach to conduct an effective literature review in support of information systems research
-
Levy, Y. and Ellis, T.J. (2006), “A systems approach to conduct an effective literature review in support of information systems research”, Informing Science Journal, Vol. 9 No. 1, pp. 181-212.
-
(2006)
Informing Science Journal
, vol.9
, Issue.1
, pp. 181-212
-
-
Levy, Y.1
Ellis, T.J.2
-
36
-
-
0031078923
-
The past and future history of the internet
-
Leiner, B.M., Cerf, V.G., Clark, D.D., Kahn, R.E., Kleinrock, L., Lynch, D.C., Postel, J., Roberts, L.G. and Wolff, S.S. (1997), “The past and future history of the internet”, Communication of the ACM Vol. 40 No. 2, pp. 102-108.
-
(1997)
Communication of the ACM
, vol.40
, Issue.2
, pp. 102-108
-
-
Leiner, B.M.1
Cerf, V.G.2
Clark, D.D.3
Kahn, R.E.4
Kleinrock, L.5
Lynch, D.C.6
Postel, J.7
Roberts, L.G.8
Wolff, S.S.9
-
37
-
-
70450274963
-
Internet literacy among children and young people: Findings from the UK children go online project
-
London, accessed 5 July 2014
-
Livingstone, S., Bober, M. and Helsper, E. (2005), “Internet literacy among children and young people: findings from the UK children go online project” LSE Research Online, London, available at: http://eprints.lse.ac.uk/archive/00000397 (accessed 5 July 2014).
-
(2005)
LSE Research Online
-
-
Livingstone, S.1
Bober, M.2
Helsper, E.3
-
38
-
-
77953858738
-
Identity theft, spyware and the law
-
Kennesaw, GA
-
Loibl, T.R. (2005), “Identity theft, spyware and the law”, Proceedings of the 2nd Annual Conference on Information Security Curriculum Development, Kennesaw, GA, pp. 118-121.
-
(2005)
Proceedings of the 2Nd Annual Conference on Information Security Curriculum Development
, pp. 118-121
-
-
Loibl, T.R.1
-
39
-
-
84893656776
-
Information security in the South Australian real estate industry: A study of 40 real estate organisations
-
Mani, D., Raymond Choo, K.K. and Mubarak, S. (2013), “Information security in the South Australian real estate industry: a study of 40 real estate organisations”, Information Management & Computer Security, Vol. 22 No. 1, pp. 24-41.
-
(2013)
Information Management &Amp; Computer Security
, vol.22
, Issue.1
, pp. 24-41
-
-
Mani, D.1
Raymond Choo, K.K.2
Mubarak, S.3
-
40
-
-
51549098348
-
Approaches to user education
-
May, C. (2008), “Approaches to user education”, Network Security, Vol. 2008 No. 9, pp. 15-17.
-
(2008)
Network Security
, vol.2008
, Issue.9
, pp. 15-17
-
-
May, C.1
-
43
-
-
34748918403
-
Cybercrime, identity theft, and fraud: Practicing safe internet – network security threats and vulnerabilities
-
22-23 September, Kennesaw, GA
-
Newman, R.C. (2006), “Cybercrime, identity theft, and fraud: practicing safe internet – network security threats and vulnerabilities”, Proceedings of the 3rd Annual Conference on Information Security Curriculum Development – InfoSecCD ’06, 22-23 September, Kennesaw, GA.
-
(2006)
Proceedings of the 3Rd Annual Conference on Information Security Curriculum Development – Infoseccd ’06
-
-
Newman, R.C.1
-
44
-
-
79953302829
-
The impact of social media on children, adolescents, and families
-
Council on Communications and Media
-
O’Keeffe, G.S., Clarke-Pearson, K. and Council on Communications and Media (2011), “The impact of social media on children, adolescents, and families”, Pediatrics, Vol. 127 No. 4, pp. 800-804.
-
(2011)
Pediatrics
, vol.127
, Issue.4
, pp. 800-804
-
-
O’keeffe, G.S.1
Clarke-Pearson, K.2
-
46
-
-
84897915329
-
A study of information security awareness in Australian government organisations
-
Parsons, K., McCormac, A., Pattinson, M., Butavicius, M. and Jerram, C. (2013), “A study of information security awareness in Australian government organisations”, Information Management & Computer Security, Vol. 22 No. 4, pp. 334-345.
-
(2013)
Information Management &Amp; Computer Security
, vol.22
, Issue.4
, pp. 334-345
-
-
Parsons, K.1
McCormac, A.2
Pattinson, M.3
Butavicius, M.4
Jerram, C.5
-
47
-
-
84993099250
-
Implementing an information security awareness program
-
Peltier, T.R. (2005), “Implementing an information security awareness program”, Information Systems Security, Vol. 14 No. 2, pp. 37-49.
-
(2005)
Information Systems Security
, vol.14
, Issue.2
, pp. 37-49
-
-
Peltier, T.R.1
-
48
-
-
37249038076
-
Developing a culture of privacy: A case study
-
Power, E.M. (2007), “Developing a culture of privacy: a case study”, IEEE Security & Privacy Magazine, Vol. 5 No. 6, pp. 58-60.
-
(2007)
IEEE Security &Amp; Privacy Magazine
, vol.5
, Issue.6
, pp. 58-60
-
-
Power, E.M.1
-
49
-
-
84871904550
-
How effective is your security awareness program? An evaluation methodology
-
Rantos, K., Fysarakis, K. and Manifavas, C. (2012), “How effective is your security awareness program? An evaluation methodology”, Information Security Journal: A Global Perspective, Vol. 21 No. 6, pp. 328-345.
-
(2012)
Information Security Journal: A Global Perspective
, vol.21
, Issue.6
, pp. 328-345
-
-
Rantos, K.1
Fysarakis, K.2
Manifavas, C.3
-
50
-
-
55849105212
-
Information security awareness in higher education: An exploratory study
-
Rezgui, Y. and Marks, A. (2008), “Information security awareness in higher education: an exploratory study”, Computers & Security, Vol. 27 Nos 7-8, pp. 241-253.
-
(2008)
Computers &Amp; Security
, vol.27
, Issue.7-8
, pp. 241-253
-
-
Rezgui, Y.1
Marks, A.2
-
51
-
-
0004238651
-
-
Sage Publications Inc., San Francisco, CA
-
Rossi, P.H., Lipsey, M.W. and Freeman, H.E. (2004), Evaluation: A Systematic Approach, Sage Publications Inc., San Francisco, CA.
-
(2004)
Evaluation: A Systematic Approach
-
-
Rossi, P.H.1
Lipsey, M.W.2
Freeman, H.E.3
-
52
-
-
56249140028
-
The impact of information richness on information security awareness training effectiveness
-
Shaw, R.S., Chen, C.C., Harris, A.L. and Huang, H.-J. (2009), “The impact of information richness on information security awareness training effectiveness”, Computers & Education, Vol. 52 No. 1, pp. 92-100.
-
(2009)
Computers &Amp; Education
, vol.52
, Issue.1
, pp. 92-100
-
-
Shaw, R.S.1
Chen, C.C.2
Harris, A.L.3
Huang, H.-J.4
-
53
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Siponen, M.T. (2000), “A conceptual foundation for organizational information security awareness”, Information Management & Computer Security, Vol. 8 No. 1, pp. 31-41.
-
(2000)
Information Management &Amp; Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.T.1
-
54
-
-
84930817462
-
A study on the adolescent online security issues
-
May/June
-
Sithira, V. and Nguwi, Y. (2014), “A study on the adolescent online security issues”, International Journal of Multidisciplinary and Current Research, Vol. 2, May/June, pp. 596-601.
-
(2014)
International Journal of Multidisciplinary and Current Research
, vol.2
, pp. 596-601
-
-
Sithira, V.1
Nguwi, Y.2
-
55
-
-
84930804675
-
Students information security practices and awareness
-
Slusky, L. and Partow-Navid, P. (2012), “Students information security practices and awareness”, Journal of Information Privacy and Security, Vol. 8 No. 4, pp. 3-26.
-
(2012)
Journal of Information Privacy and Security
, vol.8
, Issue.4
, pp. 3-26
-
-
Slusky, L.1
Partow-Navid, P.2
-
56
-
-
77952330680
-
An analysis of information security awareness within home and work environments
-
Talib, S., Clarke, N.L. and Furnell, S.M. (2010), “An analysis of information security awareness within home and work environments”, 2010 International Conference on Availability, Reliability and Security, pp. 196-203.
-
(2010)
2010 International Conference on Availability, Reliability and Security
, pp. 196-203
-
-
Talib, S.1
Clarke, N.L.2
Furnell, S.M.3
-
57
-
-
78649632049
-
Online activities and writing practices of urban Malaysian adolescents
-
Tan, K.E., Ng, M.L. and Saw, K.G. (2010), “Online activities and writing practices of urban Malaysian adolescents”, System, Vol. 38 No. 4, pp. 548-559.
-
(2010)
System
, vol.38
, Issue.4
, pp. 548-559
-
-
Tan, K.E.1
Ng, M.L.2
Saw, K.G.3
-
58
-
-
0242517401
-
Information security awareness: Educating your users effectively
-
Thomson, M.E. and von Solms, R. (1998), “Information security awareness: educating your users effectively”, Information Management & Computer Security, Vol. 6 No. 4, pp. 167-173.
-
(1998)
Information Management &Amp; Computer Security
, vol.6
, Issue.4
, pp. 167-173
-
-
Thomson, M.E.1
Von Solms, R.2
-
59
-
-
85016075946
-
Investigating information security awareness: Research and practice gaps
-
Tsohou, A., Kokolakis, S., Karyda, M. and Kiountouzis, E. (2008), “Investigating information security awareness: research and practice gaps”, Information Security Journal: A Global Perspective, Vol. 17 Nos 5-6, pp. 207-227.
-
(2008)
Information Security Journal: A Global Perspective
, vol.17
, Issue.5-6
, pp. 207-227
-
-
Tsohou, A.1
Kokolakis, S.2
Karyda, M.3
Kiountouzis, E.4
-
60
-
-
33745500491
-
Enhancing the employee security awareness model
-
Valentine, J.A. and Labs, I. (2006), “Enhancing the employee security awareness model”, Computer Fraud & Security, Vol. 2006 No. 6, pp. 17-19.
-
(2006)
Computer Fraud &Amp; Security
, vol.2006
, Issue.6
, pp. 17-19
-
-
Valentine, J.A.1
Labs, I.2
-
61
-
-
33646433992
-
A contextual framework for combating identity theft
-
WenJie, W., Yufei, Y. and Archer, N. (2006), “A contextual framework for combating identity theft”, IEEE Security & Privacy Magazine, Vol. 4 No. 2, pp. 30-38.
-
(2006)
IEEE Security &Amp; Privacy Magazine
, vol.4
, Issue.2
, pp. 30-38
-
-
Wenjie, W.1
Yufei, Y.2
Archer, N.3
-
62
-
-
62949216467
-
Identity theft and the challenges of caring for your virtual self
-
Whitson, J. (2009), “Identity theft and the challenges of caring for your virtual self”, Interactions, Vol. 16 No. 2, p. 41.
-
(2009)
Interactions
, vol.16
, Issue.2
-
-
Whitson, J.1
-
63
-
-
33745046332
-
Teenagers perceptions of online privacy and coping behaviors: A risk – benefit appraisal approach”
-
Youn, S. (2005), “Teenagers’ perceptions of online privacy and coping behaviors: a risk – benefit appraisal approach”, Journal of Broadcasting & Electronic Media, Vol. 49 No. 1, pp. 86-110.
-
(2005)
Journal of Broadcasting &Amp; Electronic Media
, vol.49
, Issue.1
, pp. 86-110
-
-
Youn, S.1
-
64
-
-
0002305454
-
From intentions to actions: A theory of planned behaviour
-
in Kuhl, J. and Beckmann, J, Springer, Berlin Heidelberg
-
Ajzen, I. (1985), “From intentions to actions: a theory of planned behaviour”, in Kuhl, J. and Beckmann, J. (Eds), Action Control, Springer, Berlin Heidelberg, pp. 11-39.
-
(1985)
Action Control
, pp. 11-39
-
-
Ajzen, I.1
-
65
-
-
0038093081
-
-
Wadsworth Cengage Learning, Belmont, CA
-
Royse, D., Thyer, B.A., Padgett, D.K. and Logan, T.K. (2001), Program Evaluation an Introduction, Wadsworth Cengage Learning, Belmont, CA.
-
(2001)
Program Evaluation an Introduction
-
-
Royse, D.1
Thyer, B.A.2
Padgett, D.K.3
Logan, T.K.4
-
66
-
-
17844366573
-
Analysis of end user security behaviors
-
Stanton, J.M., Stam, K.R., Mastrangelo, P. and Jolton, J. (2005), “Analysis of end user security behaviors”, Computers & Security, Vol. 24 No. 2, pp. 124-133.
-
(2005)
Computers &Amp; Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
67
-
-
84871947848
-
-
Sage Publications, San Francisco, CA
-
Yarbrough, D.B., Shulha, L.M., Hopson, R.K. and Caruthers, F.A. (2011), The Program Evaluation Standards: A Guide for Evalators and Evaluation Users, Sage Publications, San Francisco, CA.
-
(2011)
The Program Evaluation Standards: A Guide for Evalators and Evaluation Users
-
-
Yarbrough, D.B.1
Shulha, L.M.2
Hopson, R.K.3
Caruthers, F.A.4
|