-
1
-
-
34249871944
-
A qualitative study of users' view on information security
-
Albrechtsen, E. (2007). A qualitative study of users' view on information security, Computers & Security, 26(4), pp. 276-289.
-
(2007)
Computers & Security
, vol.26
, Issue.4
, pp. 276-289
-
-
Albrechtsen, E.1
-
2
-
-
78449271010
-
Security actions during reduction in workforce efforts: What to do when downsizing
-
Bray, T.J. (2002). Security actions during reduction in workforce efforts: What to do when downsizing, Information System Security, 11(1), pp. 11-15.
-
(2002)
Information System Security
, vol.11
, Issue.1
, pp. 11-15
-
-
Bray, T.J.1
-
3
-
-
33846367309
-
People—often the weakest link in security, but one of the best places to start
-
Bresz, F.P. (2004). People—often the weakest link in security, but one of the best places to start, Journal of Health Care Compliance, 6(4), pp. 57-60.
-
(2004)
Journal of Health Care Compliance
, vol.6
, Issue.4
, pp. 57-60
-
-
Bresz, F.P.1
-
5
-
-
60049085275
-
Mitigating information security risks by increasing user security awareness: A case study of an information security awareness system
-
Chen, C.C., Shaw, R.S. and Yang, S.C. (2006). Mitigating information security risks by increasing user security awareness: A case study of an information security awareness system, Information Technology Learning and Performance Journal, 24(1), pp. 1-14.
-
(2006)
Information Technology Learning and Performance Journal
, vol.24
, Issue.1
, pp. 1-14
-
-
Chen, C.C.1
Shaw, R.S.2
Yang, S.C.3
-
6
-
-
33846783259
-
A video game for cyber security training and awareness
-
Cone, B.D., Irvine, C.E., Thompson, M.F. and Nguyen, T.D. (2007). A video game for cyber security training and awareness, Computers & Security, 26(1), pp. 63-72.
-
(2007)
Computers & Security
, vol.26
, Issue.1
, pp. 63-72
-
-
Cone, B.D.1
Irvine, C.E.2
Thompson, M.F.3
Nguyen, T.D.4
-
7
-
-
84992963195
-
Raising information security awareness in the academic setting
-
Cox, A., Connolly, S. and Currall, J. (2001). Raising information security awareness in the academic setting, The Journal of Information and Knowledge Management System, 31(2), pp. 11-16.
-
(2001)
The Journal of Information and Knowledge Management System
, vol.31
, Issue.2
, pp. 11-16
-
-
Cox, A.1
Connolly, S.2
Currall, J.3
-
9
-
-
33748435812
-
-
Computer Security Institute. Retrieved May 28, 2008, from
-
CSI/FBI. (2006). Computer crime and security survey 2006. Computer Security Institute. Retrieved May 28, 2008, from http://i.cmpnet.com/ gocsi/db_area/pdfs/fbi/FBI2006.pdf
-
(2006)
Computer Crime and Security Survey 2006.
-
-
-
10
-
-
33748435812
-
-
2006. Computer Security Institute. Retrieved May 28, 2008, from
-
CSI/FBI. (2005). Computer crime and security survey. 2006. Computer Security Institute. Retrieved May 28, 2008, from http://i.cmpnet.com/ gocsi/db_area/pdfs/fbi/FBI2005.pdf
-
(2005)
Computer Crime and Security Survey
-
-
-
11
-
-
37749015799
-
Improving end user behavior in password utilization: An action research initiative
-
Danuvasin, C., Murali, R. and Lorne, O. (2008). Improving end user behavior in password utilization: An action research initiative, Systemic Practice and Action Research, 21(1), pp. 55-72.
-
(2008)
Systemic Practice and Action Research
, vol.21
, Issue.1
, pp. 55-72
-
-
Danuvasin, C.1
Murali, R.2
Lorne, O.3
-
12
-
-
33846794868
-
Phishing for user security awareness
-
Dodge, R.C., Carver, C. and Ferguson A.J. (2007). Phishing for user security awareness, Computers & Security, 26(1), pp. 73-80.
-
(2007)
Computers & Security
, vol.26
, Issue.1
, pp. 73-80
-
-
Dodge, R.C.1
Carver, C.2
Ferguson, A.J.3
-
13
-
-
33846807812
-
Value-focused assessment of ict security awareness in an academic environment
-
Drevin, L., Kruger, H.A. and Steyn T. (2007). Value-focused assessment of ICT security awareness in an academic environment, Computers & Security, 26(1), pp. 36-43.
-
(2007)
Computers & Security
, vol.26
, Issue.1
, pp. 36-43
-
-
Drevin, L.1
Kruger, H.A.2
Steyn, T.3
-
14
-
-
49249116220
-
-
European Network and Information Security Agency. Retrieved June 9, 2008, from
-
ENISA. (2006). A users' guide: How to raise information security awareness 2006. European Network and Information Security Agency. Retrieved June 9, 2008, from http://www.enisa.europa.eu/doc/pdf/ deliverables/enisa_a_users_guide_how_to_raise_IS_awareness.pdf
-
(2006)
A Users' Guide: How to Raise Information Security Awareness 2006.
-
-
-
15
-
-
84923430719
-
-
Retrieved June 9, 2008 from
-
Ernst & Young. (2005). Annual global information security survey 2005. Retrieved June 9, 2008 from www.vistorm.com/uplds/EY_Global_Information_ Security_survey_20051.pdf
-
(2005)
Annual Global Information Security Survey 2005.
-
-
-
16
-
-
85025312367
-
-
Retrieved June 9, 2008 from
-
Ernst & Young. (2006). Annual global information security survey 2006. Retrieved June 9, 2008 from http://www.ey.com/Global/download. nsf/International/TSRS_-_GISS_2006/$file/EY_GISS2006.pdf
-
(2006)
Annual Global Information Security Survey 2006
-
-
-
17
-
-
33644755338
-
Security awareness: Switch to a better program
-
Everett, C.J. (2006). Security awareness: Switch to a better program, Network Security, 2, pp. 15-18.
-
(2006)
Network Security
, vol.2
, pp. 15-18
-
-
Everett, C.J.1
-
18
-
-
84882779197
-
Network security policies and procedures
-
New York: Springer-Verlag.
-
Frye, D.W. (2007). Network security policies and procedures. In Series: Advances in Information Security. New York: Springer-Verlag.
-
(2007)
In Series: Advances in Information Security
-
-
Frye, D.W.1
-
19
-
-
33750958522
-
Securing the home worker
-
Furnell, S. (2006). Securing the home worker, Network Security, (11), pp. 6-12.
-
(2006)
Network Security, (11)
, pp. 6-12
-
-
Furnell, S.1
-
20
-
-
33645589662
-
A prototype tool for information security awareness and training
-
Furnell, S.M., Gennatou, M. and Dowland, P.S. (2002). A prototype tool for information security awareness and training, Logistics Information Management, 15(5/6), pp. 352-357.
-
(2002)
Logistics Information Management
, vol.15
, Issue.5-6
, pp. 352-357
-
-
Furnell, S.M.1
Gennatou, M.2
Dowland, P.S.3
-
21
-
-
41749101976
-
Getting the most from training sessions: The art of raising security awareness without curing insomnia
-
Goucher, W. (2008). Getting the most from training sessions: the art of raising security awareness without curing insomnia, Computer Fraud & Security, (4), p. 15.
-
(2008)
Computer Fraud & Security
, vol.4
, pp. 15
-
-
Goucher, W.1
-
22
-
-
85003712015
-
Designing a security awareness program: Part i
-
Hansche, S. (2001a). Designing a security awareness program: Part I, Information Systems Security, 9(6), pp. 14-23.
-
(2001)
Information Systems Security
, vol.9
, Issue.6
, pp. 14-23
-
-
Hansche, S.1
-
23
-
-
33749351552
-
Information system security training: Making it happen: Part 2
-
Hansche, S. (2001b). Information system security training: Making it happen: Part 2, Information System Security, 10(3), pp. 51-70.
-
(2001)
Information System Security
, vol.10
, Issue.3
, pp. 51-70
-
-
Hansche, S.1
-
24
-
-
0043249504
-
Awareness and challenges of internet security
-
Hawkins, S., Yen, D.C. and Chou, D.C. (2000). Awareness and challenges of Internet security, Information Management & Computer Security, 8(3), pp. 131-143.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.3
, pp. 131-143
-
-
Hawkins, S.1
Yen, D.C.2
Chou, D.C.3
-
26
-
-
0034316957
-
Health care management and information systems security: Awareness, training or education?
-
Katsikas, S. (2000). Health care management and information systems security: Awareness, training or education? International Journal of Medical Informatics, 60(2), pp. 129-135.
-
(2000)
International Journal of Medical Informatics
, vol.60
, Issue.2
, pp. 129-135
-
-
Katsikas, S.1
-
27
-
-
85025310792
-
-
Research Colloquium, Auburn University, Auburn, Alabama.
-
Knapp, K.J., Marshall, T.E., Rainer, R.K. and Morrow, D.W. (2004). Top-ranked information security issues: The 2004 international information systems security certification consortium (ISC)2 survey results. Research Colloquium, Auburn University, Auburn, Alabama.
-
(2004)
Top-Ranked Information Security Issues: The 2004 International Information Systems Security Certification Consortium (ISC)2 Survey Results
-
-
Knapp, K.J.1
Marshall, T.E.2
Rainer, R.K.3
Morrow, D.W.4
-
28
-
-
49249103382
-
-
Doctoral dissertation, University of South Africa. Retrieved October 6, 2007, from
-
Kritzinger, E. (2006). An information security retrieval and awareness model for industry. Doctoral dissertation, University of South Africa. Retrieved October 6, 2007, from http://etd.unisa.ac.za/ETD-db/ ETD-desc/describe?urn = etd-11062006-094238
-
(2006)
An Information Security Retrieval and Awareness Model for Industry.
-
-
Kritzinger, E.1
-
29
-
-
33746994612
-
A prototype for assessing information security awareness
-
Kruger, H.A. and Kearney, W.D. (2006). A prototype for assessing information security awareness, Computers & Security, 25(1), pp. 289-296.
-
(2006)
Computers & Security
, vol.25
, Issue.1
, pp. 289-296
-
-
Kruger, H.A.1
Kearney, W.D.2
-
32
-
-
45749094057
-
-
Master Thesis, NISlab Norwegian Information Security Laboratory, campus IT university. Retrieved October 6, 2007, from
-
Mathisen, J. (2004). Measuring information security awareness - A survey showing the Norwegian way to do it. Master Thesis, NISlab Norwegian Information Security Laboratory, campus IT university. Retrieved October 6, 2007, from http://dsv.su.se/en/seclab/pages/msckththeses-en
-
(2004)
Measuring Information Security Awareness - a Survey Showing the Norwegian Way to Do It.
-
-
Mathisen, J.1
-
34
-
-
33745446307
-
-
M. Wilson (ed.), NIST Special Publication 800-50. Gaithersburg, MD: National Institute of Standards and Technology. Retrieved October 6, 2007, from
-
NIST. (2003). Building an information technology security awareness and training program. In M. Wilson (ed.), NIST Special Publication 800-50. Gaithersburg, MD: National Institute of Standards and Technology. Retrieved October 6, 2007, from http://csrc.nist.gov/publications/ nistpubs/
-
(2003)
Building an Information Technology Security Awareness and Training Program
-
-
-
35
-
-
84905731710
-
Information technology security training requirements: A role- and performance-based model
-
M. Wilson (ed.), Gaithersburg, MD: National Institute of Standards and Technology. Retrieved October 6, 2007, from
-
NIST. (1998). Information technology security training requirements: A role- and performance-based model. In M. Wilson (ed.), NIST Special Publication 800-16. Gaithersburg, MD: National Institute of Standards and Technology. Retrieved October 6, 2007, from http:// csrc.nist.gov/publications/nistpubs/
-
(1998)
NIST Special Publication 800-16.
-
-
-
36
-
-
85015895149
-
On the anatomy of human hacking
-
Okenyi, P.O. and Owens, T.J. (2007). On the anatomy of human hacking, Information Systems Security, 16(6), pp. 302-314.
-
(2007)
Information Systems Security
, vol.16
, Issue.6
, pp. 302-314
-
-
Okenyi, P.O.1
Owens, T.J.2
-
37
-
-
84993099250
-
Implementing an information security awareness program
-
Peltier, T.R. (2005). Implementing an information security awareness program, Information Systems Security, 14(2), pp. 37-48.
-
(2005)
Information Systems Security
, vol.14
, Issue.2
, pp. 37-48
-
-
Peltier, T.R.1
-
38
-
-
37249038076
-
Developing a culture of privacy: A case study
-
Power, E.M. (2007). Developing a culture of privacy: A case study, IEEE Security and Privacy, 5(6), pp. 58-60.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.6
, pp. 58-60
-
-
Power, E.M.1
-
39
-
-
33744544943
-
Case study: A bold new approach to awareness and education, and how it met an ignoble fate
-
Power, R. and Forte, D. (2006). Case study: A bold new approach to awareness and education, and how it met an ignoble fate, Computer Fraud & Security, 2006(5), pp. 7-10.
-
(2006)
Computer Fraud & Security
, vol.2006
, Issue.5
, pp. 7-10
-
-
Power, R.1
Forte, D.2
-
40
-
-
49249131489
-
-
Doctoral Dissertation, Department of information processing science, University of Oulu. Retrieved October 6, 2007, from
-
Puhakainen, P. (2006). A design theory for information security awareness. Doctoral Dissertation, Department of information processing science, University of Oulu. Retrieved October 6, 2007, from http://herkules.oulu.fi/isbn9514281144/
-
(2006)
A Design Theory for Information Security Awareness
-
-
Puhakainen, P.1
-
41
-
-
84858959401
-
-
Information security breaches survey - Technical report 2006. Retrieved October 6, 2007, from
-
PWHC. (2006). Pricewaterhouse Coopers. Information security breaches survey - Technical report 2006. Retrieved October 6, 2007, from http://www.pwc.com/Extweb/pwcpublications.nsf/docid/F9843CD3C8E0FB828025715A0058C63B
-
(2006)
Pricewaterhouse Coopers.
-
-
-
42
-
-
78049393335
-
(
-
New York: Springer-Verlag
-
Qing, T., Ng, B. and Kankanhalli A. (2007). Individual's response to security messages: A decision-making perspective, decision support for global enterprises, In Series: Annals of Information Systems. New York: Springer-Verlag, pp. 177-191.
-
(2007)
Series: Annals of Information Systems
, pp. 177-191
-
-
Qing, T.1
Ng, B.2
Kankanhalli, A.3
-
43
-
-
77955673648
-
Information security culture - from analysis to change
-
Johannesburg, South Africa
-
Schlienger, T. and Teufel, S. (2003). Information security culture - from analysis to change. In Proceedings of ISSA 2003, Johannesburg, South Africa.
-
(2003)
Proceedings of ISSA 2003
-
-
Schlienger, T.1
Teufel, S.2
-
44
-
-
84905725481
-
-
ITToolBox and Pentasafe, 2002. From Web Site:, [accessed at: 09-06-2008]
-
Security Awareness Index Report. (2002). The state of security awareness among organizations worldwide. ITToolBox and Pentasafe, 2002. From Web Site: http://security.ittoolbox.com/pub/AM101502a.pdf [accessed at: 09-06-2008].
-
(2002)
The State of Security Awareness among Organizations Worldwide
-
-
-
45
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Siponen, T. M. (2000). A conceptual foundation for organizational information security awareness. Information Management & Computer Security, 8 (1), 31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, T.M.1
-
47
-
-
17844366573
-
Analysis of end user security behaviours
-
Stanton, M.J., Stam, R. K., Mastrangelo, P., & Jolton, J. (2005). Analysis of end user security behaviours. Computers & Security, 24(2), 124-133.
-
(2005)
Computers & Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, M.J.1
Stam, R.K.2
Mastrangelo, P.3
Jolton, J.4
-
48
-
-
36349023276
-
Identity theft - empirical evidence from a phishing exercise
-
Venter, H., Eloff, M. Labuschagne, L., Eloff, j., von Sohns, R., (Boston: Springer), 2007.
-
Steyn, T., Kruger, H., & Drevin, L. (2007). Identity Theft - Empirical evidence from a Phishing exercise. In: IFIP International Federation for Information Processing, Vol. 232, New Approaches for Security, Privacy and Trust in Complex Environments, eds. Venter, H., Eloff, M. Labuschagne, L., Eloff, j., von Sohns, R., (Boston: Springer), pp. 193-203, 2007.
-
(2007)
IFIP International Federation for Information Processing, Vol. 232, New Approaches for Security, Privacy and Trust in Complex Environments
, pp. 193-203
-
-
Steyn, T.1
Kruger, H.2
Drevin, L.3
-
51
-
-
0242517401
-
Information security awareness: Educating your users effectively
-
Thomson, M.E., & von Solms, R. (1998). Information security awareness: educating your users effectively. Information Management & Computer Security, 6(4), 167-173.
-
(1998)
Information Management & Computer Security
, vol.6
, Issue.4
, pp. 167-173
-
-
Thomson, M.E.1
Von Solms, R.2
-
52
-
-
33745500491
-
Enhancing the employee security awareness model
-
Valentine, J.A. (2006). Enhancing the employee security awareness model. Computer Fraud & Security, 2006 (6), 17-19.
-
(2006)
Computer Fraud & Security
, vol.2006
, Issue.6
, pp. 17-19
-
-
Valentine, J.A.1
-
53
-
-
84870365725
-
Essential factors for successful software security awareness training
-
van Wyk, K.R., & Steven, J. (2006). Essential Factors for Successful Software Security Awareness Training. IEEE Security & Privacy,4 (5), 80-83.
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.5
, pp. 80-83
-
-
Van Wyk, K.R.1
Steven, J.2
-
54
-
-
0033657872
-
Information security - the third wave?
-
von Solms, B. (2000). Information Security - The Third Wave?. Computers and Security, 19 (7), 615-620.
-
(2000)
Computers and Security
, vol.19
, Issue.7
, pp. 615-620
-
-
Von Solms, B.1
-
56
-
-
2342475711
-
Towards information security behavioural compliance
-
Vroom, C., & von Solms, R. (2004). Towards information security behavioural compliance. Computers & Security, 23(3), 191-198.
-
(2004)
Computers & Security
, vol.23
, Issue.3
, pp. 191-198
-
-
Vroom, C.1
Von Solms, R.2
-
57
-
-
0043219327
-
Information security awareness raising methods
-
Wood, C. C. (1995). Information security awareness raising methods. Computer Fraud & Security Bulletin, 1995(6), 13-15.
-
(1995)
Computer Fraud & Security Bulletin
, vol.1995
, Issue.6
, pp. 13-15
-
-
Wood, C.C.1
|