共 22 条
- [2] From culture to disobedience: Recognising the varying user acceptance of IT security[J] . Steven Furnell,Kerry-Lynn Thomson.Computer Fraud & Security . 2009 (2)
- [4] Self-efficacy in information security: Its influence on end users' information security practice behavior[J] . Hyeun-Suk Rhee,Cheongtag Kim,Young U. Ryu.Computers & Security . 2009 (8)
- [5] Human and organizational factors in computer and information security: Pathways to vulnerabilities[J] . Sara Kraemer,Pascale Carayon,John Clem.Computers & Security . 2009 (7)
- [6] Information security policy: An organizational-level process model[J] . Kenneth J. Knapp,R. Franklin Morris,Thomas E. Marshall,Terry Anthony Byrd.Computers & Security . 2009 (7)
- [7] Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study[J] . Eirik Albrechtsen,Jan Hovden.Computers & Security . 2009 (4)
- [8] An integrated view of human, organizational, and technological challenges of IT security management[J] . Rodrigo Werlinger,Kirstie Hawkey,Konstantin Beznosov.Information Management & Computer Security . 2009 (1)
- [9] A test of interventions for security threats from social engineering[J] . Michael Workman.Information Management & Computer Security . 2008 (5)
- [10] How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management[J] . Divakaran Liginlal,Inkook Sim,Lara Khansa.Computers & Security . 2008 (3)