共 27 条
[5]
Measuring perceived security in B2C electronic commerce website usage: A respecification and validation[J] . Edward Hartono,Clyde W. Holsapple,Ki-Yoon Kim,Kwan-Sik Na,James T. Simpson.Decision Support Systems . 2014
[6]
Organizations' Information Security Policy Compliance: Stick or Carrot Approach?[J] . Yan Chen,K. Ramamurthy,Kuang-Wei Wen.Journal of Management Information Systems . 2012 (3)
[7]
A game design framework for avoiding phishing attacks[J] . Nalin Asanka Gamagedara Arachchilage,Steve Love.Computers in Human Behavior . 2012
[8]
Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*[J] . Qing Hu,Tamara Dinev,Paul Hart,Donna Cooke.Decision Sciences . 2012 (4)
[9]
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model[J] . KenH. Guo,Yufei Yuan,NormanP. Archer,CatherineE. Connelly.Journal of Management Information Systems . 2011 (2)
[10]
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory[J] . Princely Ifinedo.Computers & Security . 2011 (1)