BYOD Security: Using Dual Process Theory to Adapt Effective Security Habits in BYOD

Author:

Zhang Roger,Bello Abubakar,Foster Jeffrey L.

Publisher

Springer International Publishing

Reference32 articles.

1. Babbie, E.R.: The Practice of Social Research, vol. 112. Wadsworth Publishing Company Belmont, CA (1998)

2. Bago, B., De Neys, W.: Fast logic?: examining the time course assumption of dual process theory. Cognition 158, 90–109 (2017)

3. Biswas, K., Muthukkumarasamy, V.: Quantitative research design to evaluate learning platforms and learning methods for cyber-security courses. Paper presented at the 28th Annual 2017 Conference of the Australasian Association for Engineering Education (2017)

4. Bullee, J.-W., Montoya, L., Junger, M., Hartel, P.: Spear phishing in organisations explained. Inf. Comput. Secur. 25(5), 593–613 (2017). https://doi.org/10.1108/ICS-03-2017-0009

5. Das, A., Khan, H.U.: Security behaviors of smartphone users. Inf. Comput. Secur. 24(1), 116–134 (2016)

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3