Author:
Langendörfer Peter,Kornemann Stephan,Alsabbagh Wael,Hermann Erik
Publisher
Springer International Publishing
Reference19 articles.
1. Aksu, M. U., Altuncu, E., & Bicakci, K. (2019). A first look at the usability of openvas vulnerability scanner. Workshop on usable security (USEC).
2. Berg, A., Selen, S., Wirtschaftsschutz. (2021). Bitkom Studie, https://www.bitkom.org/sites/default/files/2021-08/bitkom-slides-wirtschaftsschutz-cybercrime-05-08-2021.pdf
3. Chen, T. M., Abu-Nimeh, S. (2011). Lessons from Stuxnet. Computer, 44(4), 91–93.
4. Cram, W. A., D’Arcy, J., & Proudfoot, J. G. (2019). Seeing the forest and the trees: A meta-analysis of the antecedents to information security policy compliance. MIS Quarterly, 43, 525–554.
5. D’Arcy, J., Herath, T., & Shoss, M. K. (2014). Understanding employee responses to stressful information security requirements: A coping perspective. Journal of Management Information Systems, 31, 285–318.