Author:
Juma Mazen,Shaalan Khaled
Publisher
Springer International Publishing
Reference18 articles.
1. Liu, W., Sidhu, A., Beacom, A.M., Valente, T.W.: Social Network Theory. In: The International Encyclopedia of Media Effects, pp. 1–12 (2017)
2. Lonsdale, M.D.S., Lonsdale, D., Lim, H.W.: The impact of delivering online information neglecting user-centered information design principles. cyber security awareness websites as a case study. Inf. Des. J. 24(2), 3–41 (2019)
3. Fire, M., Puzis, R.: Organization mining using online social networks. Netw. Spat. Econ. 16(2), 545–578 (2016)
4. Knoke, D., Yang, S.: Social Network Analysis, vol. (154), pp. 201–209. SAGE Publications, Incorporated (2019)
5. Hassandoust, F., Techatassanasoontorn, A.: Understanding users’ information security awareness and intentions: a full nomology of protection motivation theory. In: Cyber Influence and Cognitive Threats, pp. 129–143. Academic Press (2020)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Conflict spectrum: An empirical study of geopolitical cyber threats from a social network perspective;2021 Eighth International Conference on Social Network Analysis, Management and Security (SNAMS);2021-12-06