Author:
Kävrestad Joakim,Nohlberg Marcus
Publisher
Springer International Publishing
Reference29 articles.
1. Al-Daeef, M.M., Basir, N., Saudi, M.M.: Security awareness training: a review. In: Proceedings of World Congress on Engineering, vol. 1, pp. 5–7 (2017)
2. Alshaikh, M., Maynard, S.B., Ahmad, A., Chang, S.: An exploratory study of current information security training and awareness practices in organizations. In: Proceedings of the 51st Hawaii International Conference on System Sciences (2018)
3. Beckles, B., Welch, V., Basney, J.: Mechanisms for increasing the usability of grid security. Int. J. Hum Comput Stud. 63(1–2), 74–101 (2005)
4. Advances in Intelligent Systems and Computing;P Biocco,2018
5. Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77–101 (2006)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Taxonomy of SETA Methods and Linkage to Delivery Preferences;ACM SIGMIS Database: the DATABASE for Advances in Information Systems;2023-10-23
2. Applying PDCA to Security, Education, Training and Awareness Programs;Human Aspects of Information Security and Assurance;2022
3. Usable Privacy and Security from the Perspective of Cognitive Abilities;Privacy and Identity Management. Between Data Protection and Security;2022
4. Context-Based Micro-training;Encyclopedia of Cryptography, Security and Privacy;2022
5. Exploring Experiences of Using SETA in Nordic Municipalities;Human Aspects of Information Security and Assurance;2021