Author:
Al Neaimi Abdulla,Lutaaya Philip
Publisher
Springer International Publishing
Reference17 articles.
1. Aloul, F.A.: The need for effective information security awareness. J. Adv. Inf. Technol. 3(3), 176–183 (2012). Academy Publisher, https://doi.org/10.4304/jait.3.3.176-183
2. Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. In: Management Information Systems Research Centre, University of Minnesota, USA, vol. 34, no. 3 (2010)
3. Siponen, M.T.: A conceptual foundation for organizational information security awareness. Inf. Manag. Comput. Secur. 8(1), 31–41 (2000)
4. Horcher, A.-M., Tejay, G.P.: Building a better password: the role of cognitive load in information security training. In: IEEE, Richardson, TX, USA (2009)
5. Wunderle, W.D.: Through the Lens of Cultural Awareness: A Primer for US Armed Forces Deploying to Arab and Middle Eastern Countries, Combat Studies Institute Press Fort Leavenworth, KS 66027 (2006)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Taxonomy of SETA Methods and Linkage to Delivery Preferences;ACM SIGMIS Database: the DATABASE for Advances in Information Systems;2023-10-23