Author:
Crossler Robert E.,Bélanger France,Ormond Dustin
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Information Systems,Theoretical Computer Science,Software
Reference85 articles.
1. Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40–46.
2. Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613–643.
3. Avalanche Technology Group. (2014). Password hacked? A 10 step guide to getting back on track... Should I Change My Password.
https://shouldichangemypassword.com/password-hacked
. Accessed 5 Jan 2014.
4. Bélanger, F., Collignon, S., Enget, K., & Negangard, E. (2017). User resistance to the implementation of a mandatory security enhancement. Information & Management. doi:
10.1016/j.im.2017.01.003
.
5. Boncella, R. J. (2000). Web security for e-commerce. Communications of the Association for Information Systems, 4(11), 1–43.
Cited by
31 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献