Author:
Burns A. J.,Posey Clay,Courtney James F.,Roberts Tom L.,Nanayakkara Prabhashi
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Information Systems,Theoretical Computer Science,Software
Reference41 articles.
1. Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613–643.
2. Blumstein, A., Cohen, J., & Nagin, D. (1978). Deterrence and incapacitation: estimating the effects of criminal sanctions on crime rates. Washington: National Academy of Sciences.
3. Bursztein, E. (2014). Behind enemy lines in our war against account hijackers http://googleonlinesecurity.blogspot.com/2014/11/behind-enemy-lines-in-our-war-against.html . Accessed 21 Jan 2015.
4. Choi, T. Y., Dooley, K. J., & Rungtusanatham, M. (2001). Supply networks and complex adaptive systems: control versus emergence. Journal of Operations Management, 19(3), 351–366.
5. Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. Computers & Security, 32, 90–101.
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献