Subject
Law,General Computer Science
Reference61 articles.
1. Phishing attacks: a recent comprehensive study and a new anatomy;Alkhalil;Front. Comput. Sci.,2021
2. Information security policies: A review of challenges and influencing factors. In: 11th International Conference for Internet Technology and Secured Transactions;Alotaibi;(ICITST),2016
3. Establishing information security policy compliance culture in organizations;Amankwa;Inf. Comput. Secur.,2018
4. Security dialogues: building better relationships between security and business;Ashenden;IEEE Secur. Priv.,2016
5. Using protection motivation theory in the design of nudges to improve online security behavior;van Bavel;Int. J. Hum. Comput. Stud.,2019
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献