Subject
Law,General Computer Science
Reference61 articles.
1. Phishing attacks: a recent comprehensive study and a new anatomy;Alkhalil;Front. Comput. Sci.,2021
2. Information security policies: A review of challenges and influencing factors. In: 11th International Conference for Internet Technology and Secured Transactions;Alotaibi;(ICITST),2016
3. Establishing information security policy compliance culture in organizations;Amankwa;Inf. Comput. Secur.,2018
4. Security dialogues: building better relationships between security and business;Ashenden;IEEE Secur. Priv.,2016
5. Using protection motivation theory in the design of nudges to improve online security behavior;van Bavel;Int. J. Hum. Comput. Stud.,2019