Subject
Information Systems and Management,Arts and Humanities (miscellaneous),Developmental and Educational Psychology,Information Systems,Management Information Systems
Reference67 articles.
1. Windows of vulnerability: a case study analysis;Arbaugh;IEEE Computer,2000
2. An adaptive risk management and access control framework to mitigate insider threats;Baracaldo;Computers & Security,2013
3. Don't make excuses! Discouraging neutralization to reduce IT policy violation;Barlow;Computers & Security,2013
4. Using Situational Crime Prevention theory to explain the effectiveness of Information Systems Security;Beebe,2005
5. Roles of information security awareness and perceived fairness in information security policy compliance;Bulgurcu,2009
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献