1. References
2. 1. Whitman, M., Security policy: From design to maintenance. In Information security: Policy, processes, and practices (Straub DW, Goodman SE and Baskerville R, Eds), pp 123-151, M. E. Sharpe, New York. 2008.
3. The impact of time pressure on cybersecurity behaviour: a systematic literature review;Chowdhury;Behaviour & Information Technology,2019
4. 3. Rostami, E., Tailoring information security policies-a computerized tool and a design theory, 2023, Örebro universitet.
5. 4. Alotaibi, M.J., S. Furnell, and N. Clarke, A framework for reporting and dealing with end-user security policy compliance. Information & Computer Security, 2019.