已选(0)清除
条数/页: 排序方式:
|
| Keeping secure to the end: a long-term perspective to understand employees' consequence-delayed information security violation 期刊论文 BEHAVIOUR & INFORMATION TECHNOLOGY, 2019, 卷号: 38, 页码: 435-453 作者: Li, Ying; Zhang, Nan; Siponen, Mikko 收藏  |  浏览/下载:5/0  |  提交时间:2019/12/02
|
| The effects of moral disengagement and organizational ethical climate on insiders' information security policy violation behavior 期刊论文 INFORMATION TECHNOLOGY & PEOPLE, 2019, 卷号: 32, 页码: 973-992 作者: Chen, Hao; Chau, Patrick Y. K.; Li, Wenli 收藏  |  浏览/下载:2/0  |  提交时间:2019/12/02
|
| Culture dimensions of information systems security in Saudi Arabia national health services 学位论文 : De Montfort University, 2016 作者: Al-umaran,Saleh 收藏  |  浏览/下载:6/0  |  提交时间:2019/12/24
|
| Culture Dimensions of Information Systems Security in Saudi Arabia National Health Services 期刊论文 International Journal of Social, Education, Economics and Management Engineering, 2015, 卷号: Vol.9 No.2, 页码: 501-505 作者: FengChen; GiampaoloBella; SalehAlumaran 收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
|
| Why do some people manage phishing e-mails better than others? 期刊论文 Information Management and Computer Security, 2012, 卷号: Vol.20 No.1, 页码: 18-28 作者: KathrynParsons; MarcusButavicius; AgataMcCormac; CateJerram; MalcolmPattinson 收藏  |  浏览/下载:2/0  |  提交时间:2020/01/04
|
| Learning human behavioral profiles in a cyber environment 会议论文 2010 作者: Beling,P.; Hummel,C.; Shi,R.; Morris,N.; Pratsch,E. 收藏  |  浏览/下载:2/0  |  提交时间:2020/01/04
|
| Adoption of E-Commerce Online Shopping in Malaysia 会议论文 2010 作者: TanBo; Osman,M.A.; Zakaria,N.; LeeHengWei 收藏  |  浏览/下载:2/0  |  提交时间:2020/01/04
|
| The enemy within: A behavioural intention model and an information security awareness process 会议论文 2012 作者: Flowerday,StephenV; Gundu,Tapiwa 收藏  |  浏览/下载:1/0  |  提交时间:2020/01/04
|
| On the Helmholtz Principle for Data Mining 会议论文 2012 作者: Dadachev,Boris; Balinsky,Alexander; Simske,Steven; Balinsky,Helen 收藏  |  浏览/下载:0/0  |  提交时间:2020/01/04
|