Related references
Note: Only part of the references are listed.More than the individual: Examining the relationship between culture and Information Security Awareness
Ashleigh Wiley et al.
COMPUTERS & SECURITY (2020)
Exploring the role of work identity and work locus of control in information security awareness
Lee Hadlington et al.
COMPUTERS & SECURITY (2019)
Raising Information Security Awareness in the Field of Urban and Regional Planning
Margit Christa Scholl
INTERNATIONAL JOURNAL OF E-PLANNING RESEARCH (2019)
Impact of employees' demographic characteristics on the awareness and compliance of information security policy in organizations
Hui Na Chua et al.
TELEMATICS AND INFORMATICS (2018)
User Participation in Information Systems Security Risk Management
Spears et al.
MIS QUARTERLY (2017)
Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions
Anderson et al.
MIS QUARTERLY (2017)
Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations
Siponen et al.
MIS QUARTERLY (2017)
Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study
Puhakainen et al.
MIS QUARTERLY (2017)
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
Bulgurcu et al.
MIS QUARTERLY (2017)
Persona-centred information security awareness
Duncan Ki-Aries et al.
COMPUTERS & SECURITY (2017)
Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks
Stefan Bauer et al.
COMPUTERS & SECURITY (2017)
Shaping intention to resist social engineering through transformational leadership, information security culture and awareness
Waldo Rocha Flores et al.
COMPUTERS & SECURITY (2016)
Guidance on assessing the methodological and reporting quality of toxicologically relevant studies: A scoping review
Gbeminiyi O. Samuel et al.
ENVIRONMENT INTERNATIONAL (2016)
Dispositional and situational factors: influences on information security policy violations
Allen C. Johnston et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2016)
User awareness and tolerance of privacy abuse on mobile Internet: An exploratory study
Cormac Callanan et al.
TELEMATICS AND INFORMATICS (2016)
Assessing information security attitudes: a comparison of two studies
Malcolm Pattinson et al.
INFORMATION AND COMPUTER SECURITY (2016)
Managing the introduction of information security awareness programmes in organisations
Aggeliki Tsohou et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2015)
A study on strengthening security awareness programs based on an RFID access control system for inside information leakage prevention
Kyong-Ho Choi et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2015)
Information Security Awareness at the Knowledge-Based Institution: Its Antecedents and Measures
Abdul Rahman Ahlan et al.
THIRD INFORMATION SYSTEMS INTERNATIONAL CONFERENCE 2015 (2015)
User preference of cyber security awareness delivery methods
Jemal Abawajy
BEHAVIOUR & INFORMATION TECHNOLOGY (2014)
Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users
James Imgraben et al.
BEHAVIOUR & INFORMATION TECHNOLOGY (2014)
An exploratory investigation of message-person congruence in information security awareness campaigns
Mitchell Kajzer et al.
COMPUTERS & SECURITY (2014)
Smartphone information security awareness: A victim of operational pressures
Sean Allam et al.
COMPUTERS & SECURITY (2014)
Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)
Kathryn Parsons et al.
COMPUTERS & SECURITY (2014)
Engaging Remote Employees: The Moderating Role of Remote Status in Determining Employee Information Security Policy Awareness
Allen C. Johnston et al.
JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING (2013)
Threats to Validity in the Design and Conduct of Preclinical Efficacy Studies: A Systematic Review of Guidelines for In Vivo Animal Experiments
Valerie C. Henderson et al.
PLOS MEDICINE (2013)
IGNORANCE TO AWARENESS: TOWARDS AN INFORMATION SECURITY AWARENESS PROCESS
T. Gundu et al.
SAIEE AFRICA RESEARCH JOURNAL (2013)
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the US and South Korea
Anat Hovav et al.
INFORMATION & MANAGEMENT (2012)
Intra-Articular Injection of Hyaluronic Acid Is Not Superior to Saline Solution Injection for Ankle Arthritis A Randomized, Double-Blind, Placebo-Controlled Study
Henry DeGroot et al.
JOURNAL OF BONE AND JOINT SURGERY-AMERICAN VOLUME (2012)
Analyzing trajectories of information security awareness
Aggeliki Tsohou et al.
INFORMATION TECHNOLOGY & PEOPLE (2012)
Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture
Qing Hu et al.
DECISION SCIENCES (2012)
Equity-Based Incentives and Supply Chain Buy-Back Contracts
Tinglong Dai et al.
DECISION SCIENCES (2012)
Information security policies in the UK healthcare sector: a critical evaluation
Bernd Carsten Stahl et al.
INFORMATION SYSTEMS JOURNAL (2012)
Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study
Eirik Albrechtsen et al.
COMPUTERS & SECURITY (2010)
Information security culture: A management perspective
J. F. Van Niekerk et al.
COMPUTERS & SECURITY (2010)
The I's Have It: A Framework for Serious Educational Game Design
Leonard A. Annetta
REVIEW OF GENERAL PSYCHOLOGY (2010)
Are Employees Putting Your Company At Risk By Not Following Information Security Policies?
Mikko Siponen et al.
COMMUNICATIONS OF THE ACM (2009)
The impact of information richness on information security awareness training effectiveness
R. S. Shaw et al.
COMPUTERS & EDUCATION (2009)
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
Tejaswini Herath et al.
DECISION SUPPORT SYSTEMS (2009)
What levels of moral reasoning and values explain adherence to information security rules? An empirical study
Liisa Myyry et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)
User behaviour towards protective information technologies: the role of national cultural differences
Tamara Dinev et al.
INFORMATION SYSTEMS JOURNAL (2009)
Does One Size Fit All? Examining the Differential Effects of IS Security Countermeasures
John D'Arcy et al.
JOURNAL OF BUSINESS ETHICS (2009)
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
John D'Arcy et al.
INFORMATION SYSTEMS RESEARCH (2009)
Comparison of PubMed, Scopus, Web of Science, and Google Scholar: strengths and weaknesses
Matthew E. Falagas et al.
FASEB JOURNAL (2008)
A video game for cyber security training and awareness
Benjamin D. Cone et al.
COMPUTERS & SECURITY (2007)
Violation of safeguards by trusted personnel and understanding related information security concerns
G Dhillon
COMPUTERS & SECURITY (2001)