4.5 Article

Cybersecurity awareness training programs: a cost-benefit analysis framework

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment

Mohammad S. Jalali et al.

JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2019)

Editorial Material Computer Science, Information Systems

Should executives go to jail over cybersecurity breaches?

Dave Chatterjee

JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE (2019)

Article Computer Science, Information Systems

Violators versus non-violators of information security measures in organizations-A study of distinguishing factors

Habib Ullah Khan et al.

JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE (2019)

Article Computer Science, Information Systems

Enterprise cybersecurity training and awareness programs: Recommendations for success

Wu He et al.

JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE (2019)

Article Information Science & Library Science

Cybersecurity economics - balancing operational security spending

Stale Ekelund et al.

INFORMATION TECHNOLOGY & PEOPLE (2019)

Article Information Science & Library Science

SETA and Security Behavior: Mediating Role of Employee Relations, Monitoring, and Accountability

Winfred Yaokumah et al.

JOURNAL OF GLOBAL INFORMATION MANAGEMENT (2019)

Article Computer Science, Information Systems

Matching training to individual learning styles improves information security awareness

Malcolm Pattinson et al.

INFORMATION AND COMPUTER SECURITY (2019)

Review Computer Science, Information Systems

Reviewing Cyber Security Social Engineering Training and Awareness Programs-Pitfalls and Ongoing Issues

Hussain Aldawood et al.

FUTURE INTERNET (2019)

Article Public Administration

Cyberattacks at the Grass Roots: American Local Governments and the Need for High Levels of Cybersecurity

Donald F. Norris et al.

PUBLIC ADMINISTRATION REVIEW (2019)

Article Information Science & Library Science

Investigating the impact of cybersecurity policy awareness on employees' cybersecurity behavior

Ling Li et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2019)

Article Engineering, Industrial

A new game of information sharing and security investment between two allied firms

Xiaofei Qian et al.

INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2018)

Article Computer Science, Information Systems

Information security investments: An exploratory multiple case study on decision-making, evaluation and learning

Eva Weishaeupl et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Cybernetics

Exploring susceptibility to phishing in the workplace

Emma J. Williams et al.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2018)

Article Computer Science, Artificial Intelligence

Decision support approaches for cyber security investment

Andrew Fielder et al.

DECISION SUPPORT SYSTEMS (2016)

Article Computer Science, Artificial Intelligence

Allocation of resources to cyber-security: The effect of misalignment of interest between managers and investors

Bin Srinidhi et al.

DECISION SUPPORT SYSTEMS (2015)

Article Information Science & Library Science

What Drives Information Security Policy Violations among Banking Employees? Insights from Neutralization and Social Exchange Theory

Pei-Lee Teh et al.

JOURNAL OF GLOBAL INFORMATION MANAGEMENT (2015)

Article Computer Science, Cybernetics

User preference of cyber security awareness delivery methods

Jemal Abawajy

BEHAVIOUR & INFORMATION TECHNOLOGY (2014)

Article Computer Science, Artificial Intelligence

Optimal information security investment in a Healthcare Information Exchange: An economic analysis

C. Derrick Huang et al.

DECISION SUPPORT SYSTEMS (2014)

Editorial Material Computer Science, Information Systems

Phishing Our Employees

Jeremy Epstein

IEEE SECURITY & PRIVACY (2014)

Article Computer Science, Information Systems

The economic impact of cyber terrorism

Jian Hua et al.

JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2013)

Article Psychology, Social

Associations Between Game Use and Cognitive Empathy: A Cross-Generational Study

Dong-Hee Shin et al.

CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING (2013)

Article Computer Science, Information Systems

Balanced Scorecard Implementation of Security Strategies: A Framework for IT Security Performance Management

Tejaswini Herath et al.

INFORMATION SYSTEMS MANAGEMENT (2010)

Article Computer Science, Interdisciplinary Applications

The impact of information richness on information security awareness training effectiveness

R. S. Shaw et al.

COMPUTERS & EDUCATION (2009)

Article Computer Science, Information Systems

Making the Best Use of Cybersecurity Economic Models

Rachel Rue et al.

IEEE SECURITY & PRIVACY (2009)

Article Engineering, Industrial

An economic analysis of the optimal information security investment in the case of a risk-averse firm

C. Derrick Huang et al.

INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2008)

Article Information Science & Library Science

A cross-cultural comparison of US and Chinese computer security awareness

Mark B. Schmidt et al.

JOURNAL OF GLOBAL INFORMATION MANAGEMENT (2008)

Article Information Science & Library Science

A value-at-risk approach to information security investment

Jingguo Wang et al.

INFORMATION SYSTEMS RESEARCH (2008)

Article Information Science & Library Science

An economic modelling approach to information security risk management

Rok Bojanc et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2008)