Information security policy compliance model in organizations
- 1 February 2016
- journal article
- Published by Elsevier BV in Computers & Security
- Vol. 56, 70-82
- https://doi.org/10.1016/j.cose.2015.10.006
Abstract
No abstract availableThis publication has 55 references indexed in Scilit:
- Power to the people? The evolving recognition of human aspects of securityComputers & Security, 2012
- A motivational approach to information providing: A resource exchange perspectiveComputers in Human Behavior, 2011
- Cyber security for home users: A new way of protection through awareness enforcementComputers & Security, 2010
- Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention studyComputers & Security, 2010
- Information security culture: A management perspectiveComputers & Security, 2010
- Self-efficacy in information security: Its influence on end users' information security practice behaviorComputers & Security, 2009
- A qualitative study of users' view on information securityComputers & Security, 2007
- Information Lifecycle Security Risk Assessment: A tool for closing security gapsComputers & Security, 2007
- Analysis of end user security behaviorsComputers & Security, 2005
- Towards information security behavioural complianceComputers & Security, 2004