ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
The Assumptions and Profiles Behind IT Security Behavior
Proceedings of the 50th Hawaii International Conference on System Sciences (2017)
◽
10.24251/hicss.2017.605
◽
2017
◽
Author(s):
Puzant Balozian
◽
Dorothy Leidner
Keyword(s):
It Security
◽
Security Behavior
Download Full-text
Related Documents
Cited By
References
Differences in IT Security Behavior and Knowledge of Private Users in Germany
WI2020 Community Tracks
◽
10.30844/wi_2020_v3-herbert
◽
2020
◽
pp. 168-184
Author(s):
Franziska Herbert
◽
◽
Franziska Herbert
◽
Gina Maria Schmidbauer-Wolf
◽
Christian Reuter
Keyword(s):
It Security
◽
Security Behavior
Download Full-text
Application of Case based Reasoning in IT Security Incident Response
International Journal of Computing Communication and Instrumentation Engineering
◽
10.15242/ijccie.e0915055
◽
2015
◽
Vol 2
(1)
◽
Keyword(s):
Case Based Reasoning
◽
It Security
◽
Incident Response
◽
Security Incident
◽
Case Based
Download Full-text
Information technology. Guidelines for the management of IT security
10.3403/01482464u
◽
2015
◽
Keyword(s):
Information Technology
◽
It Security
Download Full-text
Information technology. Guidelines for the management of IT security
10.3403/01482464
◽
1998
◽
Keyword(s):
Information Technology
◽
It Security
Download Full-text
Information technology. Security techniques. Evaluation criteria for IT security
10.3403/01947025
◽
2000
◽
Keyword(s):
Information Technology
◽
Evaluation Criteria
◽
It Security
◽
Information Technology Security
Download Full-text
Information technology. Guidelines for the management of IT security
10.3403/02997057u
◽
2015
◽
Keyword(s):
Information Technology
◽
It Security
Download Full-text
Information technology. Security techniques. Evaluation criteria for IT security
10.3403/30108744
◽
2005
◽
Keyword(s):
Information Technology
◽
Evaluation Criteria
◽
It Security
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Evaluation criteria for IT security
10.3403/30162797
◽
2009
◽
Keyword(s):
Information Technology
◽
Evaluation Criteria
◽
It Security
◽
Information Technology Security
Download Full-text
IT security techniques -- Competence requirements for information security testers and evaluators
10.3403/30354863u
◽
2018
◽
Keyword(s):
Information Security
◽
It Security
Download Full-text
IT security techniques. Competence requirements for information security testers and evaluators
10.3403/30351733
◽
2018
◽
Keyword(s):
Information Security
◽
It Security
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close