Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Enhancing employees information security awareness in private and public organisations: A systematic literature review
Preserving the confidentiality, integrity and availability (CIA) of an organisation's sensitive
information systems assets against attacks and threats is a challenge in this digital age …
information systems assets against attacks and threats is a challenge in this digital age …
[HTML][HTML] A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises
The proliferation of information and communication technologies in enterprises enables
them to develop new business models and enhance their operational and commercial …
them to develop new business models and enhance their operational and commercial …
Cyber security awareness, knowledge and behavior: A comparative study
Cyber-attacks represent a potential threat to information security. As rates of data usage and
internet consumption continue to increase, cyber awareness turned to be increasingly …
internet consumption continue to increase, cyber awareness turned to be increasingly …
Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness
Many organizations recognize that their employees, who are often considered the weakest
link in information security, can also be great assets in the effort to reduce risk related to …
link in information security, can also be great assets in the effort to reduce risk related to …
Personality, attitudes, and intentions: Predicting initial adoption of information security behavior
Investigations of computer user behavior become especially important when behaviors like
security software adoption affect organizational information resource security, but adoption …
security software adoption affect organizational information resource security, but adoption …
Information security awareness and behavior: a theory-based literature review
B Lebek, J Uffen, M Neumann, B Hohler… - Management …, 2014 - emerald.com
Purpose–This paper aims to provide an overview of theories used in the field of employees'
information systems (IS) security behavior over the past decade. Research gaps and …
information systems (IS) security behavior over the past decade. Research gaps and …
Impact of users' security awareness on desktop security behavior: A protection motivation theory perspective
This article uses the protection motivation theory to study the impact of information security
awareness on desktop security behavior. It contributes to the literature by examining the …
awareness on desktop security behavior. It contributes to the literature by examining the …
[كتاب][B] Computer security: principles and practice
W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …
programmers, system managers, network managers, product marketing personnel, system …
User participation in information systems security risk management
This paper examines user participation in information systems security risk management
and its influence in the context of regulatory compliance via a multi-method study at the …
and its influence in the context of regulatory compliance via a multi-method study at the …
Information security culture: A management perspective
Information technology has become an integral part of modern life. Today, the use of
information permeates every aspect of both business and private lives. Most organizations …
information permeates every aspect of both business and private lives. Most organizations …