The impact of SETA event attributes on employees’ security-related Intentions: An event system theory perspective (Englisch)
- Neue Suche nach: Hu, Siqi
- Weitere Informationen zu Hu, Siqi:
-
https://orcid.org/0000-0002-8003-7510
- Neue Suche nach: Hsu, Carol
- Neue Suche nach: Zhou, Zhongyun
- Weitere Informationen zu Zhou, Zhongyun:
-
https://orcid.org/0000-0003-4245-8733
- Neue Suche nach: Hu, Siqi
- Neue Suche nach: Hsu, Carol
- Neue Suche nach: Zhou, Zhongyun
In:
Computers and Security
;
109
;
2021
-
ISSN:
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:The impact of SETA event attributes on employees’ security-related Intentions: An event system theory perspective
-
Beteiligte:
-
Erschienen in:Computers and Security ; 109
-
Verlag:
- Neue Suche nach: Elsevier Ltd
-
Erscheinungsdatum:12.07.2021
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis – Band 109
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
-
Discovering features for detecting malicious websites: An empirical studyMcGahagan, John IV / Bhansali, Darshan / Pinto-Coelho, Ciro / Cukier, Michel et al. | 2021
-
Digestive neural networks: A novel defense strategy against inference attacks in federated learningLee, Hongkyu / Kim, Jeehyeong / Ahn, Seyoung / Hussain, Rasheed / Cho, Sunghyun / Son, Junggab et al. | 2021
-
Exploring stewardship: A precursor to voluntary security behaviorsOgbanufe, Obi / Crossler, Robert E. / Biros, David et al. | 2021
-
Impact of comprehensive information security awareness and cognitive characteristics on security incident management – an empirical studyThangavelu, Manisekaran / Krishnaswamy, Venkataraghavan / Sharma, Mayank et al. | 2021
-
A principlist framework for cybersecurity ethicsFormosa, Paul / Wilson, Michael / Richards, Deborah et al. | 2021
-
Machine learning based deep job exploration and secure transactions in virtual private cloud systemsRajasoundaran, S. / Prabu, A.V. / Routray, Sidheswar / Kumar, S.V.N. Santhosh / Malla, Prince Priya / Maloji, Suman / Mukherjee, Amrit / Ghosh, Uttam et al. | 2021
-
A framework for ID fraud prevention policies in E-tailing sectorSoomro, Zahoor Ahmed / Shah, Mahmood Hussain / Thatcher, Jason et al. | 2021
-
Facing airborne attacks on ADS-B data with autoencodersFried, Asaf / Last, Mark et al. | 2021
-
DIGFuPAS: Deceive IDS with GAN and function-preserving on adversarial samples in SDN-enabled networksDuy, Phan The / Tien, Le Khac / Khoa, Nghi Hoang / Hien, Do Thi Thu / Nguyen, Anh Gia-Tuan / Pham, Van-Hau et al. | 2021
-
Quantitative Security Risk Modeling and Analysis with RisQFLanter Beek, Maurice H. / Legay, Axel / Lluch Lafuente, Alberto / Vandin, Andrea et al. | 2021
-
Developing a cyber security culture: Current practices and future needsUchendu, Betsy / Nurse, Jason R.C. / Bada, Maria / Furnell, Steven et al. | 2021
-
Riemannian manifold on stream data: Fourier transform and entropy-based DDoS attacks detection methodLiu, Zhen / Hu, Changzhen / Shan, Chun et al. | 2021
-
The Agile Incident Response for Industrial Control Systems (AIR4ICS) frameworkSmith, Richard / Janicke, Helge / He, Ying / Ferra, Fenia / Albakri, Adham et al. | 2021
-
A review of amplification-based distributed denial of service attacks and their mitigationIsmail, Salih / Hassen, Hani Ragab / Just, Mike / Zantout, Hind et al. | 2021
-
Android malware detection via an app similarity graphFrenklach, Tatiana / Cohen, Dvir / Shabtai, Asaf / Puzis, Rami et al. | 2021
-
Avaddon ransomware: An in-depth analysis and decryption of infected systemsYuste, Javier / Pastrana, Sergio et al. | 2021
-
Vulnerabilities in Android webview objects: Still not the end!El-Zawawy, Mohamed A. / Losiouk, Eleonora / Conti, Mauro et al. | 2021
-
A Differentially private hybrid decomposition algorithm based on quad-treeLi, Shuyu / Geng, Yue / Li, Yingle et al. | 2021
-
Security analysis of SDN controller-based DHCP services and attack mitigation with DHCPguardTok, Mevlut Serkan / Demirci, Mehmet et al. | 2021
-
A survey on security attacks and defense techniques for connected and autonomous vehiclesPham, Minh / Xiong, Kaiqi et al. | 2021
-
Information security management in ICT and non-ICT sector companies: A preventive innovation perspectiveMirtsch, Mona / Blind, Knut / Koch, Claudia / Dudek, Gabriele et al. | 2021
-
Rationality constraints in cyber defense: Incident handling, attribution and cyber threat intelligenceHettema, Hinne et al. | 2021
-
An enhanced handover authentication solution for 6LoWPAN networksZhang, Lyuye / Ma, Maode / Qiu, Yue et al. | 2021
-
The good, the bad and the missing: A Narrative review of cyber-security implications for australian small businessesTam, Tracy / Rao, Asha / Hall, Joanne et al. | 2021
-
TZMon: Improving mobile game security with ARM trustzoneJeon, Sanghoon / Kim, Huy Kang et al. | 2021
-
Semi-supervised recommendation attack detection based on Co-ForestZhou, Quanqiang / Duan, Liangliang et al. | 2021
-
Editorial Board| 2019
-
Malware detection on windows audit logs using LSTMsRing, Markus / Schlör, Daniel / Wunderlich, Sarah / Landes, Dieter / Hotho, Andreas et al. | 2021
-
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of ThingsUnal, Devrim / Hammoudeh, Mohammad / Khan, Muhammad Asif / Abuarqoub, Abdelrahman / Epiphaniou, Gregory / Hamila, Ridha et al. | 2021
-
A novel framework for image-based malware detection with a deep neural networkJian, Yifei / Kuang, Hongbo / Ren, Chenglong / Ma, Zicheng / Wang, Haizhou et al. | 2021
-
The impact of SETA event attributes on employees’ security-related Intentions: An event system theory perspectiveHu, Siqi / Hsu, Carol / Zhou, Zhongyun et al. | 2021