AR Gillam, AM Waite - Information & Computer Security, 2021 - emerald.com
Purpose The purpose of this paper is to examine gender differences in predictors of technology threat avoidance motivation and behavior among working US adults …
Recent research of information technology (IT) end-user cybersecurity-related risky behaviors has focused on items such as IT user decision-making, impulsiveness, and …
Design, Development and Implementation of an Information Security and Cyberethics Course for Pre-Service Teachers: a Design-Based Research Abstract With the introduction …
Blockchain technology (BCT) is a novel technology that can significantly change the business operations and models that we have today. It offers various advantages such as …
This study examined the phenomenon of motivation among individuals who experienced a Security Education Training and Awareness (SETA) program session as members of US …
J Kim - Journal of Digital Convergence, 2021 - koreascience.kr
While the importance of information security policies is heightened, numerous empirical studies have been conducted to investigate the factors that influence employee's willingness …
[引用][C]El derecho fundamental a la protección de datos personales en Argentina y en el mundo: los conflictos extraterritoriales por los delitos informáticos
E Fuentes Benítez - 2022 - Universidad de San Andrés …