References
- AGRESTI, A. AND FINLAY, B. 1997. Statistical Methods for the Social Sciences. 3rd ed. Prentice Hall, Upper Saddle River, NJ.
- ANANDARAJAN, M., SIMMERS, C., AND IGBARIA, M. 2000. An exploratory investigation of the antecedents and impact of internet usage: an individual perspective. Behaviour and Information Technology 19, 1, 69-85. https://doi.org/10.1080/014492900118803
- BARTOL, N., BATES, B., GOERTZEL, K. M., AND WINOGRAD, T. 2009. Measuring Cyber Security and Information Assurance: State-of-the-Art Report (SOAR). Information Assurance Technology Analysis Center, Herndon, VA.
- BOHLIN, E., LEVIN, S. L., SUNG, N., AND YOON, C. H. 2004. Global Economy and Digital Society. Elsevier, Boston, MA.
- COUNCIL OF EUROPE. 2011. Council of Europe--ETS no. 185--Convention on cybercrime. http://onventions.coe.int/Treaty/EN/Treaties/html/185.htm.
- ECONOMIST INTELLIGENCE UNIT. 2005. The 2005 e-readiness rankings. http://www.eiu.com/site_info.asp?info_name=eiu_2005_e_readiness_rankings&rf=0.
- EUROPEAN NETWORK AND INFORMATION SECURITY AGENCY. 2007. Information security awareness: local government and internet service providers (EN). http://www.enisa.europa.eu/act/ar/deliverables/2007/loc-gov/en.
- FURNELL, S. M., BRYANT, P., AND PHIPPEN, A. D. 2007. Assessing the security perceptions of personal Internet users. Computers and Security 26, 5, 410-417. https://doi.org/10.1016/j.cose.2007.03.001
- INFODEV. 2005. E-ready for what? http://www.infodev.org/en/Publication.3.html.
- JONES, A. 2007. A framework for the management of information security risks. BT Technology Journal 25, 1, 30-36. https://doi.org/10.1007/s10550-007-0005-9
- KHOSROWPOUR, M. 2004. The Social and Cognitive Impacts of E-Commerce on Modern Organizations. Idea Group Publishing, Hershey, PA.
- KUTNER, M. H. 2004. Applied Linear Statistical Models. 5th ed. McGraw-Hill Irwin, Boston, MA.
- LAROSE, R., MASTRO, D., AND EASTIN, M. S. 2001. Understanding Internet usage: a socialcognitive approach to uses and gratifications. Social Science Computer Review 19, 4, 395-413. https://doi.org/10.1177/089443930101900401
- LITTLEWOOD, B., BROCKLEHURST, S., FENTON, N., MELLOR, P., PAGE, S., WRIGHT, D., DOBSON, J., MCDERMID, J., AND GOLLMANN, D. 1993. Towards operational measures of computer security. Journal of Computer Security 2, 211-229. https://doi.org/10.3233/JCS-1993-22-308
- MCLEAN, K. 1992. Information security awareness-selling the cause. In Proceedings of the IFIP TC11, Eighth International Conference on Information Security: IT Security: The Need for International Cooperation, 179-193.
- MORAHAN-MARTIN, J. 2005. Internet abuse: addiction? disorder? symptom? alternative explanations? Social Science Computer Review 23, 1, 39-48. https://doi.org/10.1177/0894439304271533
- NAHID, A. H., SHAHMEHRI, N., BEDNARSKI, A., CHISALITA, I., NORDQVIST, U., SALDAMLI, L., SZENTIVANYI, D., AND OSTRING, M, UNIVERSITET, L. 2001. Security issues in ehome network and software infrastructures. In Proceedings of the 3rd Conference on Computer Science and Systems Engineering, 155-161.
- OECD. 2002. OECD guidelines for the security of information systems and networks: towards a culture of security. http://www.oecd.org/document/48/0,3746,en_2649_34255_15582250_1_1_1_1,00.html.
- PAYNE, S. C. 2010. A guide to security metrics. In Educause Security Professionals Conference.
- RABINOVITCH, E. 1997. Security on the net. IEEE Communications Magazine 35, 3, 22-24. https://doi.org/10.1109/MCOM.1997.581300
- REZNIK, L. 2003. Which models should be applied to measure computer security and information assurance? In IEEE International conference on Fuzzy Systems, St. Louis, MO, 1243-1248. https://doi.org/10.1109/FUZZ.2003.1206609
- RYOO, J. W., PARK, E. A., GIRARD, T., AND OSAGIE, S. 2006. Measuring internet security readiness: a study of household behavior. In Proceedings of the 16th Biennial Conference of the International Telecommunication Society, Beijing, China.
- SIMMERS, C. A. AND ANANDARAJAN, M. 2002.Internet user satisfaction, job satisfaction and internet background: an exploratory study. In Managing Web Usage in the Workplace, M. ANANDARAJAN AND C. A. SIMMERS, Eds. IGI Publishing, Hershey, PA, 168-185.
- SIPONEN, M. T. 2000. Conceptual foundation for organizational information security awareness. Information Management and Computer Security 8, 1, 31-41. https://doi.org/10.1108/09685220010371394
- SPURLING, P. 1995. Promoting security awareness and commitment. Information Management & Computer Security 3, 2, 20-26.
- SWANSON, M., BARTOL, N., SABATO, J., HASH, J., GRAFFO, L. 2003. Security Metrics Guide for Information Technology Systems. Technical Report. NIST Special Publication 800-55, U.S. National Institute of Standards and Technology.
- TEO, T. S. H., LIM, V. K. G., AND LAI, R. Y. C. 1999. Intrinsic and extrinsic motivation in Internet usage. Omega 27, 1, 25-37. https://doi.org/10.1016/S0305-0483(98)00028-0
- THE WORLD BANK. 2004. The World Bank Technology Risk Checklist (Version 7.3). The World Bank, Washington.
- THOMSON, M. E. AND VON SOLMS, R. 1997. An effective information security awareness programme for industry. In Proceedings of the WG 11.2 and WG 11.1 of the TC11 IFIP.
- TORRELLAS, G. A. S. 2004. A framework for multi-agent system engineering using ontology domain modelling for security architecture risk assessment in e-commerce security services. In Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications, 409-412.
- VON SOLMS, R AND THOMSON, M. E. 1998. Information security awareness: educating your users effectively. Information Management and Computer Security 6, 4, 167-173. https://doi.org/10.1108/09685229810227649
- WHITMAN, M. E. AND MATTORD, H. J. 2007. Principles of Information Security. 3rd ed. Thomson Course Technology, Boston.
Cited by
- Design and implementation of an efficient defense mechanism against ARP spoofing attacks using AES and RSA vol.58, pp.1-2, 2013, https://doi.org/10.1016/j.mcm.2012.08.008
- Trust Based Dynamic Bandwidth Allocation Scheme for Ethernet Passive Optical Networks vol.83, pp.4, 2015, https://doi.org/10.1007/s11277-015-2571-3