References
- M. Jouini, L. B. A. Rabai, and A. B. Aissa, "Classification of Security Threats in Information Systems," ANT/SEIT, vol. 32, pp. 489-496.
- A. McCormac, T. Zwaans, K. Parsons, D. Calic, M. Butavicius, and M. Pattinson, "Individual differences and information security awareness," Computers in human behavior, vol. 69, pp. 151-156. https://doi.org/10.1016/j.chb.2016.11.065
- R. J. Mejias and P. A. Balthazard, "A model of information security awareness for assessing information security risk for emerging technologies," Journal of Information Privacy and Security, vol. 10, pp. 160-185. https://doi.org/10.1080/15536548.2014.974407
- P. Coopers, "Key findings from the Global State of Information Security Survey 2013," Changing the game.
- S. M. Furnell, A. Jusoh, and D. Katsabas, "The challenges of understanding and using security: A survey of end-users," Computers & Security, vol. 25, pp. 27-35, 2006. https://doi.org/10.1016/j.cose.2005.12.004
- K. Parsons, A. McCormac, M. Butavicius, and L. Ferguson, "Human factors and information security: individual, culture, and security environment," DEFENCE SCIENCE AND TECHNOLOGY ORGANISATION EDINBURGH (AUSTRALIA) COMMANDA a€¦.
- K. Parsons, A. McCormac, M. Butavicius, M. Pattinson, and C. Jerram, "Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q)," Computers & Security, vol. 42, pp. 165-176. https://doi.org/10.1016/j.cose.2013.12.003
- B. ISO, "iso," IEC Directives Part, vol. 1, 2008.
- H. A. Kruger and W. D. Kearney, "A prototype for assessing information security awareness," Computers & security, vol. 25, pp. 289-296, 2006. https://doi.org/10.1016/j.cose.2006.02.008
- J. HeinstrAm, "Five personality dimensions and their influence on information behaviour," Information research, vol. 9, pp. 9-1, 2003.
- M. Pattinson, M. Butavicius, K. Parsons, A. McCormac, and D. Calic, "Factors that influence information security Behavior: An australian web-based study," in International Conference on Human Aspects of Information Security, Privacy, and Trust, pp. 231-241.
- S. Sheng, M. Holbrook, P. Kumaraguru, L. F. Cranor, and J. Downs, "Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 373-382.
- P. E. Spector, "A consideration of the validity and meaning of self-report measures of job conditions," 1992.
- C. Vroom and R. Von Solms, "Towards information security behavioural compliance," Computers & security, vol. 23, pp. 191-198, 2004. https://doi.org/10.1016/j.cose.2004.01.012
- S. GeriA‡ and A. e. Hutinski, "Information system security threats classifications," Journal of Information and organizational sciences, vol. 31, pp. 51-61, 2007.
- M. Alhabeeb, A. Almuhaideb, P. D. Le, and B. Srinivasan, "Information security threats classification pyramid," in 2010 IEEE 24th international conference on advanced information networking and applications workshops, pp. 208-213.
- A. McCue, "Beware the insider security threat,a€‹ CIO Jury," 2008.
- B.-h. Li, B.-c. Hou, W.-t. Yu, X.-b. Lu, and C.-w. Yang, "Applications of artificial intelligence in intelligent manufacturing: a review," Frontiers of Information Technology & Electronic Engineering, vol. 18, pp. 86-96. https://doi.org/10.1631/fitee.1601885
- Y. Pan, "Heading toward artificial intelligence 2.0. Engineering, 2 (4): 409-413." https://doi.org/10.1016/j.eng.2016.04.018
- W. Pieters, "Explanation and trust: what to tell the user in security and AI?," Ethics and information technology, vol. 13, pp. 53-64. https://doi.org/10.1007/s10676-010-9253-3
- A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, "Basic concepts and taxonomy of dependable and secure computing," IEEE transactions on dependable and secure computing, vol. 1, pp. 11-33, 2004. https://doi.org/10.1109/TDSC.2004.2
- B. B. Bederson, B. Lee, R. M. Sherman, P. S. Herrnson, and R. G. Niemi, "Electronic voting system usability issues," in Proceedings of the SIGCHI conference on Human factors in computing systems, 2003, pp. 145-152.
- D. Fahrenholtz and A. Bartelt, "Towards a sociological view of trust in computer science," in Proceedings of the eighth research symposium on emerging electronic markets (RSEEM 01), 2001.
- B. Harris and D. Allen, Black box voting: Ballot tampering in the 21st century: Talion Pub., 2004.
- N. Luhmann, "Familiarity, confidence, trust: Problems and alternatives," Trust: Making and breaking cooperative relations, vol. 6, pp. 94-107, 2000.
- J. H. Park, "England's controversy over the secret ballot," Political Science Quarterly, vol. 46, pp. 51-86, 1931. https://doi.org/10.2307/2143109
- K. Veeramachaneni, I. Arnaldo, V. Korrapati, C. Bassias, and K. Li, "AI^ 2: training a big data machine to defend," in 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), pp. 49-54.