1 |
J. HeinstrAm, "Five personality dimensions and their influence on information behaviour," Information research, vol. 9, pp. 9-1, 2003.
|
2 |
D. Fahrenholtz and A. Bartelt, "Towards a sociological view of trust in computer science," in Proceedings of the eighth research symposium on emerging electronic markets (RSEEM 01), 2001.
|
3 |
M. Pattinson, M. Butavicius, K. Parsons, A. McCormac, and D. Calic, "Factors that influence information security Behavior: An australian web-based study," in International Conference on Human Aspects of Information Security, Privacy, and Trust, pp. 231-241.
|
4 |
P. E. Spector, "A consideration of the validity and meaning of self-report measures of job conditions," 1992.
|
5 |
C. Vroom and R. Von Solms, "Towards information security behavioural compliance," Computers & security, vol. 23, pp. 191-198, 2004.
DOI
|
6 |
M. Alhabeeb, A. Almuhaideb, P. D. Le, and B. Srinivasan, "Information security threats classification pyramid," in 2010 IEEE 24th international conference on advanced information networking and applications workshops, pp. 208-213.
|
7 |
A. McCue, "Beware the insider security threat,a€‹ CIO Jury," 2008.
|
8 |
W. Pieters, "Explanation and trust: what to tell the user in security and AI?," Ethics and information technology, vol. 13, pp. 53-64.
DOI
|
9 |
B. B. Bederson, B. Lee, R. M. Sherman, P. S. Herrnson, and R. G. Niemi, "Electronic voting system usability issues," in Proceedings of the SIGCHI conference on Human factors in computing systems, 2003, pp. 145-152.
|
10 |
N. Luhmann, "Familiarity, confidence, trust: Problems and alternatives," Trust: Making and breaking cooperative relations, vol. 6, pp. 94-107, 2000.
|
11 |
J. H. Park, "England's controversy over the secret ballot," Political Science Quarterly, vol. 46, pp. 51-86, 1931.
DOI
|
12 |
Y. Pan, "Heading toward artificial intelligence 2.0. Engineering, 2 (4): 409-413."
DOI
|
13 |
R. J. Mejias and P. A. Balthazard, "A model of information security awareness for assessing information security risk for emerging technologies," Journal of Information Privacy and Security, vol. 10, pp. 160-185.
DOI
|
14 |
A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, "Basic concepts and taxonomy of dependable and secure computing," IEEE transactions on dependable and secure computing, vol. 1, pp. 11-33, 2004.
DOI
|
15 |
P. Coopers, "Key findings from the Global State of Information Security Survey 2013," Changing the game.
|
16 |
S. M. Furnell, A. Jusoh, and D. Katsabas, "The challenges of understanding and using security: A survey of end-users," Computers & Security, vol. 25, pp. 27-35, 2006.
DOI
|
17 |
K. Parsons, A. McCormac, M. Butavicius, M. Pattinson, and C. Jerram, "Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q)," Computers & Security, vol. 42, pp. 165-176.
DOI
|
18 |
B. ISO, "iso," IEC Directives Part, vol. 1, 2008.
|
19 |
M. Jouini, L. B. A. Rabai, and A. B. Aissa, "Classification of Security Threats in Information Systems," ANT/SEIT, vol. 32, pp. 489-496.
|
20 |
A. McCormac, T. Zwaans, K. Parsons, D. Calic, M. Butavicius, and M. Pattinson, "Individual differences and information security awareness," Computers in human behavior, vol. 69, pp. 151-156.
DOI
|
21 |
H. A. Kruger and W. D. Kearney, "A prototype for assessing information security awareness," Computers & security, vol. 25, pp. 289-296, 2006.
DOI
|
22 |
S. Sheng, M. Holbrook, P. Kumaraguru, L. F. Cranor, and J. Downs, "Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 373-382.
|
23 |
S. GeriA‡ and A. e. Hutinski, "Information system security threats classifications," Journal of Information and organizational sciences, vol. 31, pp. 51-61, 2007.
|
24 |
B.-h. Li, B.-c. Hou, W.-t. Yu, X.-b. Lu, and C.-w. Yang, "Applications of artificial intelligence in intelligent manufacturing: a review," Frontiers of Information Technology & Electronic Engineering, vol. 18, pp. 86-96.
DOI
|
25 |
B. Harris and D. Allen, Black box voting: Ballot tampering in the 21st century: Talion Pub., 2004.
|
26 |
K. Veeramachaneni, I. Arnaldo, V. Korrapati, C. Bassias, and K. Li, "AI^ 2: training a big data machine to defend," in 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), pp. 49-54.
|
27 |
K. Parsons, A. McCormac, M. Butavicius, and L. Ferguson, "Human factors and information security: individual, culture, and security environment," DEFENCE SCIENCE AND TECHNOLOGY ORGANISATION EDINBURGH (AUSTRALIA) COMMANDA a€¦.
|