The right to security ??? securing rights or securitising rights?, 2012. ,
DOI : 10.1017/CBO9781139026291.007
Understanding your digital identity, Learning Exchange, vol.1, issue.1, 2010. ,
Security Awareness Programs, Review of Business Information Systems (RBIS), vol.16, issue.4, pp.165-168, 2012. ,
DOI : 10.19030/rbis.v16i4.7435
Introduction to emerging threats and vulnerabilities to create user awareness Information Security South Africa, 2009. ,
Commission, ISO/IEC 27002, ser. International Standard, 2007. ,
From culture to disobedience: Recognising the varying user acceptance of IT security, Computer Fraud & Security, vol.2009, issue.2, pp.5-10, 2009. ,
DOI : 10.1016/S1361-3723(09)70019-3
An Analysis of Information Security Awareness within Home and Work Environments, 2010 International Conference on Availability, Reliability and Security, pp.196-203, 2010. ,
DOI : 10.1109/ARES.2010.27
Internet security threat report: 2011 trends Symantec Corporation, 350 Ellis Stree, 2012. ,
A survey of computer crime and security in south africa, of publication: Proceedings of the ISSA 2009 Conference. ISSA, p.217, 2009. ,
The challenges of understanding and using security: A survey of end-users, Computers & Security, vol.25, issue.1, pp.27-35, 2006. ,
DOI : 10.1016/j.cose.2005.12.004
Stronger password authentication using browser extensions, Proceedings of the 14th Usenix Security Symposium, 1998. ,
Guidelines for the creation of braincompatible cyber security educational material in moodle 2.0, Information Security South Africa (ISSA), pp.1-8, 2011. ,
The impact of information richness on information security awareness training effectiveness, ) Browser display statistics. [Online]. Available, pp.92-100, 2009. ,
DOI : 10.1016/j.compedu.2008.06.011
Security and human computer interfaces, Computers & Security, vol.22, issue.8, pp.675-684, 2003. ,
DOI : 10.1016/S0167-4048(03)00006-3