Power to the people? The evolving recognition of human aspects of security, Computers & Security, vol.31, issue.8, pp.983-988, 2012. ,
DOI : 10.1016/j.cose.2012.08.004
Leveraging behavioral science to mitigate cyber security risk, Computers & Security, vol.31, issue.4, pp.597-611, 2012. ,
DOI : 10.1016/j.cose.2011.12.010
Organisational Learning Models for Information Security, 2004. ,
Combating information security apathy by encouraging prosocial organisational behaviour, Information Management & Computer Security, vol.20, issue.1, pp.39-46, 2012. ,
DOI : 10.1108/09685221211219191
Phishing for phishing awareness, Behaviour & Information Technology, vol.32, issue.2, 2011. ,
DOI : 10.1109/MSP.2008.52
A Model for Cultivating Resistance to Social Engineering Attacks, Unpublished M-dissertation, 2011. ,
School of phish, Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS '09, pp.1-312, 2009. ,
DOI : 10.1145/1572532.1572536
Social phishing, Social Phishing, pp.94-100, 2007. ,
DOI : 10.1145/1290958.1290968
Phishing for user security awareness, Computers & Security, vol.26, issue.1, pp.73-80, 2007. ,
DOI : 10.1016/j.cose.2006.10.009
Barriers against Productive Organisational Learning from Information Security Incidents, Paper in the PhD course Organisational Development and ICT, 2003. ,
Organizational learning as a determining factor in business performance, The Learning Organization, vol.12, issue.3, pp.227-245, 2005. ,
DOI : 10.1108/09696470510592494
A Critical Evaluation of the Organisational Learning that takes place in a Project Management Environment, Unpublished M-dissertation, 2008. ,
Organisational Learning II: Theory, Method and Practice, 1996. ,
Practical steps towards a learning organisation: applying academic knowledge to improvement and innovation in business processes, The Learning Organization, vol.5, issue.1, pp.15-23, 1998. ,
DOI : 10.1108/09696479810200810
Incident response teams ??? Challenges in supporting the organisational security function, Computers & Security, vol.31, issue.5, pp.643-652, 2012. ,
DOI : 10.1016/j.cose.2012.04.001
Information Technology and Organizational Learning: An Investigation of Exploration and Exploitation Processes, Organization Science, vol.18, issue.5, pp.796-812, 2007. ,
DOI : 10.1287/orsc.1070.0286
Computer Systems to Facilitating Organizational Learning: IT and Organizational Context, Expert Systems with Applications, pp.273-280, 2003. ,
DOI : 10.1016/s0957-4174(02)00155-0
URL : http://repository.nkfust.edu.tw/ir/bitstream/987654321/16553/-1/{1}
Why do some people manage phishing e???mails better than others?, Information Management & Computer Security, vol.20, issue.1, pp.18-28, 2012. ,
DOI : 10.1108/09685221211219173
URL : https://digital.library.adelaide.edu.au/dspace/retrieve/148723/RA_hdl_72956.pdf
Identity Theft ? Empirical Evidence from a Phishing Exercise, New Approaches for Security, Privacy and Trust in Complex Environments, IFIP International Federation for Information Processing, issue.232, pp.193-203, 2007. ,
The information security digital divide between information security managers and users, Computers & Security, vol.28, issue.6, pp.476-490, 2009. ,
DOI : 10.1016/j.cose.2009.01.003