Relationship between stakeholders' information value perception and information security behaviour, AIP Conference Proceedings, 2014. ,
DOI : 10.1063/1.4907819
Critical success factors analysis on effective information security management : A literature review, Information Systems Security, Assurance, and Privacy Track (SIGSEC), pp.1-13, 2014. ,
An Information Security Awareness Program to Address Common Security Concerns in IT Unit, 2014 11th International Conference on Information Technology: New Generations, 2014. ,
DOI : 10.1109/ITNG.2014.67
Information systems user security: A structured model of the knowing???doing gap, Computers in Human Behavior, vol.28, issue.5, 2012. ,
DOI : 10.1016/j.chb.2012.05.003
Information Technology 2008 Curriculum Guidelines for Undergraduate Degree Programs in Information Technology, 2008. ,
Oxford Dictionaries-Language matters Oxford online dictionary Available at: http://www.oxforddictionaries.com/definition/learner/pervasive, 2015. ,
The corporate culture survival guide: Sense and nonsense about culture change, 1999. ,
Cybersecurity Education in Universities, IEEE Security & Privacy, vol.11, issue.4, 2013. ,
DOI : 10.1109/MSP.2013.84
Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*, Decision Sciences, vol.26, issue.6, 2012. ,
DOI : 10.1201/1086/43324.11.6.20030101/40429.6
A framework and assessment instrument for information security culture, Computers & Security, vol.29, issue.2, 2010. ,
DOI : 10.1016/j.cose.2009.09.002
A holistic framework for the fostering of an information security sub-culture in organizations, Information Security South Africa, 2005. ,
From policies to culture, Computers & Security, vol.23, issue.4, 2004. ,
DOI : 10.1016/j.cose.2004.01.013
Exploring factors that influence students' behaviors in information security, Journal of Information Systems Education, vol.23, issue.4, 2012. ,
Analysis of personal information security behavior and awareness, Computers & Security, p.56, 2015. ,
Personality, attitudes, and intentions: Predicting initial adoption of information security behavior, Computers & Security, vol.49, pp.177-191, 2015. ,
DOI : 10.1016/j.cose.2015.01.002
Security-related behavior in using information systems in the workplace: A review and synthesis, Computers & Security, vol.32, issue.1, 2013. ,
DOI : 10.1016/j.cose.2012.10.003
Revisiting the human factor in organizational information security management, ISACA Journal, vol.6, 2013. ,
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model, Journal of Management Information Systems, vol.15, issue.4, pp.203-236, 2011. ,
DOI : 10.1080/07421222.1999.11518226
Using ISO 27001 in teaching information security, IECON 2012, 38th Annual Conference on IEEE Industrial Electronics Society, 2012. ,
DOI : 10.1109/IECON.2012.6389395
The Theory of Planned Behavior. Orgnizational Behavior and Human Decision Processes, pp.179-2110749, 1016. ,
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory, Computers & Security, vol.31, issue.1, pp.83-95, 2012. ,
DOI : 10.1016/j.cose.2011.10.007
An information security knowledge sharing model in organizations, Computers in Human Behavior, vol.57, pp.442-451037, 2016. ,
DOI : 10.1016/j.chb.2015.12.037
Employees??? adherence to information security policies: An exploratory field study, Information & Management, vol.51, issue.2, pp.217-224, 2014. ,
DOI : 10.1016/j.im.2013.08.006
Exploring factors that influence students' behaviors in information security, Journal of Information Systems Education, vol.23, issue.4, pp.407-416, 2012. ,
Organisational Applications of Social Cognitive Theory, Australian Journal of Management, vol.13, issue.2, pp.275-302, 1988. ,
DOI : 10.1177/002188638201800405
What makes an effective information security policy? Network Security, pp.14-16, 2002. ,
From policies to culture. Computers and Security, pp.275-279, 2004. ,
Power to the people? The evolving recognition of human aspects of security, Computers & Security, vol.31, issue.8, pp.31-983, 2012. ,
DOI : 10.1016/j.cose.2012.08.004