Online safety begins with you and me: Convincing Internet users to protect themselves, Computers in Human Behavior, vol.48, pp.199-207, 2015. ,
DOI : 10.1016/j.chb.2015.01.046
Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q), Computers & Security, vol.42, pp.165-176, 2014. ,
Information security management needs more holistic approach: A literature review, International Journal of Information Management, vol.36, issue.2, pp.215-225, 2016. ,
DOI : 10.1016/j.ijinfomgt.2015.11.009
Information security awareness in higher education: An exploratory study, Computers & Security, vol.27, issue.7-8, pp.241-253, 2008. ,
DOI : 10.1016/j.cose.2008.07.008
From the user's perspective: Perceptions of risk relative to benefit associated with using the Internet, Computers in Human Behavior, vol.59, pp.456-468, 2016. ,
Security awareness of computer users: A phishing threat avoidance perspective, Computers in Human Behavior, vol.38, pp.304-312, 2014. ,
The Need for Effective Information Security Awareness, Journal of Advances in Information Technology, vol.3, issue.3, pp.176-183, 2012. ,
A cross-cultural investigation of situational information security awareness programs, Information Management & Computer Security, vol.16, issue.4, pp.360-376, 2008. ,
Information security awareness: educating your users effectively, Information Management & Computer Security, vol.6, issue.4, pp.167-173, 1998. ,
DOI : 10.1108/09685229810227649
A conceptual foundation for organizational information security awareness, Information Management & Computer Security, vol.8, issue.1, pp.31-41, 2000. ,
A prototype for assessing information security awareness, Computers & Security, vol.25, issue.4, pp.289-296, 2006. ,
Studying users' computer security behavior: A health belief perspective, Decision Support Systems, vol.46, issue.4, pp.815-825, 2009. ,
Analysing the role of cognitive and cultural biases in the internalization of information security policies: recommendations for information security awareness programs, Computers & Security, vol.52, pp.128-141, 2015. ,
Mental fatigue: Costs and benefits, Brain Research Reviews, vol.59, issue.1, pp.125-139, 2008. ,
,
Mental fatigue and the control of cognitive processes: effects on perseveration and planning, Acta Psychologica, vol.113, issue.1, pp.150-156, 2003. ,
Recognising and addressing 'security fatigue, Computer Fraud & Security, issue.11, pp.70139-70142, 2009. ,
The SAGE Handbook of Social Network Analysis, 2011. ,
The "six-element" analysis method for the research on the characteristics of terrorist activities, Ann Oper Res, vol.234, pp.17-35, 2015. ,
Applying social network analysis to security, Working Papers of the Sustainable Society Network, pp.11-27, 2015. ,
Applications of social network analysis in behavioural information security research: concepts and empirical analysis, Computers & Security, vol.68, pp.1-15, 2017. ,
Organizational Risk using Network Analysis, Proc. South African Information Security Multi-Conference, 2010. ,
A Course Applying Network Analysis to Organizational Risk in Information Security, 2010. ,
, Principles of Information Security, Cengage Learning, 2011.
Social network analysis applied to team sports analysis, 2016. ,
The anatomy of a large-scale hypertextual web search engine, Computer networks and ISDN systems, vol.30, pp.107-117, 1998. ,
Centrality in social networks: II. Experimental results, Social networks, vol.2, issue.2, pp.119-141, 1979. ,
Introduction to social network methods, 2005. ,
Social network analysis: Methods and applications, 1994. ,
Centrality and network flow, Social Networks, issue.27, pp.55-71, 2005. ,
Informal accounting information systems: Some tentative findings, Accounting, Organizations and Society, vol.4, issue.1-2, pp.21-30, 1979. ,
Informal information flow and strategy in the international firm, International Journal of Technology Management, vol.11, issue.1-2, pp.219-232, 1996. ,
Enterprise across the digital divide: information systems and rural microenterprise in Botswana, Journal of International Development, vol.14, issue.1, pp.61-74, 2002. ,
DOI : 10.1002/jid.869
, , 2018.