共 50 条
[33]
Identifying Influences to Information Security Framework Adoption: Applying a Modified UTAUT
[J].
2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA),
2020,
:2605-2609
[34]
Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance
[J].
APPLIED SCIENCES-BASEL,
2021, 11 (08)
[35]
CONSIDERATIONS ON THE PHASES OF THE MANAGEMENT OF THE SECURITY INCIDENTS
[J].
15TH INTERNATIONAL CONFERENCE THE KNOWLEDGE-BASED ORGANIZATION: MANAGEMENT, CONFERENCE PROCEEDINGS 2,
2009, 2
:166-170
[36]
New Insights into the Justifiability of Organizational Information Security Policy Noncompliance: A Case Study
[J].
PROCEEDINGS OF THE 55TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES,
2022,
:6812-6821
[37]
Information Security Policies Compliance: The Role of Organizational Punishment Research-in-Progress
[J].
AMCIS 2013 PROCEEDINGS,
2013,
[38]
Human Factors in Information Security Culture: A Literature Review
[J].
ADVANCES IN HUMAN FACTORS IN CYBERSECURITY,
2018, 593
:269-280
[39]
Identifying and prioritizing factors affecting the security of sport facilities (Case of Iran)
[J].
CULTURA CIENCIA Y DEPORTE,
2021, 16 (50)
:593-603