ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
18
views
12
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,497
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Designing and aligning e‐Science security culture with design
Author(s):
Shamal Faily
,
Ivan Fléchais
Editor(s):
Steven M. Furnell
Publication date
Created:
November 23 2010
Publication date
(Print):
November 23 2010
Journal:
Information Management & Computer Security
Publisher:
Emerald
Read this article at
ScienceOpen
Publisher
Further versions
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
Powered by
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
The Criminology, Victimology and Security Journal
Most cited references
12
Record
: found
Abstract
: not found
Conference Proceedings
: not found
User-centered security
Richard T. Simon
,
Mary Ellen Zurko
(1996)
0
comments
Cited
13
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists
Sara Kraemer
,
Pascale Carayon
(2007)
0
comments
Cited
11
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Information security obedience: a definition
Kerry-Lynn Thomson
,
Rossouw von Solms
(2005)
0
comments
Cited
8
times
– based on
0
reviews
Review now
Bookmark
All references
Author and article information
Journal
Title:
Information Management & Computer Security
Abbreviated Title:
Info Mngmnt & Comp Security
Publisher:
Emerald
ISSN (Print):
0968-5227
Publication date Created:
November 23 2010
Publication date (Print):
November 23 2010
Volume
: 18
Issue
: 5
Pages
: 339-349
Article
DOI:
10.1108/09685221011095254
SO-VID:
0578352a-0313-4bfc-b61d-8e2ddd09ae76
Copyright ©
© 2010
License:
http://www.emeraldinsight.com/page/tdm
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
1,497
Onset of Antarctic Circumpolar Current 30 million years ago as Tasmanian Gateway aligned with westerlies
Authors:
Jennifer C. Latimer
,
Wendy Kordesch
,
Margaret Delaney
…
Aligned multilayer structure generation by electron microprojection
Authors:
K Anger
,
J. Frosien
,
B. Lischke
SATCHMO: sequence alignment and tree construction using hidden Markov models.
Authors:
Kimmen Sjölander
,
Robert Edgar
See all similar
Cited by
1
Why not comply with information security? An empirical approach for the causes of non-compliance
Authors:
Daejin Kim
,
Inho Hwang
,
Sanghyun Kim
…
See all cited by
Most referenced authors
55
D. HILL
S Lloyd
N Fox
See all reference authors