18
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Designing and aligning e‐Science security culture with design

        ,
      Information Management & Computer Security
      Emerald

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references12

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          User-centered security

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Information security obedience: a definition

                Bookmark

                Author and article information

                Journal
                Information Management & Computer Security
                Info Mngmnt & Comp Security
                Emerald
                0968-5227
                November 23 2010
                November 23 2010
                : 18
                : 5
                : 339-349
                Article
                10.1108/09685221011095254
                0578352a-0313-4bfc-b61d-8e2ddd09ae76
                © 2010

                http://www.emeraldinsight.com/page/tdm

                History

                Comments

                Comment on this article