ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
8
views
28
references
Top references
cited by
3
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,604
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Factors in an end user security expertise instrument
Author(s):
Prashanth Rajivan
,
Pablo Moriano
,
Timothy Kelley
,
L. Jean Camp
Publication date
Created:
June 12 2017
Publication date
(Print):
June 12 2017
Journal:
Information and Computer Security
Publisher:
Emerald
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Special Issue: Everyday Expertise in Social Pedagogy
Most cited references
28
Record
: found
Abstract
: not found
Book
: not found
Human Error
James Reason
(1990)
0
comments
Cited
654
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model
Naresh K. Malhotra
,
Sung S. Kim
,
James Agarwal
(2004)
0
comments
Cited
384
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book
: not found
Scaling Procedures
Richard Netemeyer
,
William Bearden
,
Subhash S. Sharma
(2003)
0
comments
Cited
268
times
– based on
0
reviews
Bookmark
All references
Author and article information
Journal
Title:
Information and Computer Security
Abbreviated Title:
Info and Computer Security
Publisher:
Emerald
ISSN (Print):
2056-4961
Publication date Created:
June 12 2017
Publication date (Print):
June 12 2017
Volume
: 25
Issue
: 2
Pages
: 190-205
Article
DOI:
10.1108/ICS-04-2017-0020
SO-VID:
2a3b2cc3-9573-424a-adc0-8bf2069f081a
Copyright ©
© 2017
License:
http://www.emeraldinsight.com/page/tdm
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
1,604
Redeployment of Brands, Sales Forces, and General Marketing Management Expertise following Horizontal Acquisitions: A Resource-Based View
Authors:
Laurence Capron
,
John Hulland
Discussion of Does the Market Value Financial Expertise on Audit Committees of Boards of Directors?
Authors:
ELLEN ENGEL
Is audit committee expertise connected with increased readability of integrated reports: Evidence from EU companies
Authors:
Patrick Velte
,
P Velte
See all similar
Cited by
3
The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance
Authors:
Jessica Dawson
,
Robert Thomson
Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks
Authors:
Prashanth Rajivan
,
Cleotilde Gonzalez
The Cyber Domains
Authors:
Robert Thomson
See all cited by
Most referenced authors
248
Y Xu
S Kim
D Liu
See all reference authors