11
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Basing Cybersecurity Training on User Perceptions

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references8

          • Record: found
          • Abstract: not found
          • Article: not found

          E-satisfaction: an initial examination

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Perceived information security, financial liability and consumer trust in electronic commerce transactions

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Security in the wild: user strategies for managing security as an everyday, practical problem

                Bookmark

                Author and article information

                Journal
                IEEE Security & Privacy Magazine
                IEEE Secur. Privacy Mag.
                Institute of Electrical and Electronics Engineers (IEEE)
                1540-7993
                March 2012
                March 2012
                : 10
                : 2
                : 40-49
                Article
                10.1109/MSP.2011.180
                e33f9067-a727-4a51-b4fe-39477295ab8c
                © 2012
                History

                Comments

                Comment on this article