Securing information system & computer security self-efficacy effect
CONTENT PART I: Securing Information System PART II: Computer Security Self Efficacy Information Systems Theories -TAM , Technology Adoption Model, TTF Social Cognitive Theory Computer security self efficacy -Computer self-efficacy -Internet self-efficacy -Confidentiality -Integrity -Av...
| Main Author: | |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English English |
| Published: |
s.n
2013
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/33412/ http://irep.iium.edu.my/33412/ http://irep.iium.edu.my/33412/1/ChinaWorkshop.pdf http://irep.iium.edu.my/33412/2/certificate-irep.pdf |
| Summary: | CONTENT
PART I: Securing Information System
PART II: Computer Security Self
Efficacy Information Systems Theories
-TAM , Technology Adoption Model, TTF
Social Cognitive Theory
Computer security self efficacy
-Computer self-efficacy
-Internet self-efficacy
-Confidentiality
-Integrity
-Availability
-Perceived Risk
-Perceived Trust
-Online Anxiety
|
|---|