Securing information system & computer security self-efficacy effect
CONTENT PART I: Securing Information System PART II: Computer Security Self Efficacy Information Systems Theories -TAM , Technology Adoption Model, TTF Social Cognitive Theory Computer security self efficacy -Computer self-efficacy -Internet self-efficacy -Confidentiality -Integrity -Av...
Main Author: | Al-Shawabkeh, Mahmoud |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
s.n
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/33412/ http://irep.iium.edu.my/33412/ http://irep.iium.edu.my/33412/1/ChinaWorkshop.pdf http://irep.iium.edu.my/33412/2/certificate-irep.pdf |
Similar Items
-
Security and privacy for IoT and fog computing paradigm
by: Rauf, Abdul, et al.
Published: (2018) -
Information security for professional counseling in organization
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016) -
Toward managing security cost for healthcare information
by: Hameed, Shihab A., et al.
Published: (2012) -
Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016) -
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)