Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
References
Journals A-Z
Journals by Subject
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Journals by Subject
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
References
•
Coughlin, T.M. (2017) Cybersecurity Education for Adolescents and Non-Technical Adult...
•
Furnell, S.M., Bryant, P. and Phippen, A.D. (2007) Assessing the Security Perceptions...
•
Galvan, J.L. (2016) Student Motivations Regarding Online Security Implementation: A Q...
•
Chakraborty, R., Lee, J., Bagchi-Sen, S., Upadhyaya, S. and Raghav Rao, H. (2016) Onl...
•
Anderson, K.B., Durbin, E. and Salinger, M.A. (2008) Identity Theft. Journal of Econo...
•
Kang, R., Dabbish, L., Fruchter, N. and Kiesler, S. (2015) My Data Just Goes Everywhe...
•
de Bruijn, H. and Janssen, M. (2017) Building Cybersecurity Awareness: The Need for E...
•
Siponen, M.T. (2000) A Conceptual Foundation for Organizational Information Security ...
•
Von Solms, B. (2001) Information Security—A Multidimensional Discipline. Computers & ...
•
Jones, D. (2007) Low Cost Security Tools: Employee Awareness. Security: Solutions for...
•
Kelly, C. (2006) Awareness Trumps New Security Toys. Computerworld-Newton Then Framin...
•
Claar, C.L. (2011) The Adoption of Computer Security: An Analysis of Home Personal Co...
•
Bryce, J. and Fraser, J. (2014) The Role of Disclosure of Personal Information in the...
•
Dinev, T. and Hu, Q. (2007) The Centrality of Awareness in the Formation of User Beha...
•
Byrne, Z.S., Dvorak, K.J., Peters, J.M., Ray, I., Howe, A. and Sanchez, D. (2016) Fro...
•
Riek, M., Bohme, R. and Moore, T. (2016) Measuring the Influence of Perceived Cybercr...
•
Skinner, C.S., Tiro, J. and Champion, V.L. (2015) The Health Belief Model. In: Health...
•
Dodel, M. and Mesch, G. (2017) Cyber-Victimization Preventive Behavior: A Health Beli...
•
McNabb, D.E. (2010) Research Methods for Political Science: Qualitative and Quantitat...
•
Liang, H. and Xue, Y. (2010) Understanding Security Behaviors in Personal Computer Us...
•
O’Dwyer, L.M. and Bernauer, J.A. (2013) Quantitative Research for the Qualitative Res...
•
Nardi, P.M. (2018) Doing Survey Research: A Guide to Quantitative Methods. 4th Editio...
•
Martin, W.E. and Bridgmon, K.D. (2012) Quantitative and Statistical Research Methods:...
•
Punch, K. (2003) Survey Research: The Basics. Sage Publications, Thousand Oaks, CA. h...
•
Gay, L. and Airasian, P. (2000) Educational Research: Competencies for Analysis and E...
•
Bethlehem, J. and Biffignandi, S. (2011) Handbook of Web Surveys (Vol. 567). John Wil...
•
Fry, R. (2018) Millennials Are the Largest Generation in the U.S. Labor Force. Pew Re...
•
Kane, M.T. (1992) The Assessment of Professional Competence. Evaluation & the Health ...
•
U.S. Census Bureau (2015) Millennials Outnumber Baby Boomers and Are Far More Diverse...
•
Survey Monkey (2018) Diverse Recruitment.
https://www.SurveyMonkey.com/collect/a...
•
Lachin, J.M. (1981) Introduction to Sample Size Determination and Power Analysis for ...
•
Shuster, J.J. (2014) Sample Size Verification for Clinical Trials. Clinical and Trans...
•
Suresh, K. and Chandrashekara, S. (2012) Sample Size Estimation and Power Analysis fo...
•
QFAB (2019) Statistical Decision Tree.
https://www.anzmtg.org/stats/PowerCalcula...
•
Ifinedo, P. (2014) Information Systems Security Policy Compliance: An Empirical Study...
•
Lebek, B., Uffen, J., Neumann, M., Hohler, B. and Breitner, M.H. (2014) Information S...
•
Straub, D., Boudreau, M. and Gefen, D. (2004) Validation Guidelines for Is Positivist...
•
Trochim, W.M.K. and Donnelly, J.P. (2008) The Research Methods Knowledge Base. 3rd Ed...
•
U.S. Department of Health and Human Services (1979) The Belmont Report. New York.
•
Coulehan, M.B. and Well, J.F. (2006) Guidelines for Responsible Data Management in Sc...
<
...
56133
56134
56135
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top