Securing information system & computer security self-efficacy effect
CONTENT PART I: Securing Information System PART II: Computer Security Self Efficacy Information Systems Theories -TAM , Technology Adoption Model, TTF Social Cognitive Theory Computer security self efficacy -Computer self-efficacy -Internet self-efficacy -Confidentiality -Integrity -Av...
Saved in:
| 主要作者: | |
|---|---|
| 格式: | Conference or Workshop Item |
| 语言: | English English |
| 出版: |
s.n
2013
|
| 主题: | |
| 在线阅读: | http://irep.iium.edu.my/33412/ http://irep.iium.edu.my/33412/ http://irep.iium.edu.my/33412/1/ChinaWorkshop.pdf http://irep.iium.edu.my/33412/2/certificate-irep.pdf |
| 标签: |
添加标签
没有标签, 成为第一个标记此记录!
|