Securing information system & computer security self-efficacy effect

CONTENT PART I: Securing Information System PART II: Computer Security Self Efficacy Information Systems Theories -TAM , Technology Adoption Model, TTF Social Cognitive Theory Computer security self efficacy -Computer self-efficacy -Internet self-efficacy -Confidentiality -Integrity -Av...

全面介绍

Saved in:
书目详细资料
主要作者: Al-Shawabkeh, Mahmoud
格式: Conference or Workshop Item
语言:English
English
出版: s.n 2013
主题:
在线阅读:http://irep.iium.edu.my/33412/
http://irep.iium.edu.my/33412/
http://irep.iium.edu.my/33412/1/ChinaWorkshop.pdf
http://irep.iium.edu.my/33412/2/certificate-irep.pdf
标签: 添加标签
没有标签, 成为第一个标记此记录!