Year | DOI | Venue |
---|---|---|
2009 | 10.1108/09685220910993980 | Inf. Manag. Comput. Security |
Keywords | Field | DocType |
theory of planned behavior,information security,data security,data analysis,security policy,behaviour,risk analysis,design methodology | USable,Data security,Computer security,Computer science,Risk analysis (business),Risk compensation,Information security,Knowledge management,Theory of planned behavior,Security policy | Journal |
Volume | Issue | Citations |
17 | 4 | 36 |
PageRank | References | Authors |
0.85 | 15 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jie Zhang | 1 | 312 | 9.33 |
Brian J. Reithel | 2 | 135 | 10.86 |
Han Li | 3 | 235 | 10.29 |