SOURCES
Adams, A., and M. A. Sasse: “Users Are Not the Enemy: Why Users Compromise Security Mechanisms and How to Take Remedial Measures”, Communications of the ACM, 42(12), December 1999, 40–46.
Adams, J, “Risk Management: It’s Not Rocket Science … It’s Much More Complicated”, Risk Management, 54(5) 2007, 36–40.
Albrechtsen, E., and J. Hovden, “The Information Security Digital Divide between Information Security Managers and Users”, Computers & Security, 28(6), 2009 476–490.
Anttila, J., and J. Kajava, “Challenging IS and ISM Standardization for Business Benefits”, paper delivered at ARES ’10 International Conference on Availability, Reliability, and Security, 2010.
Ariely, D., The Honest Truth about Dishonesty, Harper, 2013.
Aytes, K., and ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access