Securing information system & computer security self-efficacy effect

CONTENT PART I: Securing Information System PART II: Computer Security Self Efficacy Information Systems Theories -TAM , Technology Adoption Model, TTF Social Cognitive Theory Computer security self efficacy -Computer self-efficacy -Internet self-efficacy -Confidentiality -Integrity -Av...

Full description

Saved in:
Bibliographic Details
Main Author: Al-Shawabkeh, Mahmoud
Format: Conference or Workshop Item
Language:English
English
Published: s.n 2013
Subjects:
Online Access:http://irep.iium.edu.my/33412/1/ChinaWorkshop.pdf
http://irep.iium.edu.my/33412/2/certificate-irep.pdf
http://irep.iium.edu.my/33412/
http://www.gxnun.net/45nnsztw/new/readnews.asp?newsid=4041
Tags: Add Tag
No Tags, Be the first to tag this record!