Securing information system & computer security self-efficacy effect

CONTENT PART I: Securing Information System PART II: Computer Security Self Efficacy Information Systems Theories -TAM , Technology Adoption Model, TTF Social Cognitive Theory Computer security self efficacy -Computer self-efficacy -Internet self-efficacy -Confidentiality -Integrity -Av...

Full description

Saved in:
Bibliographic Details
Main Author: Al-Shawabkeh, Mahmoud
Format: Conference or Workshop Item
Language:English
English
Published: s.n 2013
Subjects:
Online Access:http://irep.iium.edu.my/33412/1/ChinaWorkshop.pdf
http://irep.iium.edu.my/33412/2/certificate-irep.pdf
http://irep.iium.edu.my/33412/
http://www.gxnun.net/45nnsztw/new/readnews.asp?newsid=4041
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.33412
record_format dspace
spelling my.iium.irep.334122014-01-21T03:41:26Z http://irep.iium.edu.my/33412/ Securing information system & computer security self-efficacy effect Al-Shawabkeh, Mahmoud T10.5 Communication of technical information CONTENT PART I: Securing Information System PART II: Computer Security Self Efficacy Information Systems Theories -TAM , Technology Adoption Model, TTF Social Cognitive Theory Computer security self efficacy -Computer self-efficacy -Internet self-efficacy -Confidentiality -Integrity -Availability -Perceived Risk -Perceived Trust -Online Anxiety s.n 2013-01-09 Conference or Workshop Item REM application/pdf en http://irep.iium.edu.my/33412/1/ChinaWorkshop.pdf application/pdf en http://irep.iium.edu.my/33412/2/certificate-irep.pdf Al-Shawabkeh, Mahmoud (2013) Securing information system & computer security self-efficacy effect. In: A talk on Security Information System, 9 Jan 2013, Guangxi, China. (Unpublished) http://www.gxnun.net/45nnsztw/new/readnews.asp?newsid=4041
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
English
topic T10.5 Communication of technical information
spellingShingle T10.5 Communication of technical information
Al-Shawabkeh, Mahmoud
Securing information system & computer security self-efficacy effect
description CONTENT PART I: Securing Information System PART II: Computer Security Self Efficacy Information Systems Theories -TAM , Technology Adoption Model, TTF Social Cognitive Theory Computer security self efficacy -Computer self-efficacy -Internet self-efficacy -Confidentiality -Integrity -Availability -Perceived Risk -Perceived Trust -Online Anxiety
format Conference or Workshop Item
author Al-Shawabkeh, Mahmoud
author_facet Al-Shawabkeh, Mahmoud
author_sort Al-Shawabkeh, Mahmoud
title Securing information system & computer security self-efficacy effect
title_short Securing information system & computer security self-efficacy effect
title_full Securing information system & computer security self-efficacy effect
title_fullStr Securing information system & computer security self-efficacy effect
title_full_unstemmed Securing information system & computer security self-efficacy effect
title_sort securing information system & computer security self-efficacy effect
publisher s.n
publishDate 2013
url http://irep.iium.edu.my/33412/1/ChinaWorkshop.pdf
http://irep.iium.edu.my/33412/2/certificate-irep.pdf
http://irep.iium.edu.my/33412/
http://www.gxnun.net/45nnsztw/new/readnews.asp?newsid=4041
_version_ 1643610430879301632
score 13.211869