Securing information system & computer security self-efficacy effect
CONTENT PART I: Securing Information System PART II: Computer Security Self Efficacy Information Systems Theories -TAM , Technology Adoption Model, TTF Social Cognitive Theory Computer security self efficacy -Computer self-efficacy -Internet self-efficacy -Confidentiality -Integrity -Av...
Saved in:
Main Author: | |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
s.n
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/33412/1/ChinaWorkshop.pdf http://irep.iium.edu.my/33412/2/certificate-irep.pdf http://irep.iium.edu.my/33412/ http://www.gxnun.net/45nnsztw/new/readnews.asp?newsid=4041 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.iium.irep.33412 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.334122014-01-21T03:41:26Z http://irep.iium.edu.my/33412/ Securing information system & computer security self-efficacy effect Al-Shawabkeh, Mahmoud T10.5 Communication of technical information CONTENT PART I: Securing Information System PART II: Computer Security Self Efficacy Information Systems Theories -TAM , Technology Adoption Model, TTF Social Cognitive Theory Computer security self efficacy -Computer self-efficacy -Internet self-efficacy -Confidentiality -Integrity -Availability -Perceived Risk -Perceived Trust -Online Anxiety s.n 2013-01-09 Conference or Workshop Item REM application/pdf en http://irep.iium.edu.my/33412/1/ChinaWorkshop.pdf application/pdf en http://irep.iium.edu.my/33412/2/certificate-irep.pdf Al-Shawabkeh, Mahmoud (2013) Securing information system & computer security self-efficacy effect. In: A talk on Security Information System, 9 Jan 2013, Guangxi, China. (Unpublished) http://www.gxnun.net/45nnsztw/new/readnews.asp?newsid=4041 |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English English |
topic |
T10.5 Communication of technical information |
spellingShingle |
T10.5 Communication of technical information Al-Shawabkeh, Mahmoud Securing information system & computer security self-efficacy effect |
description |
CONTENT
PART I: Securing Information System
PART II: Computer Security Self
Efficacy Information Systems Theories
-TAM , Technology Adoption Model, TTF
Social Cognitive Theory
Computer security self efficacy
-Computer self-efficacy
-Internet self-efficacy
-Confidentiality
-Integrity
-Availability
-Perceived Risk
-Perceived Trust
-Online Anxiety
|
format |
Conference or Workshop Item |
author |
Al-Shawabkeh, Mahmoud |
author_facet |
Al-Shawabkeh, Mahmoud |
author_sort |
Al-Shawabkeh, Mahmoud |
title |
Securing information system & computer security self-efficacy effect |
title_short |
Securing information system & computer security self-efficacy effect |
title_full |
Securing information system & computer security self-efficacy effect |
title_fullStr |
Securing information system & computer security self-efficacy effect |
title_full_unstemmed |
Securing information system & computer security self-efficacy effect |
title_sort |
securing information system & computer security self-efficacy effect |
publisher |
s.n |
publishDate |
2013 |
url |
http://irep.iium.edu.my/33412/1/ChinaWorkshop.pdf http://irep.iium.edu.my/33412/2/certificate-irep.pdf http://irep.iium.edu.my/33412/ http://www.gxnun.net/45nnsztw/new/readnews.asp?newsid=4041 |
_version_ |
1643610430879301632 |
score |
13.211869 |