Author of the publication

Exploring the role of work identity and work locus of control in information security awareness.

, , , , and . Comput. Secur., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber warfare: Issues and challenges., , and . Comput. Secur., (2015)Introduction to the special issue of the journal of information security and applications on" cyber security in ICS & SCADA systems"., , , and . J. Inf. Secur. Appl., (2020)Defence Mechanisms for Public Systems., , and . EAI Endorsed Trans. Security Safety, 4 (13): e1 (2018)Introduction to the special issue of the journal of information security and applications on "ICS & SCADA cyber security"., , , and . J. Inf. Secur. Appl., (2017)Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems., , and . EAI Endorsed Trans. Security Safety, 4 (12): e1 (2017)Exploring the role of work identity and work locus of control in information security awareness., , , , and . Comput. Secur., (2019)A Compositional Event & Time-Based Policy Model., , , , and . POLICY, page 173-182. IEEE Computer Society, (2006)Developing cyber peacekeeping: Observation, monitoring and reporting., , , and . Gov. Inf. Q., 36 (2): 276-293 (2019)Developing Cyber Buffer Zones., , , and . CoRR, (2018)A trust based approach to mobile multi-agent systems.. De Montfort University, Leicester, UK, (2010)British Library, EThOS.