INFORMAZIONI SU QUESTO ARTICOLO

Cita

[1] Andy Phippen, Steve Furnell 2007 “Taking responsibility for online protection – why citizens have their part to play” Computer Fraud & Security, Volume 2007, Issue 11, November 2007, Pages 8-1310.1016/S1361-3723(07)70153-7Search in Google Scholar

[2] AOL/NCSA 2005, America Online and the National Cyber Security Alliance, http://www.staysafeonline.info/pdf/safety_study_2005.pdf Accessed on [June 2008]Search in Google Scholar

[3] Australian home user computer security survey 2008. Survey report issued by AUS cert based at university of queen’s land, Available at http://www.auscert.org.au/images/AusCERT_Home_Users_Security_Survey_2008.pdf,Search in Google Scholar

[4] APACS 2008. “Fraud and the Facts” APACS (the UK payment associations)”, http://www.apacs.org.uk/resources_ publications/documents/FraudtheFacts2008.pdf Accessed [July 2008]Search in Google Scholar

[5] Bryant. P, “Improving Protection and Security Awareness amongst Home Users”, 2006. University of Plymouth, Accessed [July 2008]Search in Google Scholar

[6] British computer society security 2008. “Britain surfs safely” Available at http://www.bcs.org/server.php?show=conWebDoc.6307, Accessed [July 2008]Search in Google Scholar

[7] Barclays 2008, “Barclays Online banking” http://www.barclays.co.uk/pinsentry/ Accessed [July 2008]Search in Google Scholar

[8] CSI 2008. “Computer crime and security survey”, http://www.gocsi.com/forms/csi_survey_thanks.jhtml?_ DARGS =/forms/csi_survey.jhtml.2, Accessed [July 2008]Search in Google Scholar

[9] Cheryl Vroom and Rossouw von Solms 2004. “Towards information security behavioral compliance” Computers & Security, Volume 23, Issue 3, May 2004, Pages 191-198.10.1016/j.cose.2004.01.012Search in Google Scholar

[10] Deloitte 2007. “Global Security Survey”, http://www.ey.com/global/content.nsf/International/AABS_-_TSRS_GISS_2007_Download Accessed [July 2008]Search in Google Scholar

[11] DTI 2008. “Information security breaches surveys”http://www.pwc.co.uk/pdf/ BERR_ISBS_2008(sml).pdf. Accessed [July 2008]Search in Google Scholar

[12] Esther E. Klein, Thomas Tellefsen and Paul J. Herskovitz 2007, “The use of group support systems in focus groups: Information technology meets qualitative research” Computers in Human Behavior, Volume 23, Issue 5, Pages 2113-2132.[July 2008]10.1016/j.chb.2006.02.007Search in Google Scholar

[13] Furnell, S. 2008. End-user security culture: A lesson that will never be learnt? Computer Fraud & Security, 6-9.Search in Google Scholar

[14] Federal Trade Commission 2006. “Consumer Fraud and identity theft complaint data Jan-Dec 2005”, http://www.consumer.gov/sentinel/pubs/Top10Fraud2006.pdf Accessed [18 August 2008]10.1016/S1361-3723(05)70215-3Search in Google Scholar

[15] Fraud email 2008. secretary@jazz.netsync.net, 2008 [Email] message to S. M. Kamran, (Kamraniffy@gmail.com) available at: http://mail.google.com/mail/?shva=1#spam/11c1355a6238f6e3 Accessed [July 2008]Search in Google Scholar

[16] GetSafeOnline 2006. “The Get safe online report”, http://www.getsafeonline.org/media/GSO_Cyber_Report_ 2006. pdf Accessed [July 2008]Search in Google Scholar

[17] Get safe online 2007 “Social networkers and wireless networks users provide: rich pickings for criminals”http://www.getsafeonline.org/nqcontent.cfm?a_id=1469 Accessed [July 2008]Search in Google Scholar

[18] Get safe online 2007” Online fraudsters ‘sting’ users for £875”http://www.getsafeonline.org/nqcontent.cfm? a_id=1449 Accessed [July 2008]Search in Google Scholar

[19] Gerald Post and Albert Kagan 1998. “The use and effectiveness of anti-virus software”, Computers & Security, Volume 17, Issue 7, Pages 589-59910.1016/S0167-4048(99)80059-5Search in Google Scholar

[20] Julie J.C.H. Ryan, Daniel J. Ryan 2006 “Expected benefits of information security investments’’ Computers & Security, Volume 25, Issue 8, Pages 579-58810.1016/j.cose.2006.08.001Search in Google Scholar

[21] Message labs 2008. “Google Sites Becomes Newest Addition to Spammers”, http://www.messagelabs.co.uk/intelligence.aspx Accessed [July 2008]Search in Google Scholar

[22] NCSA 2007. “McAfee/NCSA Cyber security Survey report”, http://download.mcafee.com/products/manuals/en-us/McAfeeNCSA_Analysis09-25-07.pdf Accessed [July 2008]Search in Google Scholar

[23] National Statistics 2007. “National statistics survey report 2007”, http://www.statistics.gov.uk/cci/nugget.asp?id=8 Accessed [July 2008]Search in Google Scholar

[24] Oxis 2008, “Perceptions of Security and Risks on the InternetExperience and learned levels of trust” available at : http://www.oii.ox.ac.uk/microsites/oxis/events/?id=5 Accessed on [June 2008]Search in Google Scholar

[25] P. S. Dowland, S. M. F., H. M. Illingworth, P. L. Reynolds 1999. Computer crime and abuse:A survey of public attitudes and awareness. Computers & Security, 18, 715-726.10.1016/S0167-4048(99)80135-7Search in Google Scholar

[26] PC World 2008. PC World http://support.pcworld.co.uk/Layout.aspx?CatID={45712ef7-9ce7-49f4-aa10-afb4bffc 8174} &ID={e4b8726e-f726-44c2-a7f2-4331312ee1be} Accessed on [July,2008]Search in Google Scholar

[27] Ronald C. Dodge Jr., Curtis Carver, Aaron J. Ferguson 2007. “Phishing for user security awareness’’ Computers & Security, Volume 26, Issue 1, February 2007, Pages 73-8010.1016/j.cose.2006.10.009Search in Google Scholar

[28] Symantec 2008. “Symantec Internet Security Threat Report”http://eval.symantec.com/mktginfo/enterprise /white _papers/bwhitepaper internet_security_threat_report_xiii_04-2008.en-us.pdf, Accessed on [June 2008]Search in Google Scholar

eISSN:
2470-8038
Lingua:
Inglese
Frequenza di pubblicazione:
4 volte all'anno
Argomenti della rivista:
Computer Sciences, other