Skip Nav Destination
Close Modal
Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-4 of 4
Jonas Hallberg
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
An empirical test of the perceived relationship between risk and the constituents severity and probability
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2016) 24 (2): 194–204.
Published: 13 June 2016
Journal Articles
The sufficiency of the theory of planned behavior for explaining information security policy compliance
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2015) 23 (2): 200–217.
Published: 08 June 2015
Journal Articles
Variables influencing information security policy compliance: A systematic review of quantitative studies
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2014) 22 (1): 42–75.
Published: 04 March 2014
Journal Articles
The 14‐layered framework for including social and organizational aspects in security management
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2011) 19 (2): 124–133.
Published: 07 June 2011
