Securing information system & computer security self-efficacy effect
CONTENT PART I: Securing Information System PART II: Computer Security Self Efficacy Information Systems Theories -TAM , Technology Adoption Model, TTF Social Cognitive Theory Computer security self efficacy -Computer self-efficacy -Internet self-efficacy -Confidentiality -Integrity -Av...
Tác giả chính: | |
---|---|
Định dạng: | Proceeding Paper |
Ngôn ngữ: | English English |
Được phát hành: |
s.n
2013
|
Những chủ đề: | |
Truy cập trực tuyến: | http://irep.iium.edu.my/33412/1/ChinaWorkshop.pdf http://irep.iium.edu.my/33412/2/certificate-irep.pdf |