Search Constraints
Search Results
Select an image to start the slideshow
An end-user centred framework for data access management and security in the enterprise public cloud
1 of 5
Individual's motivation in responding to phishing emails : a Saudi Arabian Case Study
2 of 5
MARA and public user characteristics in response to phishing emails
3 of 5
Exploring the organisational, social and cultural factors influencing those employee attitudes and behaviours that impact the implementation of an information security culture within Omani organisations
4 of 5
A user-centric framework for addressing vulnerability to social engineering in social networks : a mixed methods study of a Saudi academic community
5 of 5