These are the sources and citations used to research Kraemer, S., Carayon, P., Clem, J. (2009), „Human and organizational factors in computer and information security: Pathways to vulnerabilities“, Computers & Security, Vol. 28 No. 7, pp. 509–520. DOI:. This bibliography was generated on Cite This For Me on

  • Journal

    Arachchilage, N. A. G. and Love, S.

    Security awareness of computer users: A phishing threat avoidance perspective

    2014 - Computers in Human Behavior

    In-text: (Arachchilage and Love 304-312)

    Your Bibliography: Arachchilage, Nalin Asanka Gamagedara, and Steve Love. "Security Awareness Of Computer Users: A Phishing Threat Avoidance Perspective." Computers in Human Behavior 38 (2014): 304-312. Web.

  • Journal

    Box, D. and Pottas, D.

    Improving Information Security Behaviour in the Healthcare Context

    2013 - Procedia Technology

    In-text: (Box and Pottas 1093-1103)

    Your Bibliography: Box, Debra, and Dalenca Pottas. "Improving Information Security Behaviour In The Healthcare Context." Procedia Technology 9 (2013): 1093-1103. Web. 31 May 2019.

  • Journal

    Bruylands, M., Paans, W., Hediger, H. and Müller-Staub, M.

    Effects on the Quality of the Nursing Care Process Through an Educational Program and the Use of Electronic Nursing Documentation

    2013 - International Journal of Nursing Knowledge

    In-text: (Bruylands et al. n/a-n/a)

    Your Bibliography: Bruylands, Michelle et al. "Effects On The Quality Of The Nursing Care Process Through An Educational Program And The Use Of Electronic Nursing Documentation." International Journal of Nursing Knowledge (2013): n/a-n/a. Web.

  • Journal

    Bulgurcu, Cavusoglu and Benbasat

    Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness

    2010 - MIS Quarterly

    In-text: (Bulgurcu, Cavusoglu and Benbasat 523)

    Your Bibliography: Bulgurcu, Cavusoglu, and Benbasat. "Information Security Policy Compliance: An Empirical Study Of Rationality-Based Beliefs And Information Security Awareness." MIS Quarterly 34.3 (2010): 523. Web.

  • Journal

    Furnell, S. and Clarke, N.

    Power to the people? The evolving recognition of human aspects of security

    2012 - Computers & Security

    In-text: (Furnell and Clarke 983-988)

    Your Bibliography: Furnell, Steven, and Nathan Clarke. "Power To The People? The Evolving Recognition Of Human Aspects Of Security." Computers & Security 31.8 (2012): 983-988. Web.

  • Journal

    Hassan, N. H. and Ismail, Z.

    A Conceptual Model for Investigating Factors Influencing Information Security Culture in Healthcare Environment

    2012 - Procedia - Social and Behavioral Sciences

    In-text: (Hassan and Ismail 1007-1012)

    Your Bibliography: Hassan, Noor Hafizah, and Zuraini Ismail. "A Conceptual Model For Investigating Factors Influencing Information Security Culture In Healthcare Environment." Procedia - Social and Behavioral Sciences 65 (2012): 1007-1012. Web. 31 May 2019.

  • Journal

    Kraemer, S., Carayon, P. and Clem, J.

    Human and organizational factors in computer and information security: Pathways to vulnerabilities

    2009 - Computers & Security

    In-text: (Kraemer, Carayon and Clem 509-520)

    Your Bibliography: Kraemer, Sara, Pascale Carayon, and John Clem. "Human And Organizational Factors In Computer And Information Security: Pathways To Vulnerabilities." Computers & Security 28.7 (2009): 509-520. Web. 30 May 2019.

  • Journal

    Kraemer, S., Carayon, P. and Clem, J.

    Human and organizational factors in computer and information security: Pathways to vulnerabilities

    2009 - Computers & Security

    In-text: (Kraemer, Carayon and Clem 509-520)

    Your Bibliography: Kraemer, Sara, Pascale Carayon, and John Clem. "Human And Organizational Factors In Computer And Information Security: Pathways To Vulnerabilities." Computers & Security 28.7 (2009): 509-520. Web.

  • Journal

    Kritzinger, E. and Smith, E.

    Information security management: An information security retrieval and awareness model for industry

    2008 - Computers & Security

    In-text: (Kritzinger and Smith 224-231)

    Your Bibliography: Kritzinger, E., and E. Smith. "Information Security Management: An Information Security Retrieval And Awareness Model For Industry." Computers & Security 27.5-6 (2008): 224-231. Web.

  • Journal

    Kruger, H. and Kearney, W.

    A prototype for assessing information security awareness

    2006 - Computers & Security

    In-text: (Kruger and Kearney 289-296)

    Your Bibliography: Kruger, H.A., and W.D. Kearney. "A Prototype For Assessing Information Security Awareness." Computers & Security 25.4 (2006): 289-296. Web.

  • Journal

    Parsons, K., McCormac, A., Butavicius, M., Pattinson, M. and Jerram, C.

    Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)

    2014 - Computers & Security

    In-text: (Parsons et al. 165-176)

    Your Bibliography: Parsons, Kathryn et al. "Determining Employee Awareness Using The Human Aspects Of Information Security Questionnaire (HAIS-Q)." Computers & Security 42 (2014): 165-176. Web.

  • Journal

    Pattinson, M., Parsons, K., Butavicius, M., McCormac, A. and Calic, D.

    Assessing information security attitudes: a comparison of two studies

    2016 - Information and Computer Security

    In-text: (Pattinson et al. 228-240)

    Your Bibliography: Pattinson, Malcolm et al. "Assessing Information Security Attitudes: A Comparison Of Two Studies." Information and Computer Security 24.2 (2016): 228-240. Web.

  • Journal

    Shah, G. H., Leider, J. P., Castrucci, B. C., Williams, K. S. and Luo, H.

    Characteristics of Local Health Departments Associated with Implementation of Electronic Health Records and other Informatics Systems

    2016 - Public Health Reports

    In-text: (Shah et al. 272-282)

    Your Bibliography: Shah, Gulzar H. et al. "Characteristics Of Local Health Departments Associated With Implementation Of Electronic Health Records And Other Informatics Systems." Public Health Reports 131.2 (2016): 272-282. Web.

  • Journal

    Sohrabi Safa, N., Von Solms, R. and Furnell, S.

    Information security policy compliance model in organizations

    2016 - Computers & Security

    In-text: (Sohrabi Safa, Von Solms and Furnell 70-82)

    Your Bibliography: Sohrabi Safa, Nader, Rossouw Von Solms, and Steven Furnell. "Information Security Policy Compliance Model In Organizations." Computers & Security 56 (2016): 70-82. Web.

  • Journal

    Stevenson, J. E. and Nilsson, G.

    Nurses’ perceptions of an electronic patient record from a patient safety perspective: a qualitative study

    2011 - Journal of Advanced Nursing

    In-text: (Stevenson and Nilsson 667-676)

    Your Bibliography: Stevenson, Jean E., and Gunilla Nilsson. "Nurses’ Perceptions Of An Electronic Patient Record From A Patient Safety Perspective: A Qualitative Study." Journal of Advanced Nursing 68.3 (2011): 667-676. Web.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Super fast and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join