These are the sources and citations used to research Schultz, E. (2005), „The human factor in securiy“, Computers & Security, Vol. 24 No. 6, pp. 425–426. Shah GH, Leider , JP, Castrucci BC, Williams KS Luo, H. Characteristics of local health departments. This bibliography was generated on Cite This For Me on

  • Journal

    Arachchilage, N. A. G. and Love, S.

    Security awareness of computer users: A phishing threat avoidance perspective

    2014 - Computers in Human Behavior

    In-text: (Arachchilage and Love 304-312)

    Your Bibliography: Arachchilage, Nalin Asanka Gamagedara, and Steve Love. "Security Awareness Of Computer Users: A Phishing Threat Avoidance Perspective." Computers in Human Behavior 38 (2014): 304-312. Web.

  • Journal

    Asamani, J. A., Amenorpe, F. D., Babanawo, F. and Ofei, A. M. A.

    Nursing documentation of inpatient care in eastern Ghana

    2014 - British Journal of Nursing

    In-text: (Asamani et al. 48-54)

    Your Bibliography: Asamani, James Avoka et al. "Nursing Documentation Of Inpatient Care In Eastern Ghana." British Journal of Nursing 23.1 (2014): 48-54. Web.

  • Journal

    Baharuddin, K., Kassim, N. A., Nordin, S. K. and Buyong, S. Z.

    Understanding the Halal Concept and the Importance of Information on Halal Food Business Needed by Potential Malaysian Entrepreneurs

    2015 - International Journal of Academic Research in Business and Social Sciences

    In-text: (Baharuddin et al.)

    Your Bibliography: Baharuddin, Kasmarini et al. "Understanding The Halal Concept And The Importance Of Information On Halal Food Business Needed By Potential Malaysian Entrepreneurs." International Journal of Academic Research in Business and Social Sciences 5.2 (2015): n. pag. Web.

  • Journal

    Barbier, E. B. and Burgess, J. C.

    The Sustainable Development Goals and the systems approach to sustainability

    2017 - Economics: The Open-Access, Open-Assessment E-Journal

    In-text: (Barbier and Burgess)

    Your Bibliography: Barbier, Edward B., and Joanne C. Burgess. "The Sustainable Development Goals And The Systems Approach To Sustainability." Economics: The Open-Access, Open-Assessment E-Journal (2017): n. pag. Web.

  • Journal

    Box, D. and Pottas, D.

    Improving Information Security Behaviour in the Healthcare Context

    2013 - Procedia Technology

    In-text: (Box and Pottas 1093-1103)

    Your Bibliography: Box, Debra, and Dalenca Pottas. "Improving Information Security Behaviour In The Healthcare Context." Procedia Technology 9 (2013): 1093-1103. Web. 29 May 2019.

  • Journal

    Bruylands, M., Paans, W., Hediger, H. and Müller-Staub, M.

    Effects on the Quality of the Nursing Care Process Through an Educational Program and the Use of Electronic Nursing Documentation

    2013 - International Journal of Nursing Knowledge

    In-text: (Bruylands et al. n/a-n/a)

    Your Bibliography: Bruylands, Michelle et al. "Effects On The Quality Of The Nursing Care Process Through An Educational Program And The Use Of Electronic Nursing Documentation." International Journal of Nursing Knowledge (2013): n/a-n/a. Web.

  • Journal

    Bulgurcu, Cavusoglu and Benbasat

    Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness

    2010 - MIS Quarterly

    In-text: (Bulgurcu, Cavusoglu and Benbasat 523)

    Your Bibliography: Bulgurcu, Cavusoglu, and Benbasat. "Information Security Policy Compliance: An Empirical Study Of Rationality-Based Beliefs And Information Security Awareness." MIS Quarterly 34.3 (2010): 523. Web.

  • Journal

    Buys, M.

    Protecting personal information: Implications of the Protection of Personal Information (POPI) Act for healthcare professionals

    2017 - South African Medical Journal

    In-text: (Buys 954)

    Your Bibliography: Buys, M. "Protecting Personal Information: Implications Of The Protection Of Personal Information (POPI) Act For Healthcare Professionals." South African Medical Journal 107.11 (2017): 954. Web.

  • Journal

    Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M. and Baskerville, R.

    Future directions for behavioral information security research

    2013 - Computers & Security

    In-text: (Crossler et al. 90-101)

    Your Bibliography: Crossler, Robert E. et al. "Future Directions For Behavioral Information Security Research." Computers & Security 32 (2013): 90-101. Web.

  • Journal

    Furnell, S. and Clarke, N.

    Power to the people? The evolving recognition of human aspects of security

    2012 - Computers & Security

    In-text: (Furnell and Clarke 983-988)

    Your Bibliography: Furnell, Steven, and Nathan Clarke. "Power To The People? The Evolving Recognition Of Human Aspects Of Security." Computers & Security 31.8 (2012): 983-988. Web.

  • Journal

    Hassan, N. H. and Ismail, Z.

    A Conceptual Model for Investigating Factors Influencing Information Security Culture in Healthcare Environment

    2012 - Procedia - Social and Behavioral Sciences

    In-text: (Hassan and Ismail 1007-1012)

    Your Bibliography: Hassan, Noor Hafizah, and Zuraini Ismail. "A Conceptual Model For Investigating Factors Influencing Information Security Culture In Healthcare Environment." Procedia - Social and Behavioral Sciences 65 (2012): 1007-1012. Web. 30 May 2019.

  • Journal

    Parsons, K., McCormac, A., Pattinson, M., Butavicius, M. and Jerram, C.

    A study of information security awareness in Australian government organisations

    2014 - Information Management & Computer Security

    In-text: (Parsons et al. 334-345)

    Your Bibliography: Parsons, Kathryn et al. "A Study Of Information Security Awareness In Australian Government Organisations." Information Management & Computer Security 22.4 (2014): 334-345. Web.

  • Journal

    Sohrabi Safa, N., Von Solms, R. and Furnell, S.

    Information security policy compliance model in organizations

    2016 - Computers & Security

    In-text: (Sohrabi Safa, Von Solms and Furnell 70-82)

    Your Bibliography: Sohrabi Safa, Nader, Rossouw Von Solms, and Steven Furnell. "Information Security Policy Compliance Model In Organizations." Computers & Security 56 (2016): 70-82. Web.

  • Journal

    Stanton, J. M., Stam, K. R., Mastrangelo, P. and Jolton, J.

    Analysis of end user security behaviors

    2005 - Computers & Security

    In-text: (Stanton et al. 124-133)

    Your Bibliography: Stanton, Jeffrey M. et al. "Analysis Of End User Security Behaviors." Computers & Security 24.2 (2005): 124-133. Web.

  • Journal

    Stevenson, J. E. and Nilsson, G.

    Nurses’ perceptions of an electronic patient record from a patient safety perspective: a qualitative study

    2011 - Journal of Advanced Nursing

    In-text: (Stevenson and Nilsson 667-676)

    Your Bibliography: Stevenson, Jean E., and Gunilla Nilsson. "Nurses’ Perceptions Of An Electronic Patient Record From A Patient Safety Perspective: A Qualitative Study." Journal of Advanced Nursing 68.3 (2011): 667-676. Web.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies