|
[1]
|
陈琳. 影响员工遵从信息安全政策的要素研究[D]: [硕士学位论文]. 辽宁: 大连理工大学, 2011: 11-38.
|
|
[2]
|
欧露, 何翼, 秦林瑜, 等. 基于隐私计算理论的短视频平台隐私悖论路径研究[J]. 智能社会研究, 2023(6): 45-62.
|
|
[3]
|
石硕. 隐私计算、自我决定与社会交换理论视角下社交媒体用户隐私披露意愿研究[J]. 新媒体研究, 2023(19): 29-36.
|
|
[4]
|
时颖惠, 薛翔. 政策工具视角下我国信息安全政策研究——基于81份政策文本的量化分析[J]. 现代情报, 2022, 42(1): 130-138.
|
|
[5]
|
张艳红. 社交网站用户自我信息表露行影响因素研究[D]: [硕士学位论文]. 北京: 北京邮电大学, 2013: 30-35.
|
|
[6]
|
徐贤贤. 基于用户感知的A银行手机银行业务服务质量提升研究[D]: [硕士学位论文]. 杭州: 浙江工商大学, 2021: 51-69.
|
|
[7]
|
强月新, 肖迪. 社交网络中的隐私悖论: 隐私关注、自我表露意愿对社交推文发送的影响研究[J]. 国际新闻界. 2019, 41(12): 6-26.
|
|
[8]
|
赵越, 马玉伟, 韩磊. 集团企业一体化信息系统安全管理策略研究[J]. 军民两用技术与产品, 2024(4): 66-69.
|
|
[9]
|
汪丽. “一带一路”国家网络安全政策法律动态及趋势[J]. 信息安全与通信保密, 2019(7): 17-21.
|
|
[10]
|
闫履鑫. 企业威慑与员工信息安全政策遵从意愿——辱虐管理的调节效应[D]: [硕士学位论文]. 大连: 东北财经大学, 2019.
|
|
[11]
|
黄玥, 周丽霞, 蒲攀. 基于AHP方法的我国信息安全政策方案优化决策研究[J]. 现代情报, 2015, 35(3): 77-81.
|
|
[12]
|
Höne, K. and Eloff, J.H.P. (2002) Information Security Policy—What Do International Information Security Standards Say? Computers & Security, 21, 402-409. [Google Scholar] [CrossRef]
|
|
[13]
|
Sohrabi Safa, N., Von Solms, R. and Furnell, S. (2016) Information Security Policy Compliance Model in Organizations. Computers & Security, 56, 70-82. [Google Scholar] [CrossRef]
|
|
[14]
|
Kenneth, J.K. and Thomas, E.M. (2015) Information Security Policy: An Organizational-Level Process Model. Computers & Security, 7, 793-508.
|
|
[15]
|
Johnston, A.C., Warkentin, M., McBride, M. and Carter, L. (2016) Dispositional and Situational Factors: Influences on Information Security Policy Violations. European Journal of Information Systems, 25, 231-251. [Google Scholar] [CrossRef]
|
|
[16]
|
Kadam, A.W. (2007) Information Security Policy Development and Implementation. Information Systems Security, 16, 246-256. [Google Scholar] [CrossRef]
|
|
[17]
|
Williams, P. (2001) Information Security Governance. Information Security Technical Report, 6, 60-70. [Google Scholar] [CrossRef]
|
|
[18]
|
Cram, W.A., Proudfoot, J.G. and D’Arcy, J. (2017) Organizational Information Security Policies: A Review and Research Framework. European Journal of Information Systems, 26, 605-641. [Google Scholar] [CrossRef]
|
|
[19]
|
Mikko, S. and Pahnila, S. (2002) Compliance with Information Security Policies: An Empirical Investigation. Computers, 2, 64-71.
|
|
[20]
|
Da Veiga, A. and Eloff, J.H.P. (2010) A Framework and Assessment Instrument for Information Security Culture. Computers & Security, 29, 196-207. [Google Scholar] [CrossRef]
|