1. Evaluating the effectiveness of learner controlled information security training;Abraham;Comput. Secur.,2019
2. A qualitative study of users’ view on information security;Albrechtsen;Comput. Secur.,2007
3. Generally speaking, context matters: making the case for a change from universal to particular ISP research;Aurigemma;J. Assoc. Inf. Syst.,2019
4. An Exploratory analysis of data breaches from 2005 to 2011: trends and Insights;Ayyagari;J. Inf. Priv. Secur.,2012
5. Review of IS security policy compliance: toward the building blocks of an IS security theory;Balozian;ACM Sigmis Database: Database Adv. Inf. Syst.,2017