SOURCES

Adams, A., and M. A. Sasse: “Users Are Not the Enemy: Why Users Compromise Security Mechanisms and How to Take Remedial Measures”, Communications of the ACM, 42(12), December 1999, 40–46.

Adams, J, “Risk Management: It’s Not Rocket Science … It’s Much More Complicated”, Risk Management, 54(5) 2007, 36–40.

Albrechtsen, E., and J. Hovden, “The Information Security Digital Divide between Information Security Managers and Users”, Computers & Security, 28(6), 2009 476–490.

Anttila, J., and J. Kajava, “Challenging IS and ISM Standardization for Business Benefits”, paper delivered at ARES ’10 International Conference on Availability, Reliability, and Security, 2010.

Ariely, D., The Honest Truth about Dishonesty, Harper, 2013.

Aytes, K., and ...

Get The Psychology of Information Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.