6Frederic Cuppens.Managing alerts in a multi-intrusion detection environment[].Proceedings of the th Annual Computer Security Applications Conference (ACSAC’).2001
7Stanton, J.M,Stam, K.R,Mastrangelo, P.Analysis of end-user securitybehaviours[].Computers and Security.2005
8Kenneth J.Knapp,Thomas E.Marshall.Information security policy:An organizational-level process model[].Computers and Security.2009
9Tejaswini Herath,H. R Rao.Encouraging information security behaviors inorganizations: Role of penalties,pressures and perceived effectiveness[].Decision Support.2009
10J.F.Van Niekerk,R.Von Solms.Information securityculture:A management perspective[].Computers and Security.2010