
Once you give users access to your computer systems, you're vulnerable! Giving untrained users access to your computer information systems is like giving the keys of a Lamborghini to a teenager! Your computer systems are an accident waiting to happen, unless you have an effective computer security training program embedded within your high-technology security. Because computer security training is usually mandatory, employee attitude affects what they'll get out of the training. Employees dread (and resist) computer security training. The author discusses how to deliver computer security training to users, to reduce the risks to your information systems. >
| citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 1 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
