Home > Refereed Journal Papers > Toward Understanding Distributed Cognition in IT Security Management: The Role of Cues and Norms > Keywords |
<record>
<controlfield tag="001">247</controlfield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">computer supported cooperative work</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">cues and norms</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">distributed cognition</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">risk</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">information technology security management</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">mutual understanding</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">notifications</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">transactive memory</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">usable security</subfield>
</datafield>
</record>