@incollection{, 82BF55961D158650AECAE6958B1A7EB1 , author={{Whyte StellaTonye} and {Walden University}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1912125 } @book{b0, , title={{Strategies for Improving Internal Controls in Small and Medium Enterprises in Nigeria.Walden Dissertations and Doctoral Studies}} , author={{ AOAladejebi }} , year={2017} } @book{b1, , title={{}} , author={{ StephenDahunsi } and { Olumuyiwaariyo }} } @incollection{b2, , title={{Aligning Technology, Policy and Culture to Enhance Nuclear Security: A Comparative Analysis of Nigeria and the}} , author={{ JohnDAuxier } and { Ii; } and { JosephStainback } and { IVRuric } and { HowardHall } and { Lewis }} , journal={{International Journal of Nuclear Security}} 3 1 , year={2017} } @incollection{b3, , title={{Violation of safeguards by trusted personnel and understanding related information security concerns}} , author={{ GDhillon }} , journal={{Computers & Security}} 20 2 , year={2001} } @incollection{b4, , title={{Computer crimes: theorizing about the enemy within}} , author={{ GDhillon } and { S&moores }} 10.1016/S0167-4048(01 , journal={{Computers & Security}} 20 8 , year={2001} } @book{b5, , title={{Implementing Security Education, Training, and Awareness Programs}} , author={{ JFlynn }} } @incollection{b6, , title={{Power to the people? The evolving recognition of human aspects of security}} , author={{ SFurnell } and { NClarke }} , journal={{Computers & Security}} 31 8 , year={2012} , note={Retrieved from the Walden Library databases} } @incollection{b7, , title={{Basing cyber security training on user perceptions}} , author={{ SMFurman } and { MFTheofanos } and { Y.-YChoong } and { BStanton }} , journal={{IEEE Security & Privacy}} 10 2 , year={2012} , note={Retrieved from Walden Library Database} } @incollection{b8, , title={{The importance of security, education, training, and awareness program}} , author={{ SHight }} , booktitle={{City of Raleigh}} , year={2005. November 2005} } @incollection{b9, , title={{Security education against phishing: A modest proposal for a major rethink}} , author={{ IKirlappos } and { MA&sasse }} , journal={{IEEE Security & Privacy}} 10 2 , year={2012} , note={Retrieved from the Walden Library databases} } @book{b10, , title={{University Dissertation and Doctoral study}} , author={{ Nigeria } and { Walden }} } @incollection{b11, , title={{Who falls for phish? A demographic analysis of phishing susceptibility and the effectiveness of interventions}} , author={{ SSheng } and { MHolbrook } and { PKumaraguru } and { LFCranor } and { JDowns }} , booktitle={{CHI '10 -Proceedings of the SIGCHI Conference on Human Factors in Computing Systems}} , year={2010} } @incollection{b12, , title={{Who falls for phish? A demographic analysis of phishing susceptibility and the effectiveness of interventions}} , author={{ SSheng } and { MHolbrook } and { PKumaraguru } and { LFCranor } and { JDowns }} , booktitle={{CHI '10 -Proceedings of the SIGCHI Conference on Human Factors in Computing Systems}} , year={2010} , note={Retrieved from the Walden Library databases} } @book{b13, , title={{Computer security: Principles and practice. 2 nd Ed}} , author={{ WStallings } and { LBrown }} , year={2012} , publisher={Pearson} } @incollection{b14, , title={{The human element of information security}} , author={{ HThompson }} , journal={{IEEE Security & Privacy}} 11 1 , year={2013} , note={Retrieved from the Walden Library databases} } @incollection{b15, , title={{Poor Management and Failed Banks: A Study of Banks with State Governments Participation in Nigeria}} , author={{ JN NUgoani }} , journal={{International Journal of Economics, Commerce and Management United Kingdom}} 2 2 , year={2014} } @book{b16, , title={{Understanding the perpetration of employee computer crime in the organizational context. Information and organization}} , author={{ RWillison }} 10.1016/j.infoandorg.2006.08.001 , year={2006} 16 } @book{b17, , title={{Strategies for Improving Internal Control in Small and Medium Enterprises in}} , author={{ AOlufemi }} , year={2017} }