![Table 4 from Antecedents of Employees' Information Security Awareness - Review, synthesis, and Directions for Future Research | Semantic Scholar Table 4 from Antecedents of Employees' Information Security Awareness - Review, synthesis, and Directions for Future Research | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/7922e2a9ec8b59a2fe56e6dcf9a33de3dbf9080c/5-Table1-1.png)
Table 4 from Antecedents of Employees' Information Security Awareness - Review, synthesis, and Directions for Future Research | Semantic Scholar
![International Journal of Information Security and Privacy (IJISP): 1930-1650, 1930-1669: Security & Forensics Journals | IGI Global International Journal of Information Security and Privacy (IJISP): 1930-1650, 1930-1669: Security & Forensics Journals | IGI Global](https://coverimages.igi-global.com/cover-images/covers/ijisp.png)
International Journal of Information Security and Privacy (IJISP): 1930-1650, 1930-1669: Security & Forensics Journals | IGI Global
![Using Deceptive Information in Computer Security Defenses: Security & Forensics Journal Article | IGI Global Using Deceptive Information in Computer Security Defenses: Security & Forensics Journal Article | IGI Global](https://coverimages.igi-global.com/cover-images/covers/ijcwt.png)