SlideShare a Scribd company logo
1
7 th International Conference on Digital Economy
May 9th-11th, 2022
Bucharest, Romania
Olfa ISMAIL
Relationship between culture and user behavior in the
context of information security systems: a qualitative
study in SMEs
06 Conclusion
2
01 Context
03 Conceptualframework
04 Methodology
02 Theoreticalfoundations
05 Results and discussion
3
01 Context
Employees remain the "weak link" in organizational IS security
Relationship : IS culture-IS behavior
4
What is the relationship between IS culture and IS
user security-related behavior?
Security ownership
5
02 Theoreticalfoundations
Organizational Culture
IS Security Culture Security awareness Security Compliance
28/04/2022 6
6
Positioning of the factors that constitute IS security culture on
three levels of culture (Schein, 1985)
IS behaviors
7
03 Conceptualframework
Framework of the Relationship between IS security culture and
security-related behavior
8
04 Methodology
Qualitative
study
9
05 Results and discussion
Estimation of the security culture of each user
Interview guide COBIT (Control Objectives for Information and Related Technology)
High 7
Medium 10
Low 5
Security-related behaviors performed by users
High 8
Medium 8
Low 6
“Yes, it's important to
know how to pay
attention to what we say,
to know how to use our
computer in a very
controlled way''
10
17 users out of 22 (77%) keep the same level in security
culture as in security behaviors
Parsons et al (2015) Flores et al (2016) Solomon and Brown (2020)
Age of the user Miltgen et al (2014)
Sheng et al (2010)
Parsons et al (2015)
Position held Guo and Yufei (2012)
11
06 Conclusion
Contribution
The limits of research
Futureperspectives
Thank you

More Related Content

Similar to Relationship between culture and user's behavior in the context of information security systems: A qualitative study in SMEs

Towards a Structured Information Security Awareness Programme
Towards a Structured Information Security Awareness ProgrammeTowards a Structured Information Security Awareness Programme
Towards a Structured Information Security Awareness Programme
tulipbiru64
 
Information Technology (IT) Security Framework for Kenyan Small and Medium En...
Information Technology (IT) Security Framework for Kenyan Small and Medium En...Information Technology (IT) Security Framework for Kenyan Small and Medium En...
Information Technology (IT) Security Framework for Kenyan Small and Medium En...
CSCJournals
 
Feedback from Lee Smith-Dennis250320 1941You have produced .docx
Feedback from Lee Smith-Dennis250320 1941You have produced .docxFeedback from Lee Smith-Dennis250320 1941You have produced .docx
Feedback from Lee Smith-Dennis250320 1941You have produced .docx
mglenn3
 
Risk based it auditing for non it auditors (basics of it auditing) final 12
Risk based it auditing for non it auditors (basics of it auditing) final 12Risk based it auditing for non it auditors (basics of it auditing) final 12
Risk based it auditing for non it auditors (basics of it auditing) final 12
Thilak Pathirage -Senior IT Gov and Risk Consultant
 
Best practice framework for information technology security governance in In...
Best practice framework for information technology security  governance in In...Best practice framework for information technology security  governance in In...
Best practice framework for information technology security governance in In...
IJECEIAES
 
Adaptive it governance in digital banking era
Adaptive it governance in digital banking eraAdaptive it governance in digital banking era
Adaptive it governance in digital banking era
Anisah Herdiyanti
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information Protection
PECB
 
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
Finni Rice
 
Sarwono sutikno wisuda stsn - 10 nov 2015 v2
Sarwono sutikno   wisuda stsn - 10 nov 2015 v2Sarwono sutikno   wisuda stsn - 10 nov 2015 v2
Sarwono sutikno wisuda stsn - 10 nov 2015 v2
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F
 
From Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital RulesFrom Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital Rules
Rónán Kennedy
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
ChantellPantoja184
 
Security in Learning Management Systems: Designing Collaborative Learning Act...
Security in Learning Management Systems: Designing Collaborative Learning Act...Security in Learning Management Systems: Designing Collaborative Learning Act...
Security in Learning Management Systems: Designing Collaborative Learning Act...
eLearning Papers
 
Issues on Management and Governance of Data Security In HEIs
Issues on Management and Governance of Data Security In HEIsIssues on Management and Governance of Data Security In HEIs
Issues on Management and Governance of Data Security In HEIs
ijtsrd
 
CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...
CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...
CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...
ijsptm
 
Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...
IJECEIAES
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and Prospect
IOSR Journals
 
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, EthiopiaPresentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
Oxford Martin Centre, OII, and Computer Science at the University of Oxford
 
Information Systems Management
Information Systems ManagementInformation Systems Management
Information Systems Management
ijitcs
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry Standards
Ansgar Koene
 
Best Practices for Harnessing Generative AI and LLMs1.pdf
Best Practices for Harnessing Generative AI and LLMs1.pdfBest Practices for Harnessing Generative AI and LLMs1.pdf
Best Practices for Harnessing Generative AI and LLMs1.pdf
E42 (Light Information Systems Pvt Ltd)
 

Similar to Relationship between culture and user's behavior in the context of information security systems: A qualitative study in SMEs (20)

Towards a Structured Information Security Awareness Programme
Towards a Structured Information Security Awareness ProgrammeTowards a Structured Information Security Awareness Programme
Towards a Structured Information Security Awareness Programme
 
Information Technology (IT) Security Framework for Kenyan Small and Medium En...
Information Technology (IT) Security Framework for Kenyan Small and Medium En...Information Technology (IT) Security Framework for Kenyan Small and Medium En...
Information Technology (IT) Security Framework for Kenyan Small and Medium En...
 
Feedback from Lee Smith-Dennis250320 1941You have produced .docx
Feedback from Lee Smith-Dennis250320 1941You have produced .docxFeedback from Lee Smith-Dennis250320 1941You have produced .docx
Feedback from Lee Smith-Dennis250320 1941You have produced .docx
 
Risk based it auditing for non it auditors (basics of it auditing) final 12
Risk based it auditing for non it auditors (basics of it auditing) final 12Risk based it auditing for non it auditors (basics of it auditing) final 12
Risk based it auditing for non it auditors (basics of it auditing) final 12
 
Best practice framework for information technology security governance in In...
Best practice framework for information technology security  governance in In...Best practice framework for information technology security  governance in In...
Best practice framework for information technology security governance in In...
 
Adaptive it governance in digital banking era
Adaptive it governance in digital banking eraAdaptive it governance in digital banking era
Adaptive it governance in digital banking era
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information Protection
 
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
 
Sarwono sutikno wisuda stsn - 10 nov 2015 v2
Sarwono sutikno   wisuda stsn - 10 nov 2015 v2Sarwono sutikno   wisuda stsn - 10 nov 2015 v2
Sarwono sutikno wisuda stsn - 10 nov 2015 v2
 
From Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital RulesFrom Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital Rules
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
 
Security in Learning Management Systems: Designing Collaborative Learning Act...
Security in Learning Management Systems: Designing Collaborative Learning Act...Security in Learning Management Systems: Designing Collaborative Learning Act...
Security in Learning Management Systems: Designing Collaborative Learning Act...
 
Issues on Management and Governance of Data Security In HEIs
Issues on Management and Governance of Data Security In HEIsIssues on Management and Governance of Data Security In HEIs
Issues on Management and Governance of Data Security In HEIs
 
CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...
CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...
CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...
 
Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and Prospect
 
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, EthiopiaPresentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
 
Information Systems Management
Information Systems ManagementInformation Systems Management
Information Systems Management
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry Standards
 
Best Practices for Harnessing Generative AI and LLMs1.pdf
Best Practices for Harnessing Generative AI and LLMs1.pdfBest Practices for Harnessing Generative AI and LLMs1.pdf
Best Practices for Harnessing Generative AI and LLMs1.pdf
 

More from ICDEcCnferenece

Total Experience. How to create user-focused digital products that accelerate...
Total Experience. How to create user-focused digital products that accelerate...Total Experience. How to create user-focused digital products that accelerate...
Total Experience. How to create user-focused digital products that accelerate...
ICDEcCnferenece
 
Two faces of the same coin: Exploring the multilateral perspective of informa...
Two faces of the same coin: Exploring the multilateral perspective of informa...Two faces of the same coin: Exploring the multilateral perspective of informa...
Two faces of the same coin: Exploring the multilateral perspective of informa...
ICDEcCnferenece
 
Spreading the Word on the Digital Economy
Spreading the Word on the Digital EconomySpreading the Word on the Digital Economy
Spreading the Word on the Digital Economy
ICDEcCnferenece
 
Readiness of Russian companies for digital transformation: what's changed?
Readiness of Russian companies for digital transformation: what's changed?Readiness of Russian companies for digital transformation: what's changed?
Readiness of Russian companies for digital transformation: what's changed?
ICDEcCnferenece
 
Possibilities and limitations of the Croatian police in communication via soc...
Possibilities and limitations of the Croatian police in communication via soc...Possibilities and limitations of the Croatian police in communication via soc...
Possibilities and limitations of the Croatian police in communication via soc...
ICDEcCnferenece
 
Changes in Global Virtual Team Conflict Over Time: The Role of Openness to Li...
Changes in Global Virtual Team Conflict Over Time: The Role of Openness to Li...Changes in Global Virtual Team Conflict Over Time: The Role of Openness to Li...
Changes in Global Virtual Team Conflict Over Time: The Role of Openness to Li...
ICDEcCnferenece
 
Cause-related marketing: towards an exploration of the factors favoring the p...
Cause-related marketing: towards an exploration of the factors favoring the p...Cause-related marketing: towards an exploration of the factors favoring the p...
Cause-related marketing: towards an exploration of the factors favoring the p...
ICDEcCnferenece
 
Examining the Impact of Digitalization on Unemployment rate During COVID-19 P...
Examining the Impact of Digitalization on Unemployment rate During COVID-19 P...Examining the Impact of Digitalization on Unemployment rate During COVID-19 P...
Examining the Impact of Digitalization on Unemployment rate During COVID-19 P...
ICDEcCnferenece
 
Success Factors for the Use of Open Educational Resources - A Quantitative Su...
Success Factors for the Use of Open Educational Resources - A Quantitative Su...Success Factors for the Use of Open Educational Resources - A Quantitative Su...
Success Factors for the Use of Open Educational Resources - A Quantitative Su...
ICDEcCnferenece
 
A Maturity Model for Open Educational Resources in Higher Education Instituti...
A Maturity Model for Open Educational Resources in Higher Education Instituti...A Maturity Model for Open Educational Resources in Higher Education Instituti...
A Maturity Model for Open Educational Resources in Higher Education Instituti...
ICDEcCnferenece
 
AI-based Business Models in Healthcare: An Empirical Study of Clinical Decisi...
AI-based Business Models in Healthcare: An Empirical Study of Clinical Decisi...AI-based Business Models in Healthcare: An Empirical Study of Clinical Decisi...
AI-based Business Models in Healthcare: An Empirical Study of Clinical Decisi...
ICDEcCnferenece
 
Towards a better digital transformation: learning from the experience of a di...
Towards a better digital transformation: learning from the experience of a di...Towards a better digital transformation: learning from the experience of a di...
Towards a better digital transformation: learning from the experience of a di...
ICDEcCnferenece
 
Digital Gender Gap in EU-27 ICT Employment During COVID-19 Impact
Digital Gender Gap in EU-27 ICT Employment During COVID-19 ImpactDigital Gender Gap in EU-27 ICT Employment During COVID-19 Impact
Digital Gender Gap in EU-27 ICT Employment During COVID-19 Impact
ICDEcCnferenece
 
Consumer Satisfaction using fitness technology innovation
Consumer Satisfaction using fitness technology innovationConsumer Satisfaction using fitness technology innovation
Consumer Satisfaction using fitness technology innovation
ICDEcCnferenece
 
Implementing an agile change process to improve digital transformation in hig...
Implementing an agile change process to improve digital transformation in hig...Implementing an agile change process to improve digital transformation in hig...
Implementing an agile change process to improve digital transformation in hig...
ICDEcCnferenece
 
What leads customer to create and participate in anti-brand community: a netn...
What leads customer to create and participate in anti-brand community: a netn...What leads customer to create and participate in anti-brand community: a netn...
What leads customer to create and participate in anti-brand community: a netn...
ICDEcCnferenece
 
Closing session: awards for best papers and reviewers
Closing session: awards for best papers and  reviewersClosing session: awards for best papers and  reviewers
Closing session: awards for best papers and reviewers
ICDEcCnferenece
 
Transition to Tertiary Education and eLearning in Lebanon against the backdro...
Transition to Tertiary Education and eLearning in Lebanon against the backdro...Transition to Tertiary Education and eLearning in Lebanon against the backdro...
Transition to Tertiary Education and eLearning in Lebanon against the backdro...
ICDEcCnferenece
 
Internet of Things healthcare system for reducing economic burden
Internet of Things healthcare system for reducing economic burdenInternet of Things healthcare system for reducing economic burden
Internet of Things healthcare system for reducing economic burden
ICDEcCnferenece
 
Online Education in Lebanon during the Covid-19 Crisis: An Ongoing Coping Phase
Online Education in Lebanon during the Covid-19 Crisis: An Ongoing Coping PhaseOnline Education in Lebanon during the Covid-19 Crisis: An Ongoing Coping Phase
Online Education in Lebanon during the Covid-19 Crisis: An Ongoing Coping Phase
ICDEcCnferenece
 

More from ICDEcCnferenece (20)

Total Experience. How to create user-focused digital products that accelerate...
Total Experience. How to create user-focused digital products that accelerate...Total Experience. How to create user-focused digital products that accelerate...
Total Experience. How to create user-focused digital products that accelerate...
 
Two faces of the same coin: Exploring the multilateral perspective of informa...
Two faces of the same coin: Exploring the multilateral perspective of informa...Two faces of the same coin: Exploring the multilateral perspective of informa...
Two faces of the same coin: Exploring the multilateral perspective of informa...
 
Spreading the Word on the Digital Economy
Spreading the Word on the Digital EconomySpreading the Word on the Digital Economy
Spreading the Word on the Digital Economy
 
Readiness of Russian companies for digital transformation: what's changed?
Readiness of Russian companies for digital transformation: what's changed?Readiness of Russian companies for digital transformation: what's changed?
Readiness of Russian companies for digital transformation: what's changed?
 
Possibilities and limitations of the Croatian police in communication via soc...
Possibilities and limitations of the Croatian police in communication via soc...Possibilities and limitations of the Croatian police in communication via soc...
Possibilities and limitations of the Croatian police in communication via soc...
 
Changes in Global Virtual Team Conflict Over Time: The Role of Openness to Li...
Changes in Global Virtual Team Conflict Over Time: The Role of Openness to Li...Changes in Global Virtual Team Conflict Over Time: The Role of Openness to Li...
Changes in Global Virtual Team Conflict Over Time: The Role of Openness to Li...
 
Cause-related marketing: towards an exploration of the factors favoring the p...
Cause-related marketing: towards an exploration of the factors favoring the p...Cause-related marketing: towards an exploration of the factors favoring the p...
Cause-related marketing: towards an exploration of the factors favoring the p...
 
Examining the Impact of Digitalization on Unemployment rate During COVID-19 P...
Examining the Impact of Digitalization on Unemployment rate During COVID-19 P...Examining the Impact of Digitalization on Unemployment rate During COVID-19 P...
Examining the Impact of Digitalization on Unemployment rate During COVID-19 P...
 
Success Factors for the Use of Open Educational Resources - A Quantitative Su...
Success Factors for the Use of Open Educational Resources - A Quantitative Su...Success Factors for the Use of Open Educational Resources - A Quantitative Su...
Success Factors for the Use of Open Educational Resources - A Quantitative Su...
 
A Maturity Model for Open Educational Resources in Higher Education Instituti...
A Maturity Model for Open Educational Resources in Higher Education Instituti...A Maturity Model for Open Educational Resources in Higher Education Instituti...
A Maturity Model for Open Educational Resources in Higher Education Instituti...
 
AI-based Business Models in Healthcare: An Empirical Study of Clinical Decisi...
AI-based Business Models in Healthcare: An Empirical Study of Clinical Decisi...AI-based Business Models in Healthcare: An Empirical Study of Clinical Decisi...
AI-based Business Models in Healthcare: An Empirical Study of Clinical Decisi...
 
Towards a better digital transformation: learning from the experience of a di...
Towards a better digital transformation: learning from the experience of a di...Towards a better digital transformation: learning from the experience of a di...
Towards a better digital transformation: learning from the experience of a di...
 
Digital Gender Gap in EU-27 ICT Employment During COVID-19 Impact
Digital Gender Gap in EU-27 ICT Employment During COVID-19 ImpactDigital Gender Gap in EU-27 ICT Employment During COVID-19 Impact
Digital Gender Gap in EU-27 ICT Employment During COVID-19 Impact
 
Consumer Satisfaction using fitness technology innovation
Consumer Satisfaction using fitness technology innovationConsumer Satisfaction using fitness technology innovation
Consumer Satisfaction using fitness technology innovation
 
Implementing an agile change process to improve digital transformation in hig...
Implementing an agile change process to improve digital transformation in hig...Implementing an agile change process to improve digital transformation in hig...
Implementing an agile change process to improve digital transformation in hig...
 
What leads customer to create and participate in anti-brand community: a netn...
What leads customer to create and participate in anti-brand community: a netn...What leads customer to create and participate in anti-brand community: a netn...
What leads customer to create and participate in anti-brand community: a netn...
 
Closing session: awards for best papers and reviewers
Closing session: awards for best papers and  reviewersClosing session: awards for best papers and  reviewers
Closing session: awards for best papers and reviewers
 
Transition to Tertiary Education and eLearning in Lebanon against the backdro...
Transition to Tertiary Education and eLearning in Lebanon against the backdro...Transition to Tertiary Education and eLearning in Lebanon against the backdro...
Transition to Tertiary Education and eLearning in Lebanon against the backdro...
 
Internet of Things healthcare system for reducing economic burden
Internet of Things healthcare system for reducing economic burdenInternet of Things healthcare system for reducing economic burden
Internet of Things healthcare system for reducing economic burden
 
Online Education in Lebanon during the Covid-19 Crisis: An Ongoing Coping Phase
Online Education in Lebanon during the Covid-19 Crisis: An Ongoing Coping PhaseOnline Education in Lebanon during the Covid-19 Crisis: An Ongoing Coping Phase
Online Education in Lebanon during the Covid-19 Crisis: An Ongoing Coping Phase
 

Recently uploaded

1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 

Recently uploaded (16)

1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 

Relationship between culture and user's behavior in the context of information security systems: A qualitative study in SMEs