Changes

Jump to navigation Jump to search
Line 26: Line 26:     
== Diagram/schematic of theory ==
 
== Diagram/schematic of theory ==
[[File:Figure 1- The Process of IT Threat Avoidance.jpg|thumb|Figure 1: The Process of IT Threat Avoidance]]
+
[[File:Figure 1- The Process of IT Threat Avoidance.jpg|thumb|Figure 1: The Process of IT Threat Avoidance|none|542x542px]]
[[File:Figure 2- The Variance Theory View of TTAT.jpg|thumb|Figure 2: The Variance Theory View of TTAT]]
+
[[File:Figure 2- The Variance Theory View of TTAT.jpg|thumb|Figure 2: The Variance Theory View of TTAT|none|547x547px]]
    
== Originating author(s) ==
 
== Originating author(s) ==
Line 36: Line 36:     
== Originating area ==
 
== Originating area ==
*
+
*IS security
    
== Level of analysis ==
 
== Level of analysis ==
Line 60: Line 60:     
== Date last updated ==
 
== Date last updated ==
*
+
*28 Feb 2017

Navigation menu