


default search action
Information Management & Computer Security, Volume 17
Volume 17, Number 1, 2009
- Rodrigo Werlinger, Kirstie Hawkey, Konstantin Beznosov:
An integrated view of human, organizational, and technological challenges of IT security management. 4-19 - David James Bennett, Paul Stephens:
A cognitive walkthrough of Autopsy Forensic Browser. 20-29 - Kirsi Helkala
, Einar Snekkenes:
Formalizing the ranking of authentication products. 30-43 - Martyn Styles, Theo Tryfonas
:
Using penetration testing feedback to cultivate an atmosphere of proactive security amongst end-users. 44-52 - Taimur Bakhshi
, Maria Papadaki
, Steven Furnell
:
Social engineering: assessing vulnerabilities in practice. 53-63
Volume 17, Number 2, 2009
- Ahmad A. Abu-Musa
:
Exploring the importance and implementation of COBIT processes in Saudi organizations: An empirical study. 73-95 - Juan Carlos Roca, Juan José García
, Juan José de la Vega:
The importance of perceived trust, security and privacy in online trading systems. 96-113 - Ali H. Al-Badi, Rafi Ashrafi
, Ali O. Al-Majeeni, Pam J. Mayhew:
IT disaster recovery: Oman and Cyclone Gonu lessons learned. 114-126 - Alan D. Smith:
Internet retail banking: A competitive analysis in an increasingly financially troubled environment. 127-150 - Jayanthi Ranjan
, Vishal Bhatnagar:
A holistic framework for mCRM - data mining perspective. 151-165 - Mohamed Intan Salwani
, Govindan Marthandan
, Mohd Daud Norzaidi
, Siong Choy Chong
:
E-commerce usage and business performance in the Malaysian tourism sector: empirical analysis. 166-185
Volume 17, Number 3, 2009
- Kamel Rouibah
, Sulaiman Al-Rafee:
Requirement engineering elicitation methods: A Kuwaiti empirical study about familiarity, usage and perceived value. 192-217 - Tzu-Chuan Chou, An-Sheng Lee:
A process model for customer relational assets creation: A case study of online securities trading platform. 218-233 - Olufunke R. Vincent, Olusegun Folorunso, Ayodele Akinde:
On consolidation model in e-bill presentment and payment. 234-247 - Wing S. Chow, Wai On Ha:
Determinants of the critical success factor of disaster recovery planning for information systems. 248-275 - Anil Gurung
, Xin (Robert) Luo, Qinyu Liao:
Consumer motivations in taking action against spyware: an empirical investigation. 276-289
Volume 17, Number 4, 2009
- Jordan Shropshire:
A canonical analysis of intentional information security breaches by insiders. 296-310 - Pavlos S. Efraimidis, George Drosatos
, Fotis Nalbadis, Aimilia Tasidou:
Towards privacy in personal data management. 311-329 - Jie Zhang
, Brian J. Reithel, Han Li:
Impact of perceived technical protection on security behaviors. 330-340 - Michael Workman:
How perceptions of justice affect security attitudes: suggestions for practitioners and researchers. 341-353
Volume 17, Number 5, 2009
- Zeeshan Ahmed
:
Proposing semantic-oriented agent and knowledge base product data management. 360-371 - Princely Ifinedo:
Information technology security management concerns in global financial services institutions: Is national culture a differentiator? 372-387 - Janne Merete Hagen, Eirik Albrechtsen:
Effects on employees' information security abilities by e-learning. 388-407 - Cheng-Chi Lee
, Min-Shiang Hwang, Chih-Wei Lin:
A new English auction scheme using the bulletin board system. 408-417

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.