default search action
Information Management & Computer Security, Volume 21
Volume 21, Number 1, 2013
- Ayako Komatsu, Daisuke Takagi, Toshihiko Takemura:
Human aspects of information security: An empirical study of intentional versus actual behavior. 5-15 - Dimitrios Michalopoulos, Ioannis Mavridis:
A method to calculate social networking hazard probability in definite time. 16-29 - Teodor Sommestad, Amund Hunstad:
Intrusion detection and the role of the system administrator. 30-40 - Cristian Thiago Moecke, Melanie Volkamer:
Usable secure email communications: criteria and evaluation of existing approaches. 41-52 - Evangelos D. Frangopoulos, Mariki M. Eloff, Lucas M. Venter:
Psychosocial risks: Can their effects on the security of information systems really be ignored? 53-65
Volume 21, Number 2, 2013
- Pablo Carballude González:
Fingerprinting Tor. 73-90 - Iwan Gulenko:
Social against social engineering: Concept and development of a Facebook application to raise security and risk awareness. 91-101 - Joshua Arvin S. Lat, Rod Xavier R. Bondoc, Kevin Charles V. Atienza:
SOUL System: secure online USB login system. 102-109 - Mariah Strella P. Indrinal, Ranyel Bryan L. Maliwanag, Marynyriene I. Silvestre:
VoxGrid: a mobile voice verification system. 110-120 - Ang Cui, Jatin Kataria, Salvatore J. Stolfo:
Revisiting the myth of Cisco IOS diversity: recent advances in reliable shellcode design. 121-138
Volume 21, Number 3, 2013
- Mahmood Hajli:
A research framework for social commerce adoption. 144-154 - Kai S. Koong, Mohammad I. Merhi, Jun Sun:
Push and pull effects of homeland information security incentives. 155-176 - Costas Lambrinoudakis:
Evaluating and enriching information and communication technologies compliance frameworks with regard to privacy. 177-190 - Hussein Shaaban, Marc Conrad:
Democracy, culture and information security: a case study in Zanzibar. 191-201 - Stefan Taubenberger, Jan Jürjens, Yijun Yu, Bashar Nuseibeh:
Resolving vulnerability identification errors using security requirements on business process models. 202-223
Volume 21, Number 4, 2013
- Kallaya Jairak, Prasong Praneetpolgrang:
Applying IT governance balanced scorecard and importance-performance analysis for providing IT governance strategy in university. 228-249 - Hannes Holm, Mathias Ekstedt:
Estimates on the effectiveness of web application firewalls against targeted attacks. 250-265 - Karin Hedström, Fredrik Karlsson, Ella Kolkowska:
Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale. 266-287 - Tarek S. Sobh:
Anomaly detection based on hybrid artificial immune principles. 288-314 - Alexandros Papanikolaou, Vasileios Vlachos, Andreas Venieris, Christos Ilioudis, Konstantinos Papapanagiotou, Anastasios Stasinopoulos:
A framework for teaching network security in academic environments. 315-338
Volume 21, Number 5, 2013
- Mark Ciampa:
A comparison of password feedback mechanisms and their impact on password entropy. 344-359 - Hamed Khiabani, Norbik Bashah Idris, Jamalul-lail Ab Manan:
Unified trust establishment by leveraging remote attestation - modeling and analysis. 360-380 - Wu He:
A survey of security risks of mobile social media through blog mining and an extensive literature search. 381-400 - Vinod Pathari, Rajendra M. Sonar:
Deriving an information security assurance indicator at the organizational level. 401-419 - Michael Levi, Matthew Leighton Williams:
Multi-agency partnerships in cybercrime reduction: Mapping the UK information assurance network cooperation space. 420-443
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.