Search dblp for Publications

export results for "toc:db/journals/imcs/imcs22.bht:"

 download as .bib file

@article{DBLP:journals/imcs/AhmadM14,
  author       = {Atif Ahmad and
                  Sean B. Maynard},
  title        = {Teaching information security management: reflections and experiences},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {513--536},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-08-2013-0058},
  doi          = {10.1108/IMCS-08-2013-0058},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AhmadM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AlazabHAKA14,
  author       = {Ammar Alazab and
                  Michael Hobbs and
                  Jemal H. Abawajy and
                  Ansam Khraisat and
                  Mamoun Alazab},
  title        = {Using response action with intelligent intrusion detection and prevention
                  system against web application malware},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {431--449},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-02-2013-0007},
  doi          = {10.1108/IMCS-02-2013-0007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AlazabHAKA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AtoumOA14,
  author       = {Issa Atoum and
                  Ahmed Otoom and
                  Amer Abu{-}Ali},
  title        = {A holistic cyber security implementation framework},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {251--264},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-02-2013-0014},
  doi          = {10.1108/IMCS-02-2013-0014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AtoumOA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Azhari14,
  author       = {Firman Azhari},
  title        = {Quick detection of {NFC} vulnerability: Implementation weakness exploitation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {134--140},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-09-2013-0067},
  doi          = {10.1108/IMCS-09-2013-0067},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Azhari14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BahlW14,
  author       = {Sanjay Bahl and
                  Om Prakash Wali},
  title        = {Perceived significance of information security governance to predict
                  the information security service quality in software service industry:
                  An empirical analysis},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {2--23},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-01-2013-0002},
  doi          = {10.1108/IMCS-01-2013-0002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BahlW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChoiN14,
  author       = {Jae Choi and
                  Derek L. Nazareth},
  title        = {Repairing trust in an e-commerce and security context: an agent-based
                  modeling approach},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {490--512},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-09-2013-0069},
  doi          = {10.1108/IMCS-09-2013-0069},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChoiN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DArcyG14,
  author       = {John D'Arcy and
                  Gwen Greene},
  title        = {Security culture and the employment relationship as drivers of employees'
                  security compliance},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {474--489},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-08-2013-0057},
  doi          = {10.1108/IMCS-08-2013-0057},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DArcyG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FenzHNP14,
  author       = {Stefan Fenz and
                  Johannes Heurix and
                  Thomas Neubauer and
                  Fabian Pechstein},
  title        = {Current challenges in information security risk management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {410--430},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-07-2013-0053},
  doi          = {10.1108/IMCS-07-2013-0053},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FenzHNP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FloresHSE14,
  author       = {Waldo Rocha Flores and
                  Hannes Holm and
                  Gustav Svensson and
                  G{\"{o}}ran Ericsson},
  title        = {Using phishing experiments and scenario-based surveys to understand
                  security behaviours in practice},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {393--406},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-11-2013-0083},
  doi          = {10.1108/IMCS-11-2013-0083},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FloresHSE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Gulenko14,
  author       = {Iwan Gulenko},
  title        = {Improving passwords: influence of emotions on security behaviour},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {167--178},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-09-2013-0068},
  doi          = {10.1108/IMCS-09-2013-0068},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Gulenko14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HaggertyHT14,
  author       = {John Haggerty and
                  Sheryllynne Haggerty and
                  Mark John Taylor},
  title        = {Forensic triage of email network narratives through visualisation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {358--370},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-11-2013-0080},
  doi          = {10.1108/IMCS-11-2013-0080},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HaggertyHT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HarrisP14,
  author       = {Mark A. Harris and
                  Karen P. Patten},
  title        = {Mobile device security considerations for small- and medium-sized
                  enterprise business mobility},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {97--114},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-03-2013-0019},
  doi          = {10.1108/IMCS-03-2013-0019},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HarrisP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HelkalaB14,
  author       = {Kirsi Helkala and
                  Tone Hodd{\o} Bak{\aa}s},
  title        = {Extended results of Norwegian password security survey},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {346--357},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-10-2013-0079},
  doi          = {10.1108/IMCS-10-2013-0079},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HelkalaB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JamesG14,
  author       = {Peter James and
                  Don Griffiths},
  title        = {A secure portable execution environment to support teleworking},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {309--330},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-07-2013-0052},
  doi          = {10.1108/IMCS-07-2013-0052},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JamesG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KasperskyF14,
  author       = {Eugene Kaspersky and
                  Steven Furnell},
  title        = {A security education Q{\&}A},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {130--133},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-01-2014-0006},
  doi          = {10.1108/IMCS-01-2014-0006},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KasperskyF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Kim14,
  author       = {Eyong B. Kim},
  title        = {Recommendations for information security awareness training for college
                  students},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {115--126},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-01-2013-0005},
  doi          = {10.1108/IMCS-01-2013-0005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Kim14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ManiCM14,
  author       = {Deepa Mani and
                  Kim{-}Kwang Raymond Choo and
                  Sameera Mubarak},
  title        = {Information security in the South Australian real estate industry:
                  {A} study of 40 real estate organisations},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {24--41},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-10-2012-0060},
  doi          = {10.1108/IMCS-10-2012-0060},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ManiCM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MayayiseO14,
  author       = {Thembekile O. Mayayise and
                  Isaac Olusegun Osunmakinde},
  title        = {E-commerce assurance models and trustworthiness issues: an empirical
                  study},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {76--96},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-01-2013-0001},
  doi          = {10.1108/IMCS-01-2013-0001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MayayiseO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MengWK14,
  author       = {Weizhi Meng and
                  Duncan S. Wong and
                  Lam{-}for Kwok},
  title        = {The effect of adaptive mechanism on behavioural biometric based mobile
                  phone authentication},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {155--166},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-09-2013-0062},
  doi          = {10.1108/IMCS-09-2013-0062},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MengWK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/N14,
  author       = {Sindhuja P. N.},
  title        = {Impact of information security initiatives on supply chain performance:
                  An empirical investigation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {450--473},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-05-2013-0035},
  doi          = {10.1108/IMCS-05-2013-0035},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/N14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/OlemboKSHV14,
  author       = {Maina M. Olembo and
                  Timo Kilian and
                  Simon Stockhardt and
                  Andreas H{\"{u}}lsing and
                  Melanie Volkamer},
  title        = {Developing and testing SCoP - a visual hash scheme},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {382--392},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-11-2013-0082},
  doi          = {10.1108/IMCS-11-2013-0082},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/OlemboKSHV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ParsonsMPBJ14,
  author       = {Kathryn Parsons and
                  Agata McCormac and
                  Malcolm Robert Pattinson and
                  Marcus A. Butavicius and
                  Cate Jerram},
  title        = {A study of information security awareness in Australian government
                  organisations},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {334--345},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-10-2013-0078},
  doi          = {10.1108/IMCS-10-2013-0078},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ParsonsMPBJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PurkaitDS14,
  author       = {Swapan Purkait and
                  Sadhan Kumar De and
                  Damodar Suar},
  title        = {An empirical investigation of the factors that influence Internet
                  user's ability to correctly identify a phishing website},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {194--234},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-05-2013-0032},
  doi          = {10.1108/IMCS-05-2013-0032},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PurkaitDS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ReidN14,
  author       = {Rayne Reid and
                  Johan Van Niekerk},
  title        = {Snakes and ladders for digital natives: information security education
                  for the youth},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {179--190},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-09-2013-0063},
  doi          = {10.1108/IMCS-09-2013-0063},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ReidN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ReidN14a,
  author       = {Rayne Reid and
                  Johan Van Niekerk},
  title        = {Brain-compatible, web-based information security education: a statistical
                  study},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {371--381},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-11-2013-0081},
  doi          = {10.1108/IMCS-11-2013-0081},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ReidN14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RepelS14,
  author       = {Dusan Repel and
                  Ingo Stengel},
  title        = {Grammar-based transformations: attack and defence},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {141--154},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-09-2013-0071},
  doi          = {10.1108/IMCS-09-2013-0071},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RepelS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RigonWSW14,
  author       = {Evandro Alencar Rigon and
                  Carla Merkle Westphall and
                  Daniel Ricardo dos Santos and
                  Carlos Becker Westphall},
  title        = {A cyclical evaluation model of information security maturity},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {265--278},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-04-2013-0025},
  doi          = {10.1108/IMCS-04-2013-0025},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RigonWSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SilicB14,
  author       = {Mario Silic and
                  Andrea Back},
  title        = {Information security: Critical review and future directions for research},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {279--308},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-05-2013-0041},
  doi          = {10.1108/IMCS-05-2013-0041},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SilicB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SommestadHLB14,
  author       = {Teodor Sommestad and
                  Jonas Hallberg and
                  Kristoffer Lundholm and
                  Johan E. Bengtsson},
  title        = {Variables influencing information security policy compliance: {A}
                  systematic review of quantitative studies},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {42--75},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-08-2012-0045},
  doi          = {10.1108/IMCS-08-2012-0045},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/SommestadHLB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Yaokumah14,
  author       = {Winfred Yaokumah},
  title        = {Information security governance implementation within Ghanaian industry
                  sectors: An empirical study},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {235--250},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-06-2013-0044},
  doi          = {10.1108/IMCS-06-2013-0044},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Yaokumah14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}