default search action
Search dblp for Publications
export results for "toc:db/journals/imcs/imcs22.bht:"
@article{DBLP:journals/imcs/AhmadM14, author = {Atif Ahmad and Sean B. Maynard}, title = {Teaching information security management: reflections and experiences}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {5}, pages = {513--536}, year = {2014}, url = {https://doi.org/10.1108/IMCS-08-2013-0058}, doi = {10.1108/IMCS-08-2013-0058}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AhmadM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AlazabHAKA14, author = {Ammar Alazab and Michael Hobbs and Jemal H. Abawajy and Ansam Khraisat and Mamoun Alazab}, title = {Using response action with intelligent intrusion detection and prevention system against web application malware}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {5}, pages = {431--449}, year = {2014}, url = {https://doi.org/10.1108/IMCS-02-2013-0007}, doi = {10.1108/IMCS-02-2013-0007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AlazabHAKA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AtoumOA14, author = {Issa Atoum and Ahmed Otoom and Amer Abu{-}Ali}, title = {A holistic cyber security implementation framework}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {3}, pages = {251--264}, year = {2014}, url = {https://doi.org/10.1108/IMCS-02-2013-0014}, doi = {10.1108/IMCS-02-2013-0014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AtoumOA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Azhari14, author = {Firman Azhari}, title = {Quick detection of {NFC} vulnerability: Implementation weakness exploitation}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {2}, pages = {134--140}, year = {2014}, url = {https://doi.org/10.1108/IMCS-09-2013-0067}, doi = {10.1108/IMCS-09-2013-0067}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Azhari14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BahlW14, author = {Sanjay Bahl and Om Prakash Wali}, title = {Perceived significance of information security governance to predict the information security service quality in software service industry: An empirical analysis}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {1}, pages = {2--23}, year = {2014}, url = {https://doi.org/10.1108/IMCS-01-2013-0002}, doi = {10.1108/IMCS-01-2013-0002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BahlW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChoiN14, author = {Jae Choi and Derek L. Nazareth}, title = {Repairing trust in an e-commerce and security context: an agent-based modeling approach}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {5}, pages = {490--512}, year = {2014}, url = {https://doi.org/10.1108/IMCS-09-2013-0069}, doi = {10.1108/IMCS-09-2013-0069}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChoiN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DArcyG14, author = {John D'Arcy and Gwen Greene}, title = {Security culture and the employment relationship as drivers of employees' security compliance}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {5}, pages = {474--489}, year = {2014}, url = {https://doi.org/10.1108/IMCS-08-2013-0057}, doi = {10.1108/IMCS-08-2013-0057}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DArcyG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FenzHNP14, author = {Stefan Fenz and Johannes Heurix and Thomas Neubauer and Fabian Pechstein}, title = {Current challenges in information security risk management}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {5}, pages = {410--430}, year = {2014}, url = {https://doi.org/10.1108/IMCS-07-2013-0053}, doi = {10.1108/IMCS-07-2013-0053}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FenzHNP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FloresHSE14, author = {Waldo Rocha Flores and Hannes Holm and Gustav Svensson and G{\"{o}}ran Ericsson}, title = {Using phishing experiments and scenario-based surveys to understand security behaviours in practice}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {4}, pages = {393--406}, year = {2014}, url = {https://doi.org/10.1108/IMCS-11-2013-0083}, doi = {10.1108/IMCS-11-2013-0083}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FloresHSE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Gulenko14, author = {Iwan Gulenko}, title = {Improving passwords: influence of emotions on security behaviour}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {2}, pages = {167--178}, year = {2014}, url = {https://doi.org/10.1108/IMCS-09-2013-0068}, doi = {10.1108/IMCS-09-2013-0068}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Gulenko14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HaggertyHT14, author = {John Haggerty and Sheryllynne Haggerty and Mark John Taylor}, title = {Forensic triage of email network narratives through visualisation}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {4}, pages = {358--370}, year = {2014}, url = {https://doi.org/10.1108/IMCS-11-2013-0080}, doi = {10.1108/IMCS-11-2013-0080}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HaggertyHT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HarrisP14, author = {Mark A. Harris and Karen P. Patten}, title = {Mobile device security considerations for small- and medium-sized enterprise business mobility}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {1}, pages = {97--114}, year = {2014}, url = {https://doi.org/10.1108/IMCS-03-2013-0019}, doi = {10.1108/IMCS-03-2013-0019}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HarrisP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HelkalaB14, author = {Kirsi Helkala and Tone Hodd{\o} Bak{\aa}s}, title = {Extended results of Norwegian password security survey}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {4}, pages = {346--357}, year = {2014}, url = {https://doi.org/10.1108/IMCS-10-2013-0079}, doi = {10.1108/IMCS-10-2013-0079}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HelkalaB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JamesG14, author = {Peter James and Don Griffiths}, title = {A secure portable execution environment to support teleworking}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {3}, pages = {309--330}, year = {2014}, url = {https://doi.org/10.1108/IMCS-07-2013-0052}, doi = {10.1108/IMCS-07-2013-0052}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JamesG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KasperskyF14, author = {Eugene Kaspersky and Steven Furnell}, title = {A security education Q{\&}A}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {2}, pages = {130--133}, year = {2014}, url = {https://doi.org/10.1108/IMCS-01-2014-0006}, doi = {10.1108/IMCS-01-2014-0006}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KasperskyF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Kim14, author = {Eyong B. Kim}, title = {Recommendations for information security awareness training for college students}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {1}, pages = {115--126}, year = {2014}, url = {https://doi.org/10.1108/IMCS-01-2013-0005}, doi = {10.1108/IMCS-01-2013-0005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Kim14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ManiCM14, author = {Deepa Mani and Kim{-}Kwang Raymond Choo and Sameera Mubarak}, title = {Information security in the South Australian real estate industry: {A} study of 40 real estate organisations}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {1}, pages = {24--41}, year = {2014}, url = {https://doi.org/10.1108/IMCS-10-2012-0060}, doi = {10.1108/IMCS-10-2012-0060}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ManiCM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MayayiseO14, author = {Thembekile O. Mayayise and Isaac Olusegun Osunmakinde}, title = {E-commerce assurance models and trustworthiness issues: an empirical study}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {1}, pages = {76--96}, year = {2014}, url = {https://doi.org/10.1108/IMCS-01-2013-0001}, doi = {10.1108/IMCS-01-2013-0001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MayayiseO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MengWK14, author = {Weizhi Meng and Duncan S. Wong and Lam{-}for Kwok}, title = {The effect of adaptive mechanism on behavioural biometric based mobile phone authentication}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {2}, pages = {155--166}, year = {2014}, url = {https://doi.org/10.1108/IMCS-09-2013-0062}, doi = {10.1108/IMCS-09-2013-0062}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MengWK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/N14, author = {Sindhuja P. N.}, title = {Impact of information security initiatives on supply chain performance: An empirical investigation}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {5}, pages = {450--473}, year = {2014}, url = {https://doi.org/10.1108/IMCS-05-2013-0035}, doi = {10.1108/IMCS-05-2013-0035}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/N14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/OlemboKSHV14, author = {Maina M. Olembo and Timo Kilian and Simon Stockhardt and Andreas H{\"{u}}lsing and Melanie Volkamer}, title = {Developing and testing SCoP - a visual hash scheme}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {4}, pages = {382--392}, year = {2014}, url = {https://doi.org/10.1108/IMCS-11-2013-0082}, doi = {10.1108/IMCS-11-2013-0082}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/OlemboKSHV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ParsonsMPBJ14, author = {Kathryn Parsons and Agata McCormac and Malcolm Robert Pattinson and Marcus A. Butavicius and Cate Jerram}, title = {A study of information security awareness in Australian government organisations}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {4}, pages = {334--345}, year = {2014}, url = {https://doi.org/10.1108/IMCS-10-2013-0078}, doi = {10.1108/IMCS-10-2013-0078}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ParsonsMPBJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PurkaitDS14, author = {Swapan Purkait and Sadhan Kumar De and Damodar Suar}, title = {An empirical investigation of the factors that influence Internet user's ability to correctly identify a phishing website}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {3}, pages = {194--234}, year = {2014}, url = {https://doi.org/10.1108/IMCS-05-2013-0032}, doi = {10.1108/IMCS-05-2013-0032}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PurkaitDS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ReidN14, author = {Rayne Reid and Johan Van Niekerk}, title = {Snakes and ladders for digital natives: information security education for the youth}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {2}, pages = {179--190}, year = {2014}, url = {https://doi.org/10.1108/IMCS-09-2013-0063}, doi = {10.1108/IMCS-09-2013-0063}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ReidN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ReidN14a, author = {Rayne Reid and Johan Van Niekerk}, title = {Brain-compatible, web-based information security education: a statistical study}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {4}, pages = {371--381}, year = {2014}, url = {https://doi.org/10.1108/IMCS-11-2013-0081}, doi = {10.1108/IMCS-11-2013-0081}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ReidN14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RepelS14, author = {Dusan Repel and Ingo Stengel}, title = {Grammar-based transformations: attack and defence}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {2}, pages = {141--154}, year = {2014}, url = {https://doi.org/10.1108/IMCS-09-2013-0071}, doi = {10.1108/IMCS-09-2013-0071}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RepelS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RigonWSW14, author = {Evandro Alencar Rigon and Carla Merkle Westphall and Daniel Ricardo dos Santos and Carlos Becker Westphall}, title = {A cyclical evaluation model of information security maturity}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {3}, pages = {265--278}, year = {2014}, url = {https://doi.org/10.1108/IMCS-04-2013-0025}, doi = {10.1108/IMCS-04-2013-0025}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RigonWSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SilicB14, author = {Mario Silic and Andrea Back}, title = {Information security: Critical review and future directions for research}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {3}, pages = {279--308}, year = {2014}, url = {https://doi.org/10.1108/IMCS-05-2013-0041}, doi = {10.1108/IMCS-05-2013-0041}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SilicB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SommestadHLB14, author = {Teodor Sommestad and Jonas Hallberg and Kristoffer Lundholm and Johan E. Bengtsson}, title = {Variables influencing information security policy compliance: {A} systematic review of quantitative studies}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {1}, pages = {42--75}, year = {2014}, url = {https://doi.org/10.1108/IMCS-08-2012-0045}, doi = {10.1108/IMCS-08-2012-0045}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/SommestadHLB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Yaokumah14, author = {Winfred Yaokumah}, title = {Information security governance implementation within Ghanaian industry sectors: An empirical study}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {3}, pages = {235--250}, year = {2014}, url = {https://doi.org/10.1108/IMCS-06-2013-0044}, doi = {10.1108/IMCS-06-2013-0044}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Yaokumah14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.