default search action
Information Management & Computer Security, Volume 20
Volume 20, Number 1, 2012
- Julio Angulo, Simone Fischer-Hübner, Erik Wästlund, Tobias Pulls:
Towards Usable Privacy Policy Display & Management for PrimeLife. 4-17 - Malcolm Robert Pattinson, Cate Jerram, Kathryn Parsons, Agata McCormac, Marcus A. Butavicius:
Why Do Some People Manage Phishing Emails Better Than Others? 18-28 - Geordie Stewart, David Lacey:
Death by a Thousand Facts: Criticising the Technocratic Approach to Information Security Awareness. 29-38 - Kerry-Lynn Thomson, Johan Van Niekerk:
Combating Information Security Apathy by Encouraging Prosocial Organisational Behaviour. 39-46
Volume 20, Number 2, 2012
- Michael Workman:
Validation of a Biases Model in Strategic Security Decision-Making. 52-70 - Stig Ole Johnsen:
Resilience at Interfaces - Improvement of Safety and Security in Distributed Control Systems by Web of Influence. 71-87 - Norshidah Mohamed, Jasber Kaur A. P. Gian Singh:
A Conceptual Framework for Information Technology Governance Effectiveness in Private Organizations. 88-106 - Teodor Sommestad, Hannes Holm, Mathias Ekstedt:
Estimates of success rates of remote arbitrary code execution attacks. 107-122 - Ahmed Patel, Wei Qi, Mona Taghavi:
An Evaluation of a Secure and Trustworthy Mobile Agent-based E-marketplace System. 123-146
Volume 20, Number 3, 2012
- Cornelius Johannes Kruger, Mavis Noxolo Mama:
Incorporating business strategy formulation with identity management strategy formulation. 152-169 - Vandana Pramod, Jinghua Li, Ping Gao:
A framework for preventing money laundering in banks. 170-183 - Vasilios Katos:
An integrated model for online transactions: illuminating the black box. 184-206 - Weiguo Sheng, Gareth Howells, Michael C. Fairhurst, Farzin Deravi, Shengyong Chen:
Reliable and secure encryption key generation from fingerprints. 207-221 - Mayur S. Desai, Kiran J. Desai, Lonnie D. Phelps:
E-commerce policies and customer privacy: a longitudinal study (2000-2010). 222-244
Volume 20, Number 4, 2012
- Raydel Montesino, Stefan Fenz, Walter Baluja:
SIEM-based framework for security controls automation. 248-263 - Vinod Pathari, Rajendra M. Sonar:
Identifying linkages between statements in information security policy, procedures and controls. 264-280 - Zac Sadan, David G. Schwartz:
Social Network Analysis for Cluster-Based IP Spam Reputation. 281-295 - Andrew Stewart:
Can spending on information security be justified? Evaluating the security spending decision from the perspective of a rational actor. 312-326
Volume 20, Number 5, 2012
- Jonna Järveläinen:
Information security and business continuity management in interorganizational IT relationships. 332-349 - Eric H. Goldman:
The effect of acquisition decision making on security posture. 350-363 - Margaret Tan, Kathrine Sagala Aguilar:
An investigation of students' perception of Bluetooth security. 364-381 - Swapan Purkait:
Phishing counter measures and their effectiveness - literature review. 382-420
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.