default search action
Information Management & Computer Security, Volume 22
Volume 22, Number 1, 2014
- Sanjay Bahl, Om Prakash Wali:
Perceived significance of information security governance to predict the information security service quality in software service industry: An empirical analysis. 2-23 - Deepa Mani, Kim-Kwang Raymond Choo, Sameera Mubarak:
Information security in the South Australian real estate industry: A study of 40 real estate organisations. 24-41 - Teodor Sommestad, Jonas Hallberg, Kristoffer Lundholm, Johan E. Bengtsson:
Variables influencing information security policy compliance: A systematic review of quantitative studies. 42-75 - Thembekile O. Mayayise, Isaac Olusegun Osunmakinde:
E-commerce assurance models and trustworthiness issues: an empirical study. 76-96 - Mark A. Harris, Karen P. Patten:
Mobile device security considerations for small- and medium-sized enterprise business mobility. 97-114 - Eyong B. Kim:
Recommendations for information security awareness training for college students. 115-126
Volume 22, Number 2, 2014
- Eugene Kaspersky, Steven Furnell:
A security education Q&A. 130-133 - Firman Azhari:
Quick detection of NFC vulnerability: Implementation weakness exploitation. 134-140 - Dusan Repel, Ingo Stengel:
Grammar-based transformations: attack and defence. 141-154 - Weizhi Meng, Duncan S. Wong, Lam-for Kwok:
The effect of adaptive mechanism on behavioural biometric based mobile phone authentication. 155-166 - Iwan Gulenko:
Improving passwords: influence of emotions on security behaviour. 167-178 - Rayne Reid, Johan Van Niekerk:
Snakes and ladders for digital natives: information security education for the youth. 179-190
Volume 22, Number 3, 2014
- Swapan Purkait, Sadhan Kumar De, Damodar Suar:
An empirical investigation of the factors that influence Internet user's ability to correctly identify a phishing website. 194-234 - Winfred Yaokumah:
Information security governance implementation within Ghanaian industry sectors: An empirical study. 235-250 - Issa Atoum, Ahmed Otoom, Amer Abu-Ali:
A holistic cyber security implementation framework. 251-264 - Evandro Alencar Rigon, Carla Merkle Westphall, Daniel Ricardo dos Santos, Carlos Becker Westphall:
A cyclical evaluation model of information security maturity. 265-278 - Mario Silic, Andrea Back:
Information security: Critical review and future directions for research. 279-308 - Peter James, Don Griffiths:
A secure portable execution environment to support teleworking. 309-330
Volume 22, Number 4, 2014
- Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram:
A study of information security awareness in Australian government organisations. 334-345 - Kirsi Helkala, Tone Hoddø Bakås:
Extended results of Norwegian password security survey. 346-357 - John Haggerty, Sheryllynne Haggerty, Mark John Taylor:
Forensic triage of email network narratives through visualisation. 358-370 - Rayne Reid, Johan Van Niekerk:
Brain-compatible, web-based information security education: a statistical study. 371-381 - Maina M. Olembo, Timo Kilian, Simon Stockhardt, Andreas Hülsing, Melanie Volkamer:
Developing and testing SCoP - a visual hash scheme. 382-392 - Waldo Rocha Flores, Hannes Holm, Gustav Svensson, Göran Ericsson:
Using phishing experiments and scenario-based surveys to understand security behaviours in practice. 393-406
Volume 22, Number 5, 2014
- Stefan Fenz, Johannes Heurix, Thomas Neubauer, Fabian Pechstein:
Current challenges in information security risk management. 410-430 - Ammar Alazab, Michael Hobbs, Jemal H. Abawajy, Ansam Khraisat, Mamoun Alazab:
Using response action with intelligent intrusion detection and prevention system against web application malware. 431-449 - Sindhuja P. N.:
Impact of information security initiatives on supply chain performance: An empirical investigation. 450-473 - John D'Arcy, Gwen Greene:
Security culture and the employment relationship as drivers of employees' security compliance. 474-489 - Jae Choi, Derek L. Nazareth:
Repairing trust in an e-commerce and security context: an agent-based modeling approach. 490-512 - Atif Ahmad, Sean B. Maynard:
Teaching information security management: reflections and experiences. 513-536
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.