Abstract
No abstract available.
Cited By
- Kearney W and Kruger H (2016). Can perceptual differences account for enigmatic information security behaviour in an organisation?, Computers and Security, 61:C, (46-58), Online publication date: 1-Aug-2016.
- Park W, Na O and Chang H (2016). An exploratory research on advanced smart media security design for sustainable intelligence information system, Multimedia Tools and Applications, 75:11, (6059-6070), Online publication date: 1-Jun-2016.
- Ahmad A, Lim J, Maynard S and Chang S (2020). Information Security Culture, International Journal of Cyber Warfare and Terrorism, 5:2, (31-52), Online publication date: 1-Apr-2015.
- Afzal W Rethinking information privacy-security Proceedings of the 76th ASIS&T Annual Meeting: Beyond the Cloud: Rethinking Information Boundaries, (1-10)
- Al‐Shawi A (2011). Data mining techniques for information security applications, WIREs Computational Statistics, 3:3, (221-229), Online publication date: 4-Apr-2011.
- Ngugi B, Kahn B and Tremaine M (2011). Typing Biometrics, Journal of Data and Information Quality, 2:2, (1-21), Online publication date: 1-Feb-2011.
- Cavusoglu H, Raghunathan S and Cavusoglu H (2009). Configuration of and Interaction Between Information Security Technologies, Information Systems Research, 20:2, (198-217), Online publication date: 1-Jun-2009.
- Bala D Biometrics and information security Proceedings of the 5th annual conference on Information security curriculum development, (64-66)
- Amer S and Hamilton J Understanding security architecture Proceedings of the 2008 Spring simulation multiconference, (335-342)
- Geoghegan S (2008). The development of an information assurance program, Journal of Computing Sciences in Colleges, 23:4, (116-123), Online publication date: 1-Apr-2008.
- Ketel M IT security risk management Proceedings of the 46th annual ACM Southeast Conference, (373-376)
- Katz F (2007). Integrating a security awareness program into an information security course, Journal of Computing Sciences in Colleges, 23:2, (181-187), Online publication date: 1-Dec-2007.
- Goss R, Botha M and von Solms R Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries, (29-35)
- Huang D, Rau P and Salvendy G A survey of factors influencing people's perception of information security Proceedings of the 12th international conference on Human-computer interaction: applications and services, (906-915)
- Yuan X, Qadah Y, Xu J, Yu H, Archer R and Chu B (2007). An animated learning tool for Kerberos authentication architecture, Journal of Computing Sciences in Colleges, 22:6, (147-155), Online publication date: 1-Jun-2007.
- Herzog A and Shahmehri N User help techniques for usable security Proceedings of the 2007 symposium on Computer human interaction for the management of information technology, (11-es)
- Beachboard J, Cole A, Mellor M, Hernandez S, Aytes K and Massad N A tentative proposal Proceedings of the 3rd annual conference on Information security curriculum development, (194-196)
- Al-Hamdani W Knowledge flow with information assurance track Proceedings of the 3rd annual conference on Information security curriculum development, (52-57)
- Spears J The effects of user participation in identifying information security risk in business processes Proceedings of the 2006 ACM SIGMIS CPR conference on computer personnel research: Forty four years of computer personnel research: achievements, challenges & the future, (351-352)
- Werner L Redefining computer literacy in the age of ubiquitous computing Proceedings of the 6th conference on Information technology education, (95-99)
- Mader A and Srinivasan S Curriculum development related to information security policies and procedures Proceedings of the 2nd annual conference on Information security curriculum development, (49-53)
- Guimaraes M, Mattord H and Austin R Incorporating security components into database courses Proceedings of the 1st annual conference on Information security curriculum development, (49-52)
- Werner L (2004). Teaching principled and practical information security, Journal of Computing Sciences in Colleges, 20:1, (81-89), Online publication date: 1-Oct-2004.
- Grubb L and Cuéllar L (2004). Survey of network weapons part 1, Journal of Computing Sciences in Colleges, 19:4, (314-320), Online publication date: 1-Apr-2004.
- Summers W and Bosworth E Password policy Proceedings of the winter international synposium on Information and communication technologies, (1-6)
Please enable JavaScript to view thecomments powered by Disqus.
Recommendations
Information security management: An information security retrieval and awareness model for industry
The purpose of this paper is to present a conceptual view of an Information Security Retrieval and Awareness (ISRA) model that can be used by industry to enhance information security awareness among employees. A common body of knowledge for information ...