default search action
Information Management & Computer Security, Volume 19
Volume 19, Number 1, 2011
- Haider Abbas, Christer Magnusson, Louise Yngström, Ahmed Hemani:
Addressing Dynamic Issues in Information Security Management. 5-24 - Lior Lazar, Omer Tikolsky, Chanan Glezer, Moshe Zviran:
Personalized Cognitive Passwords: An Exploratory Assessment. 25-41 - Ladislav Beranek:
Risk Analysis Methodology Used by Several Small and Medium Enterprises in the Czech Republic. 42-52 - Craig E. Wills, Mihajlo Zeljkovic:
A Personalized Approach to Web Privacy - Awareness, Attitudes and Actions. 53-73
Volume 19, Number 2, 2011
- Teodor Sommestad, Mathias Ekstedt, Hannes Holm, Muhammad Afzal:
Security mistakes in information system deployment projects. 80-94 - Dov Shirtz, Yuval Elovici:
Optimizing Investment Decisions in Selecting Information Security Remedies. 95-112 - Vasileios Vlachos, Marilena Minou, Vassilis Assimakopoulos, Androniki Toska:
The Landscape of Cybercrime in Greece. 113-123 - Yngve Monfelt, Sofie Pilemalm, Jonas Hallberg, Louise Yngström:
The 14 Layered Framework for Including Social and Organisational Aspects in Security Management. 124-133
Volume 19, Number 3, 2011
- Janne Merete Hagen, Eirik Albrechtsen, Stig Ole Johnsen:
The long term effects of information security e-learning on organizational learning. 140-154 - Jacqueline H. Hall, Shahram Sarkani, Thomas A. Mazzuchi:
Impacts of Organizational Capabilities In Information Security. 155-176 - Dimitris Mitropoulos, Vassilios Karakoidas, Panos Louridas, Diomidis Spinellis:
Countering Code Injection Attacks: A Unified Approach. 177-194 - Norazah Mohd Suki, Thurasamy Ramayah, Norbayah Mohd Suki:
Understanding Consumer Intention with Respect to Purchase and Use of Pirated Software. 195-210
Volume 19, Number 4, 2011
- Chlotia Posey Garrison, Matoteng Ncube:
A Longitudinal Analysis of Data Breaches. 216-230 - Hannes Holm, Teodor Sommestad, Jonas Almroth, Mats Persson:
A quantitative evaluation of vulnerability scanning. 231-247 - George Aggelinos, Sokratis K. Katsikas:
Enhancing SSADM with Disaster Recovery Plan activities. 248-261 - Dan Harnesk, John Lindström:
Shaping Security Behavior through Discipline and Agility: Implications for Information Security Management. 262-276
Volume 19, Number 5, 2011
- Helen Georgia Kapodistria, Sarandis Mitropoulos, Christos Douligeris:
An Advanced Web Attack Detection and Prevention Tool. 280-299 - Debasis Bhattacharya:
Leadership Styles and Information Security in Small Businesses. 300-312 - Abhishek Vaish, Aditya Prabhakar, Himanshu Mishra, Nupur Dayal, Shishir Kumar Singh, Utkarsh Goel, Natalie Coull:
Quantifying Information Dynamics Through New Valuation System. 313-332 - Ahmed Patel, Wei Qi, Mona Taghavi:
Design of Secure and Trustworthy Mobile Agent-based E-marketplace System. 333-352
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.