Journal: Computers & Security

Volume 26, Issue 1

1 -- 2E. Eugene Schultz. What infosec changes are likely to result from the recent US election?
14 -- 25Chris Roberts. Biometric attack vectors and defences
31 -- 33Danny Bradbury. Decoding digital rights management
35 -- 0Steven Furnell. IFIP workshop - Information security culture
36 -- 43Lynette Drevin, Hennie A. Kruger, Tjaart Steyn. Value-focused assessment of ICT security awareness in an academic environment
44 -- 55Jabiri Kuwe Bakari, Charles N. Tarimo, Louise Yngström, Christer Magnusson, Stewart Kowalski. Bridging the gap between general management and technicians - A case study on ICT security in a developing country
56 -- 62A. B. Ruighaver, S. B. Maynard, S. Chang. Organisational security culture: Extending the end-user perspective
63 -- 72Benjamin D. Cone, Cynthia E. Irvine, Michael F. Thompson, Thuy D. Nguyen. A video game for cyber security training and awareness
73 -- 80Ronald C. Dodge, Curtis Carver, Aaron J. Ferguson. Phishing for user security awareness
81 -- 93Stanley R. M. Oliveira, Osmar R. Zaïane. A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration
94 -- 97Rongxing Lu, Zhenfu Cao. Simple three-party key exchange protocol