researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Manag. Comput. Security
Home
Index
Info
Volume
Volume
15
, Issue
5
350
--
361
Ranjan B. Kini
.
Vendor availability: a key factor for outsourcing in Chilean ICT sector
362
--
371
Malcolm R. Pattinson
,
Grantley Anderson
.
How well are information risks being communicated to your computer end-users?
372
--
381
Marcus Nohlberg
,
Johannes Bäckström
.
User-centred security applied to the development of a management information system
382
--
393
Shirley Atkinson
,
Chris Johnson
,
Andy Phippen
.
Improving protection mechanisms by understanding online risk
394
--
407
Almut Herzog
,
Nahid Shahmehri
.
Usable set-up of runtime security policies
408
--
419
Finn Olav Sveen
,
Jose Maria Sarriegi
,
Eliot Rich
,
Jose J. Gonzalez
.
Toward viable information security reporting systems
420
--
431
Konstantin Beznosov
,
Olga Beznosova
.
On the imbalance of the security problem space and its expected consequences
Volume
15
, Issue
4
260
--
269
Hanudin Amin
.
An analysis of mobile credit card usage intentions
270
--
282
Princely Ifinedo
.
An empirical study of ERP success evaluations by business and IT managers
283
--
294
Mohamed Saad Saleh
,
Abdullah Alrabiah
,
Saad Haj Bakry
.
A STOPE model for the investigation of compliance with ISO 17799-2005
295
--
312
Vasileios Vlachos
,
Diomidis Spinellis
.
A PRoactive malware identification system based on the computer hygiene principles
313
--
328
Thian Song Ong
,
Andrew Teoh Beng Jin
,
Tee Connie
.
Personalized biometric key using fingerprint biometrics
Volume
15
, Issue
3
168
--
183
Mohamad Noorman Masrek
,
Nor Shahriza Abdul Karim
,
Ramlah Hussein
.
Investigating corporate intranet effectiveness: a conceptual framework
184
--
200
Chris Tseng
,
Patrick Ng
.
Precisiated information retrieval for RSS feeds
201
--
213
D. P. Goyal
.
Information systems planning practices in Indian public enterprises
214
--
225
Nathan L. Clarke
,
A. R. Mekala
.
The application of signature recognition to transparent handwriting verification for mobile devices
226
--
240
Sarandis Mitropoulos
,
Dimitrios Patsos
,
Christos Douligeris
.
Incident response requirements for distributed security information management systems
241
--
256
Oge Marques
,
Pierre Baillargeon
.
Design of a multimedia traffic classifier for Snort
Volume
15
, Issue
2
84
--
101
Adil Fathelrahamn
,
Mathew Shafaghi
.
Analyzing bloggers data on software design patterns and applications integration; methodology and implementation
102
--
115
ThuyUyen H. Nguyen
,
Joseph S. Sherif
,
Michael Newby
.
Strategies for successful CRM implementation
116
--
127
Klaus-Peter Fischer
,
Udo Bleimann
,
Woldemar F. Fuhrmann
,
Steven Furnell
.
Analysis of security-relevant semantics of BPEL in cross-domain defined business processes
128
--
148
Ahmad A. Abu-Musa
.
Evaluating the security controls of CAIS in developing countries: an empirical investigation
149
--
166
Pauline Ratnasingam
.
A risk-control framework for e-marketplace participation: the findings of seven cases
Volume
15
, Issue
1
5
--
22
Sean Lancaster
,
David C. Yen
,
Albert H. Huang
,
Shin-Yuan Hung
.
The selection of instant messaging or e-mail: College students perspective for computer communication
23
--
32
Olusegun Folorunso
,
O. R. Vincent
,
B. M. Dansu
.
Image edge detection: A knowledge management technique for visual scene analysis
33
--
45
E. John Sebes
,
Mark Stamp
.
Solvable problems in enterprise digital rights management
46
--
63
Ahmad A. Abu-Musa
.
Evaluating the security controls of CAIS in developing countries: An examination of current research
64
--
77
Subhas C. Misra
,
Vinod Kumar
,
Uma Kumar
.
A strategic modeling technique for information security risk assessment