Journal: Inf. Manag. Comput. Security

Volume 16, Issue 5

436 -- 448Eli Winjum, Bjørn Kjetil Mølmann. A multidimensional approach to multilevel security
449 -- 462Barry Wray, Richard Mathieu. Evaluating the performance of open source software projects using data envelopment analysis
463 -- 483Michael Workman. A test of interventions for security threats from social engineering
484 -- 501Namjoo Choi, Dan Kim, Jahyun Goo, Andrew Whitmore. Knowing is doing: An empirical validation of the relationship between managerial information security awareness and action

Volume 16, Issue 4

324 -- 335Dmitriy V. Chulkov, Mayur S. Desai. Escalation and premature termination in MIS projects: the role of real options
336 -- 359Narayanan Kumbakara. Managed IT services: the role of IT standards
360 -- 376Charlie C. Chen, B. Dawn Medlin, R. S. Shaw. A cross-cultural investigation of situational information security awareness programs
377 -- 397Janne Merete Hagen, Eirik Albrechtsen, Jan Hovden. Implementation and effectiveness of organizational information security measures
398 -- 414Sandip C. Patel, Pritimoy Sanyal. Securing SCADA systems
415 -- 430Sitalakshmi Venkatraman, Indika Delpachitra. Biometrics in banking security: a case study

Volume 16, Issue 3

213 -- 234Selçuk Perçin. Fuzzy multi-criteria risk-benefit analysis of business process outsourcing (BPO)
235 -- 250Stephen M. Mutula. Comparison of sub-Saharan Africa s e-government status with developed and transitional nations
251 -- 270Qingxiong Ma, Allen C. Johnston, J. Michael Pearson. Information security management objectives and practices: a parsimonious framework
271 -- 287Aggeliki Tsohou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis. Process-variance models in information security awareness research
288 -- 304Yoones Asgharzadeh Sekhavat, Mohammad Fathian. Efficient anonymous secure auction schema (ASAS) without fully trustworthy auctioneer
305 -- 319Hsu-Hui Lee, Mark Stamp. An agent-based privacy-enhancing model

Volume 16, Issue 2

89 -- 112Mohamad Noorman Masrek, Nor Shahriza Abdul Karim, Ramlah Hussein. The effect of organizational and individual characteristics on corporate intranet utilizations
113 -- 136Jitesh Thakkar, Arun Kanda, S. G. Deshmukh. Interpretive structural modeling (ISM) of IT-enablers for Indian manufacturing SMEs
137 -- 149Mohamad Noorman Masrek, Norhayati Hussin, Norashimawati Tarmuchi. An exploratory study on systems development methodologies for web-based applications
150 -- 165Edson dos Santos Moreira, Luciana Andréia Fondazzi Martimiano, Antonio José dos Santos Brandão, Mauro César Bernardes. Ontologies for information security management and governance
166 -- 186Lihong Zhou, Ana Vasconcelos, Miguel Nunes. Supporting decision making in risk management through an evidence-based information systems project risk checklist
187 -- 205Haralambos Mouratidis, Hamid Jahankhani, Mathews Z. Nkhoma. Management versus security specialists: an empirical study on security related perceptions

Volume 16, Issue 1

5 -- 19Allen C. Johnston, Merrill Warkentin. Information privacy compliance in the healthcare industry
20 -- 27Mayur S. Desai, Thomas von der Embse. Managing electronic information: an ethics perspective
28 -- 48B. S. Sahay, Jayanthi Ranjan. Real time business intelligence in supply chain analytics
49 -- 57Jason Bellone, Segolene de Basquiat, Juan Rodriguez. Reaching escape velocity: A practiced approach to information security management system implementation
58 -- 73Patricia Williams. A practical application of CMM to medical security capability
74 -- 83Vasilios Katos, Ahmed Patel. A partial equilibrium view on security and privacy