Journal: Inf. Manag. Comput. Security

Volume 17, Issue 5

372 -- 387Princely Ifinedo. Information technology security management concerns in global financial services institutions: Is national culture a differentiator?
388 -- 407Janne Merete Hagen, Eirik Albrechtsen. Effects on employees information security abilities by e-learning
408 -- 417Cheng-Chi Lee, Min-Shiang Hwang, Chih-Wei Lin. A new English auction scheme using the bulletin board system

Volume 17, Issue 4

296 -- 310Jordan Shropshire. A canonical analysis of intentional information security breaches by insiders
311 -- 329Pavlos S. Efraimidis, George Drosatos, Fotis Nalbadis, Aimilia Tasidou. Towards privacy in personal data management
330 -- 340Jie Zhang, Brian J. Reithel, Han Li. Impact of perceived technical protection on security behaviors
341 -- 353Michael Workman. How perceptions of justice affect security attitudes: suggestions for practitioners and researchers

Volume 17, Issue 3

192 -- 217Kamel Rouibah, Sulaiman Al-Rafee. Requirement engineering elicitation methods: A Kuwaiti empirical study about familiarity, usage and perceived value
218 -- 233Tzu-Chuan Chou, An-Sheng Lee. A process model for customer relational assets creation: A case study of online securities trading platform
234 -- 247Olufunke Vincent, Olusegun Folorunso, Ayodele Akinde. On consolidation model in e-bill presentment and payment
248 -- 275Wing S. Chow, Wai On Ha. Determinants of the critical success factor of disaster recovery planning for information systems
276 -- 289Anil Gurung, Xin Luo, Qinyu Liao. Consumer motivations in taking action against spyware: an empirical investigation

Volume 17, Issue 2

96 -- 113Juan Carlos Roca, Juan José García, Juan José de la Vega. The importance of perceived trust, security and privacy in online trading systems
114 -- 126Ali H. Al-Badi, Rafi Ashrafi, Ali O. Al-Majeeni, Pam J. Mayhew. IT disaster recovery: Oman and Cyclone Gonu lessons learned
127 -- 150Alan D. Smith. Internet retail banking: A competitive analysis in an increasingly financially troubled environment
151 -- 165Jayanthi Ranjan, Vishal Bhatnagar. A holistic framework for mCRM - data mining perspective
166 -- 185Mohamed Intan Salwani, Govindan Marthandan, Mohd Daud Norzaidi, Siong Choy Chong. E-commerce usage and business performance in the Malaysian tourism sector: empirical analysis

Volume 17, Issue 1

4 -- 19Rodrigo Werlinger, Kirstie Hawkey, Konstantin Beznosov. An integrated view of human, organizational, and technological challenges of IT security management
20 -- 29David J. Bennett, Paul Stephens. A cognitive walkthrough of Autopsy Forensic Browser
30 -- 43Kirsi Helkala, Einar Snekkenes. Formalizing the ranking of authentication products
44 -- 52Martyn Styles, Theo Tryfonas. Using penetration testing feedback to cultivate an atmosphere of proactive security amongst end-users
53 -- 63Taimur Bakhshi, Maria Papadaki, Steven Furnell. Social engineering: assessing vulnerabilities in practice