Journal: Inf. Manag. Comput. Security

Volume 18, Issue 5

316 -- 327Hennie A. Kruger, Lynette Drevin, Tjaart Steyn. A Vocabulary Test to Assess Information Security Awareness
328 -- 338Tatsuo Asai, Aline Uwera Hakizabera. Human-Related Problems of Information Security in East African Cross-Cultural Environments
339 -- 349Shamal Faily, Ivan Flechais. Designing and Aligning e-Science Security Culture with Design
350 -- 365Aggeliki Tsohou. A Security Standards Framework to Facilitate Best Practices Awareness and Conformity
366 -- 374Lynn Futcher, cheryl schroder, Rossouw von Solms. Information Security Education in South Africa

Volume 18, Issue 4

204 -- 225Sigi Goode. Exploring the supply of pirate software for mobile devices: An analysis of software types and piracy groups
277 -- 290Ahmed Patel, Qais Qassim, Christopher Wills. A survey of intrusion detection and prevention systems
291 -- 309Dimitrios Patsos, Sarandis Mitropoulos, Christos Douligeris. Expanding topological vulnerability analysis to intrusion detection through the incident response intelligence system

Volume 18, Issue 3

144 -- 161Ahmed Patel, Wei Qi, Christopher Wills. A review and future research directions of secure and trustworthy mobile agent-based e-marketplace systems
162 -- 172Wendy Hui. Brand, knowledge, and false sense of security
185 -- 197Zvi Goldstein, David Petrie, Yosef Sherif. Finding middle ground management strategy for software development

Volume 18, Issue 2

72 -- 85Ting Yi Chang, Ms. Yu-Ju Yang, Chun-Cheng Peng. A Personalized Rhythm Click-Based Authentication System
86 -- 100Seung S. Yang, Hongsik Choi. Vulnerability Analysis and the Practical Implications of a Server-challenge-based One-time Password System
101 -- 123Guillermo Horacio Ramirez Caceres, Yoshimi Teshigawara. Security Guideline Tool for Home Users Based on International Standards
124 -- 139Michael Pearce, Sherali Zeadally, Ray Hunt. Assessing and Improving Authentication Confidence Management

Volume 18, Issue 1

4 -- 13David Lacey. Understanding and transforming organizational security culture
14 -- 25Tara Whalen, Carrie Gates. Watching the watchers: voluntary monitoring of infosec employees
26 -- 42Rodrigo Werlinger, Kasia Muldner, Kirstie Hawkey, Konstantin Beznosov. Preparation, detection, and analysis: the diagnostic work of IT security incident response
43 -- 53M. Z. Jali, Steven Furnell, Paul Dowland. Assessing image-based authentication techniques in a web-based environment
54 -- 65Meltini Christodoulaki, Paraskevi Fragopoulou. SafeLine: reporting illegal internet content