researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Manag. Comput. Security
Home
Index
Info
Volume
Volume
18
, Issue
5
316
--
327
Hennie A. Kruger
,
Lynette Drevin
,
Tjaart Steyn
.
A Vocabulary Test to Assess Information Security Awareness
328
--
338
Tatsuo Asai
,
Aline Uwera Hakizabera
.
Human-Related Problems of Information Security in East African Cross-Cultural Environments
339
--
349
Shamal Faily
,
Ivan Flechais
.
Designing and Aligning e-Science Security Culture with Design
350
--
365
Aggeliki Tsohou
.
A Security Standards Framework to Facilitate Best Practices Awareness and Conformity
366
--
374
Lynn Futcher
,
cheryl schroder
,
Rossouw von Solms
.
Information Security Education in South Africa
Volume
18
, Issue
4
204
--
225
Sigi Goode
.
Exploring the supply of pirate software for mobile devices: An analysis of software types and piracy groups
277
--
290
Ahmed Patel
,
Qais Qassim
,
Christopher Wills
.
A survey of intrusion detection and prevention systems
291
--
309
Dimitrios Patsos
,
Sarandis Mitropoulos
,
Christos Douligeris
.
Expanding topological vulnerability analysis to intrusion detection through the incident response intelligence system
Volume
18
, Issue
3
144
--
161
Ahmed Patel
,
Wei Qi
,
Christopher Wills
.
A review and future research directions of secure and trustworthy mobile agent-based e-marketplace systems
162
--
172
Wendy Hui
.
Brand, knowledge, and false sense of security
185
--
197
Zvi Goldstein
,
David Petrie
,
Yosef Sherif
.
Finding middle ground management strategy for software development
Volume
18
, Issue
2
72
--
85
Ting Yi Chang
,
Ms. Yu-Ju Yang
,
Chun-Cheng Peng
.
A Personalized Rhythm Click-Based Authentication System
86
--
100
Seung S. Yang
,
Hongsik Choi
.
Vulnerability Analysis and the Practical Implications of a Server-challenge-based One-time Password System
101
--
123
Guillermo Horacio Ramirez Caceres
,
Yoshimi Teshigawara
.
Security Guideline Tool for Home Users Based on International Standards
124
--
139
Michael Pearce
,
Sherali Zeadally
,
Ray Hunt
.
Assessing and Improving Authentication Confidence Management
Volume
18
, Issue
1
4
--
13
David Lacey
.
Understanding and transforming organizational security culture
14
--
25
Tara Whalen
,
Carrie Gates
.
Watching the watchers: voluntary monitoring of infosec employees
26
--
42
Rodrigo Werlinger
,
Kasia Muldner
,
Kirstie Hawkey
,
Konstantin Beznosov
.
Preparation, detection, and analysis: the diagnostic work of IT security incident response
43
--
53
M. Z. Jali
,
Steven Furnell
,
Paul Dowland
.
Assessing image-based authentication techniques in a web-based environment
54
--
65
Meltini Christodoulaki
,
Paraskevi Fragopoulou
.
SafeLine: reporting illegal internet content