researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Manag. Comput. Security
Home
Index
Info
Volume
Volume
20
, Issue
5
332
--
349
Jonna Järveläinen
.
Information security and business continuity management in interorganizational IT relationships
350
--
363
Eric H. Goldman
.
The effect of acquisition decision making on security posture
364
--
381
Margaret Tan
,
Kathrine Sagala Aguilar
.
An investigation of students' perception of Bluetooth security
382
--
420
Swapan Purkait
.
Phishing counter measures and their effectiveness - literature review
Volume
20
, Issue
4
248
--
263
Raydel Montesino
,
Stefan Fenz
,
Walter Baluja
.
SIEM-based framework for security controls automation
264
--
280
Vinod Pathari
,
Rajendra M. Sonar
.
Identifying linkages between statements in information security policy, procedures and controls
281
--
295
Zac Sadan
,
David G. Schwartz
.
Social Network Analysis for Cluster-Based IP Spam Reputation
312
--
326
Andrew Stewart
.
Can spending on information security be justified? Evaluating the security spending decision from the perspective of a rational actor
Volume
20
, Issue
3
152
--
169
Cornelius Johannes Kruger
,
Mavis Noxolo Mama
.
Incorporating business strategy formulation with identity management strategy formulation
170
--
183
Vandana Pramod
,
Jinghua Li
,
Ping Gao
.
A framework for preventing money laundering in banks
184
--
206
Vasilios Katos
.
An integrated model for online transactions: illuminating the black box
207
--
221
Weiguo Sheng
,
Gareth Howells
,
Michael C. Fairhurst
,
Farzin Deravi
,
Shengyong Chen
.
Reliable and secure encryption key generation from fingerprints
222
--
244
Mayur S. Desai
,
Kiran J. Desai
,
Lonnie D. Phelps
.
E-commerce policies and customer privacy: a longitudinal study (2000-2010)
Volume
20
, Issue
2
52
--
70
Michael Workman
.
Validation of a Biases Model in Strategic Security Decision-Making
71
--
87
Stig Ole Johnsen
.
Resilience at Interfaces - Improvement of Safety and Security in Distributed Control Systems by Web of Influence
88
--
106
Norshidah Mohamed
,
Jasber Kaur A. P. Gian Singh
.
A Conceptual Framework for Information Technology Governance Effectiveness in Private Organizations
107
--
122
Teodor Sommestad
,
Hannes Holm
,
Mathias Ekstedt
.
Estimates of success rates of remote arbitrary code execution attacks
123
--
146
Ahmed Patel
,
Wei Qi
,
Mona Taghavi
.
An Evaluation of a Secure and Trustworthy Mobile Agent-based E-marketplace System
Volume
20
, Issue
1
4
--
17
Julio Angulo
,
Simone Fischer-Hübner
,
Erik Wästlund
,
Tobias Pulls
.
Towards Usable Privacy Policy Display & Management for PrimeLife
18
--
28
Malcolm Robert Pattinson
,
Cate Jerram
,
Kathryn Parsons
,
Agata McCormac
,
Marcus A. Butavicius
.
Why Do Some People Manage Phishing Emails Better Than Others?
29
--
38
Geordie Stewart
,
David Lacey
.
Death by a Thousand Facts: Criticising the Technocratic Approach to Information Security Awareness
39
--
46
Kerry-Lynn Thomson
,
Johan Van Niekerk
.
Combating Information Security Apathy by Encouraging Prosocial Organisational Behaviour