Journal: Inf. Manag. Comput. Security

Volume 20, Issue 5

332 -- 349Jonna Järveläinen. Information security and business continuity management in interorganizational IT relationships
350 -- 363Eric H. Goldman. The effect of acquisition decision making on security posture
364 -- 381Margaret Tan, Kathrine Sagala Aguilar. An investigation of students' perception of Bluetooth security
382 -- 420Swapan Purkait. Phishing counter measures and their effectiveness - literature review

Volume 20, Issue 4

248 -- 263Raydel Montesino, Stefan Fenz, Walter Baluja. SIEM-based framework for security controls automation
264 -- 280Vinod Pathari, Rajendra M. Sonar. Identifying linkages between statements in information security policy, procedures and controls
281 -- 295Zac Sadan, David G. Schwartz. Social Network Analysis for Cluster-Based IP Spam Reputation
312 -- 326Andrew Stewart. Can spending on information security be justified? Evaluating the security spending decision from the perspective of a rational actor

Volume 20, Issue 3

152 -- 169Cornelius Johannes Kruger, Mavis Noxolo Mama. Incorporating business strategy formulation with identity management strategy formulation
170 -- 183Vandana Pramod, Jinghua Li, Ping Gao. A framework for preventing money laundering in banks
184 -- 206Vasilios Katos. An integrated model for online transactions: illuminating the black box
207 -- 221Weiguo Sheng, Gareth Howells, Michael C. Fairhurst, Farzin Deravi, Shengyong Chen. Reliable and secure encryption key generation from fingerprints
222 -- 244Mayur S. Desai, Kiran J. Desai, Lonnie D. Phelps. E-commerce policies and customer privacy: a longitudinal study (2000-2010)

Volume 20, Issue 2

52 -- 70Michael Workman. Validation of a Biases Model in Strategic Security Decision-Making
71 -- 87Stig Ole Johnsen. Resilience at Interfaces - Improvement of Safety and Security in Distributed Control Systems by Web of Influence
88 -- 106Norshidah Mohamed, Jasber Kaur A. P. Gian Singh. A Conceptual Framework for Information Technology Governance Effectiveness in Private Organizations
107 -- 122Teodor Sommestad, Hannes Holm, Mathias Ekstedt. Estimates of success rates of remote arbitrary code execution attacks
123 -- 146Ahmed Patel, Wei Qi, Mona Taghavi. An Evaluation of a Secure and Trustworthy Mobile Agent-based E-marketplace System

Volume 20, Issue 1

4 -- 17Julio Angulo, Simone Fischer-Hübner, Erik Wästlund, Tobias Pulls. Towards Usable Privacy Policy Display & Management for PrimeLife
18 -- 28Malcolm Robert Pattinson, Cate Jerram, Kathryn Parsons, Agata McCormac, Marcus A. Butavicius. Why Do Some People Manage Phishing Emails Better Than Others?
29 -- 38Geordie Stewart, David Lacey. Death by a Thousand Facts: Criticising the Technocratic Approach to Information Security Awareness
39 -- 46Kerry-Lynn Thomson, Johan Van Niekerk. Combating Information Security Apathy by Encouraging Prosocial Organisational Behaviour