Journal: Inf. Manag. Comput. Security

Volume 21, Issue 5

344 -- 359Mark Ciampa. A comparison of password feedback mechanisms and their impact on password entropy
360 -- 380Hamed Khiabani, Norbik Bashah Idris, Jamalul-lail Ab Manan. Unified trust establishment by leveraging remote attestation - modeling and analysis
381 -- 400Wu He. A survey of security risks of mobile social media through blog mining and an extensive literature search
401 -- 419Vinod Pathari, Rajendra M. Sonar. Deriving an information security assurance indicator at the organizational level
420 -- 443Michael Levi, Matthew Leighton Williams. Multi-agency partnerships in cybercrime reduction: Mapping the UK information assurance network cooperation space

Volume 21, Issue 4

228 -- 249Kallaya Jairak, Prasong Praneetpolgrang. Applying IT governance balanced scorecard and importance-performance analysis for providing IT governance strategy in university
250 -- 265Hannes Holm, Mathias Ekstedt. Estimates on the effectiveness of web application firewalls against targeted attacks
266 -- 287Karin Hedström, Fredrik Karlsson, Ella Kolkowska. Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale
288 -- 314Tarek S. Sobh. Anomaly detection based on hybrid artificial immune principles
315 -- 338Alexandros Papanikolaou, Vasileios Vlachos, Andreas Venieris, Christos Ilioudis, Konstantinos Papapanagiotou, Anastasios Stasinopoulos. A framework for teaching network security in academic environments

Volume 21, Issue 3

144 -- 154Mahmood Hajli. A research framework for social commerce adoption
155 -- 176Kai S. Koong, Mohammad I. Merhi, Jun Sun. Push and pull effects of homeland information security incentives
177 -- 190Costas Lambrinoudakis. Evaluating and enriching information and communication technologies compliance frameworks with regard to privacy
191 -- 201Hussein Shaaban, Marc Conrad. Democracy, culture and information security: a case study in Zanzibar
202 -- 223Stefan Taubenberger, Jan Jürjens, Yijun Yu, Bashar Nuseibeh. Resolving vulnerability identification errors using security requirements on business process models

Volume 21, Issue 2

73 -- 90Pablo Carballude González. Fingerprinting Tor
91 -- 101Iwan Gulenko. Social against social engineering: Concept and development of a Facebook application to raise security and risk awareness
102 -- 109Joshua Arvin S. Lat, Rod Xavier R. Bondoc, Kevin Charles V. Atienza. SOUL System: secure online USB login system
110 -- 120Mariah Strella P. Indrinal, Ranyel Bryan L. Maliwanag, Marynyriene I. Silvestre. VoxGrid: a mobile voice verification system
121 -- 138Ang Cui, Jatin Kataria, Salvatore J. Stolfo. Revisiting the myth of Cisco IOS diversity: recent advances in reliable shellcode design

Volume 21, Issue 1

5 -- 15Ayako Komatsu, Daisuke Takagi, Toshihiko Takemura. Human aspects of information security: An empirical study of intentional versus actual behavior
16 -- 29Dimitrios Michalopoulos, Ioannis Mavridis. A method to calculate social networking hazard probability in definite time
30 -- 40Teodor Sommestad, Amund Hunstad. Intrusion detection and the role of the system administrator
41 -- 52Cristian Thiago Moecke, Melanie Volkamer. Usable secure email communications: criteria and evaluation of existing approaches
53 -- 65Evangelos D. Frangopoulos, Mariki M. Eloff, Lucas M. Venter. Psychosocial risks: Can their effects on the security of information systems really be ignored?