researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Manag. Comput. Security
Home
Index
Info
Volume
Volume
21
, Issue
5
344
--
359
Mark Ciampa
.
A comparison of password feedback mechanisms and their impact on password entropy
360
--
380
Hamed Khiabani
,
Norbik Bashah Idris
,
Jamalul-lail Ab Manan
.
Unified trust establishment by leveraging remote attestation - modeling and analysis
381
--
400
Wu He
.
A survey of security risks of mobile social media through blog mining and an extensive literature search
401
--
419
Vinod Pathari
,
Rajendra M. Sonar
.
Deriving an information security assurance indicator at the organizational level
420
--
443
Michael Levi
,
Matthew Leighton Williams
.
Multi-agency partnerships in cybercrime reduction: Mapping the UK information assurance network cooperation space
Volume
21
, Issue
4
228
--
249
Kallaya Jairak
,
Prasong Praneetpolgrang
.
Applying IT governance balanced scorecard and importance-performance analysis for providing IT governance strategy in university
250
--
265
Hannes Holm
,
Mathias Ekstedt
.
Estimates on the effectiveness of web application firewalls against targeted attacks
266
--
287
Karin Hedström
,
Fredrik Karlsson
,
Ella Kolkowska
.
Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale
288
--
314
Tarek S. Sobh
.
Anomaly detection based on hybrid artificial immune principles
315
--
338
Alexandros Papanikolaou
,
Vasileios Vlachos
,
Andreas Venieris
,
Christos Ilioudis
,
Konstantinos Papapanagiotou
,
Anastasios Stasinopoulos
.
A framework for teaching network security in academic environments
Volume
21
, Issue
3
144
--
154
Mahmood Hajli
.
A research framework for social commerce adoption
155
--
176
Kai S. Koong
,
Mohammad I. Merhi
,
Jun Sun
.
Push and pull effects of homeland information security incentives
177
--
190
Costas Lambrinoudakis
.
Evaluating and enriching information and communication technologies compliance frameworks with regard to privacy
191
--
201
Hussein Shaaban
,
Marc Conrad
.
Democracy, culture and information security: a case study in Zanzibar
202
--
223
Stefan Taubenberger
,
Jan Jürjens
,
Yijun Yu
,
Bashar Nuseibeh
.
Resolving vulnerability identification errors using security requirements on business process models
Volume
21
, Issue
2
73
--
90
Pablo Carballude González
.
Fingerprinting Tor
91
--
101
Iwan Gulenko
.
Social against social engineering: Concept and development of a Facebook application to raise security and risk awareness
102
--
109
Joshua Arvin S. Lat
,
Rod Xavier R. Bondoc
,
Kevin Charles V. Atienza
.
SOUL System: secure online USB login system
110
--
120
Mariah Strella P. Indrinal
,
Ranyel Bryan L. Maliwanag
,
Marynyriene I. Silvestre
.
VoxGrid: a mobile voice verification system
121
--
138
Ang Cui
,
Jatin Kataria
,
Salvatore J. Stolfo
.
Revisiting the myth of Cisco IOS diversity: recent advances in reliable shellcode design
Volume
21
, Issue
1
5
--
15
Ayako Komatsu
,
Daisuke Takagi
,
Toshihiko Takemura
.
Human aspects of information security: An empirical study of intentional versus actual behavior
16
--
29
Dimitrios Michalopoulos
,
Ioannis Mavridis
.
A method to calculate social networking hazard probability in definite time
30
--
40
Teodor Sommestad
,
Amund Hunstad
.
Intrusion detection and the role of the system administrator
41
--
52
Cristian Thiago Moecke
,
Melanie Volkamer
.
Usable secure email communications: criteria and evaluation of existing approaches
53
--
65
Evangelos D. Frangopoulos
,
Mariki M. Eloff
,
Lucas M. Venter
.
Psychosocial risks: Can their effects on the security of information systems really be ignored?