246 | -- | 285 | Fredrik Karlsson, Joachim Åström, Martin Karlsson. Information security culture - state-of-the-art review between 2000 and 2013 |
286 | -- | 301 | Ioannis Tsimperidis, Vasilios Katos, Nathan L. Clarke. Language-independent gender identification through keystroke analysis |
302 | -- | 316 | Ruth Østgaard Skotnes. Management commitment and awareness creation - ICT safety and security in electric power supply network companies |
317 | -- | 332 | Randy Borum, John Felker, Sean Kern, Kristen Dennesen, Tonya Feyes. Strategic cyber intelligence |
333 | -- | 346 | Swapan Purkait. Examining the effectiveness of phishing filters against DNS based phishing attacks |
347 | -- | 367 | Muhammad Adnan, Mike Just, Lynne Baillie, Hilmi Günes Kayacik. Investigating the work practices of network security professionals |