researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Sec. Techn. Report
Home
Index
Info
Volume
Volume
14
, Issue
4
175
--
0
Martin Smith
.
Changing staff behaviour
176
--
180
Steven M. Furnell
.
The irreversible march of technology
181
--
185
Lizzie Coles-Kemp
.
Information security management: An entangled research challenge
186
--
196
Carl Colwill
.
Human factors in information security: The insider threat - Who can you trust these days?
197
--
201
Geordie Stewart
.
A safety approach to information security communications
202
--
212
Sameera Mubarak
,
Jill Slay
.
Protecting clients from insider attacks on trust accounts
213
--
216
Andrew Jones
.
How do you make information security user friendly?
217
--
222
Theodosios Tsiakis
.
Contribution of corporate social responsibility to information security management
223
--
229
Mete Eminagaoglu
,
Erdem Uçar
,
Saban Eren
.
The positive outcomes of information security awareness training in companies - A case study
Volume
14
, Issue
3
111
--
112
Lizzie Coles-Kemp
.
The changing shape of privacy and consent
113
--
118
Shirin Elahi
.
Privacy and consent in the digital era
119
--
123
Louise Bennett
.
Reflections on privacy, identity and consent in on-line services
124
--
130
Jeremy Hilton
.
Improving the secure management of personal data: Privacy on-line IS important, but it's not easy
131
--
137
Andrew Churchill
.
'Privacy and public policy delivery - Dichotomy or design'
138
--
142
Nazir A. Malik
,
Allan Tomlinson
.
Privacy and consent in pervasive networks
143
--
145
David G. W. Birch
.
Victorian values: Politicians and the public incorrectly see security and privacy as opposites
146
--
153
Robin Wilton
.
What's happened to PETs?
154
--
159
Edgar A. Whitley
.
Informational privacy, consent and the "control" of personal data
160
--
166
Jo Bryce
,
Mathias Klang
.
Young people, disclosure of personal information and online privacy: Control, choice and consequences
167
--
172
Danijela Bogdanovic
,
Conn Crawford
,
Lizzie Coles-Kemp
.
The need for enhanced privacy and consent dialogues
Volume
14
, Issue
2
35
--
0
Michael J. Ganley
.
Introduction to this issue
36
--
45
Xuefei Leng
.
Smart card applications and security
46
--
56
Konstantinos Markantonakis
,
Michael Tunstall
,
Gerhard P. Hancke
,
Ioannis G. Askoxylakis
,
Keith Mayes
.
Attacking smart card systems: Theory and practice
57
--
69
Tony Boswell
.
Smart card security evaluation: Community solutions to intractable problems
70
--
78
Damien Sauveron
.
Multiapplication smart card: Towards an open smart card?
79
--
86
Wolfgang Rankl
.
How to defend against smartcard attacks - Or the amazing number of different ways to check a PIN securely
87
--
95
Keith Mayes
,
Konstantinos Markantonakis
,
Gerhard P. Hancke
.
Transport ticketing security and fraud controls
96
--
100
Ingo Liersch
.
Electronic passports - from secure specifications to secure implementations
101
--
110
Serge Chaumette
,
Damien Sauveron
.
Smart cards and remote computing: Interaction or convergence?
Volume
14
, Issue
1
1
--
6
Igor Muttik
,
Chris Barton
.
Cloud security technologies
7
--
15
David Harley
.
Making sense of anti-malware comparative testing
16
--
29
Asaf Shabtai
,
Robert Moskovitch
,
Yuval Elovici
,
Chanan Glezer
.
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey
30
--
33
Sami Rautiainen
.
A look at Portable Document Format vulnerabilities