Journal: Inf. Sec. Techn. Report

Volume 14, Issue 4

175 -- 0Martin Smith. Changing staff behaviour
176 -- 180Steven M. Furnell. The irreversible march of technology
181 -- 185Lizzie Coles-Kemp. Information security management: An entangled research challenge
186 -- 196Carl Colwill. Human factors in information security: The insider threat - Who can you trust these days?
197 -- 201Geordie Stewart. A safety approach to information security communications
202 -- 212Sameera Mubarak, Jill Slay. Protecting clients from insider attacks on trust accounts
213 -- 216Andrew Jones. How do you make information security user friendly?
217 -- 222Theodosios Tsiakis. Contribution of corporate social responsibility to information security management
223 -- 229Mete Eminagaoglu, Erdem Uçar, Saban Eren. The positive outcomes of information security awareness training in companies - A case study

Volume 14, Issue 3

111 -- 112Lizzie Coles-Kemp. The changing shape of privacy and consent
113 -- 118Shirin Elahi. Privacy and consent in the digital era
119 -- 123Louise Bennett. Reflections on privacy, identity and consent in on-line services
124 -- 130Jeremy Hilton. Improving the secure management of personal data: Privacy on-line IS important, but it's not easy
131 -- 137Andrew Churchill. 'Privacy and public policy delivery - Dichotomy or design'
138 -- 142Nazir A. Malik, Allan Tomlinson. Privacy and consent in pervasive networks
143 -- 145David G. W. Birch. Victorian values: Politicians and the public incorrectly see security and privacy as opposites
146 -- 153Robin Wilton. What's happened to PETs?
154 -- 159Edgar A. Whitley. Informational privacy, consent and the "control" of personal data
160 -- 166Jo Bryce, Mathias Klang. Young people, disclosure of personal information and online privacy: Control, choice and consequences
167 -- 172Danijela Bogdanovic, Conn Crawford, Lizzie Coles-Kemp. The need for enhanced privacy and consent dialogues

Volume 14, Issue 2

35 -- 0Michael J. Ganley. Introduction to this issue
36 -- 45Xuefei Leng. Smart card applications and security
46 -- 56Konstantinos Markantonakis, Michael Tunstall, Gerhard P. Hancke, Ioannis G. Askoxylakis, Keith Mayes. Attacking smart card systems: Theory and practice
57 -- 69Tony Boswell. Smart card security evaluation: Community solutions to intractable problems
70 -- 78Damien Sauveron. Multiapplication smart card: Towards an open smart card?
79 -- 86Wolfgang Rankl. How to defend against smartcard attacks - Or the amazing number of different ways to check a PIN securely
87 -- 95Keith Mayes, Konstantinos Markantonakis, Gerhard P. Hancke. Transport ticketing security and fraud controls
96 -- 100Ingo Liersch. Electronic passports - from secure specifications to secure implementations
101 -- 110Serge Chaumette, Damien Sauveron. Smart cards and remote computing: Interaction or convergence?

Volume 14, Issue 1

1 -- 6Igor Muttik, Chris Barton. Cloud security technologies
7 -- 15David Harley. Making sense of anti-malware comparative testing
16 -- 29Asaf Shabtai, Robert Moskovitch, Yuval Elovici, Chanan Glezer. Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey
30 -- 33Sami Rautiainen. A look at Portable Document Format vulnerabilities