


default search action
Information Management & Computer Security, Volume 17
Volume 17, Number 1, 2009
- Rodrigo Werlinger, Kirstie Hawkey, Konstantin Beznosov:

An integrated view of human, organizational, and technological challenges of IT security management. 4-19 - David James Bennett, Paul Stephens:

A cognitive walkthrough of Autopsy Forensic Browser. 20-29 - Kirsi Helkala

, Einar Snekkenes:
Formalizing the ranking of authentication products. 30-43 - Martyn Styles, Theo Tryfonas

:
Using penetration testing feedback to cultivate an atmosphere of proactive security amongst end-users. 44-52 - Taimur Bakhshi

, Maria Papadaki
, Steven Furnell
:
Social engineering: assessing vulnerabilities in practice. 53-63
Volume 17, Number 2, 2009
- Ahmad A. Abu-Musa

:
Exploring the importance and implementation of COBIT processes in Saudi organizations: An empirical study. 73-95 - Juan Carlos Roca, Juan José García

, Juan José de la Vega
:
The importance of perceived trust, security and privacy in online trading systems. 96-113 - Ali H. Al-Badi, Rafi Ashrafi

, Ali O. Al-Majeeni, Pam J. Mayhew:
IT disaster recovery: Oman and Cyclone Gonu lessons learned. 114-126 - Alan D. Smith:

Internet retail banking: A competitive analysis in an increasingly financially troubled environment. 127-150 - Jayanthi Ranjan

, Vishal Bhatnagar:
A holistic framework for mCRM - data mining perspective. 151-165 - Mohamed Intan Salwani

, Govindan Marthandan
, Mohd Daud Norzaidi
, Siong Choy Chong
:
E-commerce usage and business performance in the Malaysian tourism sector: empirical analysis. 166-185
Volume 17, Number 3, 2009
- Kamel Rouibah

, Sulaiman Al-Rafee:
Requirement engineering elicitation methods: A Kuwaiti empirical study about familiarity, usage and perceived value. 192-217 - Tzu-Chuan Chou, An-Sheng Lee:

A process model for customer relational assets creation: A case study of online securities trading platform. 218-233 - Olufunke R. Vincent, Olusegun Folorunso, Ayodele Akinde:

On consolidation model in e-bill presentment and payment. 234-247 - Wing S. Chow, Wai On Ha:

Determinants of the critical success factor of disaster recovery planning for information systems. 248-275 - Anil Gurung

, Xin (Robert) Luo, Qinyu Liao:
Consumer motivations in taking action against spyware: an empirical investigation. 276-289
Volume 17, Number 4, 2009
- Jordan Shropshire:

A canonical analysis of intentional information security breaches by insiders. 296-310 - Pavlos S. Efraimidis, George Drosatos

, Fotis Nalbadis, Aimilia Tasidou:
Towards privacy in personal data management. 311-329 - Jie Zhang

, Brian J. Reithel, Han Li:
Impact of perceived technical protection on security behaviors. 330-340 - Michael Workman:

How perceptions of justice affect security attitudes: suggestions for practitioners and researchers. 341-353
Volume 17, Number 5, 2009
- Zeeshan Ahmed

:
Proposing semantic-oriented agent and knowledge base product data management. 360-371 - Princely Ifinedo:

Information technology security management concerns in global financial services institutions: Is national culture a differentiator? 372-387 - Janne Merete Hagen, Eirik Albrechtsen:

Effects on employees' information security abilities by e-learning. 388-407 - Cheng-Chi Lee

, Min-Shiang Hwang, Chih-Wei Lin:
A new English auction scheme using the bulletin board system. 408-417

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














