


default search action
Information Management & Computer Security, Volume 18
Volume 18, Number 1, 2010
- David Lacey:

Understanding and transforming organizational security culture. 4-13 - Tara Whalen, Carrie Gates:

Watching the watchers: "voluntary monitoring" of infosec employees. 14-25 - Rodrigo Werlinger, Kasia Muldner, Kirstie Hawkey, Konstantin Beznosov:

Preparation, detection, and analysis: the diagnostic work of IT security incident response. 26-42 - Mohd Zalisham Jali

, Steven Furnell
, Paul Dowland
:
Assessing image-based authentication techniques in a web-based environment. 43-53 - Meltini Christodoulaki, Paraskevi Fragopoulou:

SafeLine: reporting illegal internet content. 54-65
Volume 18, Number 2
- Guillermo Horacio Ramirez Caceres, Yoshimi Teshigawara:

Security Guideline Tool for Home Users Based on International Standards. 101-123 - Ting-Yi Chang, Yu-Ju Yang, Chun-Cheng Peng:

A Personalized Rhythm Click-Based Authentication System. 72-85 - Seung S. Yang, Hongsik Choi:

Vulnerability Analysis and the Practical Implications of a Server-challenge-based One-time Password System. 86-100 - Michael Pearce, Sherali Zeadally, Ray Hunt:

Assessing and Improving Authentication Confidence Management. 124-139
Volume 18, Number 3, 2010
- Ahmed Patel, Wei Qi, Christopher Wills:

A review and future research directions of secure and trustworthy mobile agent-based e-marketplace systems. 144-161 - Wendy Hui

:
Brand, knowledge, and false sense of security. 162-172 - K. Al-Awadi, Messaoud Saidani

:
Justifying the need for a data security management plan for the UAE. 173-184 - Zvi Goldstein, David Petrie, Yosef Sherif:

Finding middle ground management strategy for software development. 185-197
Volume 18, Number 4, 2010
- Sigi Goode

:
Exploring the supply of pirate software for mobile devices: An analysis of software types and piracy groups. 204-225 - Ahmad A. Abu-Musa

:
Information security governance in Saudi organizations: an empirical study. 226-276 - Ahmed Patel, Qais Qassim

, Christopher Wills
:
A survey of intrusion detection and prevention systems. 277-290 - Dimitrios Patsos, Sarandis Mitropoulos, Christos Douligeris:

Expanding topological vulnerability analysis to intrusion detection through the incident response intelligence system. 291-309
Volume 18, Number 5, 2010
- Hennie A. Kruger

, Lynette Drevin
, Tjaart Steyn:
A Vocabulary Test to Assess Information Security Awareness. 316-327 - Tatsuo Asai, Aline Uwera Hakizabera:

Human-Related Problems of Information Security in East African Cross-Cultural Environments. 328-338 - Shamal Faily, Ivan Flechais:

Designing and Aligning e-Science Security Culture with Design. 339-349 - Aggeliki Tsohou:

A Security Standards' Framework to Facilitate Best Practices' Awareness and Conformity. 350-365 - Lynn Futcher, Cheryl Schroder, Rossouw von Solms:

Information Security Education in South Africa. 366-374

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














