


default search action
Information Management & Computer Security, Volume 19
Volume 19, Number 1, 2011
- Haider Abbas

, Christer Magnusson, Louise Yngström, Ahmed Hemani:
Addressing Dynamic Issues in Information Security Management. 5-24 - Lior Lazar, Omer Tikolsky, Chanan Glezer

, Moshe Zviran:
Personalized Cognitive Passwords: An Exploratory Assessment. 25-41 - Ladislav Beránek

:
Risk Analysis Methodology Used by Several Small and Medium Enterprises in the Czech Republic. 42-52 - Craig E. Wills, Mihajlo Zeljkovic:

A Personalized Approach to Web Privacy - Awareness, Attitudes and Actions. 53-73
Volume 19, Number 2, 2011
- Teodor Sommestad, Mathias Ekstedt, Hannes Holm

, Muhammad Afzal:
Security mistakes in information system deployment projects. 80-94 - Dov Shirtz, Yuval Elovici:

Optimizing Investment Decisions in Selecting Information Security Remedies. 95-112 - Vasileios Vlachos

, Marilena Minou, Vassilis Assimakopoulos, Androniki Toska:
The Landscape of Cybercrime in Greece. 113-123 - Yngve Monfelt, Sofie Pilemalm, Jonas Hallberg, Louise Yngström:

The 14 Layered Framework for Including Social and Organisational Aspects in Security Management. 124-133
Volume 19, Number 3, 2011
- Janne Merete Hagen, Eirik Albrechtsen, Stig Ole Johnsen:

The long term effects of information security e-learning on organizational learning. 140-154 - Jacqueline H. Hall, Shahram Sarkani, Thomas A. Mazzuchi:

Impacts of Organizational Capabilities In Information Security. 155-176 - Dimitris Mitropoulos, Vassilios Karakoidas, Panos Louridas, Diomidis Spinellis

:
Countering Code Injection Attacks: A Unified Approach. 177-194 - Norazah Mohd Suki, Thurasamy Ramayah, Norbayah Mohd Suki:

Understanding Consumer Intention with Respect to Purchase and Use of Pirated Software. 195-210
Volume 19, Number 4, 2011
- Chlotia Posey Garrison, Matoteng Ncube:

A Longitudinal Analysis of Data Breaches. 216-230 - Hannes Holm

, Teodor Sommestad, Jonas Almroth, Mats Persson:
A quantitative evaluation of vulnerability scanning. 231-247 - George Aggelinos, Sokratis K. Katsikas

:
Enhancing SSADM with Disaster Recovery Plan activities. 248-261 - Dan Harnesk, John Lindström:

Shaping Security Behavior through Discipline and Agility: Implications for Information Security Management. 262-276
Volume 19, Number 5, 2011
- Helen Georgia Kapodistria, Sarandis Mitropoulos, Christos Douligeris:

An Advanced Web Attack Detection and Prevention Tool. 280-299 - Debasis Bhattacharya:

Leadership Styles and Information Security in Small Businesses. 300-312 - Abhishek Vaish

, Aditya Prabhakar, Himanshu Mishra, Nupur Dayal, Shishir Kumar Singh, Utkarsh Goel, Natalie Coull
:
Quantifying Information Dynamics Through New Valuation System. 313-332 - Ahmed Patel, Wei Qi, Mona Taghavi:

Design of Secure and Trustworthy Mobile Agent-based E-marketplace System. 333-352

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














