


default search action
Information Management & Computer Security, Volume 20
Volume 20, Number 1, 2012
- Julio Angulo

, Simone Fischer-Hübner, Erik Wästlund
, Tobias Pulls:
Towards Usable Privacy Policy Display & Management for PrimeLife. 4-17 - Malcolm Robert Pattinson, Cate Jerram, Kathryn Parsons, Agata McCormac, Marcus A. Butavicius:

Why Do Some People Manage Phishing Emails Better Than Others? 18-28 - Geordie Stewart, David Lacey:

Death by a Thousand Facts: Criticising the Technocratic Approach to Information Security Awareness. 29-38 - Kerry-Lynn Thomson

, Johan Van Niekerk:
Combating Information Security Apathy by Encouraging Prosocial Organisational Behaviour. 39-46
Volume 20, Number 2, 2012
- Michael Workman:

Validation of a Biases Model in Strategic Security Decision-Making. 52-70 - Stig Ole Johnsen:

Resilience at Interfaces - Improvement of Safety and Security in Distributed Control Systems by Web of Influence. 71-87 - Norshidah Mohamed

, Jasber Kaur A. P. Gian Singh:
A Conceptual Framework for Information Technology Governance Effectiveness in Private Organizations. 88-106 - Teodor Sommestad, Hannes Holm

, Mathias Ekstedt:
Estimates of success rates of remote arbitrary code execution attacks. 107-122 - Ahmed Patel, Wei Qi, Mona Taghavi:

An Evaluation of a Secure and Trustworthy Mobile Agent-based E-marketplace System. 123-146
Volume 20, Number 3, 2012
- Cornelius Johannes Kruger, Mavis Noxolo Mama:

Incorporating business strategy formulation with identity management strategy formulation. 152-169 - Vandana Pramod, Jinghua Li, Ping Gao

:
A framework for preventing money laundering in banks. 170-183 - Vasilios Katos

:
An integrated model for online transactions: illuminating the black box. 184-206 - Weiguo Sheng, Gareth Howells, Michael C. Fairhurst, Farzin Deravi, Shengyong Chen:

Reliable and secure encryption key generation from fingerprints. 207-221 - Mayur S. Desai, Kiran J. Desai, Lonnie D. Phelps:

E-commerce policies and customer privacy: a longitudinal study (2000-2010). 222-244
Volume 20, Number 4, 2012
- Raydel Montesino

, Stefan Fenz
, Walter Baluja:
SIEM-based framework for security controls automation. 248-263 - Vinod Pathari

, Rajendra M. Sonar
:
Identifying linkages between statements in information security policy, procedures and controls. 264-280 - Zac Sadan, David G. Schwartz

:
Social Network Analysis for Cluster-Based IP Spam Reputation. 281-295 - Andrew Stewart

:
Can spending on information security be justified? Evaluating the security spending decision from the perspective of a rational actor. 312-326
Volume 20, Number 5, 2012
- Jonna Järveläinen

:
Information security and business continuity management in interorganizational IT relationships. 332-349 - Eric H. Goldman:

The effect of acquisition decision making on security posture. 350-363 - Margaret Tan, Kathrine Sagala Aguilar:

An investigation of students' perception of Bluetooth security. 364-381 - Swapan Purkait:

Phishing counter measures and their effectiveness - literature review. 382-420

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














