


default search action
Information Management & Computer Security, Volume 22
Volume 22, Number 1, 2014
- Sanjay Bahl, Om Prakash Wali:

Perceived significance of information security governance to predict the information security service quality in software service industry: An empirical analysis. 2-23 - Deepa Mani, Kim-Kwang Raymond Choo

, Sameera Mubarak
:
Information security in the South Australian real estate industry: A study of 40 real estate organisations. 24-41 - Teodor Sommestad, Jonas Hallberg, Kristoffer Lundholm, Johan E. Bengtsson:

Variables influencing information security policy compliance: A systematic review of quantitative studies. 42-75 - Thembekile O. Mayayise, Isaac Olusegun Osunmakinde

:
E-commerce assurance models and trustworthiness issues: an empirical study. 76-96 - Mark A. Harris

, Karen P. Patten:
Mobile device security considerations for small- and medium-sized enterprise business mobility. 97-114 - Eyong B. Kim:

Recommendations for information security awareness training for college students. 115-126
Volume 22, Number 2, 2014
- Eugene Kaspersky, Steven Furnell:

A security education Q&A. 130-133 - Firman Azhari:

Quick detection of NFC vulnerability: Implementation weakness exploitation. 134-140 - Dusan Repel, Ingo Stengel:

Grammar-based transformations: attack and defence. 141-154 - Weizhi Meng

, Duncan S. Wong, Lam-for Kwok:
The effect of adaptive mechanism on behavioural biometric based mobile phone authentication. 155-166 - Iwan Gulenko:

Improving passwords: influence of emotions on security behaviour. 167-178 - Rayne Reid, Johan Van Niekerk:

Snakes and ladders for digital natives: information security education for the youth. 179-190
Volume 22, Number 3, 2014
- Swapan Purkait, Sadhan Kumar De, Damodar Suar

:
An empirical investigation of the factors that influence Internet user's ability to correctly identify a phishing website. 194-234 - Winfred Yaokumah

:
Information security governance implementation within Ghanaian industry sectors: An empirical study. 235-250 - Issa Atoum

, Ahmed Otoom
, Amer Abu-Ali:
A holistic cyber security implementation framework. 251-264 - Evandro Alencar Rigon, Carla Merkle Westphall, Daniel Ricardo dos Santos

, Carlos Becker Westphall:
A cyclical evaluation model of information security maturity. 265-278 - Mario Silic

, Andrea Back:
Information security: Critical review and future directions for research. 279-308 - Peter James, Don Griffiths:

A secure portable execution environment to support teleworking. 309-330
Volume 22, Number 4, 2014
- Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram:

A study of information security awareness in Australian government organisations. 334-345 - Kirsi Helkala

, Tone Hoddø Bakås:
Extended results of Norwegian password security survey. 346-357 - John Haggerty, Sheryllynne Haggerty, Mark John Taylor:

Forensic triage of email network narratives through visualisation. 358-370 - Rayne Reid, Johan Van Niekerk:

Brain-compatible, web-based information security education: a statistical study. 371-381 - Maina M. Olembo, Timo Kilian, Simon Stockhardt, Andreas Hülsing

, Melanie Volkamer:
Developing and testing SCoP - a visual hash scheme. 382-392 - Waldo Rocha Flores, Hannes Holm

, Gustav Svensson, Göran Ericsson:
Using phishing experiments and scenario-based surveys to understand security behaviours in practice. 393-406
Volume 22, Number 5, 2014
- Stefan Fenz, Johannes Heurix, Thomas Neubauer, Fabian Pechstein

:
Current challenges in information security risk management. 410-430 - Ammar Alazab

, Michael Hobbs
, Jemal H. Abawajy, Ansam Khraisat, Mamoun Alazab
:
Using response action with intelligent intrusion detection and prevention system against web application malware. 431-449 - Sindhuja P. N.

:
Impact of information security initiatives on supply chain performance: An empirical investigation. 450-473 - John D'Arcy, Gwen Greene:

Security culture and the employment relationship as drivers of employees' security compliance. 474-489 - Jae Choi, Derek L. Nazareth:

Repairing trust in an e-commerce and security context: an agent-based modeling approach. 490-512 - Atif Ahmad, Sean B. Maynard

:
Teaching information security management: reflections and experiences. 513-536

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














