You are here: Home
Personal tools

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 745 items matching your search terms

Subscribe to an always-updated feed of these search terms

Cart Item JISSec_V12N3_Hassan_p177_CI
When Biology Meets Cyber-Security, by Mohamed Hassan, Alexios Mylonas and Stilianos Vidalis - Cart Item
Cart Item JISSec_V12N3_Simon_p151_CI
An Analysis of Data Breach Induced Trauma: An Exploratory Study, by Steven Simon and Robert Perkins - Cart Item
Record V12N3_Hassan.html
Record V12N3_Simon.html
Cart Item JISSec_V12N3_Benusa_p131_CI
Forensic Analysis Challenges: Shifting from HDD to SDD Storage, by Allen Benusa, Shajive Jeganathan and Mark Schmidt - Cart Item
File V12N1_Editorial.pdf
JISSec Volume 12, Number 3 Editorial
File V12N3_FrontMatter.pdf
JISSec Volume 12, Number 3 Front Matter
Document V12N3.html
JISSec Volume 12, Number 3 (2016) contents
Record V12N3_Benusa.html
Cart Item JISSec_V12N2_Baseman_p109_CI
Why Are Europeans So Sensitive about Privacy?, by Ronald Baseman - Cart Item
Cart Item JISSec_V12N2_Kongsathitsuwan_p91_CI
Cued Recall on Image Recognition, by Kanthima Kongsathitsuwan and Vichit Lorchirachoonkul- Cart Item
Cart Item JISSec_V12N2_Mai_p75_CI
Vulnerability Enhancement vs. Loss Mitigation: Optimal Information Security Investment, by Bin Mai, Shailesh Kulkarni and Mohammad Salehan - Cart Item
File V12N2_Editorial.pdf
JISSec Volume 12, Number 2 Editorial
File V12N2_FrontMatter.pdf
JISSec Volume 12, Number 2 Front Matter
Record V12N2_Baseman.html
Record V12N2_Kongsathitsuwan.html
Record V12N2_Mai.html
Document V12N2.html
JISSec Volume 12, Number 2 (2016) contents
Cart Item JISSec_V12N1_Goel_p45_CI
A Perspective on the Evolution of Information System Security Audits: Challenges and Implications, by Sunita Goel, Margaret Garnsey, Qi Liu and Ingrid Fisher - ...
Cart Item JISSec_V12N1_Dave_p27_CI
Application Profiling based on Attack Alert Aggregation, by Shalvi Dave, Bhushan Trivedi and Jimit Mahadevia - Cart Item
Cart Item JISSec_V12N1_Summers_p3_CI
An Image of Information Security: Examining the Coping Process by Internet Users, by Nirmalee Summers and Kent Marett - Cart Item
File V12N1_Editorial.pdf
JISSec Volume 12, Number 1 Editorial
File V12N1_FrontMatter.pdf
JISSec Volume 12, Number 1 Front Matter
Record V12N1_Goel.html
Record V12N1_Dave.html
Record V12N1_Summers.html
Document V12N1.html
JISSec Volume 12, Number 1 (2016) contents
Folder N3
JISSec Volume 12, Number 3
Folder N2
JISSec Volume 12, Number 2
Folder N1
JISSec Volume 12, Number 1