You are here: Home
Personal tools

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 745 items matching your search terms

Subscribe to an always-updated feed of these search terms

Document V12.html
JISSec contents: Volume 12
Folder V12
JISSec Volume 12 (2016)
News Item Volume 12, Number 3
This is JISSec Volume 12, Number 3 launch announcement
News Item Volume 12, Number 2
This is JISSec Volume 12, Number 2 launch announcement
News Item Volume 12, Number 1
This is JISSec Volume 12, Number 1 launch announcement
Folder N3
JISSec Volume 11, Number 3
Cart Item JISSec_V11N3_Aurigemma_p201_CI
The Influence of Employee Affective Organizational Commitment on Security Policy Attitudes and Compliance Intentions, by Salvatore Aurigemma and Lori Leonard - ...
Cart Item JISSec_V11N3_Clark_p185_CI
Active Authentication: The Panacea of Access Control, by Nathan Clark and Fudong Li - Cart Item
Record V11N3_Clark.html
Cart Item JISSec_V11N3_Leberknight_p171_CI
A Longitudinal Study Investigating Pressure-related Characteristics for Keystroke Analysis, by Christopher S. Leberknight - Cart Item
Record V11N3_Leberknight.html
File V11N3_Editorial.pdf
JISSec Volume 11, Number 3 Editorial
File V11N3_FrontMatter.pdf
JISSec Volume 11, Number 3 Front Matter
Document V11N3.html
JISSec Volume 11, Number 3 (2015) contents
Record V11N3_Aurigemma.html
Document V11N2.html
JISSec Volume 11, Number 2 (2015) contents
Folder N2
JISSec Volume 11, Number 2
Record V11N2_Buszman.html
Cart Item JISSec_V11N2_Buszman_p149_CI
Sensitive and Classified Data Exchange and Handling in the EU: A Case Study, by Krystian Buszman, Karol Listewnik and Tomasz Sobczynski " - Cart Item
Cart Item JISSec_V11N2_Omerasevic_p131_CI
A Novel Steganography Approach for Hiding QR Codes by Using 2-D Discrete Wavelet Transformation, by Damir Omerasevic, Dragan Pleskonjic, Narcis Behlilovic and ...
Record V11N2_Omerasevic.html
Record V11N2_Sinanaj.html
Cart Item JISSec_V11N2_Sinanaj_p111_CI
The Intangible Cost of Information Security Breaches: A State of the Art Analysis, by Griselda Sinanaj - Cart Item
Cart Item JISSec_V11N2_Zainudin_p89_CI
The Impact of the Leadership Role on Human Failures in the Face of Cyber Threats, by Dyana Zainudin and Atta Ur-Rahman - Cart Item
Record V11N2_Zainudin.html
File V11N2_Editorial.pdf
JISSec Volume 11, Number 2 Editorial
File V11N2_FrontMatter.pdf
JISSec Volume 11, Number 2 Front Matter
Image ISEG_II_Logos.png
Logos of ISEG and II
Image ISEG_Logo.png
ISEG Logo
Image II_Logo.png
Information Institute Logo