You are here: Home
Personal tools

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 745 items matching your search terms

Subscribe to an always-updated feed of these search terms

Cart Item JISSec_V9N1_Alpar_p23_CI
The Identity Crisis - Security, Privacy and Usability Issues in Identity Management, by Gergely Alpár, Jaap-Henk Hoepman and Johanneke Siljee - Cart Item
Record V9N1_Alpar.html
Cart Item JISSec_V9N1_Pendegraft_p3_CI
User Attitudes Toward Password Security: Survey and Simulation, by Norman Pendegraft - Cart Item
Record V9N1_Pendegraft.html
Document V9N1.html
JISSec Volume 9, Number 1 (2013) contents
File V9N1_Editorial.pdf
JISSec Volume 9, Number 1 Editorial
File V9N1_FrontMatter.pdf
JISSec Volume 9, Number 1 Front Matter
Document V9.html
JISSec contents: Volume 9
Folder N2
JISSec Volume 9, Number 2
Folder N1
JISSec Volume 9, Number 1
Folder V9
JISSec Volume 9 (2013)
News Item Volume 10, Number 1
This is JISSec Volume 10, Number 1 launch announcement
News Item Volume 8, Number 3
This is JISSec Volume 8, Number 3 launch announcement
Document V8N3.html
JISSec Volume 8, Number 3 (2012) contents
Folder N3
JISSec Volume 8, Number 3
Cart Item JISSec_V8N3_Luse_p29_CI
Employing Interactive Maps to Increase User Utilization of Visualization Mechanisms for Network Security, by Andy Luse, Brian Mennecke, Anthony Townsend and ...
Record V8N3_Luse.html
Cart Item JISSec_V8N3_Ngugi_p3_CI
Biometric Keypad Reliability: Stability Of Typing Patterns and Authentication Accuracy, by Benjamin Ngugi, Dezhi Wu and Jonathan Frank - Cart Item
Record V8N3_Ngugi.html
File V8N3_Editorial.pdf
JISSec Volume 8, Number 3 Editorial
File V8N3_FrontMatter.pdf
JISSec Volume 8, Number 3 Front Matter
Folder N2
JISSec Volume 8, Number 2
File V8N2_FrontMatter.pdf
JISSec Volume 8, Number 2 Front Matter
Document V8N2.html
JISSec Volume 8, Number 2 (2012) contents
Record V8N2_Chowdhuri.html
Cart Item JISSec_V8N2_Anandarajan_p43_CI
Online Identity Theft: A Longitudinal Study of Individual Threat-Response and Coping Behaviors, by Murugan Anandarajan, Narasimha Paravastu, Bay Arinze and ...
File V8N2_Editorial.pdf
JISSec Volume 8, Number 2 Editorial
Record V8N2_Anandarajan.html
Cart Item JISSec_V8N2_Harris_p19_CI
Managing Corporate Computer Crime and the Insider Threat: The Role of Cognitive Distortion Theory, by Mark A. Harris - Cart Item
Record V8N2_Harris.html