You are here: Home
Personal tools

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 745 items matching your search terms

Subscribe to an always-updated feed of these search terms

Cart Item JISSec_V4N3_Spagnoletti_p46_CI
The Duality of Information Security Management: Fighting against Predictable and Unpredictable Threats, by Paolo Spagnoletti and Andrea Resca - Cart Item
Cart Item JISSec_V4N3_Davis_p24_CI
Incident Response Planning Using Collaboration Engineering Process Development and Validation, by Alanah J. Davis, Mehruz Kamal, Terrance V. Schoonover, Leah ...
Cart Item JISSec_V4N3_VanDenEede_p3_CI
Organizational Learning for the Incident Management Process: Lessons from High Reliability Organizations, by Gerd Van Den Eede, Willem J. Muhren and Bartel Van ...
Record V4N3-Spagnoletti.html
The Duality of Information Security Management: Fighting against Predictable and Unpredictable Threats, by Paolo Spagnoletti and Andrea Resca
Record V4N3-Davis.html
Incident Response Planning Using Collaboration Engineering Process Development and Validation, by Alanah J. Davis, Mehruz Kamal, Terrance V. Schoonover, Leah ...
Record V4N3-VanDenEede.html
Organizational Learning for the Incident Management Process: Lessons from High Reliability Organizations, by Gerd Van Den Eede, Willem J. Muhren and Bartel Van ...
Document V4N3.html
JISSec Volume 4, Number 3 (2008) contents
Document Thanks
After purchase acknowledgments and instructions.
News Item Volume 5, Number 2
This is JISSec Volume 5, Number 2 launch announcement
News Item Volume 5, Number 1
This is JISSec Volume 5, Number 1 launch announcement
News Item Volume 4, Number 3
This is JISSec Volume 4, Number 3 launch announcement
Record V4N2_Arnett.html
Book Review: Principles of Information Systems Security: Text & Cases, by Gurpreet Dhillon, Reviewed by Kirk P. Arnett
Record V4N2_White.html
Just Trying to Be Friendly: A Case Study in Social Engineering, by Doug White and Alan Rea
Record V4N2_Asghar.html
MILD DSS - Conceptual Architecture, Validation and Representation, by Sohail Asghar, Damminda Alahakoon and Leonid Churilov
Record V4N2_Altinkemer.html
Vulnerabilities and Patches of Open Source Software: An Empirical Study, by Kemal Altinkemer, Jackie Rees and Sanjay Sridhar
Cart Item JISSec_V4N2_Arnett_p86_CI
Book Review: Principles of Information Systems Security: Text & Cases, by Gurpreet Dhillon, Reviewed by Kirk P. Arnett - Cart Item
Cart Item JISSec_V4N2_White_p56_CI
Just Trying to Be Friendly: A Case Study in Social Engineering, by Doug White and Alan Rea - Cart Item
Cart Item JISSec_V4N2_Asghar_p26_CI
MILD DSS - Conceptual Architecture, Validation and Representation, by Sohail Asghar, Damminda Alahakoon and Leonid Churilov - Cart Item
Cart Item JISSec_V4N2_Altinkemer_p3_CI
Vulnerabilities and Patches of Open Source Software: An Empirical Study, by Kemal Altinkemer, Jackie Rees and Sanjay Sridhar - Cart Item
File V4N2_Editorial.pdf
JISSec Volume 4, Number 2 Editorial
File V4N2_FrontMatter.pdf
JISSec Volume 4, Number 2 Front Matter
Document V4N2.html
JISSec Volume 4, Number 2 (2008) contents
Cart Item JISSec_V3N3_Sridhar_p51_CI
Challenges in Managing Information Security in Academic Institutions: Case of MDI in India, by Varadharajan Sridhar and D. K. Ahuja - Cart Item
Document V3N3.html
JISSec Volume 3, Number 3 (2007) contents
Record V3N3_Sridhar.html
Challenges in Managing Information Security in Academic Institutions: Case of MDI in India, by Varadharajan Sridhar and D. K. Ahuja
Document V4N1.html
JISSec Volume 4, Number 1 (2008) contents
Record V4N1_Jensen.html
Mitigating Consumer Perceptions of Privacy and Security Risks with the Use of Residual RFID Technologies through Governmental Trust, by Andrew S. Jensen, ...
Record V4N1_Surendra.html
The Ethics of IT Disaster Recovery Planning: Five Case Studies, by Nanda Surendra, A. Graham Peace and Daniel Connolly
Record V4N1_Hirsch.html
Perceptual and Cultural Aspects of Risk Management Alignment: a case study, by Corey Hirsch and Jean-Noël Ezingeard
Record V3N3_Tryfonas.html
On Security Metaphors and how they Shape the Emerging Practice of Secure Information Systems Development, by Theodore Tryfonas