- Info
Search results
—
773 items matching your search terms
Subscribe to an always-updated feed of these search terms
-
V19N2_FrontMatter.pdf
-
JISSec Volume 19, Number 2 Front Matter
-
N2
-
JISSec Volume 19, Number 2
-
Volume 19, Number 1
-
This is JISSec Volume 19, Number 1 launch announcement
-
JISSec_V19N1_Vedadi_p19_CI
-
An Empirical Analysis of the Factors Driving Organizational Satisfaction with Security-as-a-Service, by Ali Vedadi, Timothy Greer and Nita Brooks - Cart Item
-
V19N1_Vedadi.html
-
-
V19N1_Editorial.pdf
-
JISSec Volume 19, Number 1 Editorial
-
V19N1_FrontMatter.pdf
-
JISSec Volume 19, Number 1 Front Matter
-
N1
-
JISSec Volume 19, Number 1
-
V19
-
JISSec contents: Volume 19
-
N3
-
JISSec Volume 18, Number 3
-
V18N3_Dhillon_p167.pdf
-
A Bad Review Is As Much of A Labor to Write As A Good One: The Four Principles for Reviewing Research Manuscripts, by Gurprret Dhillon - Full Text
-
JISSec_V18N3_Rabie_p155_CI
-
Cyber Terrorism: A Critical Assessment of the Threat Landscape and Countermeasures, by Osama Rabie - Cart Item
-
V18N3_Rabie.html
-
-
V18N3_Editorial.pdf
-
JISSec Volume 18, Number 3 Editorial
-
V18N3_FrontMatter.pdf
-
JISSec Volume 18, Number 3 Front Matter
-
Volume 18, Number 2
-
This is JISSec Volume 18, Number 2 launch announcement
-
JISSec_V18N2_Kaur_p141_CI
-
Sharing Confidential Information and Privacy Calculus, by Joti Kaur and Simran Dhillon - Cart Item
-
V18N2_Kaur.html
-
-
JISSec_V18N2_Xie_p125_CI
-
How Moral Intensity Affects Information Disorder Behavior on Social Media, by Wwi Xie - Cart Item
-
V18N2_Xie.html
-
-
JISSec_V18N2_Bierens_p83_CI
-
Are We Ready to Manage Digital Risks Today and Tomorrow?, by Raymond Bierens and Abbas Shahim - Cart Item
-
V18N2_Bierens.html
-
-
V18N2_Editorial.pdf
-
JISSec Volume 18, Number 2 Editorial
-
V18N2_FrontMatter.pdf
-
JISSec Volume 18, Number 2 Front Matter
-
V18N2.html
-
JISSec Volume 18, Number 2 (2022) contents
-
N2
-
JISSec Volume 18, Number 2
-
Volume 18, Number 1
-
This is JISSec Volume 18, Number 1 launch announcement
-
JISSec_V18N1_Gulati_p63_CI
-
Comparative Study of LSB and DWT based Steganography combined with Arnold Transformation for Image Security, by Shruti Gulati, Adil Bashir and Ajaz Hussain Mir ...
-
JISSec_V18N1_Mai_p25_CI
-
Free Trial with Annoyance Mechanism as an Optimal Strategy in Cybersecurity Software Offering, by Bin Mai and Kutsal Dogan - Cart Item
-
V18N1_Mai.html
-