You are here: Home
Personal tools

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 745 items matching your search terms

Subscribe to an always-updated feed of these search terms

Record V3N3_Beebe.html
A Model for Predicting Hacker Behavior, by Nicole Lang Beebe and Jan Guynes Clark
Cart Item JISSec_V4N1_Jensen_p41_CI
Mitigating Consumer Perceptions of Privacy and Security Risks with the Use of Residual RFID Technologies through Governmental Trust, by Andrew S. Jensen, ...
Cart Item JISSec_V4N1_Surendra_p21-CI
The Ethics of IT Disaster Recovery Planning: Five Case Studies, by Nanda Surendra, A. Graham Peace and Daniel Connolly - Cart Item
Cart Item JISSec_V4N1_Hirsch_p3_CI
Perceptual and Cultural Aspects of Risk Management Alignment: a case study, by Corey Hirsch and Jean-Noël Ezingeard - Cart Item
File V4N1_FrontMatter.pdf
JISSec Volume 4, Number 1 Front Matter
File V4N1_Editorial.pdf
JISSec Volume 4, Number 1 Editorial
File V3N3_Editorial.pdf
JISSec Volume 3, Number 3 Editorial
File V3N3_FrontMatter.pdf
JISSec Volume 3, Number 3 Front Matter
Cart Item JISSec_V3N3_Tryfonas_p21_CI
On Security Metaphors and how they Shape the Emerging Practice of Secure Information Systems Development, by Theodore Tryfonas - Cart Item
Cart Item JISSec_V3N3_Beebe_p3_CI
A Model for Predicting Hacker Behavior, by Nicole Lang Beebe and Jan Guynes Clark - Cart Item
Cart Item JISSec_V3N2_Schryen_p66_CI
Do anti-spam measures effectively cover the e-mail communication network? A formal approach, by Guido Schryen - Cart Item
Cart Item JISSec_V3N2_Ray_p32_CI
A Framework to Facilitate Forensic Investigation of Falsely Advertised BGP Routes, by Indrajit Ray, Eunjong Kim and Daniel Massey - Cart Item
Cart Item JISSec_V3N2_DArcy_p3_CI
Towards a Best Fit Between Organizational Security Countermeasures and Information Systems Misuse Behaviors, by John D'Arcy and Anat Hovav - Cart Item
File V3N2_Editorial.pdf
JISSec Volume 3, Number 2 Editorial
File V3N2_FrontMatter.pdf
JISSec Volume 3, Number 2 Front Matter
Document V3N2.html
JISSec Volume 3, Number 2 (2007) contents
Record V3N2_Schryen.html
Do anti-spam measures effectively cover the e-mail communication network? A formal approach, by Guido Schryen
Record V3N2_Ray.html
A Framework to Facilitate Forensic Investigation of Falsely Advertised BGP Routes, by Indrajit Ray, Eunjong Kim and Daniel Massey
Record V3N2_DArcy.html
Towards a Best Fit Between Organizational Security Countermeasures and Information Systems Misuse Behaviors, by John D'Arcy and Anat Hovav
File V3N1_BackTitle.pdf
JISSec Volume 3, Number 1 Back Title
File V3N1_Lapke_p64.pdf
Book Review: Digital Crime and Digital Terrorism, by Robert W. Taylor, Tory J. Caeti, D. Kall Loper, Eric J. Fritsch and John Liederbach, Reviewed by Michael ...
File V3N1_Park_p39.pdf
The Effect of Spam and Privacy Concerns on E-mail Users' Behavior, by Insu Park, R. Sharman, H. Raghav Rao and S. Upadhyaya - Full Text
File V3N1_Ye_p19.pdf
An Evaluation of Size-based Traffic Feature for Intrusion Detection, by Ming Ye, G. Premkumar and Dan Zhu - Full Text
File V3N1_Angell_p3.pdf
Ethics and Morality - a business opportunity for the Amoral?, by Ian O. Angell - Full Text
File V3N1_Editorial.pdf
JISSec Volume 3, Number 1 Editorial
File V3N1_FrontMatter.pdf
JISSec Volume 3, Number 1 Front Matter
File V3N1_FrontTitle.pdf
JISSec Volume 3, Number 1 Front Title
Record V3N1_Lapke.html
Book Review: Digital Crime and Digital Terrorism, by Robert W. Taylor, Tory J. Caeti, D. Kall Loper, Eric J. Fritsch and John Liederbach, Reviewed by Michael ...
Record V3N1_Park.html
The Effect of Spam and Privacy Concerns on E-mail Users' Behavior, by Insu Park, R. Sharman, H. Raghav Rao and S. Upadhyaya
Record V3N1_Angell.html
Ethics and Morality - a business opportunity for the Amoral?, by Ian O. Angell