|
- Info
Search results
—
745 items matching your search terms
Subscribe to an always-updated feed of these search terms
-
V3N3_Beebe.html
-
A Model for Predicting Hacker Behavior, by Nicole Lang Beebe and Jan Guynes Clark
-
JISSec_V4N1_Jensen_p41_CI
-
Mitigating Consumer Perceptions of Privacy and Security Risks with the Use of Residual RFID Technologies through Governmental Trust, by Andrew S. Jensen, ...
-
JISSec_V4N1_Surendra_p21-CI
-
The Ethics of IT Disaster Recovery Planning: Five Case Studies, by Nanda Surendra, A. Graham Peace and Daniel Connolly - Cart Item
-
JISSec_V4N1_Hirsch_p3_CI
-
Perceptual and Cultural Aspects of Risk Management Alignment: a case study, by Corey Hirsch and Jean-Noël Ezingeard - Cart Item
-
V4N1_FrontMatter.pdf
-
JISSec Volume 4, Number 1 Front Matter
-
V4N1_Editorial.pdf
-
JISSec Volume 4, Number 1 Editorial
-
V3N3_Editorial.pdf
-
JISSec Volume 3, Number 3 Editorial
-
V3N3_FrontMatter.pdf
-
JISSec Volume 3, Number 3 Front Matter
-
JISSec_V3N3_Tryfonas_p21_CI
-
On Security Metaphors and how they Shape the Emerging Practice of Secure Information Systems Development, by Theodore Tryfonas - Cart Item
-
JISSec_V3N3_Beebe_p3_CI
-
A Model for Predicting Hacker Behavior, by Nicole Lang Beebe and Jan Guynes Clark - Cart Item
-
JISSec_V3N2_Schryen_p66_CI
-
Do anti-spam measures effectively cover the e-mail communication network? A formal approach, by Guido Schryen - Cart Item
-
JISSec_V3N2_Ray_p32_CI
-
A Framework to Facilitate Forensic Investigation of Falsely Advertised BGP Routes, by Indrajit Ray, Eunjong Kim and Daniel Massey - Cart Item
-
JISSec_V3N2_DArcy_p3_CI
-
Towards a Best Fit Between Organizational Security Countermeasures and Information Systems Misuse Behaviors, by John D'Arcy and Anat Hovav - Cart Item
-
V3N2_Editorial.pdf
-
JISSec Volume 3, Number 2 Editorial
-
V3N2_FrontMatter.pdf
-
JISSec Volume 3, Number 2 Front Matter
-
V3N2.html
-
JISSec Volume 3, Number 2 (2007) contents
-
V3N2_Schryen.html
-
Do anti-spam measures effectively cover the e-mail communication network? A formal approach, by Guido Schryen
-
V3N2_Ray.html
-
A Framework to Facilitate Forensic Investigation of Falsely Advertised BGP Routes, by Indrajit Ray, Eunjong Kim and Daniel Massey
-
V3N2_DArcy.html
-
Towards a Best Fit Between Organizational Security Countermeasures and Information Systems Misuse Behaviors, by John D'Arcy and Anat Hovav
-
V3N1_BackTitle.pdf
-
JISSec Volume 3, Number 1 Back Title
-
V3N1_Lapke_p64.pdf
-
Book Review: Digital Crime and Digital Terrorism, by
Robert W. Taylor, Tory J. Caeti, D. Kall Loper, Eric J. Fritsch and John Liederbach, Reviewed by Michael ...
-
V3N1_Park_p39.pdf
-
The Effect of Spam and Privacy Concerns on E-mail Users' Behavior, by Insu Park, R. Sharman, H. Raghav
Rao and S. Upadhyaya - Full Text
-
V3N1_Ye_p19.pdf
-
An Evaluation of Size-based Traffic Feature for Intrusion Detection, by Ming Ye, G. Premkumar and Dan Zhu - Full Text
-
V3N1_Angell_p3.pdf
-
Ethics and Morality - a business opportunity for the Amoral?, by Ian O. Angell - Full Text
-
V3N1_Editorial.pdf
-
JISSec Volume 3, Number 1 Editorial
-
V3N1_FrontMatter.pdf
-
JISSec Volume 3, Number 1 Front Matter
-
V3N1_FrontTitle.pdf
-
JISSec Volume 3, Number 1 Front Title
-
V3N1_Lapke.html
-
Book Review: Digital Crime and Digital Terrorism, by Robert W. Taylor, Tory J. Caeti, D. Kall Loper, Eric J. Fritsch and John Liederbach, Reviewed by Michael ...
-
V3N1_Park.html
-
The Effect of Spam and Privacy Concerns on E-mail Users' Behavior, by Insu Park, R. Sharman, H. Raghav Rao and S. Upadhyaya
-
V3N1_Angell.html
-
Ethics and Morality - a business opportunity for the Amoral?, by Ian O. Angell
|
|