You are here: Home
Personal tools

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 745 items matching your search terms

Subscribe to an always-updated feed of these search terms

Cart Item JISSec_V2N3_Cazier_p69_CI
How Secure is Your Password? An Analysis of E-Commerce Passwords and their Crack Times, by Joseph A. Cazier and B. Dawn Medlin - Cart Item
Cart Item JISSec_V2N3_Halonen_p49_CI
Building User Authentication in An Inter-Organisational Information System, by Raija Halonen - Cart Item
Cart Item JISSec_V2N3_McFadzean_p3_CI
Anchoring Information Security Governance Research: Sociological Groundings and Future Directions, by Elspeth McFadzean, Jean-Noël Ezingeard and David Birchall ...
File V2N3_Editorial.pdf
JISSec Volume 2, Number 3 Editorial
File V2N3_FrontMatter.pdf
JISSec Volume 2, Number 3 Front Matter
Document V2N3.html
JISSec Volume 2, Number 3 (2006) contents
Record V2N3_Cazier.html
How Secure is Your Password? An Analysis of E-Commerce Passwords and their Crack Times, by Joseph A. Cazier and B. Dawn Medlin
Record V2N3_Halonen.html
Building User Authentication in An Inter-Organisational Information System, by Raija Halonen
Record V2N3_McFadzean.html
Anchoring Information Security Governance Research: Sociological Groundings and Future Directions, by Elspeth McFadzean, Jean-Noël Ezingeard and David Birchall
Record V3N1_Ye.html
An Evaluation of Size-based Traffic Feature for Intrusion Detection, by Ming Ye, G. Premkumar and Dan Zhu
Document V2N2.html
JISSec Volume 2, Number 2 (2006) contents
Record V2N2_Weistroffer.html
Book Review: The Executive Guide to Information Security: Threats, Challenges, and Solutions, by Mark Egan with Tim Mather, Reviewed by Roland Weistroffer
Record V2N2_Dhillon.html
To opt-in, or to opt-out? That is the question. A Case Study, by Gurpreet Dhillon and Scott Chapman
Record V2N2_Goel.html
Managing Information Security: Demystifying the Audit Process for Security Officers, by Sanjay Goel, Damira Pon and Jack Menzies
Cart Item JISSec_V2N2_Weistroffer_p56_CI
Book Review: The Executive Guide to Information Security: Threats, Challenges, and Solutions, by Mark Egan with Tim Mather, Reviewed by Roland Weistroffer - ...
Cart Item JISSec_V2N2_Dhillon_p46_CI
To opt-in, or to opt-out? That is the question. A Case Study, by Gurpreet Dhillon and Scott Chapman - Cart Item
Cart Item JISSec_V2N2_Goel_p25_CI
Managing Information Security: Demystifying the Audit Process for Security Officers, by Sanjay Goel, Damira Pon and Jack Menzies - Cart Item
Cart Item JISSec_V2N2_Morin_p15_CI
Towards a Global Framework for Corporate and Enterprise Digital Policy Management, by Jean-Henry Morin and Michel Pawlak - Cart Item
Cart Item JISSec_V2N2_Backhouse_p3-CI
Rating Certificate Authorities: A Market Approach to the Lemons Problem, by James Backhouse, Joao Baptista and Carol Hsu - Cart Item
Record V2N2_Morin.html
Towards a Global Framework for Corporate and Enterprise Digital Policy Management, by Jean-Henry Morin and Michel Pawlak
File V2N2_Editorial.pdf
JISSec Volume 2, Number 2 Editorial
File V2N2_FrontMatter.pdf
JISSec Volume 2, Number 2 Front Matter
Record V2N2_Backhouse.html
Rating Certificate Authorities: A Market Approach to the Lemons Problem, by James Backhouse, Joao Baptista and Carol Hsu
Document V2N1.html
JISSec Volume 2, Number 1 (2006) contents
Record V2N1_Korzyk.html
A Conceptual Model for Integrative Information Systems Security, by Alexander D. Korzyk, John W. Sutherland and Heinz Roland Weistroffer
Record V2N1_Muntermann.html
Security Issues And Capabilities of Mobile Brokerage Services and Infrastructures, by Jan Muntermann and Heiko RoBnagel
Cart Item JISSec_V2N1_Korzyk_p44_CI
A Conceptual Model for Integrative Information Systems Security, by Alexander D. Korzyk, John W. Sutherland and Heinz Roland Weistroffer - Cart Item
Cart Item JISSec_V2N1_Muntermann_p27_CI
Security Issues And Capabilities of Mobile Brokerage Services and Infrastructures, by Jan Muntermann and Heiko RoBnagel - Cart Item
Cart Item JISSec_V2N1_Carlsson_p3_CI
Security Consistency in Information Ecosystems: Structuring the Risk Environment on the Internet, by Bengt Carlsson and Andreas Jacobsson - Cart Item
Record V2N1_Carlsson.html
Security Consistency in Information Ecosystems: Structuring the Risk Environment on the Internet, by Bengt Carlsson and Andreas Jacobsson