- Info
Search results
—
745 items matching your search terms
Subscribe to an always-updated feed of these search terms
-
V17N2_FrontMatter.pdf
-
JISSec Volume 17, Number 2 Front Matter
-
V17N2.html
-
JISSec Volume 17, Number 2 (2021) contents
-
N2
-
JISSec Volume 17, Number 2
-
Volume 17, Number 1
-
This is JISSec Volume 17, Number 1 launch announcement
-
JISSec_V17N1_Neto_p49_CI
-
A Case Study of the Capital One Data Breach: Why Didn't Compliance Requirements Help Prevent It?, by Nelson Novaes Neto, Stuart Madnick, Anchises Moraes G. ...
-
JISSec_V17N1_Gonzalez_p31_CI
-
Secure Matches of E-mail to Postal Addresses System, by Carlos Gonzalez - Cart Item
-
V17N1_Gonzalez.html
-
-
JISSec_V17N1_White_p3_CI
-
Root Cause Analysis Quality Model for Corporate Security Breaches, by Garry L. White and Jaymeen Shah - Cart Item
-
V17N1_Editorial.pdf
-
JISSec Volume 17, Number 1 Editorial
-
V17N1_FrontMatter.pdf
-
JISSec Volume 17, Number 1 Front Matter
-
N1
-
JISSec Volume 17, Number 1
-
V17
-
JISSec contents: Volume 17
-
Volume 16, Number 3
-
This is JISSec Volume 16, Number 3 launch announcement
-
JISSec_V16N3_Mukthapuram_p179_CI
-
Understanding Cyber Espionage, by Vani Supriya Mukthapuram - Cart Item
-
JISSec_V16N3_Marotta_p151_CI
-
Perspectives on the Relationship between Compliance and Cybersecurity, by Angelica Marotta and Stuart Madnick - Cart Item
-
JISSec_V16N3_Dhillon_p139_CI
-
Interpreting Individual Values for Information Privacy and Security, by Simran Dhillon and Sérgio Nunes - Cart Item
-
V16N3_Dhillon.html
-
-
V16N3_Editorial.pdf
-
JISSec Volume 16, Number 3 Editorial
-
V16N3_FrontMatter.pdf
-
JISSec Volume 16, Number 3 Front Matter
-
V16N3.html
-
JISSec Volume 16, Number 3 (2020) contents
-
N3
-
JISSec Volume 16, Number 3
-
Volume 18, Number 3
-
This is JISSec Volume 18, Number 3 launch announcement
-
V18N3_Dhillon.html
-
-
V18N3.html
-
JISSec Volume 18, Number 3 (2022) contents
-
JISSec_V20N2_Abdelhamid_p75_CI
-
Trust Me, I Am Accountable: Factors Influencing the Perception of Benefits of Blockchain Technology, by Mohamed Abdelhamid, Ruchi Isaac and Katja Crusius - ...
-
V19N3.html
-
JISSec Volume 19, Number 3 (2023) contents
-
V19N2_Dhillon.html
-
-
V20N2.html
-
JISSec Volume 20, Number 2 (2024) contents
-
V17N1_Neto.html
-
-
V17N1_White.html
-