You are here: Home
Personal tools

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 758 items matching your search terms

Subscribe to an always-updated feed of these search terms

News Item Volume 20, Number 3
This is JISSec Volume 20, Number 3 launch announcement
Cart Item JISSec_V20N3_Joubert_p185_CI
A Synthesis of Research on Insider Threats in Cybersecurity, by Daniël Joubert and Jan Eloff - Cart Item
Record V20N3_Joubert.html
Cart Item JISSec_V20N3_Caldeira_p167_CI
The Future of Cybersecurity: The Quantum Challenge, by Mário Caldeira and João Sabino - Cart Item
Record V20N3_Caldeira.html
Cart Item JISSec_V20N3_Li_p147_CI
Media Impact on Mobile Phishing Avoidance Behavior, by Xiaoqing Li - Cart Item
File V20N3_Dhillon_p143.pdf
The Power of Empowerment, by Gurpreet Dhillon - Full Text
Record V20N3_Dhillon.html
File V20N3_Editorial.pdf
JISSec Volume 20, Number 3 Editorial
File V20N3_FrontMatter.pdf
JISSec Volume 20, Number 3 Front Matter
Document V20N3.html
JISSec Volume 20, Number 3 (2024) contents
Folder N3
JISSec Volume 20, Number 3
News Item Volume 20, Number 2
This is JISSec Volume 20, Number 2 launch announcement
Cart Item JISSec_V20N2_Majadi_p111_CI
Detecting Collusive Seller Shill Bidding Using Social Network Analysis, by Nazia Majadi and Jarrod Trevathan - Cart Item
Record V20N2_Majadi.html
Cart Item JISSec_V20N2_Tilbury_p89_CI
The Rationality of Automation Bias in Security Operation Centers, by Jack Tilbury and Stephen Flowerday - Cart Item
Record V20N2_Tilbury.html
Record V20N2_Abdelhamid.html
File V20N2_Dhillon_p69.pdf
Rethinking Scientific Replication in Cybersecurity, by Gurpreet Dhillon - Full Text
Record V20N2_Dhillon.html
File V20N2_Editorial.pdf
JISSec Volume 20, Number 2 Editorial
Folder N2
JISSec Volume 20, Number 2
News Item Volume 20, Number 1
This is JISSec Volume 20, Number 1 launch announcement
Cart Item JISSec_V20N1_Kaur_p49_CI
A Secure and Safe Deep Learning-Driven Blockchain Application for Advanced Plant Stress Phenotyping, by Manjit Kaur and Upinder Kaur - Cart Item
Record V20N1_Kaur.html
Cart Item JISSec_V20N1_Li_p27_CI
Defeat Data Breachers' Minds: Blockchain with Bounded Rationality to Advance Information Security, by Yuanxiang John Li, Benjamin K. Ngugi and Frank M. Lin - ...
Record V20N1_Li.html
File V20N1_Dhillon_p3.pdf
Coordinating in Threes: Unraveling Complexity in Information Systems Security Management, by Gurpreet Dhillon - Full Text
Folder N1
JISSec Volume 20, Number 1
News Item Volume 19, Number 3
This is JISSec Volume 19, Number 3 launch announcement