You are here: Home
Personal tools

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 745 items matching your search terms

Subscribe to an always-updated feed of these search terms

News Item Volume 20, Number 2
This is JISSec Volume 20, Number 2 launch announcement
Cart Item JISSec_V20N2_Majadi_p111_CI
Detecting Collusive Seller Shill Bidding Using Social Network Analysis, by Nazia Majadi and Jarrod Trevathan - Cart Item
Record V20N2_Majadi.html
Cart Item JISSec_V20N2_Tilbury_p89_CI
The Rationality of Automation Bias in Security Operation Centers, by Jack Tilbury and Stephen Flowerday - Cart Item
Record V20N2_Tilbury.html
Record V20N2_Abdelhamid.html
File V20N2_Dhillon_p69.pdf
Rethinking Scientific Replication in Cybersecurity, by Gurpreet Dhillon - Full Text
Record V20N2_Dhillon.html
File V20N2_Editorial.pdf
JISSec Volume 20, Number 2 Editorial
Folder N2
JISSec Volume 20, Number 2
News Item Volume 20, Number 1
This is JISSec Volume 20, Number 1 launch announcement
Cart Item JISSec_V20N1_Kaur_p49_CI
A Secure and Safe Deep Learning-Driven Blockchain Application for Advanced Plant Stress Phenotyping, by Manjit Kaur and Upinder Kaur - Cart Item
Record V20N1_Kaur.html
Cart Item JISSec_V20N1_Li_p27_CI
Defeat Data Breachers' Minds: Blockchain with Bounded Rationality to Advance Information Security, by Yuanxiang John Li, Benjamin K. Ngugi and Frank M. Lin - ...
Record V20N1_Li.html
File V20N1_Dhillon_p3.pdf
Coordinating in Threes: Unraveling Complexity in Information Systems Security Management, by Gurpreet Dhillon - Full Text
Folder N1
JISSec Volume 20, Number 1
News Item Volume 19, Number 3
This is JISSec Volume 19, Number 3 launch announcement
Folder N3
JISSec Volume 19, Number 3
Cart Item JISSec_V19N3_AlAbdullah_p195_CI
How Does Vulnerability Awareness Impact Consumer Behavioral Intention: Evidence from POS Systems, by Muhmmad Al-Abdullah, Yazan Alnsour and Mohamad Alsharo - ...
Record V19N3_AlAbdullah.html
Cart Item JISSec_V19N3_Lapke_p183_CI
Envisioning Organizational IoT: Embracing Design Science to Address the IoT Vulnerabilities, by Michael Lapke, Jackson Walker and Malayo Magee - Cart Item
Record V19N3_Lapke.html
Cart Item JISSec_V19N3_Dweik_p169_CI
Review of AES Methods and Suggested Abstract Ciphering for Secured Image Data Communication in IoT and AI Applications, by Haneen Dweik, Mohammed Abutaha, ...
Record V19N3_Dweik.html
File V19N3_Dhillon_p165.pdf
Cybersecurity Challenges in an AI Enabled World, by Gurpreet Dhillon - Full Text
Record V19N3_Dhillon.html
File V19N3_Editorial.pdf
JISSec Volume 19, Number 3 Editorial
File V19N3_FrontMatter.pdf
JISSec Volume 19, Number 3 Front Matter
News Item Volume 19, Number 2
This is JISSec Volume 19, Number 2 launch announcement