- Info
Search results
—
801 items matching your search terms
Subscribe to an always-updated feed of these search terms
-
Volume 21, Number 3
-
This is JISSec Volume 21, Number 3 launch announcement
-
JISSec_V21N3_Aljuaid_p227_CI
-
Adversarial Attacks on Natural Language Processing (NLP) Systems: An Emerging Threat in Cybersecurity, by Alanoud Aljuaid and Xiang Liu - Cart Item
-
V21N3_Aljuaid.html
-
-
JISSec_V21N3_Jennex_p201_CI
-
Not All SMEs Are the Same: Categorizing Security Needs of SMEs, by Murray E. Jennex, Jeffry Babb, Amjad Abdullat, Abraham Abby Sen and Kareem Dana- Cart Item
-
JISSec_V21N3_Lombard_p185_CI
-
Exploring the Risks of AI Human Worth, by Adriaan Lombard and Stephen Flowerday - Cart Item
-
V21N3_Dhillon_p179.pdf
-
What Would Foucault Say about AI, Surveillance, and Cybersecurity?
-
V21N3_Dhillon.html
-
-
V21N3_Editorial.pdf
-
JISSec Volume 21, Number 3 Editorial
-
V21N3_FrontMatter.pdf
-
JISSec Volume 21, Number 3 Front Matter
-
V21N3.html
-
JISSec Volume 21, Number 3 (2025) contents
-
N3
-
JISSec Volume 21, Number 3
-
Volume 21, Number 2
-
This is JISSec Volume 21, Number 2 launch announcement
-
JISSec_V21N2_Samara_p149_CI
-
Managing the Cybersecurity of e-Government Programmes: The Case of Jordan, by Nadia Samara and Dionysios Demetis - Cart Item
-
V21N2_Samara.html
-
-
JISSec_V21N2_Clarke_p131_CI
-
An Executive Guide to Secure-by-Design AI, by Nathan Clarke,
Gaseb Alotibi, Dany Joy, Fudong Li,
Steven Furnell, Ali Alshumrani and
Hussam Mohammed - ...
-
V21N2_Clarke.html
-
-
V21N2_Dhillon_p87.pdf
-
Redefining Information Systems Security: A Reflective Perspective
-
V21N2_Editorial.pdf
-
JISSec Volume 21, Number 2 Editorial
-
V21N2_FrontMatter.pdf
-
JISSec Volume 21, Number 2 Front Matter
-
V21N2.html
-
JISSec Volume 21, Number 2 (2025) contents
-
N2
-
JISSec Volume 21, Number 2
-
Volume 21, Number 1
-
This is JISSec Volume 21, Number 1 launch announcement
-
V21
-
JISSec contents: Volume 21
-
N1
-
JISSec Volume 21, Number 1
-
V21N1.html
-
JISSec Volume 21, Number 1 (2025) contents
-
JISSec_V21N1_Mulgund_p51_CI
-
Defense-in-Depth Model of Countermeasures against Adversarial AI Attacks: Literature Review and Classification, by Pavankumar Mulgund, Raghvendra Singh, Raj ...
-
JISSec_V21N1_Jennex_p29_CI
-
Observations and Learnings from Cybersecurity Audits of SMEs, by Murray E. Jennex, Jeffry Babb and
Amjad Abdullat - Cart Item
-
JISSec_V21N1_Singh_p9_CI
-
Secure Captcha Generation with Blockchain Integration: The Case of Historical Gurmukhi Numeral Recognition, by Harpal Singh, Simpel Rani and Gurpreet Singh ...
-
V21N1_Singh.html
-
-
V21N1_Dhillon_p3.pdf
-
Cybercrime: The Ever-Persistent Problem, by Gurpreet Dhillon - Full Text