Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/journals/imcs:"
@article{DBLP:journals/imcs/AlyamiSNM24, author = {Areej Alyami and David Sammon and Karen Neville and Carolanne Mahony}, title = {Critical success factors for Security Education, Training and Awareness {(SETA)} programme effectiveness: an empirical comparison of practitioner perspectives}, journal = {Inf. Comput. Secur.}, volume = {32}, number = {1}, pages = {53--73}, year = {2024}, url = {https://doi.org/10.1108/ICS-08-2022-0133}, doi = {10.1108/ICS-08-2022-0133}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AlyamiSNM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/CalvoB24, author = {Miguel Calvo and Marta Beltr{\'{a}}n}, title = {Applying the Goal, Question, Metric method to derive tailored dynamic cyber risk metrics}, journal = {Inf. Comput. Secur.}, volume = {32}, number = {2}, pages = {133--158}, year = {2024}, url = {https://doi.org/10.1108/ICS-03-2023-0043}, doi = {10.1108/ICS-03-2023-0043}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/CalvoB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DevS24, author = {Manimay Dev and Debashis Saha}, title = {Does e-government development moderate the impact of female labor participation on national cybersecurity maturity? An empirical investigation}, journal = {Inf. Comput. Secur.}, volume = {32}, number = {1}, pages = {74--92}, year = {2024}, url = {https://doi.org/10.1108/ICS-03-2023-0042}, doi = {10.1108/ICS-03-2023-0042}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/DevS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DornheimZ24, author = {Peter Dornheim and R{\"{u}}diger Zarnekow}, title = {Determining cybersecurity culture maturity and deriving verifiable improvement measures}, journal = {Inf. Comput. Secur.}, volume = {32}, number = {2}, pages = {179--196}, year = {2024}, url = {https://doi.org/10.1108/ICS-07-2023-0116}, doi = {10.1108/ICS-07-2023-0116}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DornheimZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Lyon24, author = {Gregory Lyon}, title = {Informational inequality: the role of resources and attributes in information security awareness}, journal = {Inf. Comput. Secur.}, volume = {32}, number = {2}, pages = {197--217}, year = {2024}, url = {https://doi.org/10.1108/ICS-04-2023-0063}, doi = {10.1108/ICS-04-2023-0063}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Lyon24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MattordKWB24, author = {Herbert J. Mattord and Kathleen Kotwica and Michael E. Whitman and Evan Battaglia}, title = {Organizational perspectives on converged security operations}, journal = {Inf. Comput. Secur.}, volume = {32}, number = {2}, pages = {218--235}, year = {2024}, url = {https://doi.org/10.1108/ICS-03-2023-0029}, doi = {10.1108/ICS-03-2023-0029}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MattordKWB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/NeriNM24, author = {Martina Neri and Federico Niccolini and Luigi Martino}, title = {Organizational cybersecurity readiness in the {ICT} sector: a quanti-qualitative assessment}, journal = {Inf. Comput. Secur.}, volume = {32}, number = {1}, pages = {38--52}, year = {2024}, url = {https://doi.org/10.1108/ICS-05-2023-0084}, doi = {10.1108/ICS-05-2023-0084}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/NeriNM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/NikkhahGS24, author = {Hamid Reza Nikkhah and Varun Grover and Rajiv Sabherwal}, title = {Post hoc security and privacy concerns in mobile apps: the moderating roles of mobile apps' features and providers}, journal = {Inf. Comput. Secur.}, volume = {32}, number = {1}, pages = {1--37}, year = {2024}, url = {https://doi.org/10.1108/ICS-02-2023-0015}, doi = {10.1108/ICS-02-2023-0015}, timestamp = {Sun, 25 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/NikkhahGS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PutroSW24, author = {Prasetyo Adi Wibowo Putro and Dana Indra Sensuse and Wahyu Setiawan Setiawan Wibowo}, title = {Framework for critical information infrastructure protection in smart government: a case study in Indonesia}, journal = {Inf. Comput. Secur.}, volume = {32}, number = {1}, pages = {112--129}, year = {2024}, url = {https://doi.org/10.1108/ICS-03-2023-0031}, doi = {10.1108/ICS-03-2023-0031}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PutroSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RizviKO24, author = {Zainab Batool Rizvi and Chaudry Bilal Ahmad Khan and Michael O'Sullivan}, title = {Analytical hierarchy process model for managing cloud security}, journal = {Inf. Comput. Secur.}, volume = {32}, number = {1}, pages = {93--111}, year = {2024}, url = {https://doi.org/10.1108/ICS-07-2022-0121}, doi = {10.1108/ICS-07-2022-0121}, timestamp = {Sun, 25 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/RizviKO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ThronFDF24, author = {Eylem Thron and Shamal Faily and Huseyin Dogan and Martin Freer}, title = {Human factors and cyber-security risks on the railway - the critical role played by signalling operations}, journal = {Inf. Comput. Secur.}, volume = {32}, number = {2}, pages = {236--263}, year = {2024}, url = {https://doi.org/10.1108/ICS-05-2023-0078}, doi = {10.1108/ICS-05-2023-0078}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ThronFDF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/WenK24, author = {Shao{-}Fang Wen and Basel Katt}, title = {Exploring the role of assurance context in system security assurance evaluation: a conceptual model}, journal = {Inf. Comput. Secur.}, volume = {32}, number = {2}, pages = {159--178}, year = {2024}, url = {https://doi.org/10.1108/ICS-06-2023-0101}, doi = {10.1108/ICS-06-2023-0101}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/WenK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Andersson23, author = {Simon Andersson}, title = {Problems in information classification: insights from practice}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {4}, pages = {449--462}, year = {2023}, url = {https://doi.org/10.1108/ICS-10-2022-0163}, doi = {10.1108/ICS-10-2022-0163}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/Andersson23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AngaforYM23, author = {Giddeon Njamngang Angafor and Iryna Yevseyeva and Leandros Maglaras}, title = {Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {4}, pages = {404--426}, year = {2023}, url = {https://doi.org/10.1108/ICS-05-2022-0085}, doi = {10.1108/ICS-05-2022-0085}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/AngaforYM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BajwaAMB23, author = {Ishtiaq Ahmad Bajwa and Shabir Ahmad and Maqsood Mahmud and Farooq Ahmad Bajwa}, title = {The impact of cyberattacks awareness on customers' trust and commitment: an empirical evidence from the Pakistani banking sector}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {5}, pages = {635--654}, year = {2023}, url = {https://doi.org/10.1108/ICS-11-2022-0179}, doi = {10.1108/ICS-11-2022-0179}, timestamp = {Wed, 20 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/BajwaAMB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BhanaO23, author = {Anusha Bhana and Jacques Ophoff}, title = {Risk homeostasis and security fatigue: a case study of data specialists}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {3}, pages = {267--280}, year = {2023}, url = {https://doi.org/10.1108/ICS-11-2022-0172}, doi = {10.1108/ICS-11-2022-0172}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BhanaO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ButlerB23, author = {Kiara Jordan Butler and Irwin Brown}, title = {{COVID-19} pandemic-induced organisational cultural shifts and employee information security compliance behaviour: a South African case study}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {2}, pages = {221--243}, year = {2023}, url = {https://doi.org/10.1108/ICS-09-2022-0152}, doi = {10.1108/ICS-09-2022-0152}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ButlerB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChhetriM23, author = {Chola Chhetri and Vivian Genaro Motti}, title = {Enhancing the design of data-related privacy controls for smart home devices}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {3}, pages = {368--384}, year = {2023}, url = {https://doi.org/10.1108/ICS-11-2022-0173}, doi = {10.1108/ICS-11-2022-0173}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/ChhetriM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChowdhuryAT23, author = {Noman H. Chowdhury and Marc T. P. Adam and Timm Teubner}, title = {Rushing for security: a document analysis on the sources and effects of time pressure on organizational cybersecurity}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {4}, pages = {504--526}, year = {2023}, url = {https://doi.org/10.1108/ICS-01-2021-0013}, doi = {10.1108/ICS-01-2021-0013}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/ChowdhuryAT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChuaKW23, author = {Hui Na Chua and Vi Vien Khor and Siew Fan Wong}, title = {Examining the effect of different knowledge aspects on information security awareness}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {4}, pages = {427--448}, year = {2023}, url = {https://doi.org/10.1108/ICS-11-2022-0183}, doi = {10.1108/ICS-11-2022-0183}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/ChuaKW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ClarkeF23, author = {Nathan L. Clarke and Steven Furnell}, title = {Editorial: Human aspects of cyber security}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {3}, pages = {265--266}, year = {2023}, url = {https://doi.org/10.1108/ICS-07-2023-213}, doi = {10.1108/ICS-07-2023-213}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ClarkeF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DouhaRTK23, author = {N'guessan Yves{-}Roland Douha and Karen Renaud and Yuzo Taenaka and Youki Kadobayashi}, title = {Smart home cybersecurity awareness and behavioral incentives}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {5}, pages = {545--575}, year = {2023}, url = {https://doi.org/10.1108/ICS-03-2023-0032}, doi = {10.1108/ICS-03-2023-0032}, timestamp = {Wed, 20 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/DouhaRTK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ebot23, author = {Alain Tambe Ebot}, title = {Advance fee fraud scammers' criminal expertise and deceptive strategies: a qualitative case study}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {4}, pages = {478--503}, year = {2023}, url = {https://doi.org/10.1108/ICS-01-2022-0007}, doi = {10.1108/ICS-01-2022-0007}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/Ebot23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FordAGD23, author = {Adrian Ford and Ameer Al{-}Nemrat and Seyed Ali Ghorashi and Julia Claire Davidson}, title = {The impact of {GDPR} infringement fines on the market value of firms}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {1}, pages = {51--64}, year = {2023}, url = {https://doi.org/10.1108/ICS-03-2022-0049}, doi = {10.1108/ICS-03-2022-0049}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FordAGD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FortinH23, author = {Anne Fortin and Sylvie H{\'{e}}roux}, title = {Limited usefulness of firm-provided cybersecurity information in institutional investors' investment analysis}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {1}, pages = {108--123}, year = {2023}, url = {https://doi.org/10.1108/ICS-07-2022-0122}, doi = {10.1108/ICS-07-2022-0122}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FortinH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GafniL23, author = {Ruti Gafni and Yair Levy}, title = {Experts' feedback on the cybersecurity footprint elements: in pursuit of a quantifiable measure of SMBs' cybersecurity posture}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {5}, pages = {601--623}, year = {2023}, url = {https://doi.org/10.1108/ICS-05-2023-0083}, doi = {10.1108/ICS-05-2023-0083}, timestamp = {Wed, 20 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/GafniL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GlasVRBP23, author = {Magdalena Glas and Manfred Vielberth and Tobias Reittinger and Fabian B{\"{o}}hm and G{\"{u}}nther Pernul}, title = {Improving cybersecurity skill development through visual programming}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {3}, pages = {316--330}, year = {2023}, url = {https://doi.org/10.1108/ICS-11-2022-0170}, doi = {10.1108/ICS-11-2022-0170}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GlasVRBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GyllenstenTP23, author = {Kristina Gyllensten and Marianne T{\"{o}}rner and Anders Pousette}, title = {The impact of psychosocial working conditions on information security behaviour in the nuclear industry}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {1}, pages = {32--50}, year = {2023}, url = {https://doi.org/10.1108/ICS-05-2022-0089}, doi = {10.1108/ICS-05-2022-0089}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GyllenstenTP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/H23, author = {Haritha P. H.}, title = {Mobile payment service adoption: understanding customers for an application of emerging financial technology}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {2}, pages = {145--171}, year = {2023}, url = {https://doi.org/10.1108/ICS-04-2022-0058}, doi = {10.1108/ICS-04-2022-0058}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/H23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KannelonningK23, author = {Kristian Kannel{\o}nning and Sokratis K. Katsikas}, title = {A systematic literature review of how cybersecurity-related behavior has been assessed}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {4}, pages = {463--477}, year = {2023}, url = {https://doi.org/10.1108/ICS-08-2022-0139}, doi = {10.1108/ICS-08-2022-0139}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/KannelonningK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LindqvistK23, author = {Gunnar Lindqvist and Joakim K{\"{a}}vrestad}, title = {How privacy concerns impact Swedish citizens' willingness to report crimes: a quantitative mobile phone survey}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {3}, pages = {304--315}, year = {2023}, url = {https://doi.org/10.1108/ICS-10-2022-0167}, doi = {10.1108/ICS-10-2022-0167}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LindqvistK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MathieuT23, author = {Richard G. Mathieu and Alan E. Turovlin}, title = {Lost in the middle - a pragmatic approach for {ERP} managers to prioritize known vulnerabilities by applying classification and regression trees {(CART)}}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {5}, pages = {655--674}, year = {2023}, url = {https://doi.org/10.1108/ICS-02-2023-0027}, doi = {10.1108/ICS-02-2023-0027}, timestamp = {Wed, 20 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/MathieuT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Mujeye23, author = {Stephen Mujeye}, title = {An analysis of differences in behaviors and practices of security-conscious users and regular users on mobile devices}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {5}, pages = {624--634}, year = {2023}, url = {https://doi.org/10.1108/ICS-05-2023-0086}, doi = {10.1108/ICS-05-2023-0086}, timestamp = {Wed, 20 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/Mujeye23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PalanisamyS23, author = {Ramaraj Palanisamy and Yi Shi}, title = {Users' attitude on perceived security of mobile cloud computing: empirical evidence from {SME} users in China}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {1}, pages = {65--87}, year = {2023}, url = {https://doi.org/10.1108/ICS-03-2022-0048}, doi = {10.1108/ICS-03-2022-0048}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PalanisamyS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PharrisP23, author = {Lily Pharris and Begona Perez{-}Mira}, title = {Preventing social engineering: a phenomenological inquiry}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {1}, pages = {1--31}, year = {2023}, url = {https://doi.org/10.1108/ICS-09-2021-0137}, doi = {10.1108/ICS-09-2021-0137}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PharrisP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RiemenschneiderBB23, author = {Cynthia K. Riemenschneider and Laurie L. Burney and Saman Bina}, title = {The influence of organizational values on employee attitude and information security behavior: the mediating role of psychological capital}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {2}, pages = {172--198}, year = {2023}, url = {https://doi.org/10.1108/ICS-10-2022-0156}, doi = {10.1108/ICS-10-2022-0156}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RiemenschneiderBB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RostamiKG23, author = {Elham Rostami and Fredrik Karlsson and Shang Gao}, title = {Policy components - a conceptual model for modularizing and tailoring of information security policies}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {3}, pages = {331--352}, year = {2023}, url = {https://doi.org/10.1108/ICS-10-2022-0160}, doi = {10.1108/ICS-10-2022-0160}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RostamiKG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ShahA23, author = {Pintu Shah and Anuja Agarwal}, title = {Cyber Suraksha: a card game for smartphone security awareness}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {5}, pages = {576--600}, year = {2023}, url = {https://doi.org/10.1108/ICS-05-2022-0087}, doi = {10.1108/ICS-05-2022-0087}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/ShahA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ShaheenZ23, author = {Khalid Shaheen and Ali Hussein Zolait}, title = {The impacts of the cyber-trust program on the cybersecurity maturity of government entities in the Kingdom of Bahrain}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {5}, pages = {529--544}, year = {2023}, url = {https://doi.org/10.1108/ICS-06-2022-0108}, doi = {10.1108/ICS-06-2022-0108}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/ShaheenZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ShanleyJSC23, author = {Aleatha Shanley and Mike Johnstone and Patryk Szewczyk and Michael Crowley}, title = {An exploration of Australian attitudes towards privacy}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {3}, pages = {353--367}, year = {2023}, url = {https://doi.org/10.1108/ICS-11-2022-0171}, doi = {10.1108/ICS-11-2022-0171}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ShanleyJSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ShojaifarF23, author = {Alireza Shojaifar and Samuel A. Fricker}, title = {Design and evaluation of a self-paced cybersecurity tool}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {2}, pages = {244--262}, year = {2023}, url = {https://doi.org/10.1108/ICS-09-2021-0145}, doi = {10.1108/ICS-09-2021-0145}, timestamp = {Wed, 14 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ShojaifarF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SmithSBB23, author = {Katherine Taken Smith and Lawrence Murphy Smith and Marcus Burger and Erik S. Boyle}, title = {Cyber terrorism cases and stock market valuation effects}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {4}, pages = {385--403}, year = {2023}, url = {https://doi.org/10.1108/ICS-09-2022-0147}, doi = {10.1108/ICS-09-2022-0147}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/SmithSBB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TariqMATM23, author = {Aamna Tariq and Jawad Manzoor and Muhammad Ammar Aziz and Zain Ul Abideen Tariq and Ammar Masood}, title = {Open source {SIEM} solutions for an enterprise}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {1}, pages = {88--107}, year = {2023}, url = {https://doi.org/10.1108/ICS-09-2021-0146}, doi = {10.1108/ICS-09-2021-0146}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TariqMATM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TegethoffSDC23, author = {Thomas M. Tegethoff and Ricardo Santa and Glaucya Da{\'{u}} and Jimy Cortes}, title = {Online security in e-government as an antecedent of cost-effectiveness and quality in business operations}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {2}, pages = {125--144}, year = {2023}, url = {https://doi.org/10.1108/ICS-10-2021-0159}, doi = {10.1108/ICS-10-2021-0159}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TegethoffSDC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Veiga23, author = {Ad{\'{e}}le da Veiga}, title = {A model for information security culture with creativity and innovation as enablers - refined with an expert panel}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {3}, pages = {281--303}, year = {2023}, url = {https://doi.org/10.1108/ICS-11-2022-0178}, doi = {10.1108/ICS-11-2022-0178}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Veiga23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/XuR23, author = {Tianhao Xu and Prashanth Rajivan}, title = {Determining psycholinguistic features of deception in phishing messages}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {2}, pages = {199--220}, year = {2023}, url = {https://doi.org/10.1108/ICS-11-2021-0185}, doi = {10.1108/ICS-11-2021-0185}, timestamp = {Wed, 14 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/XuR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AmankwaLK22, author = {Eric Amankwa and Marianne Loock and Elmarie Kritzinger}, title = {The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {4}, pages = {583--614}, year = {2022}, url = {https://doi.org/10.1108/ICS-10-2021-0169}, doi = {10.1108/ICS-10-2021-0169}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AmankwaLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Baker-EvelethSE22, author = {Lori Baker{-}Eveleth and Robert W. Stone and Daniel M. Eveleth}, title = {Understanding social media users' privacy-protection behaviors}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {3}, pages = {324--345}, year = {2022}, url = {https://doi.org/10.1108/ICS-07-2021-0099}, doi = {10.1108/ICS-07-2021-0099}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Baker-EvelethSE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Bayl-SmithTYW22, author = {Piers Bayl{-}Smith and Ronnie Taib and Kun Yu and Mark W. Wiggins}, title = {Response to a phishing attack: persuasion and protection motivation in an organizational context}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {1}, pages = {63--78}, year = {2022}, url = {https://doi.org/10.1108/ICS-02-2021-0021}, doi = {10.1108/ICS-02-2021-0021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Bayl-SmithTYW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BenrhoumaAANB22, author = {Oussama Benrhouma and Ali Alzahrani and Ahmad B. Alkhodre and Abdallah Namoun and Wasim Ahmad Bhat}, title = {To sell, or not to sell: social media data-breach in second-hand Android devices}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {1}, pages = {117--136}, year = {2022}, url = {https://doi.org/10.1108/ICS-03-2021-0038}, doi = {10.1108/ICS-03-2021-0038}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/BenrhoumaAANB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BergquistTG22, author = {Jan{-}Halvard Bergquist and Samantha Tinet and Shang Gao}, title = {An information classification model for public sector organizations in Sweden: a case study of a Swedish municipality}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {2}, pages = {153--172}, year = {2022}, url = {https://doi.org/10.1108/ICS-03-2021-0032}, doi = {10.1108/ICS-03-2021-0032}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BergquistTG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BhadauriaC22, author = {Vikram S. Bhadauria and Anitha Chennamaneni}, title = {Do desire, anxiety and personal innovativeness impact the adoption of IoT devices?}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {5}, pages = {730--750}, year = {2022}, url = {https://doi.org/10.1108/ICS-07-2021-0096}, doi = {10.1108/ICS-07-2021-0096}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/BhadauriaC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BhanaF22, author = {Bhaveer Bhana and Stephen V. Flowerday}, title = {Usability of the login authentication process: passphrases and passwords}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {2}, pages = {280--305}, year = {2022}, url = {https://doi.org/10.1108/ICS-07-2021-0093}, doi = {10.1108/ICS-07-2021-0093}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BhanaF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BongiovanniRBBC22, author = {Ivano Bongiovanni and Karen Renaud and Humphrey Brydon and R{\'{e}}nette J. Blignaut and Angelo Cavallo}, title = {A quantification mechanism for assessing adherence to information security governance guidelines}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {4}, pages = {517--548}, year = {2022}, url = {https://doi.org/10.1108/ICS-08-2021-0112}, doi = {10.1108/ICS-08-2021-0112}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/BongiovanniRBBC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChenLL22, author = {Hao Chen and Mengya Liu and Tu Lyu}, title = {Understanding employees' information security-related stress and policy compliance intention: the roles of information security fatigue and psychological capital}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {5}, pages = {751--770}, year = {2022}, url = {https://doi.org/10.1108/ICS-03-2022-0047}, doi = {10.1108/ICS-03-2022-0047}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChenLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DasNC22, author = {Sanchari Das and Christena Nippert{-}Eng and L. Jean Camp}, title = {Evaluating user susceptibility to phishing attacks}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {1}, pages = {1--18}, year = {2022}, url = {https://doi.org/10.1108/ICS-12-2020-0204}, doi = {10.1108/ICS-12-2020-0204}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DasNC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/El-KhatibB22, author = {Rima El{-}Khatib and Henri Barki}, title = {How different rewards tend to influence employee non-compliance with information security policies}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {1}, pages = {97--116}, year = {2022}, url = {https://doi.org/10.1108/ICS-01-2021-0008}, doi = {10.1108/ICS-01-2021-0008}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/El-KhatibB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FaiziPN22, author = {Ana Faizi and Ali Mohammad Padyab and Andreas Naess}, title = {From rationale to lessons learned in the cloud information security risk assessment: a study of organizations in Sweden}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {2}, pages = {190--205}, year = {2022}, url = {https://doi.org/10.1108/ICS-03-2021-0034}, doi = {10.1108/ICS-03-2021-0034}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FaiziPN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GafniP22, author = {Ruti Gafni and Tal Pavel}, title = {Cyberattacks against the health-care sectors during the {COVID-19} pandemic}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {1}, pages = {137--150}, year = {2022}, url = {https://doi.org/10.1108/ICS-05-2021-0059}, doi = {10.1108/ICS-05-2021-0059}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GafniP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Gharib22, author = {Mohamad Gharib}, title = {Toward an architecture to improve privacy and informational self-determination through informed consent}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {4}, pages = {549--561}, year = {2022}, url = {https://doi.org/10.1108/ICS-12-2021-0209}, doi = {10.1108/ICS-12-2021-0209}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Gharib22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GyllenstenPT22, author = {Kristina Gyllensten and Anders Pousette and Marianne T{\"{o}}rner}, title = {Value conflicts and information security - a mixed-methods study in high-risk industry}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {3}, pages = {346--363}, year = {2022}, url = {https://doi.org/10.1108/ICS-09-2021-0139}, doi = {10.1108/ICS-09-2021-0139}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GyllenstenPT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HadzidedicFR22, author = {Suncica Hadzidedic and Silvia Berenice Fajardo Flores and Belma Ramic{-}Brkic}, title = {User perceptions and use of authentication methods: insights from youth in Mexico and Bosnia and Herzegovina}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {4}, pages = {615--632}, year = {2022}, url = {https://doi.org/10.1108/ICS-07-2021-0105}, doi = {10.1108/ICS-07-2021-0105}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HadzidedicFR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HwangH22, author = {Mark I. Hwang and Susan Helser}, title = {Cybersecurity educational games: a theoretical framework}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {2}, pages = {225--242}, year = {2022}, url = {https://doi.org/10.1108/ICS-10-2020-0173}, doi = {10.1108/ICS-10-2020-0173}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HwangH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JohansenPFJSRZS22, author = {Johanna Johansen and Tore Pedersen and Simone Fischer{-}H{\"{u}}bner and Christian Johansen and Gerardo Schneider and Arnold Roosendaal and Harald Zwingelberg and Anders Jakob Sivesind and Josef Noll}, title = {A multidisciplinary definition of privacy labels}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {3}, pages = {452--469}, year = {2022}, url = {https://doi.org/10.1108/ICS-06-2021-0080}, doi = {10.1108/ICS-06-2021-0080}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JohansenPFJSRZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JonesLWNMA22, author = {Keith S. Jones and Natalie R. Lodinger and Benjamin P. Widlus and Akbar Siami Namin and Emily Maw and Miriam E. Armstrong}, title = {How do non experts think about cyber attack consequences?}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {4}, pages = {473--489}, year = {2022}, url = {https://doi.org/10.1108/ICS-11-2020-0184}, doi = {10.1108/ICS-11-2020-0184}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JonesLWNMA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KarlssonKAD22, author = {Martin Karlsson and Fredrik Karlsson and Joachim {\AA}str{\"{o}}m and Thomas Denk}, title = {The effect of perceived organizational culture on employees' information security compliance}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {3}, pages = {382--401}, year = {2022}, url = {https://doi.org/10.1108/ICS-06-2021-0073}, doi = {10.1108/ICS-06-2021-0073}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KarlssonKAD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KhalidAI22, author = {Marium Khalid and Mehreen Afzal and Waseem Iqbal}, title = {A game model design using test bed for Malware analysis training}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {4}, pages = {633--650}, year = {2022}, url = {https://doi.org/10.1108/ICS-09-2021-0152}, doi = {10.1108/ICS-09-2021-0152}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KhalidAI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KwatengAT22, author = {Kwame Owusu Kwateng and Christopher Amanor and Francis Kamewor Tetteh}, title = {Enterprise risk management and information technology security in the financial sector}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {3}, pages = {422--451}, year = {2022}, url = {https://doi.org/10.1108/ICS-11-2020-0185}, doi = {10.1108/ICS-11-2020-0185}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KwatengAT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LeiteSA22, author = {Lu{\'{\i}}s Leite and Daniel Rodrigues dos Santos and Fernando Almeida}, title = {The impact of general data protection regulation on software engineering practices}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {1}, pages = {79--96}, year = {2022}, url = {https://doi.org/10.1108/ICS-03-2020-0043}, doi = {10.1108/ICS-03-2020-0043}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/LeiteSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MalatjiMS22, author = {Masike Malatji and Annliz{\'{e}} Marnewick and Sun{\'{e}} von Solms}, title = {Cybersecurity capabilities for critical infrastructure resilience}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {2}, pages = {255--279}, year = {2022}, url = {https://doi.org/10.1108/ICS-06-2021-0091}, doi = {10.1108/ICS-06-2021-0091}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MalatjiMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ManoharanKHA22, author = {Suganthi Manoharan and Norliza Katuk and Syahida Hassan and Rahayu Ahmad}, title = {To click or not to click the link: the factors influencing internet banking users' intention in responding to phishing emails}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {1}, pages = {37--62}, year = {2022}, url = {https://doi.org/10.1108/ICS-04-2021-0046}, doi = {10.1108/ICS-04-2021-0046}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/ManoharanKHA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/NgugiHL22, author = {Benjamin K. Ngugi and Kuo{-}Ting Hung and Yuanxiang John Li}, title = {Reducing tax identity theft by identifying vulnerability points in the electronic tax filing process}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {2}, pages = {173--189}, year = {2022}, url = {https://doi.org/10.1108/ICS-05-2021-0056}, doi = {10.1108/ICS-05-2021-0056}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/NgugiHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PerasM22, author = {Dijana Peras and Renata Mekovec}, title = {A conceptualization of the privacy concerns of cloud users}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {5}, pages = {653--671}, year = {2022}, url = {https://doi.org/10.1108/ICS-11-2021-0182}, doi = {10.1108/ICS-11-2021-0182}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PerasM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RamakrishnanHSP22, author = {Thiagarajan Ramakrishnan and Dwight M. Hite and Joseph H. Schuessler and Victor R. Prybutok}, title = {Work ethic and information security behavior}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {3}, pages = {364--381}, year = {2022}, url = {https://doi.org/10.1108/ICS-02-2021-0017}, doi = {10.1108/ICS-02-2021-0017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RamakrishnanHSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RensburgBS22, author = {Ebenhaeser Otto Janse van Rensburg and Reinhardt A. Botha and Rossouw von Solms}, title = {Utility indicator for emotion detection in a speaker authentication system}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {5}, pages = {672--686}, year = {2022}, url = {https://doi.org/10.1108/ICS-07-2021-0097}, doi = {10.1108/ICS-07-2021-0097}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/RensburgBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ShanY22, author = {Mridula Shan and Jeong Yang}, title = {Investigating the accessibility and impacts of cybersecurity programs on high-school girls' long-term industry engagement}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {3}, pages = {309--323}, year = {2022}, url = {https://doi.org/10.1108/ICS-05-2021-0067}, doi = {10.1108/ICS-05-2021-0067}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ShanY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Stewart22, author = {Harrison Stewart}, title = {The hindrance of cloud computing acceptance within the financial sectors in Germany}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {2}, pages = {206--224}, year = {2022}, url = {https://doi.org/10.1108/ICS-01-2021-0002}, doi = {10.1108/ICS-01-2021-0002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Stewart22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Stewart22a, author = {Harrison Stewart}, title = {A systematic framework to explore the determinants of information security policy development and outcomes}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {4}, pages = {490--516}, year = {2022}, url = {https://doi.org/10.1108/ICS-06-2021-0076}, doi = {10.1108/ICS-06-2021-0076}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Stewart22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/StyliosKSC22, author = {Ioannis Stylios and Spyros Kokolakis and Andreas Skalkos and Sotirios Chatzis}, title = {BioGames: a new paradigm and a behavioral biometrics collection tool for research purposes}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {2}, pages = {243--254}, year = {2022}, url = {https://doi.org/10.1108/ICS-12-2020-0196}, doi = {10.1108/ICS-12-2020-0196}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/StyliosKSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/StyliosKTC22, author = {Ioannis Stylios and Spyros Kokolakis and Olga Thanou and Sotirios Chatzis}, title = {Key factors driving the adoption of behavioral biometrics and continuous authentication technology: an empirical research}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {4}, pages = {562--582}, year = {2022}, url = {https://doi.org/10.1108/ICS-08-2021-0124}, doi = {10.1108/ICS-08-2021-0124}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/StyliosKTC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/StyliosSKK22, author = {Ioannis Stylios and Andreas Skalkos and Spyros Kokolakis and Maria Karyda}, title = {BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {5}, pages = {687--704}, year = {2022}, url = {https://doi.org/10.1108/ICS-12-2021-0212}, doi = {10.1108/ICS-12-2021-0212}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/StyliosSKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/VgenaKK22, author = {Katerina Vgena and Angeliki Kitsiou and Christos Kalloniatis}, title = {Understanding the role of users' socio-location attributes and their privacy implications on social media}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {5}, pages = {705--729}, year = {2022}, url = {https://doi.org/10.1108/ICS-12-2021-0211}, doi = {10.1108/ICS-12-2021-0211}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/VgenaKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Withanaarachchi22, author = {Amila S. Withanaarachchi and Nisansala Vithana}, title = {Female underrepresentation in the cybersecurity workforce - a study on cybersecurity professionals in Sri Lanka}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {3}, pages = {402--421}, year = {2022}, url = {https://doi.org/10.1108/ICS-08-2021-0129}, doi = {10.1108/ICS-08-2021-0129}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Withanaarachchi22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/YeH22, author = {Xiaoyun Ye and Myung{-}Mook Han}, title = {An improved feature extraction algorithm for insider threat using hidden Markov model on user behavior detection}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {1}, pages = {19--36}, year = {2022}, url = {https://doi.org/10.1108/ICS-12-2019-0142}, doi = {10.1108/ICS-12-2019-0142}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/YeH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Al-AmeenCAK21, author = {Mahdi Nasrullah Al{-}Ameen and Apoorva Chauhan and M. A. Manazir Ahsan and Huzeyfe Kocabas}, title = {A look into user's privacy perceptions and data practices of IoT devices}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {4}, pages = {573--588}, year = {2021}, url = {https://doi.org/10.1108/ICS-08-2020-0134}, doi = {10.1108/ICS-08-2020-0134}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Al-AmeenCAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AlotaibiCF21, author = {Fayez Ghazai Alotaibi and Nathan Luke Clarke and Steven M. Furnell}, title = {A novel approach for improving information security management and awareness for home environments}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {1}, pages = {25--48}, year = {2021}, url = {https://doi.org/10.1108/ICS-05-2020-0073}, doi = {10.1108/ICS-05-2020-0073}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AlotaibiCF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Avery21, author = {Atiya Avery}, title = {After the disclosure: measuring the short-term and long-term impacts of data breach disclosures on the financial performance of organizations}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {3}, pages = {500--525}, year = {2021}, url = {https://doi.org/10.1108/ICS-10-2020-0161}, doi = {10.1108/ICS-10-2020-0161}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Avery21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AzmiPVH21, author = {Nurul Asmui Azmi Md Azmi and Teoh Ai Ping and Ali Vafaei{-}Zadeh and Haniruzila Hanifah}, title = {Predicting information security culture among employees of telecommunication companies in an emerging market}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {5}, pages = {866--882}, year = {2021}, url = {https://doi.org/10.1108/ICS-02-2021-0020}, doi = {10.1108/ICS-02-2021-0020}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AzmiPVH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BergstromKA21, author = {Erik Bergstr{\"{o}}m and Fredrik Karlsson and Rose{-}Mharie {\AA}hlfeldt}, title = {Developing an information classification method}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {2}, pages = {209--239}, year = {2021}, url = {https://doi.org/10.1108/ICS-07-2020-0110}, doi = {10.1108/ICS-07-2020-0110}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BergstromKA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChatterjeeGCC21, author = {Sheshadri Chatterjee and Soumya Kanti Ghosh and Ranjan Chaudhuri and Sumana Chaudhuri}, title = {Adoption of AI-integrated {CRM} system by Indian industry: from security and privacy perspective}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {1}, pages = {1--24}, year = {2021}, url = {https://doi.org/10.1108/ICS-02-2019-0029}, doi = {10.1108/ICS-02-2019-0029}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChatterjeeGCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChowdhuryG21, author = {Nabin Chowdhury and Vasileios Gkioulos}, title = {Key competencies for critical infrastructure cyber-security: a systematic literature review}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {5}, pages = {697--723}, year = {2021}, url = {https://doi.org/10.1108/ICS-07-2020-0121}, doi = {10.1108/ICS-07-2020-0121}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChowdhuryG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Dahabiyeh21, author = {Laila Dahabiyeh}, title = {Factors affecting organizational adoption and acceptance of computer-based security awareness training tools}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {5}, pages = {836--849}, year = {2021}, url = {https://doi.org/10.1108/ICS-12-2020-0200}, doi = {10.1108/ICS-12-2020-0200}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Dahabiyeh21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FailyIAK21, author = {Shamal Faily and Claudia Iacob and Raian Ali and Duncan Ki{-}Aries}, title = {Visualising personas as goal models to find security tensions}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {5}, pages = {787--815}, year = {2021}, url = {https://doi.org/10.1108/ICS-03-2021-0035}, doi = {10.1108/ICS-03-2021-0035}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FailyIAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GangireVH21, author = {Yotamu Gangire and Ad{\'{e}}le da Veiga and Marlien Herselman}, title = {Assessing information security behaviour: a self-determination theory perspective}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {4}, pages = {625--646}, year = {2021}, url = {https://doi.org/10.1108/ICS-11-2020-0179}, doi = {10.1108/ICS-11-2020-0179}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GangireVH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GillamW21, author = {Andrew R. Gillam and Alina M. Waite}, title = {Gender differences in predictors of technology threat avoidance}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {3}, pages = {393--412}, year = {2021}, url = {https://doi.org/10.1108/ICS-01-2020-0008}, doi = {10.1108/ICS-01-2020-0008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GillamW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GuptaBBS21, author = {Rohit Gupta and Baidyanath Biswas and Indranil Biswas and Shib Sankar Sana}, title = {Firm investment decisions for information security under a fuzzy environment: a game-theoretic approach}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {1}, pages = {73--104}, year = {2021}, url = {https://doi.org/10.1108/ICS-02-2020-0028}, doi = {10.1108/ICS-02-2020-0028}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GuptaBBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HaneyL21, author = {Julie M. Haney and Wayne G. Lutters}, title = {Cybersecurity advocates: discovering the characteristics and skills of an emergent role}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {3}, pages = {485--499}, year = {2021}, url = {https://doi.org/10.1108/ICS-08-2020-0131}, doi = {10.1108/ICS-08-2020-0131}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HaneyL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HerkanaiduFP21, author = {Ram Herkanaidu and Steven M. Furnell and Maria Papadaki}, title = {Towards a cross-cultural education framework for online safety awareness}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {4}, pages = {664--679}, year = {2021}, url = {https://doi.org/10.1108/ICS-11-2020-0183}, doi = {10.1108/ICS-11-2020-0183}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HerkanaiduFP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JanjarasjitC21, author = {Suparak Janjarasjit and Siew H. Chan}, title = {Reaction of users as potential victims of information security breach}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {1}, pages = {187--206}, year = {2021}, url = {https://doi.org/10.1108/ICS-07-2020-0118}, doi = {10.1108/ICS-07-2020-0118}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JanjarasjitC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JonesATN21, author = {Keith S. Jones and Miriam E. Armstrong and McKenna K. Tornblad and Akbar Siami Namin}, title = {How social engineers use persuasion principles during vishing attacks}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {2}, pages = {314--331}, year = {2021}, url = {https://doi.org/10.1108/ICS-07-2020-0113}, doi = {10.1108/ICS-07-2020-0113}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JonesATN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KaragiannisM21, author = {Stylianos Karagiannis and Emmanouil Magkos}, title = {Adapting {CTF} challenges into virtual cybersecurity learning environments}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {1}, pages = {105--132}, year = {2021}, url = {https://doi.org/10.1108/ICS-04-2019-0050}, doi = {10.1108/ICS-04-2019-0050}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KaragiannisM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KintonovaVS21, author = {Aliya Kintonova and Alexander Vasyaev and Viktor Shestak}, title = {Cyberbullying and cyber-mobbing in developing countries}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {3}, pages = {435--456}, year = {2021}, url = {https://doi.org/10.1108/ICS-02-2020-0031}, doi = {10.1108/ICS-02-2020-0031}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KintonovaVS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KrishnaS21, author = {Ben Krishna and M. P. Sebastian}, title = {Examining the relationship between e-government development, nation's cyber-security commitment, business usage and economic prosperity: a cross-country analysis}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {5}, pages = {737--760}, year = {2021}, url = {https://doi.org/10.1108/ICS-12-2020-0205}, doi = {10.1108/ICS-12-2020-0205}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KrishnaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LennartssonKN21, author = {Markus Lennartsson and Joakim K{\"{a}}vrestad and Marcus Nohlberg}, title = {Exploring the meaning of usable security - a literature review}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {4}, pages = {647--663}, year = {2021}, url = {https://doi.org/10.1108/ICS-10-2020-0167}, doi = {10.1108/ICS-10-2020-0167}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LennartssonKN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LevyG21, author = {Yair Levy and Ruti Gafni}, title = {Introducing the concept of cybersecurity footprint}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {5}, pages = {724--736}, year = {2021}, url = {https://doi.org/10.1108/ICS-04-2020-0054}, doi = {10.1108/ICS-04-2020-0054}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LevyG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/McGillT21, author = {Tanya McGill and Nik Thompson}, title = {Exploring potential gender differences in information security and privacy}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {5}, pages = {850--865}, year = {2021}, url = {https://doi.org/10.1108/ICS-07-2020-0125}, doi = {10.1108/ICS-07-2020-0125}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/McGillT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MomenzadehGDC21, author = {Behnood Momenzadeh and Shakthidhar Gopavaram and Sanchari Das and L. Jean Camp}, title = {Bayesian evaluation of privacy-preserving risk communication for user android app preferences}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {4}, pages = {680--693}, year = {2021}, url = {https://doi.org/10.1108/ICS-11-2020-0182}, doi = {10.1108/ICS-11-2020-0182}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MomenzadehGDC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/N21, author = {Sindhuja P. N.}, title = {The impact of information security initiatives on supply chain robustness and performance: an empirical study}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {2}, pages = {365--391}, year = {2021}, url = {https://doi.org/10.1108/ICS-07-2020-0128}, doi = {10.1108/ICS-07-2020-0128}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/N21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/NaqviCP21, author = {Bilal Naqvi and Nathan Luke Clarke and Jari Porras}, title = {Incorporating the human facet of security in developing systems and services}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {1}, pages = {49--72}, year = {2021}, url = {https://doi.org/10.1108/ICS-11-2019-0130}, doi = {10.1108/ICS-11-2019-0130}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/NaqviCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/OrehekP21, author = {Spela Orehek and Gregor Petric}, title = {A systematic review of scales for measuring information security culture}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {1}, pages = {133--158}, year = {2021}, url = {https://doi.org/10.1108/ICS-12-2019-0140}, doi = {10.1108/ICS-12-2019-0140}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/OrehekP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/OriolaAPK21, author = {Oluwafemi Oriola and Adesesan B. Adeyemo and Maria Papadaki and Eduan Kotz{\'{e}}}, title = {A collaborative approach for national cybersecurity incident management}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {3}, pages = {457--484}, year = {2021}, url = {https://doi.org/10.1108/ICS-02-2020-0027}, doi = {10.1108/ICS-02-2020-0027}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/OriolaAPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PalanisamyW21, author = {Ramaraj Palanisamy and Yang Wu}, title = {Users' attitude on perceived security of enterprise systems mobility: an empirical study}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {1}, pages = {159--186}, year = {2021}, url = {https://doi.org/10.1108/ICS-05-2020-0069}, doi = {10.1108/ICS-05-2020-0069}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PalanisamyW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PapaioannouTK21, author = {Thanos Papaioannou and Aggeliki Tsohou and Maria Karyda}, title = {Forming digital identities in social networks: the role of privacy concerns and self-esteem}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {2}, pages = {240--262}, year = {2021}, url = {https://doi.org/10.1108/ICS-01-2020-0003}, doi = {10.1108/ICS-01-2020-0003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PapaioannouTK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ParkerF21, author = {Heather J. Parker and Stephen Flowerday}, title = {Understanding the disclosure of personal data online}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {3}, pages = {413--434}, year = {2021}, url = {https://doi.org/10.1108/ICS-10-2020-0168}, doi = {10.1108/ICS-10-2020-0168}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ParkerF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RamloN21, author = {Susan Ramlo and John B. Nicholas}, title = {The human factor: assessing individuals' perceptions related to cybersecurity}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {2}, pages = {350--364}, year = {2021}, url = {https://doi.org/10.1108/ICS-04-2020-0052}, doi = {10.1108/ICS-04-2020-0052}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RamloN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RenaudJO21, author = {Karen Renaud and Graham Johnson and Jacques Ophoff}, title = {Accessible authentication: dyslexia and password strategies}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {4}, pages = {604--624}, year = {2021}, url = {https://doi.org/10.1108/ICS-11-2020-0192}, doi = {10.1108/ICS-11-2020-0192}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RenaudJO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RenaudP21, author = {Karen Renaud and Suzanne Prior}, title = {The "three M's" counter-measures to children's risky online behaviors: mentor, mitigate and monitor}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {3}, pages = {526--557}, year = {2021}, url = {https://doi.org/10.1108/ICS-07-2020-0115}, doi = {10.1108/ICS-07-2020-0115}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/RenaudP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SabanRW21, author = {Kenneth Albert Saban and Stephen Rau and Charles A. Wood}, title = {"SME executives' perceptions and the information security preparedness model"}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {2}, pages = {263--282}, year = {2021}, url = {https://doi.org/10.1108/ICS-01-2020-0014}, doi = {10.1108/ICS-01-2020-0014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SabanRW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SengAW21, author = {Sovantharith Seng and Mahdi Nasrullah Al{-}Ameen and Matthew Wright}, title = {A look into user privacy andthird-party applications in Facebook}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {2}, pages = {283--313}, year = {2021}, url = {https://doi.org/10.1108/ICS-08-2019-0108}, doi = {10.1108/ICS-08-2019-0108}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/SengAW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SnymanK21, author = {Dirk P. Snyman and Hennie A. Kruger}, title = {Collective information security behaviour: a technology-driven framework}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {4}, pages = {589--603}, year = {2021}, url = {https://doi.org/10.1108/ICS-11-2020-0180}, doi = {10.1108/ICS-11-2020-0180}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SnymanK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SwartzVM21, author = {Paulus Swartz and Ad{\'{e}}le da Veiga and Nico Martins}, title = {Validating an information privacy governance questionnaire to measure the perception of employees}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {5}, pages = {761--786}, year = {2021}, url = {https://doi.org/10.1108/ICS-08-2020-0135}, doi = {10.1108/ICS-08-2020-0135}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SwartzVM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ThompsonAM21, author = {Nik Thompson and Atif Ahmad and Sean B. Maynard}, title = {Do privacy concerns determine online information disclosure? The case of internet addiction}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {3}, pages = {558--569}, year = {2021}, url = {https://doi.org/10.1108/ICS-11-2020-0190}, doi = {10.1108/ICS-11-2020-0190}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/ThompsonAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/VielberthEP21, author = {Manfred Vielberth and Ludwig Englbrecht and G{\"{u}}nther Pernul}, title = {Improving data quality for human-as-a-security-sensor. {A} process driven quality improvement approach for user-provided incident information}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {2}, pages = {332--349}, year = {2021}, url = {https://doi.org/10.1108/ICS-06-2020-0100}, doi = {10.1108/ICS-06-2020-0100}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/VielberthEP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/XuM21, author = {Hongjiang Xu and Sakthi Mahenthiran}, title = {Users' perception of cybersecurity, trust and cloud computing providers' performance}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {5}, pages = {816--835}, year = {2021}, url = {https://doi.org/10.1108/ICS-09-2020-0153}, doi = {10.1108/ICS-09-2020-0153}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/XuM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AkinsanyaPS20, author = {Opeoluwa Ore Akinsanya and Maria Papadaki and Lingfen Sun}, title = {Towards a maturity model for health-care cloud security {(M2HCS)}}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {3}, pages = {321--345}, year = {2020}, url = {https://doi.org/10.1108/ICS-05-2019-0060}, doi = {10.1108/ICS-05-2019-0060}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AkinsanyaPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Al-JabriEA20, author = {Ibrahim M. Al{-}Jabri and Mustafa I. M. Eid and Amer Abed}, title = {The willingness to disclose personal information}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {2}, pages = {161--181}, year = {2020}, url = {https://doi.org/10.1108/ICS-01-2018-0012}, doi = {10.1108/ICS-01-2018-0012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Al-JabriEA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AnassSTR20, author = {Rabii Anass and Assoul Saliha and Khadija Ouazzani Touhami and Ounsa Roudi{\`{e}}s}, title = {Information and cyber security maturity models: a systematic literature review}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {4}, pages = {627--644}, year = {2020}, url = {https://doi.org/10.1108/ICS-03-2019-0039}, doi = {10.1108/ICS-03-2019-0039}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AnassSTR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BahsiFF20, author = {Hayretdin Bahsi and Ulrik Franke and Even Langfeldt Friberg}, title = {The cyber-insurance market in Norway}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {1}, pages = {54--67}, year = {2020}, url = {https://doi.org/10.1108/ICS-01-2019-0012}, doi = {10.1108/ICS-01-2019-0012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BahsiFF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Bouaynaya20, author = {Wafa Bouaynaya}, title = {Cloud computing in SMEs: towards delegation of the {CIO} role}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {2}, pages = {199--213}, year = {2020}, url = {https://doi.org/10.1108/ICS-01-2017-0001}, doi = {10.1108/ICS-01-2017-0001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Bouaynaya20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BulleeJ20, author = {Jan{-}Willem Bullee and Marianne Junger}, title = {How effective are social engineering interventions? {A} meta-analysis}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {5}, pages = {801--830}, year = {2020}, url = {https://doi.org/10.1108/ICS-07-2019-0078}, doi = {10.1108/ICS-07-2019-0078}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BulleeJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Butler20, author = {Rika Butler}, title = {A systematic literature review of the factors affecting smartphone user threat avoidance behaviour}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {4}, pages = {555--574}, year = {2020}, url = {https://doi.org/10.1108/ICS-01-2020-0016}, doi = {10.1108/ICS-01-2020-0016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Butler20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DiamantopoulouT20, author = {Vasiliki Diamantopoulou and Aggeliki Tsohou and Maria Karyda}, title = {From {ISO/IEC27001:} 2013 and {ISO/IEC27002:} 2013 to {GDPR} compliance controls}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {4}, pages = {645--662}, year = {2020}, url = {https://doi.org/10.1108/ICS-01-2020-0004}, doi = {10.1108/ICS-01-2020-0004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DiamantopoulouT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DzidzahKA20, author = {Esther Dzidzah and Kwame Owusu Kwateng and Benjamin Kofi Asante}, title = {Security behaviour of mobile financial service users}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {5}, pages = {719--741}, year = {2020}, url = {https://doi.org/10.1108/ICS-02-2020-0021}, doi = {10.1108/ICS-02-2020-0021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DzidzahKA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/El-KhatibB20, author = {Rima El{-}Khatib and Henri Barki}, title = {An activity theory approach to information security non-compliance}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {4}, pages = {485--501}, year = {2020}, url = {https://doi.org/10.1108/ICS-11-2018-0128}, doi = {10.1108/ICS-11-2018-0128}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/El-KhatibB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FoltzF20, author = {C. Bryan Foltz and Laura Foltz}, title = {Mobile users' information privacy concerns instrument and IoT}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {3}, pages = {359--371}, year = {2020}, url = {https://doi.org/10.1108/ICS-07-2019-0090}, doi = {10.1108/ICS-07-2019-0090}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FoltzF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GeorgiopoulouML20, author = {Zafeiroula Georgiopoulou and Eleni{-}Laskarina Makri and Costas Lambrinoudakis}, title = {{GDPR} compliance: proposed technical and organizational measures for cloud provider}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {5}, pages = {665--680}, year = {2020}, url = {https://doi.org/10.1108/ICS-01-2020-0009}, doi = {10.1108/ICS-01-2020-0009}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GeorgiopoulouML20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GoelKH20, author = {Rajni Goel and Anupam Kumar and James Haddow}, title = {{PRISM:} a strategic decision framework for cybersecurity risk assessment}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {4}, pages = {591--625}, year = {2020}, url = {https://doi.org/10.1108/ICS-11-2018-0131}, doi = {10.1108/ICS-11-2018-0131}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GoelKH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KavrestadLBN20, author = {Joakim K{\"{a}}vrestad and Markus Lennartsson and Marcus Birath and Marcus Nohlberg}, title = {Constructing secure and memorable passwords}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {5}, pages = {701--717}, year = {2020}, url = {https://doi.org/10.1108/ICS-07-2019-0077}, doi = {10.1108/ICS-07-2019-0077}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KavrestadLBN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KavrestadZN20, author = {Joakim K{\"{a}}vrestad and Johan Zaxmy and Marcus Nohlberg}, title = {Analyzing the usage of character groups and keyboard patterns in password creation}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {3}, pages = {347--358}, year = {2020}, url = {https://doi.org/10.1108/ICS-11-2019-0132}, doi = {10.1108/ICS-11-2019-0132}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KavrestadZN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Kurowski20, author = {Sebastian Kurowski}, title = {Response biases in policy compliance research}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {3}, pages = {445--465}, year = {2020}, url = {https://doi.org/10.1108/ICS-02-2019-0025}, doi = {10.1108/ICS-02-2019-0025}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/Kurowski20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MakriGL20, author = {Eleni{-}Laskarina Makri and Zafeiroula Georgiopoulou and Costas Lambrinoudakis}, title = {Utilizing a privacy impact assessment method using metrics in the healthcare sector}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {4}, pages = {503--529}, year = {2020}, url = {https://doi.org/10.1108/ICS-01-2020-0007}, doi = {10.1108/ICS-01-2020-0007}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MakriGL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MavrikiK20, author = {Paola Mavriki and Maria Karyda}, title = {Automated data-driven profiling: threats for group privacy}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {2}, pages = {183--197}, year = {2020}, url = {https://doi.org/10.1108/ICS-04-2019-0048}, doi = {10.1108/ICS-04-2019-0048}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MavrikiK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MichaelE20, author = {Antonia Michael and Jan H. P. Eloff}, title = {Discovering "Insider {IT} Sabotage" based on human behaviour}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {4}, pages = {575--589}, year = {2020}, url = {https://doi.org/10.1108/ICS-12-2019-0141}, doi = {10.1108/ICS-12-2019-0141}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MichaelE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MoukafihOE20, author = {Nabil Moukafih and Ghizlane Orhanou and Said Elhajji}, title = {Mobile agent-based {SIEM} for event collection and normalization externalization}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {1}, pages = {15--34}, year = {2020}, url = {https://doi.org/10.1108/ICS-01-2019-0008}, doi = {10.1108/ICS-01-2019-0008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MoukafihOE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MukhopadhyayBCR20, author = {Surma Mukhopadhyay and Ramsankar Basak and Darrell Carpenter and Brian J. Reithel}, title = {Patient use of online medical records: an application of technology acceptance framework}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {1}, pages = {97--115}, year = {2020}, url = {https://doi.org/10.1108/ICS-07-2019-0076}, doi = {10.1108/ICS-07-2019-0076}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MukhopadhyayBCR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PaspatisTK20, author = {Ioannis Paspatis and Aggeliki Tsohou and Spyros Kokolakis}, title = {AppAware: a policy visualization model for mobile applications}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {1}, pages = {116--132}, year = {2020}, url = {https://doi.org/10.1108/ICS-04-2019-0049}, doi = {10.1108/ICS-04-2019-0049}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PaspatisTK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PattinsonBLCPCM20, author = {Malcolm R. Pattinson and Marcus A. Butavicius and Meredith Lillie and Beau Ciccarello and Kathryn Parsons and Dragana Calic and Agata McCormac}, title = {Matching training to individual learning styles improves information security awareness}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {1}, pages = {1--14}, year = {2020}, url = {https://doi.org/10.1108/ICS-01-2019-0022}, doi = {10.1108/ICS-01-2019-0022}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PattinsonBLCPCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PhamBPPUNN20, author = {Cong Hiep Pham and Linda Brennan and Lukas Parker and Nhat Tram Phan{-}Le and Irfan Ulhaq and Mathews Zanda Nkhoma and Minh Nhat Nguyen}, title = {Enhancing cyber security behavior: an internal social marketing approach}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {2}, pages = {133--159}, year = {2020}, url = {https://doi.org/10.1108/ICS-01-2019-0023}, doi = {10.1108/ICS-01-2019-0023}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/PhamBPPUNN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RostamiKK20, author = {Elham Rostami and Fredrik Karlsson and Ella Kolkowska}, title = {The hunt for computerized support in information security policy management}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {2}, pages = {215--259}, year = {2020}, url = {https://doi.org/10.1108/ICS-07-2019-0079}, doi = {10.1108/ICS-07-2019-0079}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RostamiKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SadokAB20, author = {Moufida Sadok and Steven Alter and Peter M. Bednar}, title = {It is not my job: exploring the disconnect between corporate security policies and actual security practices in SMEs}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {3}, pages = {467--483}, year = {2020}, url = {https://doi.org/10.1108/ICS-01-2019-0010}, doi = {10.1108/ICS-01-2019-0010}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SadokAB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SadokB20, author = {Moufida Sadok and Peter M. Bednar}, title = {Editorial}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {3}, pages = {397--398}, year = {2020}, url = {https://doi.org/10.1108/ICS-07-2020-148}, doi = {10.1108/ICS-07-2020-148}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/SadokB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SchinaglS20, author = {Stef Schinagl and Abbas Shahim}, title = {What do we know about information security governance?}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {2}, pages = {261--292}, year = {2020}, url = {https://doi.org/10.1108/ICS-02-2019-0033}, doi = {10.1108/ICS-02-2019-0033}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SchinaglS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ShahA20, author = {Pintu Shah and Anuja Agarwal}, title = {Cybersecurity behaviour of smartphone users in India: an empirical analysis}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {2}, pages = {293--318}, year = {2020}, url = {https://doi.org/10.1108/ICS-04-2019-0041}, doi = {10.1108/ICS-04-2019-0041}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ShahA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TsegayeF20, author = {Tamir Tsegaye and Stephen Flowerday}, title = {A Clark-Wilson and {ANSI} role-based access control model}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {3}, pages = {373--395}, year = {2020}, url = {https://doi.org/10.1108/ICS-08-2019-0100}, doi = {10.1108/ICS-08-2019-0100}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TsegayeF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TsohouMMCPPDRC20, author = {Aggeliki Tsohou and Emmanouil Magkos and Haralambos Mouratidis and George Chrysoloras and Luca Piras and Michalis Pavlidis and Julien Debussche and Marco Rotoloni and Beatriz Gallego{-}Nicasio Crespo}, title = {Privacy, security, legal and technology acceptance elicited and consolidated requirements for a {GDPR} compliance platform}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {4}, pages = {531--553}, year = {2020}, url = {https://doi.org/10.1108/ICS-01-2020-0002}, doi = {10.1108/ICS-01-2020-0002}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TsohouMMCPPDRC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/VeigaVLCF20, author = {Ad{\'{e}}le da Veiga and Ruthea Vorster and Fudong Li and Nathan L. Clarke and Steven M. Furnell}, title = {Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {3}, pages = {399--422}, year = {2020}, url = {https://doi.org/10.1108/ICS-11-2018-0135}, doi = {10.1108/ICS-11-2018-0135}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/VeigaVLCF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/VemouK20, author = {Konstantina Vemou and Maria Karyda}, title = {Evaluating privacy impact assessment methods: guidelines and best practice}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {1}, pages = {35--53}, year = {2020}, url = {https://doi.org/10.1108/ICS-04-2019-0047}, doi = {10.1108/ICS-04-2019-0047}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/VemouK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/VemouK20a, author = {Konstantina Vemou and Maria Karyda}, title = {Requirements for private communications over public spheres}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {1}, pages = {68--96}, year = {2020}, url = {https://doi.org/10.1108/ICS-01-2019-0002}, doi = {10.1108/ICS-01-2019-0002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/VemouK20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/WeidmanG20, author = {Jake Weidman and Jens Grossklags}, title = {Assessing the current state of information security policies in academic organizations}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {3}, pages = {423--444}, year = {2020}, url = {https://doi.org/10.1108/ICS-12-2018-0142}, doi = {10.1108/ICS-12-2018-0142}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/WeidmanG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/WiafeKWOY20, author = {Isaac Wiafe and Felix Nti Koranteng and Abigail Wiafe and Emmanuel Nyarko Obeng and Winfred Yaokumah}, title = {The role of norms in information security policy compliance}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {5}, pages = {743--761}, year = {2020}, url = {https://doi.org/10.1108/ICS-08-2019-0095}, doi = {10.1108/ICS-08-2019-0095}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/WiafeKWOY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ZainiMS20, author = {Muhamad Khairulnizam Zaini and Mohamad Noorman Masrek and Mad Khir Johari Abdullah Sani}, title = {The impact of information security management practices on organisational agility}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {5}, pages = {681--700}, year = {2020}, url = {https://doi.org/10.1108/ICS-02-2020-0020}, doi = {10.1108/ICS-02-2020-0020}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ZainiMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Zineddine20, author = {Mhamed Zineddine}, title = {A novel trust model for fog computing using fuzzy neural networks and weighted weakest link}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {5}, pages = {763--800}, year = {2020}, url = {https://doi.org/10.1108/ICS-04-2019-0046}, doi = {10.1108/ICS-04-2019-0046}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Zineddine20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AbdelhamidKS19, author = {Mohamed Abdelhamid and Victoria Kisekka and Spyridon Samonas}, title = {Mitigating e-services avoidance: the role of government cybersecurity preparedness}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {1}, pages = {26--46}, year = {2019}, url = {https://doi.org/10.1108/ICS-02-2018-0024}, doi = {10.1108/ICS-02-2018-0024}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AbdelhamidKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AbdullahQ19, author = {Lamya Abdullah and Juan Quintero}, title = {Sealed computation: a mechanism to support privacy-aware trustworthy cloud service}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {5}, year = {2019}, url = {https://doi.org/10.1108/ICS-11-2018-0133}, doi = {10.1108/ICS-11-2018-0133}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AbdullahQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AbidinNS19, author = {Mohd Aizuddin Zainal Abidin and Anuar Nawawi and Ahmad Saiful Azlin Puteh Salin}, title = {Customer data security and theft: a Malaysian organization's experience}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {1}, pages = {81--100}, year = {2019}, url = {https://doi.org/10.1108/ICS-04-2018-0043}, doi = {10.1108/ICS-04-2018-0043}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AbidinNS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AgrawalT19, author = {Vinayak Agrawal and Shashikala Tapaswi}, title = {Forensic analysis of Google Allo messenger on Android platform}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {1}, pages = {62--80}, year = {2019}, url = {https://doi.org/10.1108/ICS-03-2017-0011}, doi = {10.1108/ICS-03-2017-0011}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AgrawalT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AhmadOLN19, author = {Zauwiyah Ahmad and Thian Song Ong and Tze Hui Liew and Mariati Norhashim}, title = {Security monitoring and information security assurance behaviour among employees}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {2}, pages = {165--188}, year = {2019}, url = {https://doi.org/10.1108/ICS-10-2017-0073}, doi = {10.1108/ICS-10-2017-0073}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AhmadOLN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AlotaibiFC19, author = {Mutlaq Jalimid Alotaibi and Steven Furnell and Nathan L. Clarke}, title = {A framework for reporting and dealing with end-user security policy compliance}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {1}, pages = {2--25}, year = {2019}, url = {https://doi.org/10.1108/ICS-12-2017-0097}, doi = {10.1108/ICS-12-2017-0097}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/AlotaibiFC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AlsuhibanyAAA19, author = {Suliman A. Alsuhibany and Muna Almushyti and Noorah Alghasham and Fatimah Alkhudhayr}, title = {The impact of using different keyboards on free-text keystroke dynamics authentication for Arabic language}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {2}, pages = {221--232}, year = {2019}, url = {https://doi.org/10.1108/ICS-09-2017-0062}, doi = {10.1108/ICS-09-2017-0062}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AlsuhibanyAAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ArchibaldR19, author = {Jacqueline M. Archibald and Karen Renaud}, title = {Refining the PoinTER "human firewall" pentesting framework}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {4}, year = {2019}, url = {https://doi.org/10.1108/ICS-01-2019-0019}, doi = {10.1108/ICS-01-2019-0019}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ArchibaldR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AurigemmaM19, author = {Salvatore Aurigemma and Thomas Mattson}, title = {Effect of long-term orientation on voluntary security actions}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {1}, pages = {122--142}, year = {2019}, url = {https://doi.org/10.1108/ICS-07-2018-0086}, doi = {10.1108/ICS-07-2018-0086}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AurigemmaM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BadaN19, author = {Maria Bada and Jason R. C. Nurse}, title = {Developing cybersecurity education and awareness programmes for small- and medium-sized enterprises (SMEs)}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {3}, pages = {393--410}, year = {2019}, url = {https://doi.org/10.1108/ICS-07-2018-0080}, doi = {10.1108/ICS-07-2018-0080}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BadaN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BergstromLE19, author = {Erik Bergstr{\"{o}}m and Martin Lundgren and {\AA}sa Ericson}, title = {Revisiting information security risk management challenges: a practice perspective}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {3}, pages = {358--372}, year = {2019}, url = {https://doi.org/10.1108/ICS-09-2018-0106}, doi = {10.1108/ICS-09-2018-0106}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BergstromLE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/CarltonLR19, author = {Melissa Carlton and Yair Levy and Michelle M. Ramim}, title = {Mitigating cyber attacks through the measurement of non-IT professionals' cybersecurity skills}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {1}, pages = {101--121}, year = {2019}, url = {https://doi.org/10.1108/ICS-11-2016-0088}, doi = {10.1108/ICS-11-2016-0088}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/CarltonLR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/CossD19, author = {David Lewis Coss and Gurpreet Dhillon}, title = {Cloud privacy objectives a value based approach}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {2}, pages = {189--220}, year = {2019}, url = {https://doi.org/10.1108/ICS-05-2017-0034}, doi = {10.1108/ICS-05-2017-0034}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/CossD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DedekeM19, author = {Adenekan Dedeke and Katherine Masterson}, title = {Contrasting cybersecurity implementation frameworks {(CIF)} from three countries}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {3}, pages = {373--392}, year = {2019}, url = {https://doi.org/10.1108/ICS-10-2018-0122}, doi = {10.1108/ICS-10-2018-0122}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DedekeM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DiamantopoulouM19, author = {Vasiliki Diamantopoulou and Haralambos Mouratidis}, title = {Practical evaluation of a reference architecture for the management of privacy level agreements}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {5}, year = {2019}, url = {https://doi.org/10.1108/ICS-04-2019-0052}, doi = {10.1108/ICS-04-2019-0052}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DiamantopoulouM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/EvansHYJ19, author = {Mark Glenn Evans and Ying He and Iryna Yevseyeva and Helge Janicke}, title = {Published incidents and their proportions of human error}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {3}, pages = {343--357}, year = {2019}, url = {https://doi.org/10.1108/ICS-12-2018-0147}, doi = {10.1108/ICS-12-2018-0147}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/EvansHYJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FramnerFLAP19, author = {Erik Framner and Simone Fischer{-}H{\"{u}}bner and Thomas Lor{\"{u}}nser and Ala Sarah Alaqra and John S{\"{o}}ren Pettersson}, title = {Making secret sharing based cloud storage usable}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {5}, year = {2019}, url = {https://doi.org/10.1108/ICS-01-2019-0016}, doi = {10.1108/ICS-01-2019-0016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FramnerFLAP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KavrestadEN19, author = {Joakim K{\"{a}}vrestad and Fredrik Eriksson and Marcus Nohlberg}, title = {Understanding passwords - a taxonomy of password creation strategies}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {3}, pages = {453--467}, year = {2019}, url = {https://doi.org/10.1108/ICS-06-2018-0077}, doi = {10.1108/ICS-06-2018-0077}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KavrestadEN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KumahYO19, author = {Peace Kumah and Winfred Yaokumah and Eric Saviour Aryee Okai}, title = {A conceptual model and empirical assessment of {HR} security risk management}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {3}, pages = {411--433}, year = {2019}, url = {https://doi.org/10.1108/ICS-05-2018-0057}, doi = {10.1108/ICS-05-2018-0057}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KumahYO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LanktonSG19, author = {Nancy K. Lankton and Charles T. Stivason and Anil Gurung}, title = {Information protection behaviors: morality and organizational criticality}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {3}, pages = {468--488}, year = {2019}, url = {https://doi.org/10.1108/ICS-07-2018-0092}, doi = {10.1108/ICS-07-2018-0092}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LanktonSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LavranouT19, author = {Rena Lavranou and Aggeliki Tsohou}, title = {Developing and validating a common body of knowledge for information privacy}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {5}, year = {2019}, url = {https://doi.org/10.1108/ICS-08-2018-0099}, doi = {10.1108/ICS-08-2018-0099}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LavranouT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MalatjiSM19, author = {Masike Malatji and Sun{\'{e}} von Solms and Annliz{\'{e}} Marnewick}, title = {Socio-technical systems cybersecurity framework}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {2}, pages = {233--272}, year = {2019}, url = {https://doi.org/10.1108/ICS-03-2018-0031}, doi = {10.1108/ICS-03-2018-0031}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MalatjiSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MelandBFLS19, author = {Per H{\aa}kon Meland and Karin Bernsmed and Christian Fr{\o}ystad and Jingyue Li and Guttorm Sindre}, title = {An experimental evaluation of bow-tie analysis for security}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {4}, year = {2019}, url = {https://doi.org/10.1108/ICS-11-2018-0132}, doi = {10.1108/ICS-11-2018-0132}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MelandBFLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MirK19, author = {Abdul Wahid Mir and Ramachandran Ramkumar Ketti}, title = {Security gaps assessment of smart grid based {SCADA} systems}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {3}, pages = {434--452}, year = {2019}, url = {https://doi.org/10.1108/ICS-12-2018-0146}, doi = {10.1108/ICS-12-2018-0146}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MirK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MmangaFMWKM19, author = {Andrew M'manga and Shamal Faily and John McAlaney and Chris Williams and Youki Kadobayashi and Daisuke Miyamoto}, title = {A normative decision-making model for cyber security}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {5}, year = {2019}, url = {https://doi.org/10.1108/ICS-01-2019-0021}, doi = {10.1108/ICS-01-2019-0021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MmangaFMWKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Mutchler19, author = {Leigh A. Mutchler}, title = {Response awareness and instructional self-efficacy: influences on intent}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {4}, year = {2019}, url = {https://doi.org/10.1108/ICS-05-2018-0061}, doi = {10.1108/ICS-05-2018-0061}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Mutchler19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/NelD19, author = {Frans Nel and Lynette Drevin}, title = {Key elements of an information security culture in organisations}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {2}, pages = {146--164}, year = {2019}, url = {https://doi.org/10.1108/ICS-12-2016-0095}, doi = {10.1108/ICS-12-2016-0095}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/NelD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/OsliakSM19, author = {Oleksii Osliak and Andrea Saracino and Fabio Martinelli}, title = {A scheme for the sticky policy representation supporting secure cyber-threat intelligence analysis and sharing}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {5}, year = {2019}, url = {https://doi.org/10.1108/ICS-01-2019-0011}, doi = {10.1108/ICS-01-2019-0011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/OsliakSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/QassimJDPJ19, author = {Qais Saif Qassim and Norziana Jamil and Maslina Daud and Ahmed Patel and Norhamadi Ja'affar}, title = {A review of security assessment methodologies in industrial control systems}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {1}, pages = {47--61}, year = {2019}, url = {https://doi.org/10.1108/ICS-04-2018-0048}, doi = {10.1108/ICS-04-2018-0048}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/QassimJDPJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SerketzisKIBP19, author = {Nikolaos Serketzis and Vasilios Katos and Christos Ilioudis and Dimitrios A. Baltatzis and George J. Pangalos}, title = {Actionable threat intelligence for digital forensics readiness}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {2}, pages = {273--291}, year = {2019}, url = {https://doi.org/10.1108/ICS-09-2018-0110}, doi = {10.1108/ICS-09-2018-0110}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SerketzisKIBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TondelJCW19, author = {Inger Anne T{\o}ndel and Martin Gilje Jaatun and Daniela Soares Cruzes and Laurie A. Williams}, title = {Collaborative security risk estimation in agile software development}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {4}, year = {2019}, url = {https://doi.org/10.1108/ICS-12-2018-0138}, doi = {10.1108/ICS-12-2018-0138}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/TondelJCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TopaK19, author = {Ioanna Topa and Maria Karyda}, title = {From theory to practice: guidelines for enhancing information security management}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {3}, pages = {326--342}, year = {2019}, url = {https://doi.org/10.1108/ICS-09-2018-0108}, doi = {10.1108/ICS-09-2018-0108}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TopaK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/WaltE19, author = {Est{\'{e}}e van der Walt and Jan H. P. Eloff}, title = {Identity deception detection: requirements and a model}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {4}, year = {2019}, url = {https://doi.org/10.1108/ICS-01-2019-0017}, doi = {10.1108/ICS-01-2019-0017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/WaltE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/YousufM19, author = {Omerah Yousuf and Roohie Naaz Mir}, title = {A survey on the Internet of Things security}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {2}, pages = {292--323}, year = {2019}, url = {https://doi.org/10.1108/ICS-07-2018-0084}, doi = {10.1108/ICS-07-2018-0084}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/YousufM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ZimmermannGMKPS19, author = {Verena Zimmermann and Nina Gerber and Peter Mayer and Marius Kleboth and Alexandra von Preuschen and Konstantin Schmidt}, title = {Keep on rating - on the systematic rating and comparison of authentication schemes}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {5}, year = {2019}, url = {https://doi.org/10.1108/ICS-01-2019-0020}, doi = {10.1108/ICS-01-2019-0020}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ZimmermannGMKPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AlohaliCLF18, author = {Manal Alohali and Nathan L. Clarke and Fudong Li and Steven Furnell}, title = {Identifying and predicting the factors affecting end-users' risk-taking behavior}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {3}, pages = {306--326}, year = {2018}, url = {https://doi.org/10.1108/ICS-03-2018-0037}, doi = {10.1108/ICS-03-2018-0037}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AlohaliCLF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AlshammariS18, author = {Majed Alshammari and Andrew Simpson}, title = {A model-based approach to support privacy compliance}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {4}, pages = {437--453}, year = {2018}, url = {https://doi.org/10.1108/ICS-11-2017-0084}, doi = {10.1108/ICS-11-2017-0084}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AlshammariS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AlshareLL18, author = {Khaled A. Alshare and Peggy Lane and Michael R. Lane}, title = {Information security policy compliance: a higher education case study}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {1}, pages = {91--108}, year = {2018}, url = {https://doi.org/10.1108/ICS-09-2016-0073}, doi = {10.1108/ICS-09-2016-0073}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/AlshareLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Alzamil18, author = {Zakarya A. Alzamil}, title = {Information security practice in Saudi Arabia: case study on Saudi organizations}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {5}, pages = {568--583}, year = {2018}, url = {https://doi.org/10.1108/ICS-01-2018-0006}, doi = {10.1108/ICS-01-2018-0006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Alzamil18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AmankwaLK18, author = {Eric Amankwa and Marianne Loock and Elmarie Kritzinger}, title = {Establishing information security policy compliance culture in organizations}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {4}, pages = {420--436}, year = {2018}, url = {https://doi.org/10.1108/ICS-09-2017-0063}, doi = {10.1108/ICS-09-2017-0063}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/AmankwaLK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AnandMSMB18, author = {Rashmi Anand and Sanjay Medhavi and Vivek Soni and Charru Malhotra and D. K. Banwet}, title = {Transforming information security governance in India {(A} {SAP-LAP} based case study of security, {IT} policy and e-governance)}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {1}, pages = {58--90}, year = {2018}, url = {https://doi.org/10.1108/ICS-12-2016-0090}, doi = {10.1108/ICS-12-2016-0090}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AnandMSMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ArgyropoulosAMF18, author = {Nikolaos Argyropoulos and Konstantinos Angelopoulos and Haralambos Mouratidis and Andrew Fish}, title = {Risk-aware decision support with constrained goal models}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {4}, pages = {472--490}, year = {2018}, url = {https://doi.org/10.1108/ICS-01-2018-0010}, doi = {10.1108/ICS-01-2018-0010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ArgyropoulosAMF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ashenden18, author = {Debi Ashenden}, title = {In their own words: employee attitudes towards information security}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {3}, pages = {327--337}, year = {2018}, url = {https://doi.org/10.1108/ICS-04-2018-0042}, doi = {10.1108/ICS-04-2018-0042}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Ashenden18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BerndtssonJK18, author = {Joakim Berndtsson and Peter Johansson and Martin Karlsson}, title = {Value conflicts and non-compliance: Attitudes to whistleblowing in Swedish organisations}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {2}, pages = {246--258}, year = {2018}, url = {https://doi.org/10.1108/ICS-08-2017-0057}, doi = {10.1108/ICS-08-2017-0057}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BerndtssonJK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ButlerB18, author = {Rika Butler and Martin J. Butler}, title = {Assessing the information quality of phishing-related content on financial institutions' websites}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {5}, pages = {514--532}, year = {2018}, url = {https://doi.org/10.1108/ICS-09-2017-0067}, doi = {10.1108/ICS-09-2017-0067}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ButlerB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DiamantopoulouM18, author = {Vasiliki Diamantopoulou and Haralambos Mouratidis}, title = {Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {4}, pages = {382--400}, year = {2018}, url = {https://doi.org/10.1108/ICS-12-2017-0087}, doi = {10.1108/ICS-12-2017-0087}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DiamantopoulouM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ebot18, author = {Alain Claude Tambe Ebot}, title = {Using stage theorizing to make anti-phishing recommendations more effective}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {4}, pages = {401--419}, year = {2018}, url = {https://doi.org/10.1108/ICS-06-2017-0040}, doi = {10.1108/ICS-06-2017-0040}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/Ebot18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FenzN18, author = {Stefan Fenz and Thomas Neubauer}, title = {Ontology-based information security compliance determination and control selection on the example of {ISO} 27002}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {5}, pages = {551--567}, year = {2018}, url = {https://doi.org/10.1108/ICS-02-2018-0020}, doi = {10.1108/ICS-02-2018-0020}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FenzN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FoleyR18, author = {Simon N. Foley and Vivien M. Rooney}, title = {A grounded theory approach to security policy elicitation}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {4}, pages = {454--471}, year = {2018}, url = {https://doi.org/10.1108/ICS-12-2017-0086}, doi = {10.1108/ICS-12-2017-0086}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FoleyR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FurnellC18, author = {Steven Furnell and Nathan L. Clarke}, title = {Guest editorial}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {3}, pages = {262--263}, year = {2018}, url = {https://doi.org/10.1108/ICS-06-2018-0065}, doi = {10.1108/ICS-06-2018-0065}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FurnellC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JansenS18, author = {Jurjen Jansen and Paul van Schaik}, title = {Persuading end users to act cautiously online: a fear appeals study on phishing}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {3}, pages = {264--276}, year = {2018}, url = {https://doi.org/10.1108/ICS-03-2018-0038}, doi = {10.1108/ICS-03-2018-0038}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JansenS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KajtaziCBH18, author = {Miranda Kajtazi and Hasan Cavusoglu and Izak Benbasat and Darek M. Haftor}, title = {Escalation of commitment as an antecedent to noncompliance with information security policy}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {2}, pages = {171--193}, year = {2018}, url = {https://doi.org/10.1108/ICS-09-2017-0066}, doi = {10.1108/ICS-09-2017-0066}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KajtaziCBH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KarlssonDA18, author = {Martin Karlsson and Thomas Denk and Joachim {\AA}str{\"{o}}m}, title = {Perceptions of organizational culture and value conflicts in information security management}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {2}, pages = {213--229}, year = {2018}, url = {https://doi.org/10.1108/ICS-08-2017-0058}, doi = {10.1108/ICS-08-2017-0058}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KarlssonDA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KarlssonKT18, author = {Fredrik Karlsson and Ella Kolkowska and Marianne T{\"{o}}rner}, title = {Guest editorial}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {2}, pages = {146--149}, year = {2018}, url = {https://doi.org/10.1108/ICS-02-2018-0019}, doi = {10.1108/ICS-02-2018-0019}, timestamp = {Thu, 23 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KarlssonKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/McCormacCPBPL18, author = {Agata McCormac and Dragana Calic and Kathryn Parsons and Marcus A. Butavicius and Malcolm Robert Pattinson and Meredith Lillie}, title = {The effect of resilience and job stress on information security awareness}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {3}, pages = {277--289}, year = {2018}, url = {https://doi.org/10.1108/ICS-03-2018-0032}, doi = {10.1108/ICS-03-2018-0032}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/McCormacCPBPL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MicallefA18, author = {Nicholas Micallef and Nalin Asanka Gamagedara Arachchilage}, title = {Security questions education: exploring gamified features and functionalities}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {3}, pages = {365--378}, year = {2018}, url = {https://doi.org/10.1108/ICS-03-2018-0033}, doi = {10.1108/ICS-03-2018-0033}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MicallefA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Miloslavskaya18, author = {Natalia G. Miloslavskaya}, title = {Designing blockchain-based {SIEM} 3.0 system}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {4}, pages = {491--512}, year = {2018}, url = {https://doi.org/10.1108/ICS-10-2017-0075}, doi = {10.1108/ICS-10-2017-0075}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Miloslavskaya18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/NawawiS18, author = {Anuar Nawawi and Ahmad Saiful Azlin Puteh Salin}, title = {Employee fraud and misconduct: empirical evidence from a telecommunication company}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {1}, pages = {129--144}, year = {2018}, url = {https://doi.org/10.1108/ICS-07-2017-0046}, doi = {10.1108/ICS-07-2017-0046}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/NawawiS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Nicho18, author = {Mathew Nicho}, title = {A process model for implementing information systems security governance}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {1}, pages = {10--38}, year = {2018}, url = {https://doi.org/10.1108/ICS-07-2016-0061}, doi = {10.1108/ICS-07-2016-0061}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Nicho18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SmithDH18, author = {Kane Smith and Gurpreet Dhillon and Karin Hedstr{\"{o}}m}, title = {Reconciling value-based objectives for security and identity management}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {2}, pages = {194--212}, year = {2018}, url = {https://doi.org/10.1108/ICS-08-2017-0059}, doi = {10.1108/ICS-08-2017-0059}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SmithDH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SnymanKK18, author = {Dirk Snyman and Hennie A. Kruger and Wayne D. Kearney}, title = {I shall, we shall, and all others will: paradoxical information security behaviour}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {3}, pages = {290--305}, year = {2018}, url = {https://doi.org/10.1108/ICS-03-2018-0034}, doi = {10.1108/ICS-03-2018-0034}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SnymanKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SolmsS18, author = {Basie von Solms and Rossouw von Solms}, title = {Cybersecurity and information security - what goes where?}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {1}, pages = {2--9}, year = {2018}, url = {https://doi.org/10.1108/ICS-04-2017-0025}, doi = {10.1108/ICS-04-2017-0025}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SolmsS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Sommestad18, author = {Teodor Sommestad}, title = {Work-related groups and information security policy compliance}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {5}, pages = {533--550}, year = {2018}, url = {https://doi.org/10.1108/ICS-08-2017-0054}, doi = {10.1108/ICS-08-2017-0054}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/Sommestad18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SonowalK18, author = {Gunikhan Sonowal and K. S. Kuppusamy}, title = {MMSPhiD: a phoneme based phishing verification model for persons with visual impairments}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {5}, pages = {613--636}, year = {2018}, url = {https://doi.org/10.1108/ICS-12-2017-0091}, doi = {10.1108/ICS-12-2017-0091}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SonowalK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Stewart18, author = {Andrew Stewart}, title = {A utilitarian re-examination of enterprise-scale information security management}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {1}, pages = {39--57}, year = {2018}, url = {https://doi.org/10.1108/ICS-03-2017-0012}, doi = {10.1108/ICS-03-2017-0012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Stewart18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/StewartJ18, author = {Harrison Stewart and Jan J{\"{u}}rjens}, title = {Data security and consumer trust in FinTech innovation in Germany}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {1}, pages = {109--128}, year = {2018}, url = {https://doi.org/10.1108/ICS-06-2017-0039}, doi = {10.1108/ICS-06-2017-0039}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/StewartJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TuYAC18, author = {Zhiling Tu and Yufei Yuan and Norm Archer and Catherine E. Connelly}, title = {Strategic value alignment for information security management: a critical success factor analysis}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {2}, pages = {150--170}, year = {2018}, url = {https://doi.org/10.1108/ICS-06-2017-0042}, doi = {10.1108/ICS-06-2017-0042}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TuYAC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Tweneboah-Koduah18, author = {Samuel Tweneboah{-}Koduah and Francis Atsu and William J. Buchanan}, title = {Impact of cyberattacks on stock performance: a comparative study}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {5}, pages = {637--652}, year = {2018}, url = {https://doi.org/10.1108/ICS-05-2018-0060}, doi = {10.1108/ICS-05-2018-0060}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/Tweneboah-Koduah18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Veiga18, author = {Ad{\'{e}}le da Veiga}, title = {An information privacy culture instrument to measure consumer privacy expectations and confidence}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {3}, pages = {338--364}, year = {2018}, url = {https://doi.org/10.1108/ICS-03-2018-0036}, doi = {10.1108/ICS-03-2018-0036}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Veiga18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Veiga18a, author = {Ad{\'{e}}le da Veiga}, title = {An approach to information security culture change combining {ADKAR} and the {ISCA} questionnaire to aid transition to the desired culture}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {5}, pages = {584--612}, year = {2018}, url = {https://doi.org/10.1108/ICS-08-2017-0056}, doi = {10.1108/ICS-08-2017-0056}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Veiga18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/YaylaL18, author = {Ali Alper Yayla and Yu Lei}, title = {Information security policies and value conflict in multinational companies}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {2}, pages = {230--245}, year = {2018}, url = {https://doi.org/10.1108/ICS-08-2017-0061}, doi = {10.1108/ICS-08-2017-0061}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/YaylaL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AddaeBSTR17, author = {Joyce Hoese Addae and Michael A. Brown and Xu Sun and Dave Towey and Milena Radenkovic}, title = {Measuring attitude towards personal data for adaptive cybersecurity}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {5}, pages = {560--579}, year = {2017}, url = {https://doi.org/10.1108/ICS-11-2016-0085}, doi = {10.1108/ICS-11-2016-0085}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AddaeBSTR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AldiniSLTG17, author = {Alessandro Aldini and Jean{-}Marc Seigneur and Carlos Ballester Lafuente and Xavier Titi and Jonathan Guislain}, title = {Design and validation of a trust-based opportunity-enabled risk management system}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {1}, pages = {2--25}, year = {2017}, url = {https://doi.org/10.1108/ICS-05-2016-0037}, doi = {10.1108/ICS-05-2016-0037}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AldiniSLTG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AurigemmaM17, author = {Salvatore Aurigemma and Thomas Mattson}, title = {Deterrence and punishment experience impacts on {ISP} compliance attitudes}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {4}, pages = {421--436}, year = {2017}, url = {https://doi.org/10.1108/ICS-11-2016-0089}, doi = {10.1108/ICS-11-2016-0089}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AurigemmaM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BelloMA17, author = {Abubakar Garba Bello and David Murray and Jocelyn Armarego}, title = {A systematic approach to investigating how information security and privacy can be achieved in {BYOD} environments}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {4}, pages = {475--492}, year = {2017}, url = {https://doi.org/10.1108/ICS-03-2016-0025}, doi = {10.1108/ICS-03-2016-0025}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BelloMA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BulleeMJH17, author = {Jan{-}Willem Bullee and Lorena Montoya and Marianne Junger and Pieter H. Hartel}, title = {Spear phishing in organisations explained}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {5}, pages = {593--613}, year = {2017}, url = {https://doi.org/10.1108/ICS-03-2017-0009}, doi = {10.1108/ICS-03-2017-0009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BulleeMJH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChenL17, author = {Hao Chen and Wenli Li}, title = {Mobile device users' privacy security assurance behavior: {A} technology threat avoidance perspective}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {3}, pages = {330--344}, year = {2017}, url = {https://doi.org/10.1108/ICS-04-2016-0027}, doi = {10.1108/ICS-04-2016-0027}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChenL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Chulkov17, author = {Dmitriy V. Chulkov}, title = {Escalation of commitment and information security: theories and implications}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {5}, pages = {580--592}, year = {2017}, url = {https://doi.org/10.1108/ICS-02-2016-0015}, doi = {10.1108/ICS-02-2016-0015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Chulkov17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ConnollyLGT17, author = {Lena Yuryna Connolly and Michael Lang and John Gathegi and J. Doug Tygar}, title = {Organisational culture, procedural countermeasures, and employee security behaviour: {A} qualitative study}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {2}, pages = {118--136}, year = {2017}, url = {https://doi.org/10.1108/ICS-03-2017-0013}, doi = {10.1108/ICS-03-2017-0013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ConnollyLGT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/CopeSCMJ17, author = {Jacqueline Cope and Fran{\c{c}}ois Siewe and Feng Chen and Leandros A. Maglaras and Helge Janicke}, title = {On data leakage from non-production systems}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {4}, pages = {454--474}, year = {2017}, url = {https://doi.org/10.1108/ICS-02-2017-0004}, doi = {10.1108/ICS-02-2017-0004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/CopeSCMJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DamenuB17, author = {Temesgen Kitaw Damenu and Chris Beaumont}, title = {Analysing information security in a bank using soft systems methodology}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {3}, pages = {240--258}, year = {2017}, url = {https://doi.org/10.1108/ICS-07-2016-0053}, doi = {10.1108/ICS-07-2016-0053}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DamenuB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GcazaSGV17, author = {Noluxolo Gcaza and Rossouw von Solms and Marthie Grobler and Joey Jansen van Vuuren}, title = {A general morphological analysis: delineating a cyber-security culture}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {3}, pages = {259--278}, year = {2017}, url = {https://doi.org/10.1108/ICS-12-2015-0046}, doi = {10.1108/ICS-12-2015-0046}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GcazaSGV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GreeneC17, author = {Kristen K. Greene and Yee{-}Yin Choong}, title = {Must I, can I? {I} don't understand your ambiguous password rules}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {1}, pages = {80--99}, year = {2017}, url = {https://doi.org/10.1108/ICS-06-2016-0043}, doi = {10.1108/ICS-06-2016-0043}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GreeneC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HolmS17, author = {Hannes Holm and Teodor Sommestad}, title = {So long, and thanks for only using readily available scripts}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {1}, pages = {47--61}, year = {2017}, url = {https://doi.org/10.1108/ICS-08-2016-0069}, doi = {10.1108/ICS-08-2016-0069}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HolmS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JansenS17, author = {Jurjen Jansen and Paul van Schaik}, title = {Comparing three models to explain precautionary online behavioural intentions}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {2}, pages = {165--180}, year = {2017}, url = {https://doi.org/10.1108/ICS-03-2017-0018}, doi = {10.1108/ICS-03-2017-0018}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JansenS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KajiyamaJA17, author = {Takahiko Kajiyama and Murray E. Jennex and Theophilus B. A. Addo}, title = {To cloud or not to cloud: how risks and threats are affecting cloud adoption decisions}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {5}, pages = {634--659}, year = {2017}, url = {https://doi.org/10.1108/ICS-07-2016-0051}, doi = {10.1108/ICS-07-2016-0051}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KajiyamaJA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Kalloniatis17, author = {Christos Kalloniatis}, title = {Incorporating privacy in the design of cloud-based systems: a conceptual meta-model}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {5}, pages = {614--633}, year = {2017}, url = {https://doi.org/10.1108/ICS-06-2016-0044}, doi = {10.1108/ICS-06-2016-0044}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Kalloniatis17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Karanja17, author = {Erastus Karanja}, title = {The role of the chief information security officer in the management of {IT} security}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {3}, pages = {300--329}, year = {2017}, url = {https://doi.org/10.1108/ICS-02-2016-0013}, doi = {10.1108/ICS-02-2016-0013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Karanja17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KarlssonKA17, author = {Fredrik Karlsson and Martin Karlsson and Joachim {\AA}str{\"{o}}m}, title = {Measuring employees' compliance - the importance of value pluralism}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {3}, pages = {279--299}, year = {2017}, url = {https://doi.org/10.1108/ICS-11-2016-0084}, doi = {10.1108/ICS-11-2016-0084}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KarlssonKA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KaukolaRTHL17, author = {Jesse Kaukola and Jukka Ruohonen and Antti Tuomisto and Sami Hyrynsalmi and Ville Lepp{\"{a}}nen}, title = {Tightroping between {APT} and {BCI} in small enterprises}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {3}, pages = {226--239}, year = {2017}, url = {https://doi.org/10.1108/ICS-07-2016-0047}, doi = {10.1108/ICS-07-2016-0047}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KaukolaRTHL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KiayiasZZ17, author = {Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, title = {Auditing for privacy in threshold {PKE} e-voting}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {1}, pages = {100--116}, year = {2017}, url = {https://doi.org/10.1108/ICS-07-2016-0056}, doi = {10.1108/ICS-07-2016-0056}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/KiayiasZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MayerGMVV17, author = {Peter Mayer and Nina Gerber and Ronja McDermott and Melanie Volkamer and Joachim Vogt}, title = {Productivity vs security: mitigating conflicting goals in organizations}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {2}, pages = {137--151}, year = {2017}, url = {https://doi.org/10.1108/ICS-03-2017-0014}, doi = {10.1108/ICS-03-2017-0014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MayerGMVV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Munteanu17, author = {Adrian Munteanu}, title = {Running the risk {IT} - more perception and less probabilities in uncertain systems}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {3}, pages = {345--354}, year = {2017}, url = {https://doi.org/10.1108/ICS-07-2016-0055}, doi = {10.1108/ICS-07-2016-0055}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Munteanu17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PattersonHZ17, author = {Nicholas Charles Patterson and Michael Hobbs and Tianqing Zhu}, title = {A cyber-threat analytic model for autonomous detection of virtual property theft}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {4}, pages = {358--381}, year = {2017}, url = {https://doi.org/10.1108/ICS-11-2016-0087}, doi = {10.1108/ICS-11-2016-0087}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PattersonHZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PattinsonBPMC17, author = {Malcolm Robert Pattinson and Marcus A. Butavicius and Kathryn Parsons and Agata McCormac and Dragana Calic}, title = {Managing information security awareness at an Australian bank: a comparative study}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {2}, pages = {181--189}, year = {2017}, url = {https://doi.org/10.1108/ICS-03-2017-0017}, doi = {10.1108/ICS-03-2017-0017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PattinsonBPMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PolatidisGPS17, author = {Nikolaos Polatidis and Christos K. Georgiadis and Elias Pimenidis and Emmanouil Stiakakis}, title = {Privacy-preserving recommendations in context-aware mobile environments}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {1}, pages = {62--79}, year = {2017}, url = {https://doi.org/10.1108/ICS-04-2016-0028}, doi = {10.1108/ICS-04-2016-0028}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PolatidisGPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RajivanMKC17, author = {Prashanth Rajivan and Pablo Moriano and Timothy Kelley and L. Jean Camp}, title = {Factors in an end user security expertise instrument}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {2}, pages = {190--205}, year = {2017}, url = {https://doi.org/10.1108/ICS-04-2017-0020}, doi = {10.1108/ICS-04-2017-0020}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RajivanMKC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RayK17, author = {Argha Ray and Anjali Kaushik}, title = {State transgression on electronic expression: is it for real?}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {4}, pages = {382--401}, year = {2017}, url = {https://doi.org/10.1108/ICS-03-2016-0024}, doi = {10.1108/ICS-03-2016-0024}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RayK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SchaabBP17, author = {Peter Schaab and Kristian Beckers and Sebastian Pape}, title = {Social engineering defence mechanisms and counteracting training strategies}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {2}, pages = {206--222}, year = {2017}, url = {https://doi.org/10.1108/ICS-04-2017-0022}, doi = {10.1108/ICS-04-2017-0022}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SchaabBP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SnymanK17, author = {Dirk Snyman and Hennie A. Kruger}, title = {The application of behavioural thresholds to analyse collective behaviour in information security}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {2}, pages = {152--164}, year = {2017}, url = {https://doi.org/10.1108/ICS-03-2017-0015}, doi = {10.1108/ICS-03-2017-0015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SnymanK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SolmsW17, author = {Rossouw von Solms and Melanie Willett}, title = {Cloud computing assurance - a review of literature guidance}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {1}, pages = {26--46}, year = {2017}, url = {https://doi.org/10.1108/ICS-09-2015-0037}, doi = {10.1108/ICS-09-2015-0037}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SolmsW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/StewartJ17, author = {Harrison Stewart and Jan J{\"{u}}rjens}, title = {Information security management and the human aspect in organizations}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {5}, pages = {494--534}, year = {2017}, url = {https://doi.org/10.1108/ICS-07-2016-0054}, doi = {10.1108/ICS-07-2016-0054}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/StewartJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/StillCS17, author = {Jeremiah D. Still and Ashley A. Cain and David Schuster}, title = {Human-centered authentication guidelines}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {4}, pages = {437--453}, year = {2017}, url = {https://doi.org/10.1108/ICS-04-2016-0034}, doi = {10.1108/ICS-04-2016-0034}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/StillCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Taherdoost17, author = {Hamed Taherdoost}, title = {Understanding of e-service security dimensions and its effect on quality and intention to use}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {5}, pages = {535--559}, year = {2017}, url = {https://doi.org/10.1108/ICS-09-2016-0074}, doi = {10.1108/ICS-09-2016-0074}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Taherdoost17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Woltjer17, author = {Rogier Woltjer}, title = {Workarounds and trade-offs in information security - an exploratory study}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {4}, pages = {402--420}, year = {2017}, url = {https://doi.org/10.1108/ICS-02-2016-0017}, doi = {10.1108/ICS-02-2016-0017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Woltjer17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AbdelazizNG16, author = {Abdelaziz Amara Korba and Mehdi Nafaa and Salim Ghanemi}, title = {An efficient intrusion detection and prevention framework for ad hoc networks}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {4}, pages = {298--325}, year = {2016}, url = {https://doi.org/10.1108/ICS-08-2015-0034}, doi = {10.1108/ICS-08-2015-0034}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AbdelazizNG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Al-AmeenHW16, author = {Mahdi Nasrullah Al{-}Ameen and S. M. Taiabul Haque and Matthew K. Wright}, title = {Leveraging autobiographical memory for two-factor online authentication}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {4}, pages = {386--399}, year = {2016}, url = {https://doi.org/10.1108/ICS-01-2016-0005}, doi = {10.1108/ICS-01-2016-0005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Al-AmeenHW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AlaviIM16, author = {Reza Alavi and Shareeful Islam and Haralambos Mouratidis}, title = {An information security risk-driven investment model for analysing human factors}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {2}, pages = {205--227}, year = {2016}, url = {https://doi.org/10.1108/ICS-01-2016-0006}, doi = {10.1108/ICS-01-2016-0006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AlaviIM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AndriotisOMT16, author = {Panagiotis Andriotis and George C. Oikonomou and Alexios Mylonas and Theo Tryfonas}, title = {A study on usability and security features of the Android pattern lock screen}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {1}, pages = {53--72}, year = {2016}, url = {https://doi.org/10.1108/ICS-01-2015-0001}, doi = {10.1108/ICS-01-2015-0001}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/AndriotisOMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DasK16, author = {Amit Das and Habib Ullah Khan}, title = {Security behaviors of smartphone users}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {1}, pages = {116--134}, year = {2016}, url = {https://doi.org/10.1108/ICS-04-2015-0018}, doi = {10.1108/ICS-04-2015-0018}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DasK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/El-TemtamyMP16, author = {Osama El{-}Temtamy and Munir Majdalawieh and Lela Pumphrey}, title = {Assessing {IT} disaster recovery plans: The case of publicly listed firms on Abu Dhabi/UAE security exchange}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {5}, pages = {514--533}, year = {2016}, url = {https://doi.org/10.1108/ICS-04-2016-0030}, doi = {10.1108/ICS-04-2016-0030}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/El-TemtamyMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FenzPH16, author = {Stefan Fenz and Stefanie Plieschnegger and Heidi Hobel}, title = {Mapping information security standard {ISO} 27002 to an ontological structure}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {5}, pages = {452--473}, year = {2016}, url = {https://doi.org/10.1108/ICS-07-2015-0030}, doi = {10.1108/ICS-07-2015-0030}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FenzPH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FurnellC16, author = {Steven Furnell and Nathan Luke Clarke}, title = {Guest editorial}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {2}, pages = {138}, year = {2016}, url = {https://doi.org/10.1108/ICS-05-2016-0036}, doi = {10.1108/ICS-05-2016-0036}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/FurnellC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GurungR16, author = {Anil Gurung and M. K. Raja}, title = {Online privacy and security concerns of consumers}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {4}, pages = {348--371}, year = {2016}, url = {https://doi.org/10.1108/ICS-05-2015-0020}, doi = {10.1108/ICS-05-2015-0020}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GurungR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HarrisC16, author = {Mark A. Harris and Amita Goyal Chin}, title = {Consumer trust in Google's top developers' apps: an exploratory study}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {5}, pages = {474--495}, year = {2016}, url = {https://doi.org/10.1108/ICS-11-2015-0044}, doi = {10.1108/ICS-11-2015-0044}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HarrisC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HelkalaKJKL16, author = {Kirsi Helkala and Benjamin Knox and {\O}yvind J{\o}sok and Silje Knox and Mass Soldal Lund}, title = {Factors to affect improvement in cyber officer performance}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {2}, pages = {152--163}, year = {2016}, url = {https://doi.org/10.1108/ICS-01-2016-0001}, doi = {10.1108/ICS-01-2016-0001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HelkalaKJKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KarlssonKP16, author = {Fredrik Karlsson and Ella Kolkowska and Frans Prenkert}, title = {Inter-organisational information security: a systematic literature review}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {5}, pages = {418--451}, year = {2016}, url = {https://doi.org/10.1108/ICS-11-2016-091}, doi = {10.1108/ICS-11-2016-091}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KarlssonKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KearneyK16, author = {Wayne D. Kearney and Hennie A. Kruger}, title = {Theorising on risk homeostasis in the context of information security behaviour}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {5}, pages = {496--513}, year = {2016}, url = {https://doi.org/10.1108/ICS-04-2016-0029}, doi = {10.1108/ICS-04-2016-0029}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KearneyK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KelleyB16, author = {Timothy Kelley and Bennett I. Bertenthal}, title = {Attention and past behavior, not security knowledge, modulate users' decisions to login to insecure websites}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {2}, pages = {164--176}, year = {2016}, url = {https://doi.org/10.1108/ICS-01-2016-0002}, doi = {10.1108/ICS-01-2016-0002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KelleyB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Kennedy16, author = {Sarah Elizabeth Kennedy}, title = {The pathway to security - mitigating user negligence}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {3}, pages = {255--264}, year = {2016}, url = {https://doi.org/10.1108/ICS-10-2014-0065}, doi = {10.1108/ICS-10-2014-0065}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Kennedy16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LiM16, author = {Wenjuan Li and Weizhi Meng}, title = {Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {3}, pages = {265--276}, year = {2016}, url = {https://doi.org/10.1108/ICS-12-2014-0077}, doi = {10.1108/ICS-12-2014-0077}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LiM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LineA16, author = {Maria Bartnes Line and Eirik Albrechtsen}, title = {Examining the suitability of industrial safety management approaches for information security incident management}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {1}, pages = {20--37}, year = {2016}, url = {https://doi.org/10.1108/ICS-01-2015-0003}, doi = {10.1108/ICS-01-2015-0003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LineA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Meng16, author = {Weizhi Meng}, title = {Evaluating the effect of multi-touch behaviours on Android unlock patterns}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {3}, pages = {277--287}, year = {2016}, url = {https://doi.org/10.1108/ICS-12-2014-0078}, doi = {10.1108/ICS-12-2014-0078}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Meng16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MiragliaC16, author = {Armando Miraglia and Matteo Casenove}, title = {Fight fire with fire: the ultimate active defence}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {3}, pages = {288--296}, year = {2016}, url = {https://doi.org/10.1108/ICS-01-2015-0004}, doi = {10.1108/ICS-01-2015-0004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MiragliaC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PattinsonPBMC16, author = {Malcolm Robert Pattinson and Kathryn Parsons and Marcus A. Butavicius and Agata McCormac and Dragana Calic}, title = {Assessing information security attitudes: a comparison of two studies}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {2}, pages = {228--240}, year = {2016}, url = {https://doi.org/10.1108/ICS-01-2016-0009}, doi = {10.1108/ICS-01-2016-0009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PattinsonPBMC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PhamER16, author = {Cong Hiep Pham and Jamal El{-}Den and Joan Richardson}, title = {Stress-based security compliance model - an exploratory study}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {4}, pages = {326--347}, year = {2016}, url = {https://doi.org/10.1108/ICS-10-2014-0067}, doi = {10.1108/ICS-10-2014-0067}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/PhamER16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PipyrosMGA16, author = {Kosmas Pipyros and Lilian Mitrou and Dimitris Gritzalis and Theodoros K. Apostolopoulos}, title = {Cyberoperations and international humanitarian law: {A} review of obstacles in applying international law rules in cyber warfare}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {1}, pages = {38--52}, year = {2016}, url = {https://doi.org/10.1108/ICS-12-2014-0081}, doi = {10.1108/ICS-12-2014-0081}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PipyrosMGA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ReidN16, author = {Rayne Reid and Johan Van Niekerk}, title = {Decoding audience interpretations of awareness campaign messages}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {2}, pages = {177--193}, year = {2016}, url = {https://doi.org/10.1108/ICS-01-2016-0003}, doi = {10.1108/ICS-01-2016-0003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ReidN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RenaudFEV16, author = {Karen Renaud and Stephen Flowerday and Rosanne English and Melanie Volkamer}, title = {Why don't {UK} citizens protest against privacy-invading dragnet surveillance?}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {4}, pages = {400--415}, year = {2016}, url = {https://doi.org/10.1108/ICS-06-2015-0024}, doi = {10.1108/ICS-06-2015-0024}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RenaudFEV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RohnSL16, author = {Eli Rohn and Gilad Sabari and Guy Leshem}, title = {Explaining small business InfoSec posture using social theories}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {5}, pages = {534--556}, year = {2016}, url = {https://doi.org/10.1108/ICS-09-2015-0041}, doi = {10.1108/ICS-09-2015-0041}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RohnSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SchatzB16, author = {Daniel Schatz and Rabih Bashroush}, title = {The impact of repeated data breach events on organisations' market value}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {1}, pages = {73--92}, year = {2016}, url = {https://doi.org/10.1108/ICS-03-2014-0020}, doi = {10.1108/ICS-03-2014-0020}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/SchatzB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ShumilovP16, author = {Artem Shumilov and Andrey Philippovich}, title = {Gesture-based animated {CAPTCHA}}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {3}, pages = {242--254}, year = {2016}, url = {https://doi.org/10.1108/ICS-12-2014-0082}, doi = {10.1108/ICS-12-2014-0082}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ShumilovP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SommestadKNH16, author = {Teodor Sommestad and Henrik Karlz{\'{e}}n and Peter Nilsson and Jonas Hallberg}, title = {An empirical test of the perceived relationship between risk and the constituents severity and probability}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {2}, pages = {194--204}, year = {2016}, url = {https://doi.org/10.1108/ICS-01-2016-0004}, doi = {10.1108/ICS-01-2016-0004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SommestadKNH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TasidouESMK16, author = {Aimilia Tasidou and Pavlos S. Efraimidis and Yannis Soupionis and Lilian Mitrou and Vasilios Katos}, title = {Privacy-preserving, user-centric VoIP {CAPTCHA} challenges: An integrated solution in the {SIP} environment}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {1}, pages = {2--19}, year = {2016}, url = {https://doi.org/10.1108/ICS-07-2014-0046}, doi = {10.1108/ICS-07-2014-0046}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TasidouESMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Veiga16, author = {Ad{\'{e}}le da Veiga}, title = {Comparing the information security culture of employees who had read the information security policy and those who had not: Illustrated through an empirical study}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {2}, pages = {139--151}, year = {2016}, url = {https://doi.org/10.1108/ICS-12-2015-0048}, doi = {10.1108/ICS-12-2015-0048}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Veiga16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/VolkamerRG16, author = {Melanie Volkamer and Karen Renaud and Paul Gerber}, title = {Spot the phish by checking the pruned {URL}}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {4}, pages = {372--385}, year = {2016}, url = {https://doi.org/10.1108/ICS-07-2015-0032}, doi = {10.1108/ICS-07-2015-0032}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/VolkamerRG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/YuL16, author = {Xiaoying Yu and Qi Liao}, title = {User password repetitive patterns analysis and visualization}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {1}, pages = {93--115}, year = {2016}, url = {https://doi.org/10.1108/ICS-06-2015-0026}, doi = {10.1108/ICS-06-2015-0026}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/YuL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AdnanJBK15, author = {Muhammad Adnan and Mike Just and Lynne Baillie and Hilmi G{\"{u}}nes Kayacik}, title = {Investigating the work practices of network security professionals}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {3}, pages = {347--367}, year = {2015}, url = {https://doi.org/10.1108/ICS-07-2014-0049}, doi = {10.1108/ICS-07-2014-0049}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AdnanJBK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AhmimZ15, author = {Ahmed Ahmim and Nacira Ghoualmi{-}Zine}, title = {A new hierarchical intrusion detection system based on a binary tree of classifiers}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {1}, pages = {31--57}, year = {2015}, url = {https://doi.org/10.1108/ICS-04-2013-0031}, doi = {10.1108/ICS-04-2013-0031}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AhmimZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Al-MukahalA15, author = {Hasan M. Al{-}Mukahal and Khaled A. Alshare}, title = {An examination of factors that influence the number of information security policy violations in Qatari organizations}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {1}, pages = {102--118}, year = {2015}, url = {https://doi.org/10.1108/ICS-03-2014-0018}, doi = {10.1108/ICS-03-2014-0018}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Al-MukahalA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Alqahtani15, author = {Abdulrahman Alqahtani}, title = {Towards a framework for the potential cyber-terrorist threat to critical national infrastructure: {A} quantitative study}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {5}, pages = {532--569}, year = {2015}, url = {https://doi.org/10.1108/ICS-09-2014-0060}, doi = {10.1108/ICS-09-2014-0060}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Alqahtani15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BorumFKDF15, author = {Randy Borum and John Felker and Sean Kern and Kristen Dennesen and Tonya Feyes}, title = {Strategic cyber intelligence}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {3}, pages = {317--332}, year = {2015}, url = {https://doi.org/10.1108/ICS-09-2014-0064}, doi = {10.1108/ICS-09-2014-0064}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BorumFKDF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BrookeP15, author = {Phillip J. Brooke and Richard F. Paige}, title = {User-visible cryptography in email and web scenarios}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {1}, pages = {58--72}, year = {2015}, url = {https://doi.org/10.1108/ICS-07-2013-0054}, doi = {10.1108/ICS-07-2013-0054}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BrookeP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ButlerB15, author = {Martin J. Butler and Rika Butler}, title = {Investigating the possibility to use differentiated authentication based on risk profiling to secure online banking}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {4}, pages = {421--434}, year = {2015}, url = {https://doi.org/10.1108/ICS-11-2014-0074}, doi = {10.1108/ICS-11-2014-0074}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ButlerB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Faily15, author = {Shamal Faily}, title = {Engaging stakeholders during late stage security design with assumption personas}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {4}, pages = {435--446}, year = {2015}, url = {https://doi.org/10.1108/ICS-10-2014-0066}, doi = {10.1108/ICS-10-2014-0066}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Faily15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FerryOC15, author = {Eugene Ferry and John O'Raw and Kevin Curran}, title = {Security evaluation of the OAuth 2.0 framework}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {1}, pages = {73--101}, year = {2015}, url = {https://doi.org/10.1108/ICS-12-2013-0089}, doi = {10.1108/ICS-12-2013-0089}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FerryOC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FloresHNE15, author = {Waldo Rocha Flores and Hannes Holm and Marcus Nohlberg and Mathias Ekstedt}, title = {Investigating personal determinants of phishing and the effect of national culture}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {2}, pages = {178--199}, year = {2015}, url = {https://doi.org/10.1108/ICS-05-2014-0029}, doi = {10.1108/ICS-05-2014-0029}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FloresHNE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ForgetCB15, author = {Alain Forget and Sonia Chiasson and Robert Biddle}, title = {User-centred authentication feature framework}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {5}, pages = {497--515}, year = {2015}, url = {https://doi.org/10.1108/ICS-08-2014-0058}, doi = {10.1108/ICS-08-2014-0058}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ForgetCB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Furnell15, author = {Steven Furnell}, title = {Editorial}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {1}, year = {2015}, url = {https://doi.org/10.1108/ICS-01-2015-0002}, doi = {10.1108/ICS-01-2015-0002}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/Furnell15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HoHY15, author = {Li{-}Hsing Ho and Ming{-}Tsai Hsu and Tieh{-}Min Yen}, title = {Identifying core control items of information security management and improvement strategies by applying fuzzy {DEMATEL}}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {2}, pages = {161--177}, year = {2015}, url = {https://doi.org/10.1108/ICS-04-2014-0026}, doi = {10.1108/ICS-04-2014-0026}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HoHY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Hughes-Roberts15, author = {Thomas Hughes{-}Roberts}, title = {Privacy as a secondary goal problem: an experiment examining control}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {4}, pages = {382--393}, year = {2015}, url = {https://doi.org/10.1108/ICS-10-2014-0068}, doi = {10.1108/ICS-10-2014-0068}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Hughes-Roberts15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KarlssonAK15, author = {Fredrik Karlsson and Joachim {\AA}str{\"{o}}m and Martin Karlsson}, title = {Information security culture - state-of-the-art review between 2000 and 2013}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {3}, pages = {246--285}, year = {2015}, url = {https://doi.org/10.1108/ICS-05-2014-0033}, doi = {10.1108/ICS-05-2014-0033}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KarlssonAK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LotterF15, author = {Andr{\'{e}} L{\"{o}}tter and Lynn Futcher}, title = {A framework to assist email users in the identification of phishing attacks}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {4}, pages = {370--381}, year = {2015}, url = {https://doi.org/10.1108/ICS-10-2014-0070}, doi = {10.1108/ICS-10-2014-0070}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LotterF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Marett15, author = {Kent Marett}, title = {Checking the manipulation checks in information security research}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {1}, pages = {20--30}, year = {2015}, url = {https://doi.org/10.1108/ICS-12-2013-0087}, doi = {10.1108/ICS-12-2013-0087}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Marett15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Mishra15, author = {Sushma Mishra}, title = {Organizational objectives for information security governance: a value focused assessment}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {2}, pages = {122--144}, year = {2015}, url = {https://doi.org/10.1108/ICS-02-2014-0016}, doi = {10.1108/ICS-02-2014-0016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Mishra15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/NK15, author = {Sindhuja P. N. and Anand S. Kunnathur}, title = {Information security in supply chains: a management control perspective}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {5}, pages = {476--496}, year = {2015}, url = {https://doi.org/10.1108/ICS-07-2014-0050}, doi = {10.1108/ICS-07-2014-0050}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/NK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/NgoqoF15, author = {Bukelwa Ngoqo and Stephen V. Flowerday}, title = {Exploring the relationship between student mobile information security awareness and behavioural intent}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {4}, pages = {406--420}, year = {2015}, url = {https://doi.org/10.1108/ICS-10-2014-0072}, doi = {10.1108/ICS-10-2014-0072}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/NgoqoF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Purkait15, author = {Swapan Purkait}, title = {Examining the effectiveness of phishing filters against {DNS} based phishing attacks}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {3}, pages = {333--346}, year = {2015}, url = {https://doi.org/10.1108/ICS-02-2013-0009}, doi = {10.1108/ICS-02-2013-0009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Purkait15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ShahpasandSGG15, author = {Maryam Shahpasand and Mehdi Shajari and Seyed Alireza Hashemi Golpaygani and Hoda Ghavamipoor}, title = {A comprehensive security control selection model for inter-dependent organizational assets structure}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {2}, pages = {218--242}, year = {2015}, url = {https://doi.org/10.1108/ICS-12-2013-0090}, doi = {10.1108/ICS-12-2013-0090}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ShahpasandSGG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SilicBS15, author = {Mario Silic and Andrea Back and Dario Silic}, title = {Taxonomy of technological risks of open source software in the enterprise adoption context}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {5}, pages = {570--583}, year = {2015}, url = {https://doi.org/10.1108/ICS-08-2014-0056}, doi = {10.1108/ICS-08-2014-0056}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SilicBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Skotnes15, author = {Ruth {\O}stgaard Skotnes}, title = {Management commitment and awareness creation - {ICT} safety and security in electric power supply network companies}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {3}, pages = {302--316}, year = {2015}, url = {https://doi.org/10.1108/ICS-02-2014-0017}, doi = {10.1108/ICS-02-2014-0017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Skotnes15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SommestadKH15, author = {Teodor Sommestad and Henrik Karlz{\'{e}}n and Jonas Hallberg}, title = {The sufficiency of the theory of planned behavior for explaining information security policy compliance}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {2}, pages = {200--217}, year = {2015}, url = {https://doi.org/10.1108/ICS-04-2014-0025}, doi = {10.1108/ICS-04-2014-0025}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/SommestadKH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SommestadS15, author = {Teodor Sommestad and Fredrik Sandstr{\"{o}}m}, title = {An empirical test of the accuracy of an attack graph analysis tool}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {5}, pages = {516--531}, year = {2015}, url = {https://doi.org/10.1108/ICS-06-2014-0036}, doi = {10.1108/ICS-06-2014-0036}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SommestadS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SrivastavaT15, author = {Himanshu Srivastava and Shashikala Tapaswi}, title = {Logical acquisition and analysis of data from android mobile devices}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {5}, pages = {450--475}, year = {2015}, url = {https://doi.org/10.1108/ICS-02-2014-0013}, doi = {10.1108/ICS-02-2014-0013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SrivastavaT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SunD15, author = {Yan Sun and Ian Davidson}, title = {Influential factors of online fraud occurrence in retailing banking sectors from a global prospective: An empirical study of individual customers in the {UK} and China}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {1}, pages = {3--19}, year = {2015}, url = {https://doi.org/10.1108/ICS-10-2013-0076}, doi = {10.1108/ICS-10-2013-0076}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SunD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TsavliEKM15, author = {Matina Tsavli and Pavlos S. Efraimidis and Vasilios Katos and Lilian Mitrou}, title = {Reengineering the user: privacy concerns about personal data on smartphones}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {4}, pages = {394--405}, year = {2015}, url = {https://doi.org/10.1108/ICS-10-2014-0071}, doi = {10.1108/ICS-10-2014-0071}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TsavliEKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TsimperidisKC15, author = {Ioannis Tsimperidis and Vasilios Katos and Nathan L. Clarke}, title = {Language-independent gender identification through keystroke analysis}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {3}, pages = {286--301}, year = {2015}, url = {https://doi.org/10.1108/ICS-05-2014-0032}, doi = {10.1108/ICS-05-2014-0032}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TsimperidisKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Yen15, author = {Yung{-}Shen Yen}, title = {Managing perceived risk for customer retention in e-commerce: The role of switching costs}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {2}, pages = {145--160}, year = {2015}, url = {https://doi.org/10.1108/ICS-12-2013-0088}, doi = {10.1108/ICS-12-2013-0088}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Yen15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AhmadM14, author = {Atif Ahmad and Sean B. Maynard}, title = {Teaching information security management: reflections and experiences}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {5}, pages = {513--536}, year = {2014}, url = {https://doi.org/10.1108/IMCS-08-2013-0058}, doi = {10.1108/IMCS-08-2013-0058}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AhmadM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AlazabHAKA14, author = {Ammar Alazab and Michael Hobbs and Jemal H. Abawajy and Ansam Khraisat and Mamoun Alazab}, title = {Using response action with intelligent intrusion detection and prevention system against web application malware}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {5}, pages = {431--449}, year = {2014}, url = {https://doi.org/10.1108/IMCS-02-2013-0007}, doi = {10.1108/IMCS-02-2013-0007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AlazabHAKA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AtoumOA14, author = {Issa Atoum and Ahmed Otoom and Amer Abu{-}Ali}, title = {A holistic cyber security implementation framework}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {3}, pages = {251--264}, year = {2014}, url = {https://doi.org/10.1108/IMCS-02-2013-0014}, doi = {10.1108/IMCS-02-2013-0014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AtoumOA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Azhari14, author = {Firman Azhari}, title = {Quick detection of {NFC} vulnerability: Implementation weakness exploitation}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {2}, pages = {134--140}, year = {2014}, url = {https://doi.org/10.1108/IMCS-09-2013-0067}, doi = {10.1108/IMCS-09-2013-0067}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Azhari14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BahlW14, author = {Sanjay Bahl and Om Prakash Wali}, title = {Perceived significance of information security governance to predict the information security service quality in software service industry: An empirical analysis}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {1}, pages = {2--23}, year = {2014}, url = {https://doi.org/10.1108/IMCS-01-2013-0002}, doi = {10.1108/IMCS-01-2013-0002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BahlW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChoiN14, author = {Jae Choi and Derek L. Nazareth}, title = {Repairing trust in an e-commerce and security context: an agent-based modeling approach}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {5}, pages = {490--512}, year = {2014}, url = {https://doi.org/10.1108/IMCS-09-2013-0069}, doi = {10.1108/IMCS-09-2013-0069}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChoiN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DArcyG14, author = {John D'Arcy and Gwen Greene}, title = {Security culture and the employment relationship as drivers of employees' security compliance}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {5}, pages = {474--489}, year = {2014}, url = {https://doi.org/10.1108/IMCS-08-2013-0057}, doi = {10.1108/IMCS-08-2013-0057}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DArcyG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FenzHNP14, author = {Stefan Fenz and Johannes Heurix and Thomas Neubauer and Fabian Pechstein}, title = {Current challenges in information security risk management}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {5}, pages = {410--430}, year = {2014}, url = {https://doi.org/10.1108/IMCS-07-2013-0053}, doi = {10.1108/IMCS-07-2013-0053}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FenzHNP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FloresHSE14, author = {Waldo Rocha Flores and Hannes Holm and Gustav Svensson and G{\"{o}}ran Ericsson}, title = {Using phishing experiments and scenario-based surveys to understand security behaviours in practice}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {4}, pages = {393--406}, year = {2014}, url = {https://doi.org/10.1108/IMCS-11-2013-0083}, doi = {10.1108/IMCS-11-2013-0083}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FloresHSE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Gulenko14, author = {Iwan Gulenko}, title = {Improving passwords: influence of emotions on security behaviour}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {2}, pages = {167--178}, year = {2014}, url = {https://doi.org/10.1108/IMCS-09-2013-0068}, doi = {10.1108/IMCS-09-2013-0068}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Gulenko14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HaggertyHT14, author = {John Haggerty and Sheryllynne Haggerty and Mark John Taylor}, title = {Forensic triage of email network narratives through visualisation}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {4}, pages = {358--370}, year = {2014}, url = {https://doi.org/10.1108/IMCS-11-2013-0080}, doi = {10.1108/IMCS-11-2013-0080}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HaggertyHT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HarrisP14, author = {Mark A. Harris and Karen P. Patten}, title = {Mobile device security considerations for small- and medium-sized enterprise business mobility}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {1}, pages = {97--114}, year = {2014}, url = {https://doi.org/10.1108/IMCS-03-2013-0019}, doi = {10.1108/IMCS-03-2013-0019}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HarrisP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HelkalaB14, author = {Kirsi Helkala and Tone Hodd{\o} Bak{\aa}s}, title = {Extended results of Norwegian password security survey}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {4}, pages = {346--357}, year = {2014}, url = {https://doi.org/10.1108/IMCS-10-2013-0079}, doi = {10.1108/IMCS-10-2013-0079}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HelkalaB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JamesG14, author = {Peter James and Don Griffiths}, title = {A secure portable execution environment to support teleworking}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {3}, pages = {309--330}, year = {2014}, url = {https://doi.org/10.1108/IMCS-07-2013-0052}, doi = {10.1108/IMCS-07-2013-0052}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JamesG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KasperskyF14, author = {Eugene Kaspersky and Steven Furnell}, title = {A security education Q{\&}A}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {2}, pages = {130--133}, year = {2014}, url = {https://doi.org/10.1108/IMCS-01-2014-0006}, doi = {10.1108/IMCS-01-2014-0006}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KasperskyF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Kim14, author = {Eyong B. Kim}, title = {Recommendations for information security awareness training for college students}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {1}, pages = {115--126}, year = {2014}, url = {https://doi.org/10.1108/IMCS-01-2013-0005}, doi = {10.1108/IMCS-01-2013-0005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Kim14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ManiCM14, author = {Deepa Mani and Kim{-}Kwang Raymond Choo and Sameera Mubarak}, title = {Information security in the South Australian real estate industry: {A} study of 40 real estate organisations}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {1}, pages = {24--41}, year = {2014}, url = {https://doi.org/10.1108/IMCS-10-2012-0060}, doi = {10.1108/IMCS-10-2012-0060}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ManiCM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MayayiseO14, author = {Thembekile O. Mayayise and Isaac Olusegun Osunmakinde}, title = {E-commerce assurance models and trustworthiness issues: an empirical study}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {1}, pages = {76--96}, year = {2014}, url = {https://doi.org/10.1108/IMCS-01-2013-0001}, doi = {10.1108/IMCS-01-2013-0001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MayayiseO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MengWK14, author = {Weizhi Meng and Duncan S. Wong and Lam{-}for Kwok}, title = {The effect of adaptive mechanism on behavioural biometric based mobile phone authentication}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {2}, pages = {155--166}, year = {2014}, url = {https://doi.org/10.1108/IMCS-09-2013-0062}, doi = {10.1108/IMCS-09-2013-0062}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MengWK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/N14, author = {Sindhuja P. N.}, title = {Impact of information security initiatives on supply chain performance: An empirical investigation}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {5}, pages = {450--473}, year = {2014}, url = {https://doi.org/10.1108/IMCS-05-2013-0035}, doi = {10.1108/IMCS-05-2013-0035}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/N14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/OlemboKSHV14, author = {Maina M. Olembo and Timo Kilian and Simon Stockhardt and Andreas H{\"{u}}lsing and Melanie Volkamer}, title = {Developing and testing SCoP - a visual hash scheme}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {4}, pages = {382--392}, year = {2014}, url = {https://doi.org/10.1108/IMCS-11-2013-0082}, doi = {10.1108/IMCS-11-2013-0082}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/OlemboKSHV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ParsonsMPBJ14, author = {Kathryn Parsons and Agata McCormac and Malcolm Robert Pattinson and Marcus A. Butavicius and Cate Jerram}, title = {A study of information security awareness in Australian government organisations}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {4}, pages = {334--345}, year = {2014}, url = {https://doi.org/10.1108/IMCS-10-2013-0078}, doi = {10.1108/IMCS-10-2013-0078}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ParsonsMPBJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PurkaitDS14, author = {Swapan Purkait and Sadhan Kumar De and Damodar Suar}, title = {An empirical investigation of the factors that influence Internet user's ability to correctly identify a phishing website}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {3}, pages = {194--234}, year = {2014}, url = {https://doi.org/10.1108/IMCS-05-2013-0032}, doi = {10.1108/IMCS-05-2013-0032}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PurkaitDS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ReidN14, author = {Rayne Reid and Johan Van Niekerk}, title = {Snakes and ladders for digital natives: information security education for the youth}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {2}, pages = {179--190}, year = {2014}, url = {https://doi.org/10.1108/IMCS-09-2013-0063}, doi = {10.1108/IMCS-09-2013-0063}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ReidN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ReidN14a, author = {Rayne Reid and Johan Van Niekerk}, title = {Brain-compatible, web-based information security education: a statistical study}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {4}, pages = {371--381}, year = {2014}, url = {https://doi.org/10.1108/IMCS-11-2013-0081}, doi = {10.1108/IMCS-11-2013-0081}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ReidN14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RepelS14, author = {Dusan Repel and Ingo Stengel}, title = {Grammar-based transformations: attack and defence}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {2}, pages = {141--154}, year = {2014}, url = {https://doi.org/10.1108/IMCS-09-2013-0071}, doi = {10.1108/IMCS-09-2013-0071}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RepelS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RigonWSW14, author = {Evandro Alencar Rigon and Carla Merkle Westphall and Daniel Ricardo dos Santos and Carlos Becker Westphall}, title = {A cyclical evaluation model of information security maturity}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {3}, pages = {265--278}, year = {2014}, url = {https://doi.org/10.1108/IMCS-04-2013-0025}, doi = {10.1108/IMCS-04-2013-0025}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RigonWSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SilicB14, author = {Mario Silic and Andrea Back}, title = {Information security: Critical review and future directions for research}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {3}, pages = {279--308}, year = {2014}, url = {https://doi.org/10.1108/IMCS-05-2013-0041}, doi = {10.1108/IMCS-05-2013-0041}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SilicB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SommestadHLB14, author = {Teodor Sommestad and Jonas Hallberg and Kristoffer Lundholm and Johan E. Bengtsson}, title = {Variables influencing information security policy compliance: {A} systematic review of quantitative studies}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {1}, pages = {42--75}, year = {2014}, url = {https://doi.org/10.1108/IMCS-08-2012-0045}, doi = {10.1108/IMCS-08-2012-0045}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/SommestadHLB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Yaokumah14, author = {Winfred Yaokumah}, title = {Information security governance implementation within Ghanaian industry sectors: An empirical study}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {3}, pages = {235--250}, year = {2014}, url = {https://doi.org/10.1108/IMCS-06-2013-0044}, doi = {10.1108/IMCS-06-2013-0044}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Yaokumah14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ciampa13, author = {Mark Ciampa}, title = {A comparison of password feedback mechanisms and their impact on password entropy}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {5}, pages = {344--359}, year = {2013}, url = {https://doi.org/10.1108/IMCS-12-2012-0072}, doi = {10.1108/IMCS-12-2012-0072}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Ciampa13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/CuiKS13, author = {Ang Cui and Jatin Kataria and Salvatore J. Stolfo}, title = {Revisiting the myth of Cisco {IOS} diversity: recent advances in reliable shellcode design}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {2}, pages = {121--138}, year = {2013}, url = {https://doi.org/10.1108/IMCS-09-2012-0046}, doi = {10.1108/IMCS-09-2012-0046}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/CuiKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FrangopoulosEV13, author = {Evangelos D. Frangopoulos and Mariki M. Eloff and Lucas M. Venter}, title = {Psychosocial risks: Can their effects on the security of information systems really be ignored?}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {1}, pages = {53--65}, year = {2013}, url = {https://doi.org/10.1108/09685221311314428}, doi = {10.1108/09685221311314428}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FrangopoulosEV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Gonzalez13, author = {Pablo Carballude Gonz{\'{a}}lez}, title = {Fingerprinting Tor}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {2}, pages = {73--90}, year = {2013}, url = {https://doi.org/10.1108/IMCS-01-2013-0004}, doi = {10.1108/IMCS-01-2013-0004}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Gonzalez13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Gulenko13, author = {Iwan Gulenko}, title = {Social against social engineering: Concept and development of a Facebook application to raise security and risk awareness}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {2}, pages = {91--101}, year = {2013}, url = {https://doi.org/10.1108/IMCS-09-2012-0053}, doi = {10.1108/IMCS-09-2012-0053}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Gulenko13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Hajli13, author = {Mahmood Hajli}, title = {A research framework for social commerce adoption}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {3}, pages = {144--154}, year = {2013}, url = {https://doi.org/10.1108/IMCS-04-2012-0024}, doi = {10.1108/IMCS-04-2012-0024}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Hajli13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/He13, author = {Wu He}, title = {A survey of security risks of mobile social media through blog mining and an extensive literature search}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {5}, pages = {381--400}, year = {2013}, url = {https://doi.org/10.1108/IMCS-12-2012-0068}, doi = {10.1108/IMCS-12-2012-0068}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/He13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HedstromKK13, author = {Karin Hedstr{\"{o}}m and Fredrik Karlsson and Ella Kolkowska}, title = {Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {4}, pages = {266--287}, year = {2013}, url = {https://doi.org/10.1108/IMCS-08-2012-0043}, doi = {10.1108/IMCS-08-2012-0043}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HedstromKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HolmE13, author = {Hannes Holm and Mathias Ekstedt}, title = {Estimates on the effectiveness of web application firewalls against targeted attacks}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {4}, pages = {250--265}, year = {2013}, url = {https://doi.org/10.1108/IMCS-11-2012-0064}, doi = {10.1108/IMCS-11-2012-0064}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HolmE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/IndrinalMS13, author = {Mariah Strella P. Indrinal and Ranyel Bryan L. Maliwanag and Marynyriene I. Silvestre}, title = {VoxGrid: a mobile voice verification system}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {2}, pages = {110--120}, year = {2013}, url = {https://doi.org/10.1108/IMCS-09-2012-0048}, doi = {10.1108/IMCS-09-2012-0048}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/IndrinalMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JairakP13, author = {Kallaya Jairak and Prasong Praneetpolgrang}, title = {Applying {IT} governance balanced scorecard and importance-performance analysis for providing {IT} governance strategy in university}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {4}, pages = {228--249}, year = {2013}, url = {https://doi.org/10.1108/IMCS-08-2012-0036}, doi = {10.1108/IMCS-08-2012-0036}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JairakP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KhiabaniIM13, author = {Hamed Khiabani and Norbik Bashah Idris and Jamalul{-}lail Ab Manan}, title = {Unified trust establishment by leveraging remote attestation - modeling and analysis}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {5}, pages = {360--380}, year = {2013}, url = {https://doi.org/10.1108/IMCS-11-2012-0062}, doi = {10.1108/IMCS-11-2012-0062}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KhiabaniIM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KomatsuTT13, author = {Ayako Komatsu and Daisuke Takagi and Toshihiko Takemura}, title = {Human aspects of information security: An empirical study of intentional versus actual behavior}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {1}, pages = {5--15}, year = {2013}, url = {https://doi.org/10.1108/09685221311314383}, doi = {10.1108/09685221311314383}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KomatsuTT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KoongMS13, author = {Kai S. Koong and Mohammad I. Merhi and Jun Sun}, title = {Push and pull effects of homeland information security incentives}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {3}, pages = {155--176}, year = {2013}, url = {https://doi.org/10.1108/IMCS-04-2012-0022}, doi = {10.1108/IMCS-04-2012-0022}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KoongMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Lambrinoudakis13, author = {Costas Lambrinoudakis}, title = {Evaluating and enriching information and communication technologies compliance frameworks with regard to privacy}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {3}, pages = {177--190}, year = {2013}, url = {https://doi.org/10.1108/IMCS-09-2012-0051}, doi = {10.1108/IMCS-09-2012-0051}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/Lambrinoudakis13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LatBA13, author = {Joshua Arvin S. Lat and Rod Xavier R. Bondoc and Kevin Charles V. Atienza}, title = {{SOUL} System: secure online {USB} login system}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {2}, pages = {102--109}, year = {2013}, url = {https://doi.org/10.1108/IMCS-08-2012-0042}, doi = {10.1108/IMCS-08-2012-0042}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LatBA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LeviW13, author = {Michael Levi and Matthew Leighton Williams}, title = {Multi-agency partnerships in cybercrime reduction: Mapping the {UK} information assurance network cooperation space}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {5}, pages = {420--443}, year = {2013}, url = {https://doi.org/10.1108/IMCS-04-2013-0027}, doi = {10.1108/IMCS-04-2013-0027}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/LeviW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MichalopoulosM13, author = {Dimitrios Michalopoulos and Ioannis Mavridis}, title = {A method to calculate social networking hazard probability in definite time}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {1}, pages = {16--29}, year = {2013}, url = {https://doi.org/10.1108/09685221311314392}, doi = {10.1108/09685221311314392}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/MichalopoulosM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MoeckeV13, author = {Cristian Thiago Moecke and Melanie Volkamer}, title = {Usable secure email communications: criteria and evaluation of existing approaches}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {1}, pages = {41--52}, year = {2013}, url = {https://doi.org/10.1108/09685221311314419}, doi = {10.1108/09685221311314419}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MoeckeV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PapanikolaouVVIPS13, author = {Alexandros Papanikolaou and Vasileios Vlachos and Andreas Venieris and Christos Ilioudis and Konstantinos Papapanagiotou and Anastasios Stasinopoulos}, title = {A framework for teaching network security in academic environments}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {4}, pages = {315--338}, year = {2013}, url = {https://doi.org/10.1108/IMCS-11-2011-0056}, doi = {10.1108/IMCS-11-2011-0056}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PapanikolaouVVIPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PathariS13, author = {Vinod Pathari and Rajendra M. Sonar}, title = {Deriving an information security assurance indicator at the organizational level}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {5}, pages = {401--419}, year = {2013}, url = {https://doi.org/10.1108/IMCS-02-2013-0011}, doi = {10.1108/IMCS-02-2013-0011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PathariS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ShaabanC13, author = {Hussein Shaaban and Marc Conrad}, title = {Democracy, culture and information security: a case study in Zanzibar}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {3}, pages = {191--201}, year = {2013}, url = {https://doi.org/10.1108/IMCS-09-2012-0057}, doi = {10.1108/IMCS-09-2012-0057}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ShaabanC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Sobh13, author = {Tarek S. Sobh}, title = {Anomaly detection based on hybrid artificial immune principles}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {4}, pages = {288--314}, year = {2013}, url = {https://doi.org/10.1108/IMCS-11-2012-0063}, doi = {10.1108/IMCS-11-2012-0063}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Sobh13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SommestadH13, author = {Teodor Sommestad and Amund Hunstad}, title = {Intrusion detection and the role of the system administrator}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {1}, pages = {30--40}, year = {2013}, url = {https://doi.org/10.1108/09685221311314400}, doi = {10.1108/09685221311314400}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SommestadH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TaubenbergerJYN13, author = {Stefan Taubenberger and Jan J{\"{u}}rjens and Yijun Yu and Bashar Nuseibeh}, title = {Resolving vulnerability identification errors using security requirements on business process models}, journal = {Inf. Manag. Comput. Secur.}, volume = {21}, number = {3}, pages = {202--223}, year = {2013}, url = {https://doi.org/10.1108/IMCS-09-2012-0054}, doi = {10.1108/IMCS-09-2012-0054}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TaubenbergerJYN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AnguloFWP12, author = {Julio Angulo and Simone Fischer{-}H{\"{u}}bner and Erik W{\"{a}}stlund and Tobias Pulls}, title = {Towards Usable Privacy Policy Display {\&} Management for PrimeLife}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {1}, pages = {4--17}, year = {2012}, url = {https://doi.org/10.1108/09685221211219155}, doi = {10.1108/09685221211219155}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AnguloFWP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DesaiDP12, author = {Mayur S. Desai and Kiran J. Desai and Lonnie D. Phelps}, title = {E-commerce policies and customer privacy: a longitudinal study {(2000-2010)}}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {3}, pages = {222--244}, year = {2012}, url = {https://doi.org/10.1108/09685221211247325}, doi = {10.1108/09685221211247325}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DesaiDP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Goldman12, author = {Eric H. Goldman}, title = {The effect of acquisition decision making on security posture}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {5}, pages = {350--363}, year = {2012}, url = {https://doi.org/10.1108/09685221211286520}, doi = {10.1108/09685221211286520}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Goldman12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Jarvelainen12, author = {Jonna J{\"{a}}rvel{\"{a}}inen}, title = {Information security and business continuity management in interorganizational {IT} relationships}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {5}, pages = {332--349}, year = {2012}, url = {https://doi.org/10.1108/09685221211286511}, doi = {10.1108/09685221211286511}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Jarvelainen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Johnsen12, author = {Stig Ole Johnsen}, title = {Resilience at Interfaces - Improvement of Safety and Security in Distributed Control Systems by Web of Influence}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {2}, pages = {71--87}, year = {2012}, url = {https://doi.org/10.1108/09685221211235607}, doi = {10.1108/09685221211235607}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Johnsen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Katos12, author = {Vasilios Katos}, title = {An integrated model for online transactions: illuminating the black box}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {3}, pages = {184--206}, year = {2012}, url = {https://doi.org/10.1108/09685221211247299}, doi = {10.1108/09685221211247299}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Katos12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KrugerM12, author = {Cornelius Johannes Kruger and Mavis Noxolo Mama}, title = {Incorporating business strategy formulation with identity management strategy formulation}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {3}, pages = {152--169}, year = {2012}, url = {https://doi.org/10.1108/09685221211247271}, doi = {10.1108/09685221211247271}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KrugerM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MohamedS12, author = {Norshidah Mohamed and Jasber Kaur A. P. Gian Singh}, title = {A Conceptual Framework for Information Technology Governance Effectiveness in Private Organizations}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {2}, pages = {88--106}, year = {2012}, url = {https://doi.org/10.1108/09685221211235616}, doi = {10.1108/09685221211235616}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MohamedS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MontesinoFB12, author = {Raydel Montesino and Stefan Fenz and Walter Baluja}, title = {SIEM-based framework for security controls automation}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {4}, pages = {248--263}, year = {2012}, url = {https://doi.org/10.1108/09685221211267639}, doi = {10.1108/09685221211267639}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MontesinoFB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PatelQT12, author = {Ahmed Patel and Wei Qi and Mona Taghavi}, title = {An Evaluation of a Secure and Trustworthy Mobile Agent-based E-marketplace System}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {2}, pages = {123--146}, year = {2012}, url = {https://doi.org/10.1108/09685221211235634}, doi = {10.1108/09685221211235634}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PatelQT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PathariS12, author = {Vinod Pathari and Rajendra M. Sonar}, title = {Identifying linkages between statements in information security policy, procedures and controls}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {4}, pages = {264--280}, year = {2012}, url = {https://doi.org/10.1108/09685221211267648}, doi = {10.1108/09685221211267648}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PathariS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PattinsonJPMB12, author = {Malcolm Robert Pattinson and Cate Jerram and Kathryn Parsons and Agata McCormac and Marcus A. Butavicius}, title = {Why Do Some People Manage Phishing Emails Better Than Others?}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {1}, pages = {18--28}, year = {2012}, url = {https://doi.org/10.1108/09685221211219173}, doi = {10.1108/09685221211219173}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PattinsonJPMB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PramodLG12, author = {Vandana Pramod and Jinghua Li and Ping Gao}, title = {A framework for preventing money laundering in banks}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {3}, pages = {170--183}, year = {2012}, url = {https://doi.org/10.1108/09685221211247280}, doi = {10.1108/09685221211247280}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PramodLG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Purkait12, author = {Swapan Purkait}, title = {Phishing counter measures and their effectiveness - literature review}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {5}, pages = {382--420}, year = {2012}, url = {https://doi.org/10.1108/09685221211286548}, doi = {10.1108/09685221211286548}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Purkait12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SadanS12, author = {Zac Sadan and David G. Schwartz}, title = {Social Network Analysis for Cluster-Based {IP} Spam Reputation}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {4}, pages = {281--295}, year = {2012}, url = {https://doi.org/10.1108/09685221211267657}, doi = {10.1108/09685221211267657}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SadanS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ShengHFDC12, author = {Weiguo Sheng and Gareth Howells and Michael C. Fairhurst and Farzin Deravi and Shengyong Chen}, title = {Reliable and secure encryption key generation from fingerprints}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {3}, pages = {207--221}, year = {2012}, url = {https://doi.org/10.1108/09685221211247307}, doi = {10.1108/09685221211247307}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ShengHFDC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SommestadHE12, author = {Teodor Sommestad and Hannes Holm and Mathias Ekstedt}, title = {Estimates of success rates of remote arbitrary code execution attacks}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {2}, pages = {107--122}, year = {2012}, url = {https://doi.org/10.1108/09685221211235625}, doi = {10.1108/09685221211235625}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SommestadHE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Stewart12, author = {Andrew Stewart}, title = {Can spending on information security be justified? Evaluating the security spending decision from the perspective of a rational actor}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {4}, pages = {312--326}, year = {2012}, url = {https://doi.org/10.1108/09685221211267675}, doi = {10.1108/09685221211267675}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Stewart12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/StewartL12, author = {Geordie Stewart and David Lacey}, title = {Death by a Thousand Facts: Criticising the Technocratic Approach to Information Security Awareness}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {1}, pages = {29--38}, year = {2012}, url = {https://doi.org/10.1108/09685221211219182}, doi = {10.1108/09685221211219182}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/StewartL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TanA12, author = {Margaret Tan and Kathrine Sagala Aguilar}, title = {An investigation of students' perception of Bluetooth security}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {5}, pages = {364--381}, year = {2012}, url = {https://doi.org/10.1108/09685221211286539}, doi = {10.1108/09685221211286539}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TanA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ThomsonN12, author = {Kerry{-}Lynn Thomson and Johan Van Niekerk}, title = {Combating Information Security Apathy by Encouraging Prosocial Organisational Behaviour}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {1}, pages = {39--46}, year = {2012}, url = {https://doi.org/10.1108/09685221211219191}, doi = {10.1108/09685221211219191}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ThomsonN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Workman12, author = {Michael Workman}, title = {Validation of a Biases Model in Strategic Security Decision-Making}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {2}, pages = {52--70}, year = {2012}, url = {https://doi.org/10.1108/09685221211235599}, doi = {10.1108/09685221211235599}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Workman12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AbbasMYH11, author = {Haider Abbas and Christer Magnusson and Louise Yngstr{\"{o}}m and Ahmed Hemani}, title = {Addressing Dynamic Issues in Information Security Management}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {1}, pages = {5--24}, year = {2011}, url = {https://doi.org/10.1108/09685221111115836}, doi = {10.1108/09685221111115836}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AbbasMYH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AggelinosK11, author = {George Aggelinos and Sokratis K. Katsikas}, title = {Enhancing {SSADM} with Disaster Recovery Plan activities}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {4}, pages = {248--261}, year = {2011}, url = {https://doi.org/10.1108/09685221111173067}, doi = {10.1108/09685221111173067}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AggelinosK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Beranek11, author = {Ladislav Beranek}, title = {Risk Analysis Methodology Used by Several Small and Medium Enterprises in the Czech Republic}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {1}, pages = {42--52}, year = {2011}, url = {https://doi.org/10.1108/09685221111115854}, doi = {10.1108/09685221111115854}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Beranek11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Bhattacharya11, author = {Debasis Bhattacharya}, title = {Leadership Styles and Information Security in Small Businesses}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {5}, pages = {300--312}, year = {2011}, url = {https://doi.org/10.1108/09685221111188593}, doi = {10.1108/09685221111188593}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Bhattacharya11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GarrisonN11, author = {Chlotia Posey Garrison and Matoteng Ncube}, title = {A Longitudinal Analysis of Data Breaches}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {4}, pages = {216--230}, year = {2011}, url = {https://doi.org/10.1108/09685221111173049}, doi = {10.1108/09685221111173049}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GarrisonN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HagenAJ11, author = {Janne Merete Hagen and Eirik Albrechtsen and Stig Ole Johnsen}, title = {The long term effects of information security e-learning on organizational learning}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {3}, pages = {140--154}, year = {2011}, url = {https://doi.org/10.1108/09685221111153537}, doi = {10.1108/09685221111153537}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HagenAJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HallSM11, author = {Jacqueline H. Hall and Shahram Sarkani and Thomas A. Mazzuchi}, title = {Impacts of Organizational Capabilities In Information Security}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {3}, pages = {155--176}, year = {2011}, url = {https://doi.org/10.1108/09685221111153546}, doi = {10.1108/09685221111153546}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HallSM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HarneskL11, author = {Dan Harnesk and John Lindstr{\"{o}}m}, title = {Shaping Security Behavior through Discipline and Agility: Implications for Information Security Management}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {4}, pages = {262--276}, year = {2011}, url = {https://doi.org/10.1108/09685221111173076}, doi = {10.1108/09685221111173076}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HarneskL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HolmSAP11, author = {Hannes Holm and Teodor Sommestad and Jonas Almroth and Mats Persson}, title = {A quantitative evaluation of vulnerability scanning}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {4}, pages = {231--247}, year = {2011}, url = {https://doi.org/10.1108/09685221111173058}, doi = {10.1108/09685221111173058}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HolmSAP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KapodistriaMD11, author = {Helen Georgia Kapodistria and Sarandis Mitropoulos and Christos Douligeris}, title = {An Advanced Web Attack Detection and Prevention Tool}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {5}, pages = {280--299}, year = {2011}, url = {https://doi.org/10.1108/09685221111188584}, doi = {10.1108/09685221111188584}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KapodistriaMD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LazarTGZ11, author = {Lior Lazar and Omer Tikolsky and Chanan Glezer and Moshe Zviran}, title = {Personalized Cognitive Passwords: An Exploratory Assessment}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {1}, pages = {25--41}, year = {2011}, url = {https://doi.org/10.1108/09685221111115845}, doi = {10.1108/09685221111115845}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/LazarTGZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MitropoulosKLS11, author = {Dimitris Mitropoulos and Vassilios Karakoidas and Panos Louridas and Diomidis Spinellis}, title = {Countering Code Injection Attacks: {A} Unified Approach}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {3}, pages = {177--194}, year = {2011}, url = {https://doi.org/10.1108/09685221111153555}, doi = {10.1108/09685221111153555}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MitropoulosKLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MonfeltPHY11, author = {Yngve Monfelt and Sofie Pilemalm and Jonas Hallberg and Louise Yngstr{\"{o}}m}, title = {The 14 Layered Framework for Including Social and Organisational Aspects in Security Management}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {2}, pages = {124--133}, year = {2011}, url = {https://doi.org/10.1108/09685221111143060}, doi = {10.1108/09685221111143060}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MonfeltPHY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PatelQT11, author = {Ahmed Patel and Wei Qi and Mona Taghavi}, title = {Design of Secure and Trustworthy Mobile Agent-based E-marketplace System}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {5}, pages = {333--352}, year = {2011}, url = {https://doi.org/10.1108/09685221111188610}, doi = {10.1108/09685221111188610}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PatelQT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ShirtzE11, author = {Dov Shirtz and Yuval Elovici}, title = {Optimizing Investment Decisions in Selecting Information Security Remedies}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {2}, pages = {95--112}, year = {2011}, url = {https://doi.org/10.1108/09685221111143042}, doi = {10.1108/09685221111143042}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ShirtzE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SommestadEHA11, author = {Teodor Sommestad and Mathias Ekstedt and Hannes Holm and Muhammad Afzal}, title = {Security mistakes in information system deployment projects}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {2}, pages = {80--94}, year = {2011}, url = {https://doi.org/10.1108/09685221111143033}, doi = {10.1108/09685221111143033}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SommestadEHA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SukiRS11, author = {Norazah Mohd Suki and Thurasamy Ramayah and Norbayah Mohd Suki}, title = {Understanding Consumer Intention with Respect to Purchase and Use of Pirated Software}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {3}, pages = {195--210}, year = {2011}, url = {https://doi.org/10.1108/09685221111153564}, doi = {10.1108/09685221111153564}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SukiRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/VaishPMDSGC11, author = {Abhishek Vaish and Aditya Prabhakar and Himanshu Mishra and Nupur Dayal and Shishir Kumar Singh and Utkarsh Goel and Natalie Coull}, title = {Quantifying Information Dynamics Through New Valuation System}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {5}, pages = {313--332}, year = {2011}, url = {https://doi.org/10.1108/09685221111188601}, doi = {10.1108/09685221111188601}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/VaishPMDSGC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/VlachosMAT11, author = {Vasileios Vlachos and Marilena Minou and Vassilis Assimakopoulos and Androniki Toska}, title = {The Landscape of Cybercrime in Greece}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {2}, pages = {113--123}, year = {2011}, url = {https://doi.org/10.1108/09685221111143051}, doi = {10.1108/09685221111143051}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/VlachosMAT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/WillsZ11, author = {Craig E. Wills and Mihajlo Zeljkovic}, title = {A Personalized Approach to Web Privacy - Awareness, Attitudes and Actions}, journal = {Inf. Manag. Comput. Secur.}, volume = {19}, number = {1}, pages = {53--73}, year = {2011}, url = {https://doi.org/10.1108/09685221111115863}, doi = {10.1108/09685221111115863}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/WillsZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Abu-Musa10, author = {Ahmad Abu{-}Musa}, title = {Information security governance in Saudi organizations: an empirical study}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {4}, pages = {226--276}, year = {2010}, url = {https://doi.org/10.1108/09685221011079180}, doi = {10.1108/09685221011079180}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Abu-Musa10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Al-AwadiS10, author = {K. Al{-}Awadi and Messaoud Saidani}, title = {Justifying the need for a data security management plan for the {UAE}}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {3}, pages = {173--184}, year = {2010}, url = {https://doi.org/10.1108/09685221011064708}, doi = {10.1108/09685221011064708}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Al-AwadiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AsaiH10, author = {Tatsuo Asai and Aline Uwera Hakizabera}, title = {Human-Related Problems of Information Security in East African Cross-Cultural Environments}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {5}, pages = {328--338}, year = {2010}, url = {https://doi.org/10.1108/09685221011095245}, doi = {10.1108/09685221011095245}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AsaiH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/CaceresT10, author = {Guillermo Horacio Ramirez Caceres and Yoshimi Teshigawara}, title = {Security Guideline Tool for Home Users Based on International Standards}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {2}, pages = {101--123}, year = {2010}, url = {https://doi.org/10.1108/09685221011048346}, doi = {10.1108/09685221011048346}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/CaceresT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChangYP10, author = {Ting{-}Yi Chang and Yu{-}Ju Yang and Chun{-}Cheng Peng}, title = {A Personalized Rhythm Click-Based Authentication System}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {2}, pages = {72--85}, year = {2010}, url = {https://doi.org/10.1108/09685221011048328}, doi = {10.1108/09685221011048328}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChangYP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChristodoulakiF10, author = {Meltini Christodoulaki and Paraskevi Fragopoulou}, title = {SafeLine: reporting illegal internet content}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {1}, pages = {54--65}, year = {2010}, url = {https://doi.org/10.1108/09685221011035269}, doi = {10.1108/09685221011035269}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChristodoulakiF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FailyF10, author = {Shamal Faily and Ivan Flechais}, title = {Designing and Aligning e-Science Security Culture with Design}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {5}, pages = {339--349}, year = {2010}, url = {https://doi.org/10.1108/09685221011095254}, doi = {10.1108/09685221011095254}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FailyF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FutchersS10, author = {Lynn Futcher and Cheryl Schroder and Rossouw von Solms}, title = {Information Security Education in South Africa}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {5}, pages = {366--374}, year = {2010}, url = {https://doi.org/10.1108/09685221011095272}, doi = {10.1108/09685221011095272}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FutchersS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GoldsteinPS10, author = {Zvi Goldstein and David Petrie and Yosef Sherif}, title = {Finding middle ground management strategy for software development}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {3}, pages = {185--197}, year = {2010}, url = {https://doi.org/10.1108/09685221011064717}, doi = {10.1108/09685221011064717}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GoldsteinPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Goode10, author = {Sigi Goode}, title = {Exploring the supply of pirate software for mobile devices: An analysis of software types and piracy groups}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {4}, pages = {204--225}, year = {2010}, url = {https://doi.org/10.1108/09685221011079171}, doi = {10.1108/09685221011079171}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Goode10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Hui10, author = {Wendy Hui}, title = {Brand, knowledge, and false sense of security}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {3}, pages = {162--172}, year = {2010}, url = {https://doi.org/10.1108/09685221011064690}, doi = {10.1108/09685221011064690}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Hui10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JaliFD10, author = {Mohd Zalisham Jali and Steven Furnell and Paul Dowland}, title = {Assessing image-based authentication techniques in a web-based environment}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {1}, pages = {43--53}, year = {2010}, url = {https://doi.org/10.1108/09685221011035250}, doi = {10.1108/09685221011035250}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JaliFD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KrugerDS10, author = {Hennie A. Kruger and Lynette Drevin and Tjaart Steyn}, title = {A Vocabulary Test to Assess Information Security Awareness}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {5}, pages = {316--327}, year = {2010}, url = {https://doi.org/10.1108/09685221011095236}, doi = {10.1108/09685221011095236}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KrugerDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Lacey10, author = {David Lacey}, title = {Understanding and transforming organizational security culture}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {1}, pages = {4--13}, year = {2010}, url = {https://doi.org/10.1108/09685221011035223}, doi = {10.1108/09685221011035223}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Lacey10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PatelQW10, author = {Ahmed Patel and Wei Qi and Christopher Wills}, title = {A review and future research directions of secure and trustworthy mobile agent-based e-marketplace systems}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {3}, pages = {144--161}, year = {2010}, url = {https://doi.org/10.1108/09685221011064681}, doi = {10.1108/09685221011064681}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PatelQW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PatelQW10a, author = {Ahmed Patel and Qais Qassim and Christopher Wills}, title = {A survey of intrusion detection and prevention systems}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {4}, pages = {277--290}, year = {2010}, url = {https://doi.org/10.1108/09685221011079199}, doi = {10.1108/09685221011079199}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PatelQW10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PatsosMD10, author = {Dimitrios Patsos and Sarandis Mitropoulos and Christos Douligeris}, title = {Expanding topological vulnerability analysis to intrusion detection through the incident response intelligence system}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {4}, pages = {291--309}, year = {2010}, url = {https://doi.org/10.1108/09685221011079207}, doi = {10.1108/09685221011079207}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PatsosMD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PearceZH10, author = {Michael Pearce and Sherali Zeadally and Ray Hunt}, title = {Assessing and Improving Authentication Confidence Management}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {2}, pages = {124--139}, year = {2010}, url = {https://doi.org/10.1108/09685221011048355}, doi = {10.1108/09685221011048355}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PearceZH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Tsohou10, author = {Aggeliki Tsohou}, title = {A Security Standards' Framework to Facilitate Best Practices' Awareness and Conformity}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {5}, pages = {350--365}, year = {2010}, url = {https://doi.org/10.1108/09685221011095263}, doi = {10.1108/09685221011095263}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Tsohou10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/WerlingerMHB10, author = {Rodrigo Werlinger and Kasia Muldner and Kirstie Hawkey and Konstantin Beznosov}, title = {Preparation, detection, and analysis: the diagnostic work of {IT} security incident response}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {1}, pages = {26--42}, year = {2010}, url = {https://doi.org/10.1108/09685221011035241}, doi = {10.1108/09685221011035241}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/WerlingerMHB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/WhalenG10, author = {Tara Whalen and Carrie Gates}, title = {Watching the watchers: "voluntary monitoring" of infosec employees}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {1}, pages = {14--25}, year = {2010}, url = {https://doi.org/10.1108/09685221011035232}, doi = {10.1108/09685221011035232}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/WhalenG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/YangC10, author = {Seung S. Yang and Hongsik Choi}, title = {Vulnerability Analysis and the Practical Implications of a Server-challenge-based One-time Password System}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {2}, pages = {86--100}, year = {2010}, url = {https://doi.org/10.1108/09685221011048337}, doi = {10.1108/09685221011048337}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/YangC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Abu-Musa09, author = {Ahmad Abu{-}Musa}, title = {Exploring the importance and implementation of {COBIT} processes in Saudi organizations: An empirical study}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {2}, pages = {73--95}, year = {2009}, url = {https://doi.org/10.1108/09685220910963974}, doi = {10.1108/09685220910963974}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Abu-Musa09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ahmed09, author = {Zeeshan Ahmed}, title = {Proposing semantic-oriented agent and knowledge base product data management}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {5}, pages = {360--371}, year = {2009}, url = {https://doi.org/10.1108/09685220911006669}, doi = {10.1108/09685220911006669}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Ahmed09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Al-BadiAAM09, author = {Ali H. Al{-}Badi and Rafi Ashrafi and Ali O. Al{-}Majeeni and Pam J. Mayhew}, title = {{IT} disaster recovery: Oman and Cyclone Gonu lessons learned}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {2}, pages = {114--126}, year = {2009}, url = {https://doi.org/10.1108/09685220910963992}, doi = {10.1108/09685220910963992}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Al-BadiAAM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BakhshiPF09, author = {Taimur Bakhshi and Maria Papadaki and Steven Furnell}, title = {Social engineering: assessing vulnerabilities in practice}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {1}, pages = {53--63}, year = {2009}, url = {https://doi.org/10.1108/09685220910944768}, doi = {10.1108/09685220910944768}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BakhshiPF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BennettS09, author = {David James Bennett and Paul Stephens}, title = {A cognitive walkthrough of Autopsy Forensic Browser}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {1}, pages = {20--29}, year = {2009}, url = {https://doi.org/10.1108/09685220910944731}, doi = {10.1108/09685220910944731}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BennettS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChouL09, author = {Tzu{-}Chuan Chou and An{-}Sheng Lee}, title = {A process model for customer relational assets creation: {A} case study of online securities trading platform}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {3}, pages = {218--233}, year = {2009}, url = {https://doi.org/10.1108/09685220910978095}, doi = {10.1108/09685220910978095}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChouL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChowH09, author = {Wing S. Chow and Wai On Ha}, title = {Determinants of the critical success factor of disaster recovery planning for information systems}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {3}, pages = {248--275}, year = {2009}, url = {https://doi.org/10.1108/09685220910978103}, doi = {10.1108/09685220910978103}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChowH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/EfraimidisDNT09, author = {Pavlos S. Efraimidis and George Drosatos and Fotis Nalbadis and Aimilia Tasidou}, title = {Towards privacy in personal data management}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {4}, pages = {311--329}, year = {2009}, url = {https://doi.org/10.1108/09685220910993971}, doi = {10.1108/09685220910993971}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/EfraimidisDNT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GurungLL09, author = {Anil Gurung and Xin (Robert) Luo and Qinyu Liao}, title = {Consumer motivations in taking action against spyware: an empirical investigation}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {3}, pages = {276--289}, year = {2009}, url = {https://doi.org/10.1108/09685220910978112}, doi = {10.1108/09685220910978112}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GurungLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HagenA09, author = {Janne Merete Hagen and Eirik Albrechtsen}, title = {Effects on employees' information security abilities by e-learning}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {5}, pages = {388--407}, year = {2009}, url = {https://doi.org/10.1108/09685220911006687}, doi = {10.1108/09685220911006687}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HagenA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HelkalaS09, author = {Kirsi Helkala and Einar Snekkenes}, title = {Formalizing the ranking of authentication products}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {1}, pages = {30--43}, year = {2009}, url = {https://doi.org/10.1108/09685220910944740}, doi = {10.1108/09685220910944740}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HelkalaS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ifinedo09, author = {Princely Ifinedo}, title = {Information technology security management concerns in global financial services institutions: Is national culture a differentiator?}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {5}, pages = {372--387}, year = {2009}, url = {https://doi.org/10.1108/09685220911006678}, doi = {10.1108/09685220911006678}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Ifinedo09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LeeHL09, author = {Cheng{-}Chi Lee and Min{-}Shiang Hwang and Chih{-}Wei Lin}, title = {A new English auction scheme using the bulletin board system}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {5}, pages = {408--417}, year = {2009}, url = {https://doi.org/10.1108/09685220911006696}, doi = {10.1108/09685220911006696}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LeeHL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RanjanB09, author = {Jayanthi Ranjan and Vishal Bhatnagar}, title = {A holistic framework for mCRM - data mining perspective}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {2}, pages = {151--165}, year = {2009}, url = {https://doi.org/10.1108/09685220910964018}, doi = {10.1108/09685220910964018}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RanjanB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RocaGV09, author = {Juan Carlos Roca and Juan Jos{\'{e}} Garc{\'{\i}}a and Juan Jos{\'{e}} de la Vega}, title = {The importance of perceived trust, security and privacy in online trading systems}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {2}, pages = {96--113}, year = {2009}, url = {https://doi.org/10.1108/09685220910963983}, doi = {10.1108/09685220910963983}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RocaGV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RouibahA09, author = {Kamel Rouibah and Sulaiman Al{-}Rafee}, title = {Requirement engineering elicitation methods: {A} Kuwaiti empirical study about familiarity, usage and perceived value}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {3}, pages = {192--217}, year = {2009}, url = {https://doi.org/10.1108/09685220910978086}, doi = {10.1108/09685220910978086}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RouibahA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SalwaniMNC09, author = {Mohamed Intan Salwani and Govindan Marthandan and Mohd Daud Norzaidi and Siong Choy Chong}, title = {E-commerce usage and business performance in the Malaysian tourism sector: empirical analysis}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {2}, pages = {166--185}, year = {2009}, url = {https://doi.org/10.1108/09685220910964027}, doi = {10.1108/09685220910964027}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SalwaniMNC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Shropshire09, author = {Jordan Shropshire}, title = {A canonical analysis of intentional information security breaches by insiders}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {4}, pages = {296--310}, year = {2009}, url = {https://doi.org/10.1108/09685220910993962}, doi = {10.1108/09685220910993962}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Shropshire09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Smith09, author = {Alan D. Smith}, title = {Internet retail banking: {A} competitive analysis in an increasingly financially troubled environment}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {2}, pages = {127--150}, year = {2009}, url = {https://doi.org/10.1108/09685220910964009}, doi = {10.1108/09685220910964009}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Smith09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/StylesT09, author = {Martyn Styles and Theo Tryfonas}, title = {Using penetration testing feedback to cultivate an atmosphere of proactive security amongst end-users}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {1}, pages = {44--52}, year = {2009}, url = {https://doi.org/10.1108/09685220910944759}, doi = {10.1108/09685220910944759}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/StylesT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/VincentFA09, author = {Olufunke R. Vincent and Olusegun Folorunso and Ayodele Akinde}, title = {On consolidation model in e-bill presentment and payment}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {3}, pages = {234--247}, year = {2009}, url = {https://doi.org/10.1108/09685220910978121}, doi = {10.1108/09685220910978121}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/VincentFA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/WerlingerHB09, author = {Rodrigo Werlinger and Kirstie Hawkey and Konstantin Beznosov}, title = {An integrated view of human, organizational, and technological challenges of {IT} security management}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {1}, pages = {4--19}, year = {2009}, url = {https://doi.org/10.1108/09685220910944722}, doi = {10.1108/09685220910944722}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/WerlingerHB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Workman09, author = {Michael Workman}, title = {How perceptions of justice affect security attitudes: suggestions for practitioners and researchers}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {4}, pages = {341--353}, year = {2009}, url = {https://doi.org/10.1108/09685220910993999}, doi = {10.1108/09685220910993999}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Workman09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ZhangRL09, author = {Jie Zhang and Brian J. Reithel and Han Li}, title = {Impact of perceived technical protection on security behaviors}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {4}, pages = {330--340}, year = {2009}, url = {https://doi.org/10.1108/09685220910993980}, doi = {10.1108/09685220910993980}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ZhangRL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BelloneBR08, author = {Jason Bellone and Segolene de Basquiat and Juan Rodriguez}, title = {Reaching escape velocity: {A} practiced approach to information security management system implementation}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {1}, pages = {49--57}, year = {2008}, url = {https://doi.org/10.1108/09685220810862742}, doi = {10.1108/09685220810862742}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BelloneBR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChenMS08, author = {Charlie C. Chen and B. Dawn Medlin and R. S. Shaw}, title = {A cross-cultural investigation of situational information security awareness programs}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {4}, pages = {360--376}, year = {2008}, url = {https://doi.org/10.1108/09685220810908787}, doi = {10.1108/09685220810908787}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChenMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChoiKGW08, author = {Namjoo Choi and Dan Jong Kim and Jahyun Goo and Andrew Whitmore}, title = {Knowing is doing: An empirical validation of the relationship between managerial information security awareness and action}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {5}, pages = {484--501}, year = {2008}, url = {https://doi.org/10.1108/09685220810920558}, doi = {10.1108/09685220810920558}, timestamp = {Thu, 08 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChoiKGW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChulkovD08, author = {Dmitriy V. Chulkov and Mayur S. Desai}, title = {Escalation and premature termination in {MIS} projects: the role of real options}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {4}, pages = {324--335}, year = {2008}, url = {https://doi.org/10.1108/09685220810908769}, doi = {10.1108/09685220810908769}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChulkovD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DesaiE08, author = {Mayur S. Desai and Thomas von der Embse}, title = {Managing electronic information: an ethics perspective}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {1}, pages = {20--27}, year = {2008}, url = {https://doi.org/10.1108/09685220810862724}, doi = {10.1108/09685220810862724}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DesaiE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HagenAH08, author = {Janne Merete Hagen and Eirik Albrechtsen and Jan Hovden}, title = {Implementation and effectiveness of organizational information security measures}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {4}, pages = {377--397}, year = {2008}, url = {https://doi.org/10.1108/09685220810908796}, doi = {10.1108/09685220810908796}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HagenAH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JohnstonW08, author = {Allen C. Johnston and Merrill Warkentin}, title = {Information privacy compliance in the healthcare industry}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {1}, pages = {5--19}, year = {2008}, url = {https://doi.org/10.1108/09685220810862715}, doi = {10.1108/09685220810862715}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/JohnstonW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KatosP08, author = {Vasilios Katos and Ahmed Patel}, title = {A partial equilibrium view on security and privacy}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {1}, pages = {74--83}, year = {2008}, url = {https://doi.org/10.1108/09685220810862760}, doi = {10.1108/09685220810862760}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KatosP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Kumbakara08, author = {Narayanan Kumbakara}, title = {Managed {IT} services: the role of {IT} standards}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {4}, pages = {336--359}, year = {2008}, url = {https://doi.org/10.1108/09685220810908778}, doi = {10.1108/09685220810908778}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Kumbakara08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LeeS08, author = {Hsu{-}Hui Lee and Mark Stamp}, title = {An agent-based privacy-enhancing model}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {3}, pages = {305--319}, year = {2008}, url = {https://doi.org/10.1108/09685220810893234}, doi = {10.1108/09685220810893234}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/LeeS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MaJP08, author = {Qingxiong Ma and Allen C. Johnston and J. Michael Pearson}, title = {Information security management objectives and practices: a parsimonious framework}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {3}, pages = {251--270}, year = {2008}, url = {https://doi.org/10.1108/09685220810893207}, doi = {10.1108/09685220810893207}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MaJP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MasrekHT08, author = {Mohamad Noorman Masrek and Norhayati Hussin and Norashimawati Tarmuchi}, title = {An exploratory study on systems development methodologies for web-based applications}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {2}, pages = {137--149}, year = {2008}, url = {https://doi.org/10.1108/09685220810879618}, doi = {10.1108/09685220810879618}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/MasrekHT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MasrekKH08, author = {Mohamad Noorman Masrek and Nor Shahriza Abdul Karim and Ramlah Hussein}, title = {The effect of organizational and individual characteristics on corporate intranet utilizations}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {2}, pages = {89--112}, year = {2008}, url = {https://doi.org/10.1108/09685220810879591}, doi = {10.1108/09685220810879591}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MasrekKH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MoreiraMBB08, author = {Edson dos Santos Moreira and Luciana Andr{\'{e}}ia Fondazzi Martimiano and Antonio Jos{\'{e}} dos Santos Brand{\~{a}}o and Mauro C{\'{e}}sar Bernardes}, title = {Ontologies for information security management and governance}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {2}, pages = {150--165}, year = {2008}, url = {https://doi.org/10.1108/09685220810879627}, doi = {10.1108/09685220810879627}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MoreiraMBB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MouratidisJN08, author = {Haralambos Mouratidis and Hamid Jahankhani and Mathews Z. Nkhoma}, title = {Management versus security specialists: an empirical study on security related perceptions}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {2}, pages = {187--205}, year = {2008}, url = {https://doi.org/10.1108/09685220810879645}, doi = {10.1108/09685220810879645}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MouratidisJN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Mutula08, author = {Stephen M. Mutula}, title = {Comparison of sub-Saharan Africa's e-government status with developed and transitional nations}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {3}, pages = {235--250}, year = {2008}, url = {https://doi.org/10.1108/09685220810893199}, doi = {10.1108/09685220810893199}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Mutula08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PatelS08, author = {Sandip C. Patel and Pritimoy Sanyal}, title = {Securing {SCADA} systems}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {4}, pages = {398--414}, year = {2008}, url = {https://doi.org/10.1108/09685220810908804}, doi = {10.1108/09685220810908804}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PatelS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Percin08, author = {Sel{\c{c}}uk Per{\c{c}}in}, title = {Fuzzy multi-criteria risk-benefit analysis of business process outsourcing {(BPO)}}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {3}, pages = {213--234}, year = {2008}, url = {https://doi.org/10.1108/09685220810893180}, doi = {10.1108/09685220810893180}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Percin08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SahayR08, author = {B. S. Sahay and Jayanthi Ranjan}, title = {Real time business intelligence in supply chain analytics}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {1}, pages = {28--48}, year = {2008}, url = {https://doi.org/10.1108/09685220810862733}, doi = {10.1108/09685220810862733}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SahayR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SekhavatF08, author = {Yoones Asgharzadeh Sekhavat and Mohammad Fathian}, title = {Efficient anonymous secure auction schema {(ASAS)} without fully trustworthy auctioneer}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {3}, pages = {288--304}, year = {2008}, url = {https://doi.org/10.1108/09685220810893225}, doi = {10.1108/09685220810893225}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SekhavatF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ThakkarKD08, author = {Jitesh Thakkar and Arun Kanda and S. G. Deshmukh}, title = {Interpretive structural modeling {(ISM)} of IT-enablers for Indian manufacturing SMEs}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {2}, pages = {113--136}, year = {2008}, url = {https://doi.org/10.1108/09685220810879609}, doi = {10.1108/09685220810879609}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ThakkarKD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TsohouKKK08, author = {Aggeliki Tsohou and Spyros Kokolakis and Maria Karyda and Evangelos A. Kiountouzis}, title = {Process-variance models in information security awareness research}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {3}, pages = {271--287}, year = {2008}, url = {https://doi.org/10.1108/09685220810893216}, doi = {10.1108/09685220810893216}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TsohouKKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/VenkatramanD08, author = {Sitalakshmi Venkatraman and Indika Delpachitra}, title = {Biometrics in banking security: a case study}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {4}, pages = {415--430}, year = {2008}, url = {https://doi.org/10.1108/09685220810908813}, doi = {10.1108/09685220810908813}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/VenkatramanD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Williams08, author = {Patricia A. H. Williams}, title = {A practical application of {CMM} to medical security capability}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {1}, pages = {58--73}, year = {2008}, url = {https://doi.org/10.1108/09685220810862751}, doi = {10.1108/09685220810862751}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Williams08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/WinjumM08, author = {Eli Winjum and Bj{\o}rn Kjetil M{\o}lmann}, title = {A multidimensional approach to multilevel security}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {5}, pages = {436--448}, year = {2008}, url = {https://doi.org/10.1108/09685220810920521}, doi = {10.1108/09685220810920521}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/WinjumM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Workman08, author = {Michael Workman}, title = {A test of interventions for security threats from social engineering}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {5}, pages = {463--483}, year = {2008}, url = {https://doi.org/10.1108/09685220810920549}, doi = {10.1108/09685220810920549}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Workman08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/WrayM08, author = {Barry Wray and Richard Mathieu}, title = {Evaluating the performance of open source software projects using data envelopment analysis}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {5}, pages = {449--462}, year = {2008}, url = {https://doi.org/10.1108/09685220810920530}, doi = {10.1108/09685220810920530}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/WrayM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ZhouVN08, author = {Lihong Zhou and Ana Vasconcelos and Jos{\'{e}} Miguel Baptista Nunes}, title = {Supporting decision making in risk management through an evidence-based information systems project risk checklist}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {2}, pages = {166--186}, year = {2008}, url = {https://doi.org/10.1108/09685220810879636}, doi = {10.1108/09685220810879636}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/ZhouVN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Abu-Musa07, author = {Ahmad A. Abu{-}Musa}, title = {Evaluating the security controls of {CAIS} in developing countries: An examination of current research}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {1}, pages = {46--63}, year = {2007}, url = {https://doi.org/10.1108/09685220710738778}, doi = {10.1108/09685220710738778}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Abu-Musa07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Abu-Musa07a, author = {Ahmad A. Abu{-}Musa}, title = {Evaluating the security controls of {CAIS} in developing countries: an empirical investigation}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {2}, pages = {128--148}, year = {2007}, url = {https://doi.org/10.1108/09685220710748038}, doi = {10.1108/09685220710748038}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Abu-Musa07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Amin07, author = {Hanudin Amin}, title = {An analysis of mobile credit card usage intentions}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {4}, pages = {260--269}, year = {2007}, url = {https://doi.org/10.1108/09685220710817789}, doi = {10.1108/09685220710817789}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Amin07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AtkinsonJP07, author = {Shirley Atkinson and Chris A. Johnson and Andrew D. Phippen}, title = {Improving protection mechanisms by understanding online risk}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {5}, pages = {382--393}, year = {2007}, url = {https://doi.org/10.1108/09685220710831125}, doi = {10.1108/09685220710831125}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AtkinsonJP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BeznosovB07, author = {Konstantin Beznosov and Olga Beznosova}, title = {On the imbalance of the security problem space and its expected consequences}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {5}, pages = {420--431}, year = {2007}, url = {https://doi.org/10.1108/09685220710831152}, doi = {10.1108/09685220710831152}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BeznosovB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ClarkeM07, author = {Nathan L. Clarke and A. R. Mekala}, title = {The application of signature recognition to transparent handwriting verification for mobile devices}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {3}, pages = {214--225}, year = {2007}, url = {https://doi.org/10.1108/09685220710759559}, doi = {10.1108/09685220710759559}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ClarkeM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FathelrahamnS07, author = {Adil Fathelrahamn and Mathew Shafaghi}, title = {Analyzing bloggers data on software design patterns and applications integration; methodology and implementation}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {2}, pages = {84--101}, year = {2007}, url = {https://doi.org/10.1108/09685220710747994}, doi = {10.1108/09685220710747994}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FathelrahamnS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FischerBFF07, author = {Klaus Peter Fischer and Udo Bleimann and Woldemar F. Fuhrmann and Steven Furnell}, title = {Analysis of security-relevant semantics of {BPEL} in cross-domain defined business processes}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {2}, pages = {116--127}, year = {2007}, url = {https://doi.org/10.1108/09685220710748010}, doi = {10.1108/09685220710748010}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FischerBFF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FolorunsoVD07, author = {Olusegun Folorunso and Olufunke R. Vincent and B. M. Dansu}, title = {Image edge detection: {A} knowledge management technique for visual scene analysis}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {1}, pages = {23--32}, year = {2007}, url = {https://doi.org/10.1108/09685220710738741}, doi = {10.1108/09685220710738741}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FolorunsoVD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Goyal07, author = {D. P. Goyal}, title = {Information systems planning practices in Indian public enterprises}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {3}, pages = {201--213}, year = {2007}, url = {https://doi.org/10.1108/09685220710759540}, doi = {10.1108/09685220710759540}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Goyal07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HerzogS07, author = {Almut Herzog and Nahid Shahmehri}, title = {Usable set-up of runtime security policies}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {5}, pages = {394--407}, year = {2007}, url = {https://doi.org/10.1108/09685220710831134}, doi = {10.1108/09685220710831134}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HerzogS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ifinedo07, author = {Princely Ifinedo}, title = {An empirical study of {ERP} success evaluations by business and {IT} managers}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {4}, pages = {270--282}, year = {2007}, url = {https://doi.org/10.1108/09685220710817798}, doi = {10.1108/09685220710817798}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Ifinedo07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Kini07, author = {Ranjan B. Kini}, title = {Vendor availability: a key factor for outsourcing in Chilean {ICT} sector}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {5}, pages = {350--361}, year = {2007}, url = {https://doi.org/10.1108/09685220710831099}, doi = {10.1108/09685220710831099}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Kini07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LancasterYHH07, author = {Sean Lancaster and David C. Yen and Albert H. Huang and Shin{-}Yuan Hung}, title = {The selection of instant messaging or e-mail: College students' perspective for computer communication}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {1}, pages = {5--22}, year = {2007}, url = {https://doi.org/10.1108/09685220710738750}, doi = {10.1108/09685220710738750}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LancasterYHH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Lazarides07, author = {Themistokles Lazarides}, title = {Comply! Resistance is futile}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {5}, pages = {339--349}, year = {2007}, url = {https://doi.org/10.1108/09685220710831080}, doi = {10.1108/09685220710831080}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Lazarides07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MarquesB07, author = {Oge Marques and Pierre Baillargeon}, title = {Design of a multimedia traffic classifier for Snort}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {3}, pages = {241--256}, year = {2007}, url = {https://doi.org/10.1108/09685220710759577}, doi = {10.1108/09685220710759577}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MarquesB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MasrekKH07, author = {Mohamad Noorman Masrek and Nor Shahriza Abdul Karim and Ramlah Hussein}, title = {Investigating corporate intranet effectiveness: a conceptual framework}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {3}, pages = {168--183}, year = {2007}, url = {https://doi.org/10.1108/09685220710759522}, doi = {10.1108/09685220710759522}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MasrekKH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MisraKK07, author = {Subhas C. Misra and Vinod Kumar and Uma Kumar}, title = {A strategic modeling technique for information security risk assessment}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {1}, pages = {64--77}, year = {2007}, url = {https://doi.org/10.1108/09685220710738787}, doi = {10.1108/09685220710738787}, timestamp = {Wed, 04 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MisraKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MitropoulosPD07, author = {Sarandis Mitropoulos and Dimitrios Patsos and Christos Douligeris}, title = {Incident response requirements for distributed security information management systems}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {3}, pages = {226--240}, year = {2007}, url = {https://doi.org/10.1108/09685220710759568}, doi = {10.1108/09685220710759568}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MitropoulosPD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/NguyenSN07, author = {ThuyUyen H. Nguyen and Joseph S. Sherif and Michael Newby}, title = {Strategies for successful {CRM} implementation}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {2}, pages = {102--115}, year = {2007}, url = {https://doi.org/10.1108/09685220710748001}, doi = {10.1108/09685220710748001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/NguyenSN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/NohlbergB07, author = {Marcus Nohlberg and Johannes B{\"{a}}ckstr{\"{o}}m}, title = {User-centred security applied to the development of a management information system}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {5}, pages = {372--381}, year = {2007}, url = {https://doi.org/10.1108/09685220710831116}, doi = {10.1108/09685220710831116}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/NohlbergB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/OngJC07, author = {Thian Song Ong and Andrew Teoh Beng Jin and Tee Connie}, title = {Personalized biometric key using fingerprint biometrics}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {4}, pages = {313--328}, year = {2007}, url = {https://doi.org/10.1108/09685220710817824}, doi = {10.1108/09685220710817824}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/OngJC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PattinsonA07, author = {Malcolm R. Pattinson and Grantley Anderson}, title = {How well are information risks being communicated to your computer end-users?}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {5}, pages = {362--371}, year = {2007}, url = {https://doi.org/10.1108/09685220710831107}, doi = {10.1108/09685220710831107}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PattinsonA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ratnasingam07, author = {Pauline Ratnasingam}, title = {A risk-control framework for e-marketplace participation: the findings of seven cases}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {2}, pages = {149--166}, year = {2007}, url = {https://doi.org/10.1108/09685220710748029}, doi = {10.1108/09685220710748029}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Ratnasingam07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SalehAB07, author = {Mohamed Saad Saleh and Abdullah Alrabiah and Saad Haj Bakry}, title = {A {STOPE} model for the investigation of compliance with {ISO} 17799-2005}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {4}, pages = {283--294}, year = {2007}, url = {https://doi.org/10.1108/09685220710817806}, doi = {10.1108/09685220710817806}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SalehAB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SebesS07, author = {E. John Sebes and Mark Stamp}, title = {Solvable problems in enterprise digital rights management}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {1}, pages = {33--45}, year = {2007}, url = {https://doi.org/10.1108/09685220710738769}, doi = {10.1108/09685220710738769}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SebesS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SveenSRG07, author = {Finn Olav Sveen and Jose M. Sarriegi and Eliot H. Rich and Jose J. Gonzalez}, title = {Toward viable information security reporting systems}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {5}, pages = {408--419}, year = {2007}, url = {https://doi.org/10.1108/09685220710831143}, doi = {10.1108/09685220710831143}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SveenSRG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TsengN07, author = {Chris Tseng and Patrick Ng}, title = {Precisiated information retrieval for {RSS} feeds}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {3}, pages = {184--200}, year = {2007}, url = {https://doi.org/10.1108/09685220710759531}, doi = {10.1108/09685220710759531}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TsengN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/VlachosS07, author = {Vasileios Vlachos and Diomidis Spinellis}, title = {A PRoactive malware identification system based on the computer hygiene principles}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {4}, pages = {295--312}, year = {2007}, url = {https://doi.org/10.1108/09685220710817815}, doi = {10.1108/09685220710817815}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/VlachosS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AgourramR06, author = {Hafid Agourram and Bill Robson}, title = {Defining information systems success in Canada}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {4}, pages = {300--311}, year = {2006}, url = {https://doi.org/10.1108/09685220610690781}, doi = {10.1108/09685220610690781}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AgourramR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Bajgoric06, author = {Nijaz Bajgoric}, title = {Information technologies for business continuity: an implementation framework}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {5}, pages = {450--466}, year = {2006}, url = {https://doi.org/10.1108/09685220610717754}, doi = {10.1108/09685220610717754}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Bajgoric06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Brown06, author = {William C. Brown}, title = {Vasa."{\textgreater}IT governance, architectural competency, and the Vasa}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {2}, pages = {140--154}, year = {2006}, url = {https://doi.org/10.1108/09685220610655889}, doi = {10.1108/09685220610655889}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Brown06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BrownRH06, author = {William Brown and Mezbahur Rahman and Travis Hacker}, title = {Home page usability and credibility: {A} comparison of the fastest growing companies to the Fortune 30 and the implications to {IT} governance}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {3}, pages = {252--269}, year = {2006}, url = {https://doi.org/10.1108/09685220610670404}, doi = {10.1108/09685220610670404}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BrownRH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChangY06, author = {Arthur Jung{-}Ting Chang and Quey{-}Jen Yeh}, title = {On security preparations against possible {IS} threats across industries}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {4}, pages = {343--360}, year = {2006}, url = {https://doi.org/10.1108/09685220610690817}, doi = {10.1108/09685220610690817}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChangY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Choo06, author = {Kim{-}Kwang Raymond Choo}, title = {Issue report on business adoption of Microsoft Passport}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {3}, pages = {218--234}, year = {2006}, url = {https://doi.org/10.1108/09685220610670387}, doi = {10.1108/09685220610670387}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Choo06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Cong06, author = {Jin Cong}, title = {A novel watermarking algorithm for resistant geometric attacks using feature points matching}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {1}, pages = {75--98}, year = {2006}, url = {https://doi.org/10.1108/09685220610648391}, doi = {10.1108/09685220610648391}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Cong06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/CurranM06, author = {Kevin Curran and Sheila McKinney}, title = {Scheduled {RSS} feeds for streaming multimedia to the desktop using {RSS} enclosures}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {1}, pages = {65--74}, year = {2006}, url = {https://doi.org/10.1108/09685220610648382}, doi = {10.1108/09685220610648382}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/CurranM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DebarV06, author = {Herv{\'{e}} Debar and Jouni Viinikka}, title = {Security information management as an outsourced service}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {5}, pages = {417--435}, year = {2006}, url = {https://doi.org/10.1108/09685220610707430}, doi = {10.1108/09685220610707430}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DebarV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DraganidisM06, author = {Fotis Draganidis and Gregoris Mentzas}, title = {Competency based management: a review of systems and approaches}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {1}, pages = {51--64}, year = {2006}, url = {https://doi.org/10.1108/09685220610648373}, doi = {10.1108/09685220610648373}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/DraganidisM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Eigeles06, author = {Dan Eigeles}, title = {Intelligent authentication, authorization, and administration {(I3A)}}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {1}, pages = {5--23}, year = {2006}, url = {https://doi.org/10.1108/09685220610648346}, doi = {10.1108/09685220610648346}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Eigeles06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Fitsilis06, author = {Panos Fitsilis}, title = {Practices and problems in managing electronic services using SLAs}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {2}, pages = {185--195}, year = {2006}, url = {https://doi.org/10.1108/09685220610678622}, doi = {10.1108/09685220610678622}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Fitsilis06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FolorunsoOS06, author = {Olusegun Folorunso and Shawn Oluwafemi Ogunseye and Sushil K. Sharma}, title = {An exploratory study of the critical factors affecting the acceptability of e-learning in Nigerian universities}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {5}, pages = {496--505}, year = {2006}, url = {https://doi.org/10.1108/09685220610717781}, doi = {10.1108/09685220610717781}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FolorunsoOS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GonzalezGL06, author = {Reyes{-}G. Gonzalez and Jose Gasco and Juan Llopis}, title = {Information systems managers' view about outsourcing in Spain}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {4}, pages = {312--326}, year = {2006}, url = {https://doi.org/10.1108/09685220610690790}, doi = {10.1108/09685220610690790}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GonzalezGL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GowanMH06, author = {J. Arthur Gowan and Richard G. Mathieu and Mark B. Hey}, title = {Earned value management in a data warehouse project}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {1}, pages = {37--50}, year = {2006}, url = {https://doi.org/10.1108/09685220610648364}, doi = {10.1108/09685220610648364}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GowanMH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HongCCT06, author = {Kwo{-}Shing Hong and Yen{-}Ping Chi and Louis R. Chao and Jih{-}Hsing Tang}, title = {An empirical study of information security policy on information security elevation in Taiwan}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {2}, pages = {104--115}, year = {2006}, url = {https://doi.org/10.1108/09685220610655861}, doi = {10.1108/09685220610655861}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HongCCT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KarydaMQ06, author = {Maria Karyda and Evangelia Mitrou and Gerald Quirchmayr}, title = {A framework for outsourcing {IS/IT} security services}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {5}, pages = {402--415}, year = {2006}, url = {https://doi.org/10.1108/09685220610707421}, doi = {10.1108/09685220610707421}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KarydaMQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KnappMRF06, author = {Kenneth J. Knapp and Thomas E. Marshall and R. Kelly Rainer Jr. and F. Nelson Ford}, title = {Information security: management's effect on culture and policy}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {1}, pages = {24--36}, year = {2006}, url = {https://doi.org/10.1108/09685220610648355}, doi = {10.1108/09685220610648355}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KnappMRF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LancasterYK06, author = {Sean Lancaster and David C. Yen and Cheng{-}Yuan Ku}, title = {E-supply chain management: an evaluation of current web initiatives}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {2}, pages = {167--184}, year = {2006}, url = {https://doi.org/10.1108/09685220610678613}, doi = {10.1108/09685220610678613}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LancasterYK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LekkasL06, author = {Dimitrios Lekkas and Costas Lambrinoudakis}, title = {Outsourcing digital signatures: a solution to key management burden}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {5}, pages = {436--449}, year = {2006}, url = {https://doi.org/10.1108/09685220610707449}, doi = {10.1108/09685220610707449}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LekkasL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LuthyF06, author = {David Luthy and Karen A. Forcht}, title = {Laws and regulations affecting information management and frameworks for assessing compliance}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {2}, pages = {155--166}, year = {2006}, url = {https://doi.org/10.1108/09685220610655898}, doi = {10.1108/09685220610655898}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LuthyF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MagklarasFB06, author = {George Magklaras and Steven Furnell and Phillip J. Brooke}, title = {Towards an insider threat prediction specification language}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {4}, pages = {361--381}, year = {2006}, url = {https://doi.org/10.1108/09685220610690826}, doi = {10.1108/09685220610690826}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MagklarasFB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MouK06, author = {Richard Mou and Brian Kleiner}, title = {Duty of care involving outsourced payroll}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {3}, pages = {284--293}, year = {2006}, url = {https://doi.org/10.1108/09685220610670422}, doi = {10.1108/09685220610670422}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MouK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PapadakiF06, author = {Maria Papadaki and Steven Furnell}, title = {Achieving automated intrusion response: a prototype implementation}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {3}, pages = {235--251}, year = {2006}, url = {https://doi.org/10.1108/09685220610670396}, doi = {10.1108/09685220610670396}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PapadakiF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PilgermannBV06, author = {Michael Pilgermann and Andrew Blyth and Stilianos Vidalis}, title = {Inter-organisational intrusion detection using knowledge grid technology}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {4}, pages = {327--342}, year = {2006}, url = {https://doi.org/10.1108/09685220610690808}, doi = {10.1108/09685220610690808}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PilgermannBV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Rehman06, author = {Sajjad ur Rehman}, title = {{IT} applications in Kuwaiti financial companies: an analysis}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {5}, pages = {467--484}, year = {2006}, url = {https://doi.org/10.1108/09685220610717763}, doi = {10.1108/09685220610717763}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Rehman06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Shalhoub06, author = {Zeinab Karake Shalhoub}, title = {Trust, privacy, and security in electronic business: the case of the {GCC} countries}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {3}, pages = {270--283}, year = {2006}, url = {https://doi.org/10.1108/09685220610670413}, doi = {10.1108/09685220610670413}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Shalhoub06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SkinnerHC06, author = {Geoff Skinner and Song Han and Elizabeth Chang}, title = {An information privacy taxonomy for collaborative environments}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {4}, pages = {382--394}, year = {2006}, url = {https://doi.org/10.1108/09685220610690835}, doi = {10.1108/09685220610690835}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/SkinnerHC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TsohouKKK06, author = {Aggeliki Tsohou and Maria Karyda and Spyros Kokolakis and Evangelos A. Kiountouzis}, title = {Formulating information systems risk management strategies through cultural theory}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {3}, pages = {198--217}, year = {2006}, url = {https://doi.org/10.1108/09685220610670378}, doi = {10.1108/09685220610670378}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TsohouKKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ZiaeeFS06, author = {Mohsen Ziaee and Mohammad Fathian and Seyed Jafar Sadjadi}, title = {A modular approach to {ERP} system selection: {A} case study}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {5}, pages = {485--495}, year = {2006}, url = {https://doi.org/10.1108/09685220610717772}, doi = {10.1108/09685220610717772}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ZiaeeFS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ZuoP06, author = {Yanjun Zuo and Brajendra Panda}, title = {Distributed database damage assessment paradigm}, journal = {Inf. Manag. Comput. Secur.}, volume = {14}, number = {2}, pages = {116--139}, year = {2006}, url = {https://doi.org/10.1108/09685220610655870}, doi = {10.1108/09685220610655870}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ZuoP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AhmedS05, author = {Fawad Ahmed and Mohammed Yakoob Siyal}, title = {A novel approach for regenerating a private key using password, fingerprint and smart card}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {1}, pages = {39--54}, year = {2005}, url = {https://doi.org/10.1108/09685220510582665}, doi = {10.1108/09685220510582665}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AhmedS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Al-AyedFZD05, author = {A. Al{-}Ayed and Steven Furnell and D. Zhao and Paul Dowland}, title = {An automated framework for managing security vulnerabilities}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {2}, pages = {156--166}, year = {2005}, url = {https://doi.org/10.1108/09685220510589334}, doi = {10.1108/09685220510589334}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Al-AyedFZD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AlsaidM05, author = {Adil Alsaid and Chris J. Mitchell}, title = {Dynamic content attacks on digital signatures}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {4}, pages = {328--336}, year = {2005}, url = {https://doi.org/10.1108/09685220510614443}, doi = {10.1108/09685220510614443}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AlsaidM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BelsisKK05, author = {Petros Belsis and Spyros Kokolakis and Evangelos A. Kiountouzis}, title = {Information systems security from a knowledge management perspective}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {3}, pages = {189--202}, year = {2005}, url = {https://doi.org/10.1108/09685220510602013}, doi = {10.1108/09685220510602013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BelsisKK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BlythT05, author = {Andrew Blyth and Paula Thomas}, title = {An XML-based architecture for data integration in vulnerability assessments}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {4}, pages = {260--273}, year = {2005}, url = {https://doi.org/10.1108/09685220510614399}, doi = {10.1108/09685220510614399}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BlythT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BrownN05, author = {William Brown and Frank Nasuti}, title = {What {ERP} systems can tell us about Sarbanes-Oxley}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {4}, pages = {311--327}, year = {2005}, url = {https://doi.org/10.1108/09685220510614434}, doi = {10.1108/09685220510614434}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BrownN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChouTC05, author = {David C. Chou and Hima Bindu Tripuramallu and Amy Y. Chou}, title = {{BI} and {ERP} integration}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {5}, pages = {340--349}, year = {2005}, url = {https://doi.org/10.1108/09685220510627241}, doi = {10.1108/09685220510627241}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChouTC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChulkovD05, author = {Dmitriy V. Chulkov and Mayur S. Desai}, title = {Information technology project failures: Applying the bandit problem to evaluate managerial decision making}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {2}, pages = {135--143}, year = {2005}, url = {https://doi.org/10.1108/09685220510589316}, doi = {10.1108/09685220510589316}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChulkovD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/CoetzeeE05, author = {Marijke Coetzee and Jan H. P. Eloff}, title = {An access control framework for web services}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {1}, pages = {29--38}, year = {2005}, url = {https://doi.org/10.1108/09685220510582656}, doi = {10.1108/09685220510582656}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/CoetzeeE05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Eigeles05, author = {Dan Eigeles}, title = {Intelligent authentication, authorization, and administration {(I3A)}}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {5}, pages = {419--434}, year = {2005}, url = {https://doi.org/10.1108/09685220510627296}, doi = {10.1108/09685220510627296}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Eigeles05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FolorunsoO05, author = {Olusegun Folorunso and Adewale Akintayo Ogunde}, title = {Data mining as a technique for knowledge management in business process redesign}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {4}, pages = {274--280}, year = {2005}, url = {https://doi.org/10.1108/09685220510614407}, doi = {10.1108/09685220510614407}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FolorunsoO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GonzalezGL05, author = {Reyes{-}G. Gonzalez and Jose Gasco and Juan Llopis}, title = {Information systems outsourcing success factors: a review and some results}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {5}, pages = {399--418}, year = {2005}, url = {https://doi.org/10.1108/09685220510627287}, doi = {10.1108/09685220510627287}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GonzalezGL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Gritzalis05, author = {Stefanos Gritzalis}, title = {A good-practice guidance on the use of {PKI} services in the public sector of the European Union member states}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {5}, pages = {379--398}, year = {2005}, url = {https://doi.org/10.1108/09685220510627278}, doi = {10.1108/09685220510627278}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Gritzalis05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GuptaH05, author = {Atul Gupta and Rex Hammond}, title = {Information systems security issues and decisions for small businesses: An empirical examination}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {4}, pages = {297--310}, year = {2005}, url = {https://doi.org/10.1108/09685220510614425}, doi = {10.1108/09685220510614425}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GuptaH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KeshR05, author = {Someswar Kesh and M. K. Raja}, title = {Development of a qualitative reasoning model for financial forecasting}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {2}, pages = {167--179}, year = {2005}, url = {https://doi.org/10.1108/09685220510582638}, doi = {10.1108/09685220510582638}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KeshR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Lai05, author = {Iat Long Alex Lai}, title = {Knowledge management for Chinese medicines: a conceptual model}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {3}, pages = {244--255}, year = {2005}, url = {https://doi.org/10.1108/09685220510602059}, doi = {10.1108/09685220510602059}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Lai05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LuHH05, author = {Hsi{-}Peng Lu and Chin{-}Lung Hsu and Hsiu{-}Ying Hsu}, title = {An empirical study of the effect of perceived risk upon intention to use online applications}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {2}, pages = {106--120}, year = {2005}, url = {https://doi.org/10.1108/09685220510589299}, doi = {10.1108/09685220510589299}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LuHH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MarnewickL05, author = {Carl Marnewick and Les Labuschagne}, title = {A conceptual model for enterprise resource planning {(ERP)}}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {2}, pages = {144--155}, year = {2005}, url = {https://doi.org/10.1108/09685220510589325}, doi = {10.1108/09685220510589325}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MarnewickL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MazhelisMV05, author = {Oleksiy Mazhelis and Jouni Markkula and Jari Veijalainen}, title = {An integrated identity verification system for mobile terminals}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {5}, pages = {367--378}, year = {2005}, url = {https://doi.org/10.1108/09685220510627269}, doi = {10.1108/09685220510627269}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/MazhelisMV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MetaxiotisZNP05, author = {Kostas S. Metaxiotis and Ioannis Zafeiropoulos and Konstantina Nikolinakou and John E. Psarras}, title = {Goal directed project management methodology for the support of {ERP} implementation and optimal adaptation procedure}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {1}, pages = {55--71}, year = {2005}, url = {https://doi.org/10.1108/09685220510582674}, doi = {10.1108/09685220510582674}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MetaxiotisZNP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PatiD05, author = {Niranjan Pati and Mayur S. Desai}, title = {Conceptualizing strategic issues in information technology outsourcing}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {4}, pages = {281--296}, year = {2005}, url = {https://doi.org/10.1108/09685220510614416}, doi = {10.1108/09685220510614416}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PatiD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RedmanWH05, author = {J. Redman and Matthew J. Warren and William Hutchinson}, title = {System survivability: a critical security problem}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {3}, pages = {182--188}, year = {2005}, url = {https://doi.org/10.1108/09685220510602004}, doi = {10.1108/09685220510602004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RedmanWH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RileyK05, author = {Richard A. Riley Jr. and Virginia Franke Kleist}, title = {The biometric technologies business case: a systematic approach}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {2}, pages = {89--105}, year = {2005}, url = {https://doi.org/10.1108/09685220510589280}, doi = {10.1108/09685220510589280}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RileyK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ShihW05, author = {Stephen C. Shih and H. Joseph Wen}, title = {E-enterprise security management life cycle}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {2}, pages = {121--134}, year = {2005}, url = {https://doi.org/10.1108/09685220510589307}, doi = {10.1108/09685220510589307}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ShihW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Smith05, author = {Alan D. Smith}, title = {Exploring radio frequency identification technology and its impact on business systems}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {1}, pages = {16--28}, year = {2005}, url = {https://doi.org/10.1108/09685220510582647}, doi = {10.1108/09685220510582647}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Smith05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SodiyaL05, author = {Adesina S. Sodiya and H. O. D. Longe}, title = {An improved two-tiered strategy to intrusion detection}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {3}, pages = {235--243}, year = {2005}, url = {https://doi.org/10.1108/09685220510602040}, doi = {10.1108/09685220510602040}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SodiyaL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SodiyaLA05, author = {Adesina S. Sodiya and H. O. D. Longe and Adio T. Akinwale}, title = {Maintaining privacy in anomaly-based intrusion detection systems}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {1}, pages = {72--80}, year = {2005}, url = {https://doi.org/10.1108/09685220510582683}, doi = {10.1108/09685220510582683}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SodiyaLA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/StengelFBS05, author = {Ingo Stengel and Klaus Peter Fischer and Udo Bleimann and Jeanne Stynes}, title = {Mitigating the mobile agent malicious host problem by using communication patterns}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {3}, pages = {203--211}, year = {2005}, url = {https://doi.org/10.1108/09685220510602022}, doi = {10.1108/09685220510602022}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/StengelFBS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Stewart05, author = {Andrew Stewart}, title = {Information security technologies as a commodity input}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {1}, pages = {5--15}, year = {2005}, url = {https://doi.org/10.1108/09685220510582629}, doi = {10.1108/09685220510582629}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Stewart05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ZafiropoulosMA05, author = {Ioannis Zafeiropoulos and Kostas S. Metaxiotis and Dimitris Askounis}, title = {Dynamic risk management system for the modeling, optimal adaptation and implementation of an {ERP} system}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {3}, pages = {212--234}, year = {2005}, url = {https://doi.org/10.1108/09685220510602031}, doi = {10.1108/09685220510602031}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ZafiropoulosMA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ZhouOL05, author = {Jianying Zhou and Jose Antonio Onieva and Javier L{\'{o}}pez}, title = {Optimized multi-party certified email protocols}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {5}, pages = {350--366}, year = {2005}, url = {https://doi.org/10.1108/09685220510627250}, doi = {10.1108/09685220510627250}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ZhouOL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BahliB04, author = {Bouchaib Bahli and Younes Benslimane}, title = {An exploration of wireless computing risks: Development of a risk taxonomy}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {3}, pages = {245--254}, year = {2004}, url = {https://doi.org/10.1108/09685220410542606}, doi = {10.1108/09685220410542606}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BahliB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Beheshti04, author = {Hooshang M. Beheshti}, title = {The impact of {IT} on SMEs in the United States}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {4}, pages = {318--327}, year = {2004}, url = {https://doi.org/10.1108/09685220410553532}, doi = {10.1108/09685220410553532}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Beheshti04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BelhadjaliW04, author = {Moncef Belhadjali and Gary L. Whaley}, title = {A data mining approach to neural network training}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {1}, pages = {117--124}, year = {2004}, url = {https://doi.org/10.1108/09685220410518874}, doi = {10.1108/09685220410518874}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BelhadjaliW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BothaS04, author = {Jacques Botha and Rossouw von Solms}, title = {A cyclic approach to business continuity planning}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {4}, pages = {328--337}, year = {2004}, url = {https://doi.org/10.1108/09685220410553541}, doi = {10.1108/09685220410553541}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BothaS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChouTY04, author = {David C. Chou and Xin Tan and David C. Yen}, title = {Web technology and supply chain management}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {4}, pages = {338--349}, year = {2004}, url = {https://doi.org/10.1108/09685220410553550}, doi = {10.1108/09685220410553550}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChouTY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DesaiDO04, author = {Mayur S. Desai and Kiran J. Desai and Lucy Ojode}, title = {A global information technology model: business applications in developing economies (case studies)}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {5}, pages = {401--410}, year = {2004}, url = {https://doi.org/10.1108/09685220410563388}, doi = {10.1108/09685220410563388}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DesaiDO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/EmbseDD04, author = {Thomas von der Embse and Mayur S. Desai and Seema Desai}, title = {How well are corporate ethics codes and policies applied in the trenches? Key factors and conditions}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {2}, pages = {146--153}, year = {2004}, url = {https://doi.org/10.1108/09685220410530780}, doi = {10.1108/09685220410530780}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/EmbseDD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Foltz04, author = {C. Bryan Foltz}, title = {Cyberterrorism, computer crime, and reality}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {2}, pages = {154--166}, year = {2004}, url = {https://doi.org/10.1108/09685220410530799}, doi = {10.1108/09685220410530799}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Foltz04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FurnellPD04, author = {Steven Furnell and I. Papadopoulos and Paul Dowland}, title = {A long-term trial of alternative user authentication technologies}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {2}, pages = {178--190}, year = {2004}, url = {https://doi.org/10.1108/09685220410530816}, doi = {10.1108/09685220410530816}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FurnellPD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Gritzalis04, author = {Dimitris Gritzalis}, title = {Embedding privacy in {IT} applications development}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {1}, pages = {8--26}, year = {2004}, url = {https://doi.org/10.1108/09685220410518801}, doi = {10.1108/09685220410518801}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Gritzalis04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Gritzalis04a, author = {Stefanos Gritzalis}, title = {Enhancing Web privacy and anonymity in the digital era}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {3}, pages = {255--287}, year = {2004}, url = {https://doi.org/10.1108/09685220410542615}, doi = {10.1108/09685220410542615}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Gritzalis04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GrupeJ04, author = {Fritz H. Grupe and Simon Jooste}, title = {Genetic algorithms: {A} business perspective}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {3}, pages = {288--297}, year = {2004}, url = {https://doi.org/10.1108/09685220410542624}, doi = {10.1108/09685220410542624}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GrupeJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LimSV04, author = {Billy B. L. Lim and Yan Sun and Joaquin Vila}, title = {Incorporating WS-Security into a Web services-based portal}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {3}, pages = {206--217}, year = {2004}, url = {https://doi.org/10.1108/09685220410542570}, doi = {10.1108/09685220410542570}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LimSV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LiuTW04, author = {Jau{-}Yang Liu and Jyh{-}Horng Michael Tarn and H. Joseph Wen}, title = {Adopting e-commerce Web site operation modes: The current state of large {US} firms}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {1}, pages = {73--90}, year = {2004}, url = {https://doi.org/10.1108/09685220410518847}, doi = {10.1108/09685220410518847}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LiuTW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Maguire04, author = {Stuart Maguire}, title = {Reconciling the system requirements process in changing business environments}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {4}, pages = {362--372}, year = {2004}, url = {https://doi.org/10.1108/09685220410553578}, doi = {10.1108/09685220410553578}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Maguire04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MarisMPNTA04, author = {Kostas Maris and Kostas S. Metaxiotis and G. Pantou and Konstantinos Nikolopoulos and Eleni Tavanidou and Vassilis Assimakopoulos}, title = {{D-TIFIS:} a decision support system for options trading}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {1}, pages = {45--65}, year = {2004}, url = {https://doi.org/10.1108/09685220410518829}, doi = {10.1108/09685220410518829}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MarisMPNTA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Metaxiotis04, author = {Kostas S. Metaxiotis}, title = {{RECOT:} an expert system for the reduction of environmental cost in the textile industry}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {3}, pages = {218--227}, year = {2004}, url = {https://doi.org/10.1108/09685220410542589}, doi = {10.1108/09685220410542589}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Metaxiotis04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MoulinosIT04, author = {Konstantinos Moulinos and John Iliadis and Vassilis Tsoumas}, title = {Towards secure sealing of privacy policies}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {4}, pages = {350--361}, year = {2004}, url = {https://doi.org/10.1108/09685220410553569}, doi = {10.1108/09685220410553569}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MoulinosIT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Petrovic-LazarevicS04, author = {Sonja Petrovic{-}Lazarevic and Amrik S. Sohal}, title = {Nature of e-business ethical dilemmas}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {2}, pages = {167--177}, year = {2004}, url = {https://doi.org/10.1108/09685220410530807}, doi = {10.1108/09685220410530807}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Petrovic-LazarevicS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RawatGP04, author = {Sanjay Rawat and Ved Prakash Gulati and Arun K. Pujari}, title = {Frequency- and ordering-based similarity measure for host-based intrusion detection}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {5}, pages = {411--421}, year = {2004}, url = {https://doi.org/10.1108/09685220410563397}, doi = {10.1108/09685220410563397}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RawatGP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RaziTS04, author = {Muhammad A. Razi and J. Michael Tarn and Faisal A. Siddiqui}, title = {Exploring the failure and success of DotComs}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {3}, pages = {228--244}, year = {2004}, url = {https://doi.org/10.1108/09685220410542598}, doi = {10.1108/09685220410542598}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RaziTS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RehmanM04, author = {Sajjad ur Rehman and Laila Marouf}, title = {Human resources for information management operations in Kuwaiti corporate companies}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {2}, pages = {191--201}, year = {2004}, url = {https://doi.org/10.1108/09685220410530825}, doi = {10.1108/09685220410530825}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RehmanM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RuppS04, author = {William T. Rupp and Alan D. Smith}, title = {Exploring the impacts of {P2P} networks on the entertainment industry}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {1}, pages = {102--116}, year = {2004}, url = {https://doi.org/10.1108/09685220410518865}, doi = {10.1108/09685220410518865}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RuppS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SodiyaLA04, author = {Adesina S. Sodiya and H. O. D. Longe and Adio T. Akinwale}, title = {A new two-tiered strategy to intrusion detection}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {1}, pages = {27--44}, year = {2004}, url = {https://doi.org/10.1108/09685220410518810}, doi = {10.1108/09685220410518810}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SodiyaLA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Srinivasan04, author = {S. Srinivasan}, title = {Role of trust in e-business success}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {1}, pages = {66--72}, year = {2004}, url = {https://doi.org/10.1108/09685220410518838}, doi = {10.1108/09685220410518838}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Srinivasan04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TsoumasT04, author = {Vassilis Tsoumas and Theodore Tryfonas}, title = {From risk analysis to effective security management: towards an automated approach}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {1}, pages = {91--101}, year = {2004}, url = {https://doi.org/10.1108/09685220410518856}, doi = {10.1108/09685220410518856}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TsoumasT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Xing-fenY04, author = {Xing{-}fen Wang and Yi{-}jun Li}, title = {Formal definition and implementation of business-oriented SoD access control policy}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {5}, pages = {379--388}, year = {2004}, url = {https://doi.org/10.1108/09685220410563351}, doi = {10.1108/09685220410563351}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Xing-fenY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ZhaoYC04, author = {Ning Zhao and David C. Yen and I{-}Chiu Chang}, title = {Auditing in the e-commerce era}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {5}, pages = {389--400}, year = {2004}, url = {https://doi.org/10.1108/09685220410563360}, doi = {10.1108/09685220410563360}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ZhaoYC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ZorkadisD04, author = {Vasilios Zorkadis and P. Donos}, title = {On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {1}, pages = {125--137}, year = {2004}, url = {https://doi.org/10.1108/09685220410518883}, doi = {10.1108/09685220410518883}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ZorkadisD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AbouzakharM03, author = {Nasser Salem Abouzakhar and Gordon A. Manson}, title = {Networks security measures using neuro-fuzzy agents}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {1}, pages = {33--38}, year = {2003}, url = {https://doi.org/10.1108/09685220310463713}, doi = {10.1108/09685220310463713}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AbouzakharM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AljifriPC03, author = {Hassan Aljifri and Alexander Perez{-}Pons and Daniel Collins}, title = {Global e-commerce: a framework for understanding and overcoming the trust barrier}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {3}, pages = {130--138}, year = {2003}, url = {https://doi.org/10.1108/09685220310480417}, doi = {10.1108/09685220310480417}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AljifriPC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ArmstrongF03, author = {Helen L. Armstrong and Patrick J. Forde}, title = {Internet anonymity practices in computer crime}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {5}, pages = {209--215}, year = {2003}, url = {https://doi.org/10.1108/09685220310500117}, doi = {10.1108/09685220310500117}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ArmstrongF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ClarkeFLR03, author = {Nathan L. Clarke and Steven Furnell and Benn Lines and Paul L. Reynolds}, title = {Keystroke dynamics on a mobile handset: a feasibility study}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {4}, pages = {161--166}, year = {2003}, url = {https://doi.org/10.1108/09685220310489526}, doi = {10.1108/09685220310489526}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ClarkeFLR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DesaiRD03, author = {Mayur S. Desai and Thomas C. Richards and Kiran J. Desai}, title = {E-commerce policies and customer privacy}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {1}, pages = {19--27}, year = {2003}, url = {https://doi.org/10.1108/09685220310463696}, doi = {10.1108/09685220310463696}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DesaiRD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FocacciMGD03, author = {Luisa Focacci and Robert J. Mockler and Marc E. Gartenfeld and Dorothy G. Dologite}, title = {How to choose an {ASP:} selection guidelines}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {2}, pages = {67--73}, year = {2003}, url = {https://doi.org/10.1108/09685220310468628}, doi = {10.1108/09685220310468628}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FocacciMGD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FulfordD03, author = {Heather Fulford and Neil F. Doherty}, title = {The application of information security policies in large UK-based organizations: an exploratory investigation}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {3}, pages = {106--114}, year = {2003}, url = {https://doi.org/10.1108/09685220310480381}, doi = {10.1108/09685220310480381}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FulfordD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GargCH03, author = {Ashish Garg and Jeffrey Curtis and Hilary Halper}, title = {Quantifying the financial impact of {IT} security breaches}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {2}, pages = {74--83}, year = {2003}, url = {https://doi.org/10.1108/09685220310468646}, doi = {10.1108/09685220310468646}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GargCH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Grupe03, author = {Fritz H. Grupe}, title = {Information systems professionals and conflict of interest}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {1}, pages = {28--32}, year = {2003}, url = {https://doi.org/10.1108/09685220310463704}, doi = {10.1108/09685220310463704}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Grupe03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HongCCT03, author = {Kwo{-}Shing Hong and Yen{-}Ping Chi and Louis R. Chao and Jih{-}Hsing Tang}, title = {An integrated system theory of information security management}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {5}, pages = {243--248}, year = {2003}, url = {https://doi.org/10.1108/09685220310500153}, doi = {10.1108/09685220310500153}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HongCCT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MetaxiotisESP03, author = {Kostas S. Metaxiotis and Konstantinos Ergazakis and Emanuel Samouilidis and John E. Psarras}, title = {Decision support through knowledge management: the role of the artificial intelligence}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {5}, pages = {216--221}, year = {2003}, url = {https://doi.org/10.1108/09685220310500126}, doi = {10.1108/09685220310500126}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MetaxiotisESP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MetaxiotisPS03, author = {Kostas S. Metaxiotis and John E. Psarras and Emanuel Samouilidis}, title = {Integrating fuzzy logic into decision suppport systems: current research and future prospects}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {2}, pages = {53--59}, year = {2003}, url = {https://doi.org/10.1108/09685220310468592}, doi = {10.1108/09685220310468592}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MetaxiotisPS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Moghe03, author = {Vidya Moghe}, title = {Privacy management - a new era in the Australian business environment}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {2}, pages = {60--66}, year = {2003}, url = {https://doi.org/10.1108/09685220310468600}, doi = {10.1108/09685220310468600}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Moghe03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/NgL03, author = {Jimmy J. M. Ng and K. X. Li}, title = {Implications of {ICT} for knowledge management in globalization}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {4}, pages = {167--174}, year = {2003}, url = {https://doi.org/10.1108/09685220310489535}, doi = {10.1108/09685220310489535}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/NgL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/NikolopoulosMAT03, author = {Konstantinos Nikolopoulos and Kostas S. Metaxiotis and Vassilis Assimakopoulos and Eleni Tavanidou}, title = {A first approach to e-forecasting: a survey of forecasting Web services}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {3}, pages = {146--152}, year = {2003}, url = {https://doi.org/10.1108/09685220310480435}, doi = {10.1108/09685220310480435}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/NikolopoulosMAT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ramaswamy03, author = {Raju Ramaswamy}, title = {A novel approach to solve {DSL} network data rate problems}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {4}, pages = {187--194}, year = {2003}, url = {https://doi.org/10.1108/09685220310489553}, doi = {10.1108/09685220310489553}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Ramaswamy03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SeleznyovP03, author = {Alexandr Seleznyov and Seppo Puuronen}, title = {Using continuous user authentication to detect masqueraders}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {3}, pages = {139--145}, year = {2003}, url = {https://doi.org/10.1108/09685220310480426}, doi = {10.1108/09685220310480426}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SeleznyovP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SherifA03, author = {Joseph S. Sherif and Rod Ayers}, title = {Intrusion detection: methods and systems. Part {II}}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {5}, pages = {222--229}, year = {2003}, url = {https://doi.org/10.1108/09685220310500135}, doi = {10.1108/09685220310500135}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SherifA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SherifAD03, author = {Joseph S. Sherif and Rod Ayers and Tommy G. Dearmond}, title = {Intrusion detection: the art and the practice. Part {I}}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {4}, pages = {175--186}, year = {2003}, url = {https://doi.org/10.1108/10.1108/09685220310489544}, doi = {10.1108/10.1108/09685220310489544}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SherifAD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SherifG03, author = {Joseph S. Sherif and David P. Gilliam}, title = {Deployment of anti-virus software: a case study}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {1}, pages = {5--10}, year = {2003}, url = {https://doi.org/10.1108/09685220310463678}, doi = {10.1108/09685220310463678}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SherifG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SkoularidouS03, author = {Victoria Skoularidou and Diomidis Spinellis}, title = {Security architectures for network clients}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {2}, pages = {84--91}, year = {2003}, url = {https://doi.org/10.1108/09685220310468664}, doi = {10.1108/09685220310468664}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SkoularidouS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Smith03, author = {Alan D. Smith}, title = {Exploring potential strategic impacts of XML-related technologies}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {2}, pages = {92--100}, year = {2003}, url = {https://doi.org/10.1108/09685220310468673}, doi = {10.1108/09685220310468673}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Smith03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SmithR03, author = {Alan D. Smith and William T. Rupp}, title = {Application service providers: an application of the transaction cost model}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {1}, pages = {11--18}, year = {2003}, url = {https://doi.org/10.1108/09685220310463687}, doi = {10.1108/09685220310463687}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SmithR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TemtimeCS03, author = {Z. T. Temtime and S. V. Chinyoka and J. P. W. Shunda}, title = {Toward strategic use of {IT} in SMEs: a developing country perspective}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {5}, pages = {230--237}, year = {2003}, url = {https://doi.org/10.1108/09685220310500144}, doi = {10.1108/09685220310500144}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TemtimeCS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/WarrenH03, author = {Matthew J. Warren and William Hutchinson}, title = {A security risk management approach for e-commerce}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {5}, pages = {238--242}, year = {2003}, url = {https://doi.org/10.1108/09685220310509028}, doi = {10.1108/09685220310509028}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/WarrenH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/WolfS03, author = {H. J. A. (Rens) de Wolf and Marcel E. M. Spruit}, title = {Stealth tracing: Subliminal Traceroute}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {3}, pages = {123--129}, year = {2003}, url = {https://doi.org/10.1108/09685220310480408}, doi = {10.1108/09685220310480408}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/WolfS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Xenitellis03, author = {Simeon Xenitellis}, title = {Identifying security vulnerabilities through input flow tracing and analysis}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {4}, pages = {195--199}, year = {2003}, url = {https://doi.org/10.1108/09685220310489562}, doi = {10.1108/09685220310489562}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Xenitellis03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/YangZ03, author = {Cungang Yang and Chang N. Zhang}, title = {An XML-based administration method on role-based access control in the enterprise environment}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {5}, pages = {249--257}, year = {2003}, url = {https://doi.org/10.1108/09685220310500162}, doi = {10.1108/09685220310500162}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/YangZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ZengCY03, author = {Yun E. Zeng and Roger H. L. Chiang and David C. Yen}, title = {Enterprise integration with advanced information technologies: {ERP} and data warehousing}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {3}, pages = {115--122}, year = {2003}, url = {https://doi.org/10.1108/09685220310480390}, doi = {10.1108/09685220310480390}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ZengCY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ZengWY03, author = {Yun E. Zeng and H. Joseph Wen and David C. Yen}, title = {Customer relationship management {(CRM)} in business-to-business {(B2B)} e-commerce}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {1}, pages = {39--44}, year = {2003}, url = {https://doi.org/10.1108/09685220310463722}, doi = {10.1108/09685220310463722}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ZengWY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AbouzakharM02, author = {Nasser Salem Abouzakhar and Gordon A. Manson}, title = {An intelligent approach to prevent distributed systems attacks}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {5}, pages = {203--209}, year = {2002}, url = {https://doi.org/10.1108/09685220210447505}, doi = {10.1108/09685220210447505}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AbouzakharM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BothaS02, author = {Martin Botha and Rossouw von Solms}, title = {The utilization of trend analysis in the effective monitoring of information security. Part 2: the model}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {1}, pages = {5--11}, year = {2002}, url = {https://doi.org/10.1108/09685220210417454}, doi = {10.1108/09685220210417454}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BothaS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DesaiRE02, author = {Mayur S. Desai and Thomas C. Richards and Thomas von der Embse}, title = {System insecurity - firewalls}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {3}, pages = {135--139}, year = {2002}, url = {https://doi.org/10.1108/09685220210431890}, doi = {10.1108/09685220210431890}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DesaiRE02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FengW02, author = {Feng Hao and Chan Choong Wah}, title = {Private key generation from on-line handwritten signatures}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {4}, pages = {159--164}, year = {2002}, url = {https://doi.org/10.1108/09685220210436949}, doi = {10.1108/09685220210436949}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FengW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FranceYWC02, author = {Tim France and Dave Yen and Jyun{-}Cheng Wang and Chia{-}Ming Chang}, title = {Integrating search engines with data mining for customer-oriented information search}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {5}, pages = {242--254}, year = {2002}, url = {https://doi.org/10.1108/09685220210446597}, doi = {10.1108/09685220210446597}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FranceYWC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Furnell02, author = {Kevin Fitzgerald}, title = {Steven Furnell: Cybercrime - vandalizing the information society (Review)}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {4}, pages = {196}, year = {2002}, url = {https://doi.org/10.1108/imcs.2002.10.4.196.1}, doi = {10.1108/IMCS.2002.10.4.196.1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Furnell02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HarrisY02, author = {Austin Jay Harris and David C. Yen}, title = {Biometric authentication: assuring access to information}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {1}, pages = {12--19}, year = {2002}, url = {https://doi.org/10.1108/09685220210417463}, doi = {10.1108/09685220210417463}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HarrisY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Higgins02, author = {Huong Ngo Higgins}, title = {Auditing disclosure risks of on-line broker-dealers}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {2}, pages = {73--76}, year = {2002}, url = {https://doi.org/10.1108/09685220210424131}, doi = {10.1108/09685220210424131}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Higgins02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/IrakleousFDP02, author = {I. Irakleous and Steven Furnell and Paul Dowland and Maria Papadaki}, title = {An experimental comparison of secret-based user authentication technologies}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {3}, pages = {100--108}, year = {2002}, url = {https://doi.org/10.1108/09685220210431854}, doi = {10.1108/09685220210431854}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/IrakleousFDP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JainSV02, author = {Gaurav Jain and Deepali Singh and Shekhar Verma}, title = {Service level agreements in {IP} networks}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {4}, pages = {171--177}, year = {2002}, url = {https://doi.org/10.1108/09685220210436967}, doi = {10.1108/09685220210436967}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JainSV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KeshNR02, author = {Someswar Kesh and Sridhar P. Nerur and Sam Ramanujan}, title = {Quality of service - technology and implementation}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {2}, pages = {85--91}, year = {2002}, url = {https://doi.org/10.1108/09685220210424168}, doi = {10.1108/09685220210424168}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KeshNR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KeshRN02, author = {Someswar Kesh and Sam Ramanujan and Sridhar P. Nerur}, title = {A framework for analyzing e-commerce security}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {4}, pages = {149--158}, year = {2002}, url = {https://doi.org/10.1108/09685220210436930}, doi = {10.1108/09685220210436930}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KeshRN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Kini02, author = {Ranjan B. Kini}, title = {{IT} in manufacturing for performance: the challenge for Thai manufacturers}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {1}, pages = {41--48}, year = {2002}, url = {https://doi.org/10.1108/09685220210417508}, doi = {10.1108/09685220210417508}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Kini02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KruckGMBF02, author = {S. E. Kruck and Danny Gottovi and Farideh Moghadami and Ralph Broom and Karen A. Forcht}, title = {Protecting personal privacy on the Internet}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {2}, pages = {77--84}, year = {2002}, url = {https://doi.org/10.1108/09685220210424140}, doi = {10.1108/09685220210424140}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KruckGMBF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LeeL02, author = {Jintae Lee and Younghwa Lee}, title = {A holistic model of computer abuse within organizations}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {2}, pages = {57--63}, year = {2002}, url = {https://doi.org/10.1108/09685220210424104}, doi = {10.1108/09685220210424104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LeeL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LimW02, author = {Billy B. L. Lim and H. Joseph Wen}, title = {The impact of next generation {XML}}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {1}, pages = {33--40}, year = {2002}, url = {https://doi.org/10.1108/09685220210417490}, doi = {10.1108/09685220210417490}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LimW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Lunn02, author = {Mark Lunn}, title = {Using business models and revenue streams for digital marketplace success}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {1}, pages = {20--27}, year = {2002}, url = {https://doi.org/10.1108/09685220210417472}, doi = {10.1108/09685220210417472}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Lunn02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Maguire02, author = {Stuart Maguire}, title = {Identifying risks during information system development: managing the process}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {3}, pages = {126--134}, year = {2002}, url = {https://doi.org/10.1108/09685220210431881}, doi = {10.1108/09685220210431881}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Maguire02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Mamaghani02, author = {Farrokh Mamaghani}, title = {Evaluation and selection of an antivirus and content filtering software}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {1}, pages = {28--32}, year = {2002}, url = {https://doi.org/10.1108/09685220210417481}, doi = {10.1108/09685220210417481}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Mamaghani02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MetaxiotisPP02, author = {Kostas S. Metaxiotis and John E. Psarras and Stefanos Papastefanatos}, title = {Knowledge and information management in e-learning environments; the user agent architecture}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {4}, pages = {165--170}, year = {2002}, url = {https://doi.org/10.1108/09685220210436958}, doi = {10.1108/09685220210436958}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MetaxiotisPP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ratnasingam02, author = {Pauline Ratnasingam}, title = {The importance of technology trust in Web services security}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {5}, pages = {255--260}, year = {2002}, url = {https://doi.org/10.1108/09685220210447514}, doi = {10.1108/09685220210447514}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Ratnasingam02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RodgersYC02, author = {John A. Rodgers and David C. Yen and David C. Chou}, title = {Developing e-business; a strategic approach}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {4}, pages = {184--192}, year = {2002}, url = {https://doi.org/10.1108/09685220210436985}, doi = {10.1108/09685220210436985}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RodgersYC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Siponen02, author = {Mikko T. Siponen}, title = {Towards maturity of information security maturity criteria: six lessons learned from software maturity criteria}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {5}, pages = {210--224}, year = {2002}, url = {https://doi.org/10.1108/09685220210446560}, doi = {10.1108/09685220210446560}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Siponen02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SmithO02, author = {Alan D. Smith and O. Felix Offodile}, title = {Information management of automatic data capture: an overview of technical developments}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {3}, pages = {109--118}, year = {2002}, url = {https://doi.org/10.1108/09685220210431863}, doi = {10.1108/09685220210431863}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SmithO02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SmithR02, author = {Alan D. Smith and William T. Rupp}, title = {Application service providers {(ASP):} moving downstream to enhance competitive advantage}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {2}, pages = {64--72}, year = {2002}, url = {https://doi.org/10.1108/09685220210424113}, doi = {10.1108/09685220210424113}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SmithR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SmithR02a, author = {Alan D. Smith and William T. Rupp}, title = {Issues in cybersecurity; understanding the potential risks associated with hackers/crackers}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {4}, pages = {178--183}, year = {2002}, url = {https://doi.org/10.1108/09685220210436976}, doi = {10.1108/09685220210436976}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SmithR02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TranA02, author = {Elizabeth Tran and MaryAnne Atkinson}, title = {Security of personal data across national borders}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {5}, pages = {237--241}, year = {2002}, url = {https://doi.org/10.1108/09685220210446588}, doi = {10.1108/09685220210446588}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TranA02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/VermeulenS02, author = {Clive Vermeulen and Rossouw von Solms}, title = {The information security management toolbox - taking the pain out of security management}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {3}, pages = {119--125}, year = {2002}, url = {https://doi.org/10.1108/09685220210431872}, doi = {10.1108/09685220210431872}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/VermeulenS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ZhangY02, author = {Chang N. Zhang and Cungang Yang}, title = {Information flow analysis on role-based access control model}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {5}, pages = {225--236}, year = {2002}, url = {https://doi.org/10.1108/09685220210446579}, doi = {10.1108/09685220210446579}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ZhangY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ali01, author = {H. Arafat Ali}, title = {A new model for monitoring intrusion based on Petri Nets}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {4}, pages = {175--182}, year = {2001}, url = {https://doi.org/10.1108/EUM0000000005807}, doi = {10.1108/EUM0000000005807}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Ali01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Badamas01, author = {Muhammed A. Badamas}, title = {Mobile computer systems - security considerations}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {3}, pages = {134--136}, year = {2001}, url = {https://doi.org/10.1108/EUM0000000005545}, doi = {10.1108/EUM0000000005545}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Badamas01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BothaE01, author = {Reinhardt A. Botha and Jan H. P. Eloff}, title = {A framework for access control in workflow systems}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {3}, pages = {126--133}, year = {2001}, url = {https://doi.org/10.1108/09685220110394848}, doi = {10.1108/09685220110394848}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/BothaE01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BothaS01, author = {Martin Botha and Rossouw von Solms}, title = {The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {5}, pages = {237--242}, year = {2001}, url = {https://doi.org/10.1108/EUM0000000006069}, doi = {10.1108/EUM0000000006069}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BothaS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChanK01, author = {Mangtang Chan and Lam{-}for Kwok}, title = {Integrating security design into the software development process for e-commerce systems}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {3}, pages = {112--122}, year = {2001}, url = {https://doi.org/10.1108/09685220110394758}, doi = {10.1108/09685220110394758}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChanK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChengL01, author = {Eddie W. L. Cheng and Heng Li}, title = {Information priority-setting for better resource allocation using analytic hierarchy process {(AHP)}}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {2}, pages = {61--70}, year = {2001}, url = {https://doi.org/10.1108/09685220110388827}, doi = {10.1108/09685220110388827}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChengL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ClarkCY01, author = {Mary A. Clark and David C. Chou and David C. Yen}, title = {Domain names management: a strategy for electronic commerce security}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {5}, pages = {225--232}, year = {2001}, url = {https://doi.org/10.1108/09685220110408130}, doi = {10.1108/09685220110408130}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ClarkCY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Costa01, author = {Christina Costa}, title = {Information technology outsourcing in Australia: a literature review}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {5}, pages = {213--224}, year = {2001}, url = {https://doi.org/10.1108/EUM0000000006068}, doi = {10.1108/EUM0000000006068}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Costa01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FurnellCD01, author = {Steven Furnell and Pelagia Chiliarchaki and Paul Dowland}, title = {Security analysers: administrator assistants or hacker helpers?}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {2}, pages = {93--101}, year = {2001}, url = {https://doi.org/10.1108/09685220110388872}, doi = {10.1108/09685220110388872}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FurnellCD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GerberSO01, author = {Mariana Gerber and Rossouw von Solms and Paul L. Overbeek}, title = {Formalizing information security requirements}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {1}, pages = {32--37}, year = {2001}, url = {https://doi.org/10.1108/09685220110366768}, doi = {10.1108/09685220110366768}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GerberSO01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GritzalisG01, author = {Stefanos Gritzalis and Dimitris Gritzalis}, title = {A digital seal solution for deploying trust on commercial transactions}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {2}, pages = {71--79}, year = {2001}, url = {https://doi.org/10.1108/09685220110388836}, doi = {10.1108/09685220110388836}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GritzalisG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Hurley01, author = {Margaret A. Hurley}, title = {{IT} outsourcing - managing the key asset}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {5}, pages = {243--249}, year = {2001}, url = {https://doi.org/10.1108/09685220110408059}, doi = {10.1108/09685220110408059}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Hurley01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HutchinsonW01, author = {William Hutchinson and Matthew J. Warren}, title = {Attitudes of Australian information system managers against online attackers}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {3}, pages = {106--111}, year = {2001}, url = {https://doi.org/10.1108/09685220110394749}, doi = {10.1108/09685220110394749}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HutchinsonW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JanbandhuS01, author = {Pawan Kumar Janbandhu and Mohammed Yakoob Siyal}, title = {Novel biometric digital signatures for Internet-based applications}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {5}, pages = {205--212}, year = {2001}, url = {https://doi.org/10.1108/09685220110408022}, doi = {10.1108/09685220110408022}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JanbandhuS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KolluruM01, author = {Ramesh Kolluru and Paul Meredith}, title = {Security and trust management in supply chains}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {5}, pages = {233--236}, year = {2001}, url = {https://doi.org/10.1108/09685220110408031}, doi = {10.1108/09685220110408031}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KolluruM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LeeYC01, author = {Ching{-}Yun Lee and Yi{-}Shiung Yeh and Deng{-}Jyi Chen}, title = {Model calculations to estimate the probability of secret reconstruction in computer environments}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {1}, pages = {13--20}, year = {2001}, url = {https://doi.org/10.1108/09685220110366722}, doi = {10.1108/09685220110366722}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LeeYC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LoukisS01, author = {Euripidis N. Loukis and Diomidis Spinellis}, title = {Information systems security in the Greek public sector}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {1}, pages = {21--31}, year = {2001}, url = {https://doi.org/10.1108/09685220110366740}, doi = {10.1108/09685220110366740}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LoukisS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MetaxiotisPA01, author = {Kostas S. Metaxiotis and John E. Psarras and Dimitris Askounis}, title = {Building ontologies for production scheduling systems: towards a unified methodology}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {1}, pages = {44--51}, year = {2001}, url = {https://doi.org/10.1108/09685220110366803}, doi = {10.1108/09685220110366803}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MetaxiotisPA01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MetaxiotisPK01, author = {Kostas S. Metaxiotis and John E. Psarras and Konstantinos Karnezis}, title = {{NUMASS:} a Web-based nuclear monitoring system}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {4}, pages = {154--164}, year = {2001}, url = {https://doi.org/10.1108/09685220110400336}, doi = {10.1108/09685220110400336}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MetaxiotisPK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/StamoulisGGM01, author = {Dimitrios S. Stamoulis and Dimitris Gouscos and Panagiotis Georgiadis and Drakoulis Martakos}, title = {Revisiting public information management for effective e-government services}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {4}, pages = {146--153}, year = {2001}, url = {https://doi.org/10.1108/09685220110400327}, doi = {10.1108/09685220110400327}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/StamoulisGGM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TryfonasKP01, author = {Theodore Tryfonas and Evangelos A. Kiountouzis and Angeliki Poulymenakou}, title = {Embedding security practices in contemporary information systems development approaches}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {4}, pages = {183--197}, year = {2001}, url = {https://doi.org/10.1108/09685220110401254}, doi = {10.1108/09685220110401254}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TryfonasKP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Udo01, author = {Godwin J. Udo}, title = {Privacy and security concerns as major barriers for e-commerce: a survey study}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {4}, pages = {165--174}, year = {2001}, url = {https://doi.org/10.1108/EUM0000000005808}, doi = {10.1108/EUM0000000005808}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Udo01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/WenCH01, author = {H. Joseph Wen and Houn{-}Gee Chen and Hsin{-}Ginn Hwang}, title = {E-commerce Web site design: strategies and models}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {1}, pages = {5--12}, year = {2001}, url = {https://doi.org/10.1108/09685220110366713}, doi = {10.1108/09685220110366713}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/WenCH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/WhiteP01, author = {Gayle Webb White and Sheila J. Pearson}, title = {Controlling corporate e-mail, {PC} use and computer security}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {2}, pages = {88--92}, year = {2001}, url = {https://doi.org/10.1108/09685220110388863}, doi = {10.1108/09685220110388863}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/WhiteP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/X01, title = {Say goodbye to the CIO, welcome to the business prophet}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {3}, pages = {123--125}, year = {2001}, url = {https://doi.org/10.1108/EUM0000000005544}, doi = {10.1108/EUM0000000005544}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/X01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ye01, author = {Nong Ye}, title = {Robust intrusion tolerance in information systems}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {1}, pages = {38--43}, year = {2001}, url = {https://doi.org/10.1108/09685220110366786}, doi = {10.1108/09685220110366786}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Ye01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/YenC01, author = {David C. Yen and David C. Chou}, title = {Intranets for organizational innovation}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {2}, pages = {80--87}, year = {2001}, url = {https://doi.org/10.1108/09685220110388845}, doi = {10.1108/09685220110388845}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/YenC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Attaran00, author = {Mohsen Attaran}, title = {Voice recognition software programs: are they right for you?}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {1}, pages = {42--44}, year = {2000}, url = {https://doi.org/10.1108/09685220010312524}, doi = {10.1108/09685220010312524}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Attaran00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Attaran00a, author = {Mohsen Attaran}, title = {Managing legal liability of the Net: a ten step guide for {IT} managers}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {2}, pages = {98--100}, year = {2000}, url = {https://doi.org/10.1108/09685220010321335}, doi = {10.1108/09685220010321335}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Attaran00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Chow00, author = {Wing S. Chow}, title = {Success factors for {IS} disaster recovery planning in Hong Kong}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {2}, pages = {80--87}, year = {2000}, url = {https://doi.org/10.1108/09685220010321326}, doi = {10.1108/09685220010321326}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Chow00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DhillonC00, author = {Gurpreet Dhillon and M{\'{a}}rio M. Caldeira}, title = {Interpreting the adoption and use of {EDI} in the Portuguese clothing and textile industry}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {4}, pages = {184--188}, year = {2000}, url = {https://doi.org/10.1108/09685220010344934}, doi = {10.1108/09685220010344934}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DhillonC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FooH00, author = {Schubert Foo and Mark Hepworth}, title = {The implementation of an electronic survey tool to help determine the information needs of a knowledge-based organization}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {2}, pages = {53--64}, year = {2000}, url = {https://doi.org/10.1108/09685220010694008}, doi = {10.1108/09685220010694008}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FooH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Forcht00, author = {Karen A. Forcht}, title = {Security-related concerns with geographic information systems and geographic mapping}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {5}, pages = {218--221}, year = {2000}, url = {https://doi.org/10.1108/09685220010353141}, doi = {10.1108/09685220010353141}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Forcht00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FurnellD00, author = {Steven Furnell and Paul Dowland}, title = {A conceptual architecture for real-time intrusion monitoring}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {2}, pages = {65--75}, year = {2000}, url = {https://doi.org/10.1108/09685220010321317}, doi = {10.1108/09685220010321317}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FurnellD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GritzalisIO00, author = {Stefanos Gritzalis and John Iliadis and Spyros Oikonomopoulos}, title = {Distributed component software security issues on deploying a secure electronic marketplace}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {1}, pages = {5--13}, year = {2000}, url = {https://doi.org/10.1108/09685220010312290}, doi = {10.1108/09685220010312290}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GritzalisIO00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HawkinsYC00, author = {Steve Hawkins and David C. Yen and David C. Chou}, title = {Awareness and challenges of Internet security}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {3}, pages = {131--143}, year = {2000}, url = {https://doi.org/10.1108/09685220010372564}, doi = {10.1108/09685220010372564}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HawkinsYC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HawkinsYC00a, author = {Steve M. Hawkins and David C. Yen and David C. Chou}, title = {Disaster recovery planning: a strategy for data security}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {5}, pages = {222--230}, year = {2000}, url = {https://doi.org/10.1108/09685220010353150}, doi = {10.1108/09685220010353150}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HawkinsYC00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HelmsEM00, author = {Marilyn M. Helms and Lawrence P. Ettkin and Daniel J. Morris}, title = {Shielding your company against information compromise}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {3}, pages = {117--130}, year = {2000}, url = {https://doi.org/10.1108/09685220010339228}, doi = {10.1108/09685220010339228}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HelmsEM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JanczewskiP00, author = {Lech J. Janczewski and Victor Portougal}, title = {"Need-to-know" principle and fuzzy security clearances modelling}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {5}, pages = {210--217}, year = {2000}, url = {https://doi.org/10.1108/09685220010356247}, doi = {10.1108/09685220010356247}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JanczewskiP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KimO00, author = {Bowon Kim and Heungshik Oh}, title = {An exploratory inquiry into the perceived effectiveness of a global information system}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {3}, pages = {144--154}, year = {2000}, url = {https://doi.org/10.1108/09685220010372573}, doi = {10.1108/09685220010372573}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KimO00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Kodama00, author = {Mitsuru Kodama}, title = {New regional community creation through video-based information networks - a case study of regional vitalization through the promotion of information technology in Japan}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {2}, pages = {87--97}, year = {2000}, url = {https://doi.org/10.1108/09685220010324459}, doi = {10.1108/09685220010324459}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Kodama00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KokolakisDK00, author = {Spyros Kokolakis and A. J. Demopoulos and Evangelos A. Kiountouzis}, title = {The use of business process modelling in information systems security analysis and design}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {3}, pages = {107--116}, year = {2000}, url = {https://doi.org/10.1108/09685220010339192}, doi = {10.1108/09685220010339192}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KokolakisDK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LabuschagneE00, author = {Les Labuschagne and Jan H. P. Eloff}, title = {Electronic commerce: the information-security challenge}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {3}, pages = {154--157}, year = {2000}, url = {https://doi.org/10.1108/09685220010372582}, doi = {10.1108/09685220010372582}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LabuschagneE00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Lambrinoudakis00, author = {Costas Lambrinoudakis}, title = {Smart card technology for deploying a secure information management framework}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {4}, pages = {173--183}, year = {2000}, url = {https://doi.org/10.1108/09685220010344925}, doi = {10.1108/09685220010344925}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Lambrinoudakis00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LankfordJ00, author = {William M. Lankford and Jack E. Johnson}, title = {{EDI} via the Internet}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {1}, pages = {27--30}, year = {2000}, url = {https://doi.org/10.1108/09685220010312353}, doi = {10.1108/09685220010312353}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LankfordJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Maguire00, author = {Stuart Maguire}, title = {Towards a "business-led" approach to information systems development}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {5}, pages = {230--238}, year = {2000}, url = {https://doi.org/10.1108/09685220010353187}, doi = {10.1108/09685220010353187}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Maguire00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MetaxiotisS00, author = {Kostas S. Metaxiotis and Emanuel Samouilidis}, title = {Expert systems in medicine: academic illusion or real power?}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {2}, pages = {75--79}, year = {2000}, url = {https://doi.org/10.1108/09685220010694017}, doi = {10.1108/09685220010694017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MetaxiotisS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MorrisEH00, author = {Daniel J. Morris and Lawrence P. Ettkin and Marilyn M. Helms}, title = {Issues in the illegal transference of {US} information technologies}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {4}, pages = {164--173}, year = {2000}, url = {https://doi.org/10.1108/09685220010344916}, doi = {10.1108/09685220010344916}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MorrisEH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PhukanD00, author = {Sanjeev Phukan and Gurpreet Dhillon}, title = {Ethics and information technology use: a survey of {US} based SMEs}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {5}, pages = {239--243}, year = {2000}, url = {https://doi.org/10.1108/09685220010353907}, doi = {10.1108/09685220010353907}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PhukanD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RahimRS00, author = {Md. Mahbubur Rahim and Mohd. Noah Abd. Rahman and Afzaal H. Seyal}, title = {Software piracy among academics: an empirical study in Brunei Darussalam}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {1}, pages = {14--26}, year = {2000}, url = {https://doi.org/10.1108/09685220010312326}, doi = {10.1108/09685220010312326}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RahimRS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Siponen00, author = {Mikko T. Siponen}, title = {A conceptual foundation for organizational information security awareness}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {1}, pages = {31--41}, year = {2000}, url = {https://doi.org/10.1108/09685220010371394}, doi = {10.1108/09685220010371394}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Siponen00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Siponen00a, author = {Mikko T. Siponen}, title = {Critical analysis of different approaches to minimizing user-related faults in information systems security: implications for research and practice}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {5}, pages = {197--209}, year = {2000}, url = {https://doi.org/10.1108/09685220010353178}, doi = {10.1108/09685220010353178}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Siponen00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Turega00, author = {Mike Turega}, title = {Issues with information dissemination on global networks}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {5}, pages = {244--248}, year = {2000}, url = {https://doi.org/10.1108/09685220010353169}, doi = {10.1108/09685220010353169}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Turega00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Attaran99, author = {Mohsen Attaran}, title = {Internet-based business opportunities: buyers beware of scams}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {4}, pages = {176--178}, year = {1999}, url = {https://doi.org/10.1108/09685229910292682}, doi = {10.1108/09685229910292682}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Attaran99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AttaranV99, author = {Mohsen Attaran and Ilja VanLaar}, title = {Privacy and security on the Internet: how to secure your personal information and company data}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {5}, pages = {241--247}, year = {1999}, url = {https://doi.org/10.1108/09685229910292907}, doi = {10.1108/09685229910292907}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AttaranV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Catania99, author = {Philip Catania}, title = {Year 2000 legal and regulatory environment}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {3}, pages = {133--139}, year = {1999}, url = {https://doi.org/10.1108/09685229910279434}, doi = {10.1108/09685229910279434}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Catania99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Dhillon99, author = {Gurpreet Dhillon}, title = {Managing and controlling computer misuse}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {4}, pages = {171--175}, year = {1999}, url = {https://doi.org/10.1108/09685229910292664}, doi = {10.1108/09685229910292664}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Dhillon99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Dinnie99, author = {Garry Dinnie}, title = {The Second Annual Global Information Security Survey}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {3}, pages = {112--120}, year = {1999}, url = {https://doi.org/10.1108/09685229910693812}, doi = {10.1108/09685229910693812}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Dinnie99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FooLHL99, author = {Schubert Foo and Peng{-}Chor Leong and Siu Cheung Hui and Shigong Liu}, title = {Security considerations in the delivery of Web-based applications: a case study}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {1}, pages = {40--50}, year = {1999}, url = {https://doi.org/10.1108/09685229910255197}, doi = {10.1108/09685229910255197}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FooLHL99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FurnellDS99, author = {Steven Furnell and Paul Dowland and Peter W. Sanders}, title = {Dissecting the "Hacker Manifesto"}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {2}, pages = {69--75}, year = {1999}, url = {https://doi.org/10.1108/09685229910265493}, doi = {10.1108/09685229910265493}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FurnellDS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HartMT99, author = {Rod Hart and Darren Morgan and Hai Tran}, title = {An introduction to automated intrusion detection approaches}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {2}, pages = {76--82}, year = {1999}, url = {https://doi.org/10.1108/09685229910265501}, doi = {10.1108/09685229910265501}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HartMT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Higgins99, author = {Huong Ngo Higgins}, title = {Corporate system security: towards an integrated management approach}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {5}, pages = {217--222}, year = {1999}, url = {https://doi.org/10.1108/09685229910292817}, doi = {10.1108/09685229910292817}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Higgins99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JohannessenOO99, author = {Jon{-}Arild Johannessen and Johan Olaisen and Bj{\o}rn Olsen}, title = {Strategic use of information technology for increased innovation and performance}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {1}, pages = {5--22}, year = {1999}, url = {https://doi.org/10.1108/09685229910255133}, doi = {10.1108/09685229910255133}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JohannessenOO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Jordan99, author = {Ernest Jordan}, title = {{IT} contingency planning: management roles}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {5}, pages = {232--238}, year = {1999}, url = {https://doi.org/10.1108/09685229910292853}, doi = {10.1108/09685229910292853}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Jordan99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KnahlHP99, author = {Martin Hans Knahl and Holger D. Hofmann and Andrew D. Phippen}, title = {A distributed component framework for integrated network and systems management}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {5}, pages = {254--260}, year = {1999}, url = {https://doi.org/10.1108/09685229910292916}, doi = {10.1108/09685229910292916}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KnahlHP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Kodama99, author = {Mitsuru Kodama}, title = {Community management support through community-based information networks}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {3}, pages = {140--150}, year = {1999}, url = {https://doi.org/10.1108/09685229910279452}, doi = {10.1108/09685229910279452}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Kodama99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Kodama99a, author = {Mitsuru Kodama}, title = {Strategic business applications and new virtual knowledge-based businesses through community-based information networks}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {4}, pages = {186--199}, year = {1999}, url = {https://doi.org/10.1108/09685229910292754}, doi = {10.1108/09685229910292754}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Kodama99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Kreltszheim99, author = {David Kreltszheim}, title = {Identifying the proceeds of electronic money fraud}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {5}, pages = {223--231}, year = {1999}, url = {https://doi.org/10.1108/09685229910292835}, doi = {10.1108/09685229910292835}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Kreltszheim99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KwokL99, author = {Lam{-}for Kwok and Dennis Longley}, title = {Information security management and modelling}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {1}, pages = {30--40}, year = {1999}, url = {https://doi.org/10.1108/09685229910255179}, doi = {10.1108/09685229910255179}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KwokL99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LiddyS99, author = {Carrie Liddy and Alice Sturgeon}, title = {The evolution of certificate model architecture}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {2}, pages = {95--100}, year = {1999}, url = {https://doi.org/10.1108/09685229910265547}, doi = {10.1108/09685229910265547}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LiddyS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MosleyH99, author = {Valerie Mosley and Margaret A. Hurley}, title = {{IT} skill retention}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {3}, pages = {129--132}, year = {1999}, url = {https://doi.org/10.1108/09685229910279425}, doi = {10.1108/09685229910279425}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MosleyH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ng99, author = {Eng Huat Ng}, title = {Step-by-step guideline for designing and documenting the navigation structure of multimedia hypertext systems}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {2}, pages = {88--98}, year = {1999}, url = {https://doi.org/10.1108/09685229910370784}, doi = {10.1108/09685229910370784}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Ng99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Oddie99, author = {Carolyn Oddie}, title = {Copyright protection in the digital age}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {5}, pages = {239--240}, year = {1999}, url = {https://doi.org/10.1108/09685229910292880}, doi = {10.1108/09685229910292880}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Oddie99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PsarrasPM99, author = {John E. Psarras and Athanassios P. Papakonstantinou and Kostas S. Metaxiotis}, title = {Towards the integrated monitoring and evaluation system {IMES:} a real power}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {5}, pages = {247--254}, year = {1999}, url = {https://doi.org/10.1108/09685229910292899}, doi = {10.1108/09685229910292899}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PsarrasPM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SmithM99, author = {Brian W. Smith and Andrew J. Morris}, title = {Avoiding securities class actions arising from {Y2K} issues}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {4}, pages = {178--185}, year = {1999}, url = {https://doi.org/10.1108/09685229910292709}, doi = {10.1108/09685229910292709}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SmithM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Solms99, author = {Rossouw von Solms}, title = {Information security management: why standards are important}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {1}, pages = {50--58}, year = {1999}, url = {https://doi.org/10.1108/09685229910255223}, doi = {10.1108/09685229910255223}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Solms99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SpinellisKG99, author = {Diomidis Spinellis and Spyros Kokolakis and Stefanos Gritzalis}, title = {Security requirements, risks and recommendations for small enterprise and home-office environments}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {3}, pages = {121--128}, year = {1999}, url = {https://doi.org/10.1108/09685229910371071}, doi = {10.1108/09685229910371071}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SpinellisKG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Whittaker99, author = {Brenda Whittaker}, title = {What went wrong? Unsuccessful information technology projects}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {1}, pages = {23--30}, year = {1999}, url = {https://doi.org/10.1108/09685229910255160}, doi = {10.1108/09685229910255160}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Whittaker99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Wilson99, author = {Stephen Wilson}, title = {Digital signatures and the future of documentation}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {2}, pages = {83--87}, year = {1999}, url = {https://doi.org/10.1108/09685229910265510}, doi = {10.1108/09685229910265510}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Wilson99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Wilson99a, author = {Stephen Wilson}, title = {New models for the management of public key infrastructure and root certification authorities}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {4}, pages = {166--170}, year = {1999}, url = {https://doi.org/10.1108/09685229910292655}, doi = {10.1108/09685229910292655}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Wilson99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BarnardS98, author = {Lynette Barnard and Rossouw von Solms}, title = {The evaluation and certification of information security against {BS} 7799}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {2}, pages = {72--77}, year = {1998}, url = {https://doi.org/10.1108/09685229810209397}, doi = {10.1108/09685229810209397}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BarnardS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BrockwayH98, author = {Douglas Brockway and Margaret A. Hurley}, title = {Achieving {IT} success}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {5}, pages = {199--204}, year = {1998}, url = {https://doi.org/10.1108/09685229810240103}, doi = {10.1108/09685229810240103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BrockwayH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/CrammM98, author = {Susan Cramm and Thornton May}, title = {Accelerating executive development: hey coach ..}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {5}, pages = {196--198}, year = {1998}, url = {https://doi.org/10.1108/09685229810240095}, doi = {10.1108/09685229810240095}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/CrammM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GrupeHY98, author = {Fritz H. Grupe and James M. Hensley and Jeanne H. Yamamura}, title = {Watching systems in action: security at the periphery}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {4}, pages = {155--159}, year = {1998}, url = {https://doi.org/10.1108/09685229810232418}, doi = {10.1108/09685229810232418}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GrupeHY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Hurley98, author = {Margaret A. Hurley}, title = {Features and functions overload}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {4}, pages = {160--161}, year = {1998}, url = {https://doi.org/10.1108/09685229810232427}, doi = {10.1108/09685229810232427}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Hurley98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LabuschagneE98, author = {Les Labuschagne and Jan H. P. Eloff}, title = {Real-time risk analysis using Java concepts}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {5}, pages = {212--217}, year = {1998}, url = {https://doi.org/10.1108/09685229810240121}, doi = {10.1108/09685229810240121}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LabuschagneE98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Larson98, author = {Kent D. Larson}, title = {The role of service level agreements in {IT} service delivery}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {3}, pages = {128--132}, year = {1998}, url = {https://doi.org/10.1108/09685229810225029}, doi = {10.1108/09685229810225029}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Larson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LiddyS98, author = {Carrie Liddy and Alice Sturgeon}, title = {Seamless secured transactions}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {1}, pages = {21--27}, year = {1998}, url = {https://doi.org/10.1108/09685229810207416}, doi = {10.1108/09685229810207416}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LiddyS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/May98, author = {Thornton May}, title = {Strategic ignorance: the new competitive high ground}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {3}, pages = {127--128}, year = {1998}, url = {https://doi.org/10.1108/09685229810225010}, doi = {10.1108/09685229810225010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/May98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Morwood98, author = {Gregory Morwood}, title = {Business continuity: awareness and training programmes}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {1}, pages = {28--32}, year = {1998}, url = {https://doi.org/10.1108/09685229810207425}, doi = {10.1108/09685229810207425}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Morwood98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Moscato98, author = {Donald R. Moscato}, title = {Database gateway processor risk analysis using fuzzy logic}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {3}, pages = {138--144}, year = {1998}, url = {https://doi.org/10.1108/09685229810225047}, doi = {10.1108/09685229810225047}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Moscato98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MutsaersZG98, author = {Ernest{-}Jan Mutsaers and Han T. M. van der Zee and Henrik Giertz}, title = {The evolution of information technology}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {3}, pages = {115--126}, year = {1998}, url = {https://doi.org/10.1108/09685229810225001}, doi = {10.1108/09685229810225001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MutsaersZG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PortougalJ98, author = {Victor Portougal and Lech J. Janczewski}, title = {Industrial information-weight security models}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {5}, pages = {205--211}, year = {1998}, url = {https://doi.org/10.1108/09685229810240112}, doi = {10.1108/09685229810240112}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PortougalJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Puthli98, author = {R. K. R. P. Puthli}, title = {{METANET:} a five-year Internet strategy}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {1}, pages = {3--14}, year = {1998}, url = {https://doi.org/10.1108/09685229810207399}, doi = {10.1108/09685229810207399}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Puthli98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ratnasingham98, author = {Pauline Ratnasingham}, title = {Internet-based {EDI} trust and security}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {1}, pages = {33--39}, year = {1998}, url = {https://doi.org/10.1108/09685229810207434}, doi = {10.1108/09685229810207434}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Ratnasingham98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ratnasingham98a, author = {Pauline Ratnasingham}, title = {Trust in Web-based electronic commerce security}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {4}, pages = {162--166}, year = {1998}, url = {https://doi.org/10.1108/09685229810227667}, doi = {10.1108/09685229810227667}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Ratnasingham98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Schneier98, author = {Bruce Schneier}, title = {Security pitfalls in cryptographic design}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {3}, pages = {133--137}, year = {1998}, url = {https://doi.org/10.1108/09685229810225038}, doi = {10.1108/09685229810225038}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Schneier98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Solms98, author = {Rossouw von Solms}, title = {Information security management {(1):} why information security is so important}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {4}, pages = {174--177}, year = {1998}, url = {https://doi.org/10.1108/EUM0000000004533}, doi = {10.1108/EUM0000000004533}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Solms98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Solms98a, author = {Rossouw von Solms}, title = {Information security management {(2):} guidelines to the management of information technology security {(GMITS)}}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {5}, pages = {221--223}, year = {1998}, url = {https://doi.org/10.1108/EUM0000000004542}, doi = {10.1108/EUM0000000004542}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Solms98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Solms98b, author = {Rossouw von Solms}, title = {Information security management {(3):} the Code of Practice for Information Security Management {(BS} 7799)}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {5}, pages = {224--225}, year = {1998}, url = {https://doi.org/10.1108/09685229810240158}, doi = {10.1108/09685229810240158}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Solms98b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Thompson98, author = {David Thompson}, title = {1997 computer crime and security survey}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {2}, pages = {78--101}, year = {1998}, url = {https://doi.org/10.1108/09685229810209414}, doi = {10.1108/09685229810209414}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Thompson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ThomsonS98, author = {M. E. Thomson and Rossouw von Solms}, title = {Information security awareness: educating your users effectively}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {4}, pages = {167--173}, year = {1998}, url = {https://doi.org/10.1108/09685229810227649}, doi = {10.1108/09685229810227649}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ThomsonS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Wen98, author = {H. Joseph Wen}, title = {From client/server to intranet}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {1}, pages = {15--20}, year = {1998}, url = {https://doi.org/10.1108/09685229810207407}, doi = {10.1108/09685229810207407}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Wen98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Wen98a, author = {H. Joseph Wen}, title = {Internet computer virus protection policy}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {2}, pages = {66--71}, year = {1998}, url = {https://doi.org/10.1108/09685229810209388}, doi = {10.1108/09685229810209388}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Wen98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/WenT98, author = {H. Joseph Wen and Jyh{-}Horng Michael Tarn}, title = {Internet security: a case study of firewall selection}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {4}, pages = {178--184}, year = {1998}, url = {https://doi.org/10.1108/09685229810227658}, doi = {10.1108/09685229810227658}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/WenT98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Wilson98, author = {Stephen Wilson}, title = {Some limitations of web of trust models}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {5}, pages = {218--220}, year = {1998}, url = {https://doi.org/10.1108/09685229810240130}, doi = {10.1108/09685229810240130}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Wilson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Zee98, author = {Han T. M. van der Zee}, title = {Rejuvenating the {IT} supply organization}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {2}, pages = {55--65}, year = {1998}, url = {https://doi.org/10.1108/09685229810209379}, doi = {10.1108/09685229810209379}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Zee98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BestM97, author = {Jim Best and Thornton May}, title = {Is your infrastructure ticking?}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {1}, pages = {3--6}, year = {1997}, url = {https://doi.org/10.1108/09685229710167962}, doi = {10.1108/09685229710167962}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BestM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Brockway97, author = {Douglas Brockway}, title = {There's an entranet in your future}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {1}, pages = {7--10}, year = {1997}, url = {https://doi.org/10.1108/09685229710167971}, doi = {10.1108/09685229710167971}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Brockway97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FooL97, author = {Schubert Foo and Ee{-}Peng Lim}, title = {Managing World Wide Web publications}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {1}, pages = {11--17}, year = {1997}, url = {https://doi.org/10.1108/09685229710167980}, doi = {10.1108/09685229710167980}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/FooL97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FooLS97, author = {Schubert Foo and Peng{-}Chor Leong and Yee Nam Sng}, title = {Improving security in computational electronic mail systems}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {3}, pages = {102--110}, year = {1997}, url = {https://doi.org/10.1108/09685229710175783}, doi = {10.1108/09685229710175783}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FooLS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ForchtTUE97, author = {Karen A. Forcht and Daphyne Saunders Thomas and Mark L. Usry and Kelly Egan}, title = {Control of the Internet}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {1}, pages = {23--28}, year = {1997}, url = {https://doi.org/10.1108/09685229710168015}, doi = {10.1108/09685229710168015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ForchtTUE97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Gooch97, author = {Jeff Gooch}, title = {Managing for demonstrably effective {IT} projects}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {4}, pages = {133--137}, year = {1997}, url = {https://doi.org/10.1108/09685229710184495}, doi = {10.1108/09685229710184495}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Gooch97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Harrington97, author = {Catherine Harrington}, title = {Compassion in World Farming: an imaging and text retrieval case}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {2}, pages = {51--52}, year = {1997}, url = {https://doi.org/10.1108/09685229710182811}, doi = {10.1108/09685229710182811}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Harrington97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Higgs97, author = {Ernest Higgs}, title = {Health informatics blueprint: business needs}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {2}, pages = {58--62}, year = {1997}, url = {https://doi.org/10.1108/09685229710182839}, doi = {10.1108/09685229710182839}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Higgs97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Hurley97, author = {Margaret A. Hurley}, title = {Managing the desktop: research findings}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {2}, pages = {53--57}, year = {1997}, url = {https://doi.org/10.1108/09685229710182820}, doi = {10.1108/09685229710182820}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Hurley97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HurleyH97, author = {Margaret A. Hurley and Rod Harris}, title = {Facilitating corporate knowledge: building the data warehouse}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {5}, pages = {170--174}, year = {1997}, url = {https://doi.org/10.1108/09685229710187230}, doi = {10.1108/09685229710187230}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HurleyH97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HurleyS97, author = {Margaret A. Hurley and Folker Schaumann}, title = {{KPMG} survey: the {IT} outsourcing decision}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {4}, pages = {126--132}, year = {1997}, url = {https://doi.org/10.1108/09685229710184486}, doi = {10.1108/09685229710184486}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HurleyS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Karakasidis97, author = {Kon Karakasidis}, title = {A project planning process for business continuity}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {2}, pages = {72--78}, year = {1997}, url = {https://doi.org/10.1108/09685229710182857}, doi = {10.1108/09685229710182857}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Karakasidis97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Karake97, author = {Zeinab A. Karake}, title = {Managing information resources and environmental turbulence}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {3}, pages = {93--99}, year = {1997}, url = {https://doi.org/10.1108/09685229710175765}, doi = {10.1108/09685229710175765}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Karake97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Kwok97, author = {Lam{-}for Kwok}, title = {Hypertext information security model for organizations}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {4}, pages = {138--148}, year = {1997}, url = {https://doi.org/10.1108/09685229710184512}, doi = {10.1108/09685229710184512}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Kwok97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LichtensteinS97, author = {Sharman Lichtenstein and Paula M. C. Swatman}, title = {Internet acceptable usage policy for organizations}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {5}, pages = {182--190}, year = {1997}, url = {https://doi.org/10.1108/09685229710367726}, doi = {10.1108/09685229710367726}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LichtensteinS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Liddy97, author = {Carrie Liddy}, title = {Commercialization of cryptography}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {3}, pages = {87--89}, year = {1997}, url = {https://doi.org/10.1108/09685229710175738}, doi = {10.1108/09685229710175738}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Liddy97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/May97, author = {Thornton May}, title = {The death of {ROI:} re-thinking {IT} value measurement}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {3}, pages = {90--92}, year = {1997}, url = {https://doi.org/10.1108/09685229710175756}, doi = {10.1108/09685229710175756}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/May97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Nolan97, author = {Richard L. Nolan}, title = {Top-down driven architecture design}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {4}, pages = {123--125}, year = {1997}, url = {https://doi.org/10.1108/09685229710184468}, doi = {10.1108/09685229710184468}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Nolan97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Oliver97, author = {Susan Oliver}, title = {A model for the future of electronic commerce}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {5}, pages = {166--169}, year = {1997}, url = {https://doi.org/10.1108/09685229710187221}, doi = {10.1108/09685229710187221}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Oliver97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Orlowski97, author = {Steve Orlowski}, title = {Government initiatives in information technology security}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {3}, pages = {111--118}, year = {1997}, url = {https://doi.org/10.1108/09685229710693102}, doi = {10.1108/09685229710693102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Orlowski97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Pattison97, author = {Michael Pattison}, title = {Legal implications of doing business on the Internet}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {1}, pages = {29--34}, year = {1997}, url = {https://doi.org/10.1108/09685229710168024}, doi = {10.1108/09685229710168024}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Pattison97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ratnasingham97, author = {Pauline Ratnasingham}, title = {{EDI} security: a model of {EDI} risks and associated controls}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {2}, pages = {63--71}, year = {1997}, url = {https://doi.org/10.1108/09685229710182848}, doi = {10.1108/09685229710182848}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Ratnasingham97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Roest97, author = {Pim Roest}, title = {The golden rules for implementing the balanced business scorecard}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {5}, pages = {163--165}, year = {1997}, url = {https://doi.org/10.1108/09685229710187212}, doi = {10.1108/09685229710187212}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Roest97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Solms97, author = {Rossouw von Solms}, title = {Driving safely on the information superhighway}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {1}, pages = {20--22}, year = {1997}, url = {https://doi.org/10.1108/09685229710168006}, doi = {10.1108/09685229710168006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Solms97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Tarascio97, author = {Everard Tarascio}, title = {Business critical messaging}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {4}, pages = {149--152}, year = {1997}, url = {https://doi.org/10.1108/09685229710184521}, doi = {10.1108/09685229710184521}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Tarascio97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Wilson97, author = {Stephen Wilson}, title = {Certificates and trust in electronic commerce}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {5}, pages = {175--181}, year = {1997}, url = {https://doi.org/10.1108/EUM0000000004466}, doi = {10.1108/EUM0000000004466}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Wilson97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Wood97, author = {Charles Cresson Wood}, title = {Part of the foundation for secure systems: separation of duties policy}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {1}, pages = {18--19}, year = {1997}, url = {https://doi.org/10.1108/09685229710167999}, doi = {10.1108/09685229710167999}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Wood97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Wood97a, author = {Charles Cresson Wood}, title = {A secure password storage policy}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {2}, pages = {79--80}, year = {1997}, url = {https://doi.org/10.1108/09685229710182866}, doi = {10.1108/09685229710182866}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Wood97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Wood97b, author = {Charles Cresson Wood}, title = {Securely handling staff terminations}, journal = {Inf. Manag. Comput. Secur.}, volume = {5}, number = {3}, pages = {100--101}, year = {1997}, url = {https://doi.org/10.1108/09685229710175774}, doi = {10.1108/09685229710175774}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Wood97b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Abdallah96, author = {Mohamed H. Abdallah}, title = {An integrated approach for system evaluation: study results}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {4}, pages = {10--19}, year = {1996}, url = {https://doi.org/10.1108/09685229610793094}, doi = {10.1108/09685229610793094}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Abdallah96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Brockway96, author = {Douglas Brockway}, title = {Knowledge technologies and business alignment}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {1}, pages = {45--46}, year = {1996}, url = {https://doi.org/10.1108/09685229610114213}, doi = {10.1108/09685229610114213}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Brockway96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Brookson96, author = {Charles Brookson}, title = {Mobile secure telephones}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {2}, pages = {7--10}, year = {1996}, url = {https://doi.org/10.1108/09685229610793049}, doi = {10.1108/09685229610793049}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Brookson96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/CoghlanH96, author = {Liz Coghlan and Margaret A. Hurley}, title = {A profile of the information technology executive}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {1}, pages = {5--9}, year = {1996}, url = {https://doi.org/10.1108/09685229610114150}, doi = {10.1108/09685229610114150}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/CoghlanH96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Doddrell96, author = {Gregory R. Doddrell}, title = {Extinguishing halons}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {1}, pages = {38--42}, year = {1996}, url = {https://doi.org/10.1108/09685229610114196}, doi = {10.1108/09685229610114196}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Doddrell96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Duffy96, author = {Jan Duffy}, title = {Collaborative computing, groupware and knowledge}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {2}, pages = {39--41}, year = {1996}, url = {https://doi.org/10.1108/09685229610121026}, doi = {10.1108/09685229610121026}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Duffy96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Fitzgerald96, author = {Kevin J. Fitzgerald}, title = {Corporate policy at Cable {\&} Wireless enhances business efficiency and improves quality of working life}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {2}, pages = {5--6}, year = {1996}, url = {https://doi.org/10.1108/09685229610793030}, doi = {10.1108/09685229610793030}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Fitzgerald96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Fitzgerald96a, author = {Kevin J. Fitzgerald}, title = {Data security report}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {2}, pages = {14--17}, year = {1996}, url = {https://doi.org/10.1108/09685229610793058}, doi = {10.1108/09685229610793058}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Fitzgerald96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Forcht96, author = {Karen A. Forcht}, title = {Doing business on the Internet: marketing and security aspects}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {4}, pages = {3--9}, year = {1996}, url = {https://doi.org/10.1108/09685229610130477}, doi = {10.1108/09685229610130477}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Forcht96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Frosdick96, author = {Steve Frosdick}, title = {Practical management of programme risk: the case of the National Strategy for Police Information Systems for England and Wales}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {5}, pages = {24--33}, year = {1996}, url = {https://doi.org/10.1108/09685229610153157}, doi = {10.1108/09685229610153157}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Frosdick96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Gibson96, author = {Gary Gibson}, title = {An introduction to seismology}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {3}, pages = {20--25}, year = {1996}, url = {https://doi.org/10.1108/09685229610126959}, doi = {10.1108/09685229610126959}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Gibson96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HallidayBS96, author = {Sharon Halliday and Karin P. Badenhorst and Rossouw von Solms}, title = {A business approach to effective information technology risk analysis and management}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {1}, pages = {19--31}, year = {1996}, url = {https://doi.org/10.1108/09685229610114178}, doi = {10.1108/09685229610114178}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HallidayBS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Heinen96, author = {Joseph Heinen}, title = {Internet marketing practices}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {5}, pages = {7--14}, year = {1996}, url = {https://doi.org/10.1108/09685229610153120}, doi = {10.1108/09685229610153120}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Heinen96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Heng96, author = {Goh Moh Heng}, title = {Developing a suitable business continuity planning methodology}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {2}, pages = {11--13}, year = {1996}, url = {https://doi.org/10.1108/09685229610121008}, doi = {10.1108/09685229610121008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Heng96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Howe96, author = {Randy Howe}, title = {Getting beyond the dark side of distributed computing}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {2}, pages = {52--53}, year = {1996}, url = {https://doi.org/10.1108/09685229610793076}, doi = {10.1108/09685229610793076}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Howe96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Kearvell-White96, author = {Brian Kearvell{-}White}, title = {KPMG's {UK} Computer Security Review 1994}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {2}, pages = {42--51}, year = {1996}, url = {https://doi.org/10.1108/09685229610121035}, doi = {10.1108/09685229610121035}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Kearvell-White96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Kearvell-White96a, author = {Brian Kearvell{-}White}, title = {National {(UK)} Computer Security Survey 1996}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {3}, pages = {3--17}, year = {1996}, url = {https://doi.org/10.1108/09685229610126931}, doi = {10.1108/09685229610126931}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Kearvell-White96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Lichtenstein96, author = {Sharman Lichtenstein}, title = {Factors in the selection of a risk assessment method}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {4}, pages = {20--25}, year = {1996}, url = {https://doi.org/10.1108/09685229610130503}, doi = {10.1108/09685229610130503}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Lichtenstein96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Liddy96, author = {Carrie Liddy}, title = {Commercial security on the Internet}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {1}, pages = {47--49}, year = {1996}, url = {https://doi.org/10.1108/09685229610114222}, doi = {10.1108/09685229610114222}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Liddy96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Lowrey96, author = {Ross Lowrey}, title = {Relating information and value disciplines}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {3}, pages = {30--35}, year = {1996}, url = {https://doi.org/10.1108/09685229610126968}, doi = {10.1108/09685229610126968}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Lowrey96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Maslen96, author = {Colin Maslen}, title = {"Testing the plan is more important than the plan itself"}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {3}, pages = {26--29}, year = {1996}, url = {https://doi.org/10.1108/09685229610793085}, doi = {10.1108/09685229610793085}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Maslen96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/May96, author = {Thornton May}, title = {The Thornton May Files}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {3}, pages = {36--38}, year = {1996}, url = {https://doi.org/10.1108/09685229610126977}, doi = {10.1108/09685229610126977}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/May96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/May96a, author = {Thornton May}, title = {The Thornton May Files}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {4}, pages = {36--38}, year = {1996}, url = {https://doi.org/10.1108/09685229610793102}, doi = {10.1108/09685229610793102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/May96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/May96b, author = {Thornton May}, title = {Internet and Intranet: the faces of the wired economy}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {5}, pages = {3--6}, year = {1996}, url = {https://doi.org/10.1108/09685229610153111}, doi = {10.1108/09685229610153111}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/May96b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/McCormick96, author = {John McCormick}, title = {Telecommunications deregulation: an Australian perspective}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {3}, pages = {39--41}, year = {1996}, url = {https://doi.org/10.1108/09685229610126986}, doi = {10.1108/09685229610126986}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/McCormick96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/McWilliams96, author = {Brian McWilliams}, title = {The value brokers: how to measure client/server payback}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {5}, pages = {15--17}, year = {1996}, url = {https://doi.org/10.1108/09685229610793111}, doi = {10.1108/09685229610793111}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/McWilliams96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ramarapu96, author = {Narender K. Ramarapu}, title = {Executive information systems in financial institutions: an introduction}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {5}, pages = {18--21}, year = {1996}, url = {https://doi.org/10.1108/09685229610153139}, doi = {10.1108/09685229610153139}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Ramarapu96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SandersonF96, author = {Ethan Sanderson and Karen A. Forcht}, title = {Information security in business environments}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {1}, pages = {32--37}, year = {1996}, url = {https://doi.org/10.1108/09685229610114187}, doi = {10.1108/09685229610114187}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SandersonF96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ShiSS96, author = {Yong Shi and Pamela Specht and Justin Stolen}, title = {A consensus ranking for information system requirements}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {1}, pages = {10--18}, year = {1996}, url = {https://doi.org/10.1108/09685229610114169}, doi = {10.1108/09685229610114169}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ShiSS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Sturgeon96, author = {Alice Sturgeon}, title = {Telework: threats, risks and solutions}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {2}, pages = {27--38}, year = {1996}, url = {https://doi.org/10.1108/09685229610121017}, doi = {10.1108/09685229610121017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Sturgeon96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Stymiest96, author = {Bev Stymiest}, title = {Providing security for Unix networks}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {2}, pages = {18--26}, year = {1996}, url = {https://doi.org/10.1108/09685229610793067}, doi = {10.1108/09685229610793067}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Stymiest96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Wood96, author = {Charles Cresson Wood}, title = {Constructing difficult-to-guess passwords}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {1}, pages = {43--44}, year = {1996}, url = {https://doi.org/10.1108/09685229610114204}, doi = {10.1108/09685229610114204}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Wood96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Wood96a, author = {Charles Cresson Wood}, title = {A computer emergency response team policy}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {2}, pages = {4}, year = {1996}, url = {https://doi.org/10.1108/09685229610120991}, doi = {10.1108/09685229610120991}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Wood96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Wood96b, author = {Charles Cresson Wood}, title = {A policy for sending secret information over communications networks}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {3}, pages = {18--19}, year = {1996}, url = {https://doi.org/10.1108/09685229610126940}, doi = {10.1108/09685229610126940}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Wood96b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Wood96c, author = {Charles Cresson Wood}, title = {Information owners, custodians and users}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {4}, pages = {34--35}, year = {1996}, url = {https://doi.org/10.1108/09685229610130495}, doi = {10.1108/09685229610130495}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Wood96c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Wood96d, author = {Charles Cresson Wood}, title = {Removal of all unauthorized access paths in production software}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {5}, pages = {22--23}, year = {1996}, url = {https://doi.org/10.1108/09685229610153148}, doi = {10.1108/09685229610153148}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Wood96d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/X96, title = {The Ernst {\&} Young International Information Security Survey 1995}, journal = {Inf. Manag. Comput. Secur.}, volume = {4}, number = {4}, pages = {26--33}, year = {1996}, url = {https://doi.org/10.1108/09685229610130486}, doi = {10.1108/09685229610130486}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/X96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BanerjeeG95, author = {Snehamay Banerjee and Damodar Y. Golhar}, title = {Security issues in the {EDI} environment}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {2}, pages = {27--33}, year = {1995}, url = {https://doi.org/10.1108/09685229510792997}, doi = {10.1108/09685229510792997}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BanerjeeG95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Bloombecker95, author = {Jay BloomBecker}, title = {Simplifying the state and federal computer crime law maze in the {USA}}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {1}, pages = {18--20}, year = {1995}, url = {https://doi.org/10.1108/09685229510088232}, doi = {10.1108/09685229510088232}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Bloombecker95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Campbell95, author = {John R. Campbell}, title = {Real security for local area networks}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {1}, pages = {28--29}, year = {1995}, url = {https://doi.org/10.1108/09685229510088250}, doi = {10.1108/09685229510088250}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Campbell95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Cardinali95, author = {Richard Cardinali}, title = {Safeguarding databases: basic concepts revisited}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {1}, pages = {30--37}, year = {1995}, url = {https://doi.org/10.1108/09685229510147074}, doi = {10.1108/09685229510147074}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Cardinali95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Collier95, author = {Graham Collier}, title = {Information privacy}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {1}, pages = {41--45}, year = {1995}, url = {https://doi.org/10.1108/09685229510792979}, doi = {10.1108/09685229510792979}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Collier95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Doddrell95, author = {Gregory R. Doddrell}, title = {Security environment reviews}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {4}, pages = {3--14}, year = {1995}, url = {https://doi.org/10.1108/09685229510097250}, doi = {10.1108/09685229510097250}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Doddrell95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Doddrell95a, author = {Gregory R. Doddrell}, title = {Information security and the Internet}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {4}, pages = {15--19}, year = {1995}, url = {https://doi.org/10.1108/09685229510123629}, doi = {10.1108/09685229510123629}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Doddrell95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/EdwardsC95, author = {Bruce Edwards and John Cooper}, title = {Testing the disaster recovery plan}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {1}, pages = {21--27}, year = {1995}, url = {https://doi.org/10.1108/09685229510088241}, doi = {10.1108/09685229510088241}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/EdwardsC95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Fitzgerald95, author = {Kevin J. Fitzgerald}, title = {What if you had a flood in your computer room}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {1}, pages = {38--40}, year = {1995}, url = {https://doi.org/10.1108/09685229510088269}, doi = {10.1108/09685229510088269}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Fitzgerald95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Fitzgerald95a, author = {Kevin J. Fitzgerald}, title = {Information security baselines}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {2}, pages = {8--12}, year = {1995}, url = {https://doi.org/10.1108/09685229510088575}, doi = {10.1108/09685229510088575}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Fitzgerald95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Fitzgerald95b, author = {Kevin J. Fitzgerald}, title = {Establishing an effective continuity strategy}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {3}, pages = {20--24}, year = {1995}, url = {https://doi.org/10.1108/09685229510092039}, doi = {10.1108/09685229510092039}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Fitzgerald95b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Fitzgerald95c, author = {Kevin J. Fitzgerald}, title = {Security and data integrity for LANs and WANs}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {4}, pages = {27--33}, year = {1995}, url = {https://doi.org/10.1108/09685229510097287}, doi = {10.1108/09685229510097287}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Fitzgerald95c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Gubbins95, author = {Barry Gubbins}, title = {Protecting availability in complex computer environments}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {4}, pages = {20--22}, year = {1995}, url = {https://doi.org/10.1108/09685229510097269}, doi = {10.1108/09685229510097269}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Gubbins95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Irwin95, author = {Elaine Irwin}, title = {Software Intelligence introduces a new cross-platform, dient/server security solution}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {1}, pages = {7--8}, year = {1995}, url = {https://doi.org/10.1108/09685229510088214}, doi = {10.1108/09685229510088214}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Irwin95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KlouwenbergKS95, author = {Maaikel Klein Klouwenberg and William J. D. Koo and J. Alphons M. van Schaik}, title = {Establishing business strategy with information technology}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {5}, pages = {8--20}, year = {1995}, url = {https://doi.org/10.1108/09685229510104945}, doi = {10.1108/09685229510104945}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KlouwenbergKS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KoH95, author = {Catherine Ko and Margaret A. Hurley}, title = {Managing end-user computing}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {3}, pages = {3--6}, year = {1995}, url = {https://doi.org/10.1108/09685229510092066}, doi = {10.1108/09685229510092066}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KoH95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Lee95, author = {Matthew K. O. Lee}, title = {Legal control of computer crime in Hong Kong}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {2}, pages = {13--19}, year = {1995}, url = {https://doi.org/10.1108/09685229510088584}, doi = {10.1108/09685229510088584}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Lee95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MathieuW95, author = {Richard G. Mathieu and Robert L. Woodard}, title = {Data integrity and the Internet: implications for management}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {2}, pages = {3--7}, year = {1995}, url = {https://doi.org/10.1108/09685229510088566}, doi = {10.1108/09685229510088566}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MathieuW95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/May95, author = {Thornton May}, title = {The interpersonal computer interregnum}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {3}, pages = {25--33}, year = {1995}, url = {https://doi.org/10.1108/09685229510092020}, doi = {10.1108/09685229510092020}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/May95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/May95a, author = {Thornton May}, title = {Chief information officer ABCs}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {5}, pages = {23--24}, year = {1995}, url = {https://doi.org/10.1108/09685229510104963}, doi = {10.1108/09685229510104963}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/May95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MouleG95, author = {Barry Moule and Lina Giavara}, title = {Policies, procedures and standards: an approach for implementation}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {3}, pages = {7--16}, year = {1995}, url = {https://doi.org/10.1108/09685229510092057}, doi = {10.1108/09685229510092057}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MouleG95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Nolan95, author = {Richard L. Nolan}, title = {Improving {IT} quality: the basics to boost service and cut costs}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {5}, pages = {3--7}, year = {1995}, url = {https://doi.org/10.1108/09685229510104936}, doi = {10.1108/09685229510104936}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Nolan95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Norton95, author = {David P. Norton}, title = {Managing benefits from information technology}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {5}, pages = {29--35}, year = {1995}, url = {https://doi.org/10.1108/09685229510793022}, doi = {10.1108/09685229510793022}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Norton95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Paradine95, author = {T. J. Paradine}, title = {Business interruption insurance: a vital ingredient in your disaster recovery plan}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {1}, pages = {9--17}, year = {1995}, url = {https://doi.org/10.1108/09685229510088223}, doi = {10.1108/09685229510088223}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Paradine95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Smith95, author = {Russell Smith}, title = {Business continuity planning and service level agreements}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {3}, pages = {17--19}, year = {1995}, url = {https://doi.org/10.1108/09685229510092048}, doi = {10.1108/09685229510092048}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Smith95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Spurling95, author = {Phil Spurling}, title = {Promoting security awareness and commitment}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {2}, pages = {20--26}, year = {1995}, url = {https://doi.org/10.1108/09685229510792988}, doi = {10.1108/09685229510792988}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Spurling95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Whybrow95, author = {Martin Whybrow}, title = {Bridging the gaps}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {1}, pages = {4--6}, year = {1995}, url = {https://doi.org/10.1108/09685229510088205}, doi = {10.1108/09685229510088205}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Whybrow95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Wood95, author = {Charles Cresson Wood}, title = {The Charles Cresson Wood file}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {4}, pages = {23--26}, year = {1995}, url = {https://doi.org/10.1108/09685229510097278}, doi = {10.1108/09685229510097278}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Wood95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Wood95a, author = {Charles Cresson Wood}, title = {Background checks for employees in computer-related positions of trust}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {5}, pages = {21--22}, year = {1995}, url = {https://doi.org/10.1108/09685229510104954}, doi = {10.1108/09685229510104954}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Wood95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/YasinQ95, author = {Mahmoud M. Yasin and John V. Quigley}, title = {The utility of information systems views of CEOs and information system executives}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {2}, pages = {34--38}, year = {1995}, url = {https://doi.org/10.1108/09685229510793004}, doi = {10.1108/09685229510793004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/YasinQ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Zerman95, author = {David Zerman}, title = {Crisis communication: managing the mass media}, journal = {Inf. Manag. Comput. Secur.}, volume = {3}, number = {5}, pages = {25--28}, year = {1995}, url = {https://doi.org/10.1108/09685229510793013}, doi = {10.1108/09685229510793013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Zerman95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Anderson94, author = {Ross J. Anderson}, title = {Whither Cryptography}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {5}, pages = {13--20}, year = {1994}, url = {https://doi.org/10.1108/09685229410792961}, doi = {10.1108/09685229410792961}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Anderson94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BellK94, author = {Graham P. Bell and David Kavanagh}, title = {Minimizing Risk in Your Wide Area Network Design}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {3}, pages = {26--28}, year = {1994}, url = {https://doi.org/10.1108/09685229410066183}, doi = {10.1108/09685229410066183}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BellK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Berner94, author = {Philip Berner}, title = {Software Auditing Means Better Business}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {4}, pages = {32--34}, year = {1994}, url = {https://doi.org/10.1108/09685229410068208}, doi = {10.1108/09685229410068208}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Berner94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ButlerF94, author = {James R. Butler and Karen A. Forcht}, title = {The Clipper Chip and the Price of Security in America}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {5}, pages = {9--12}, year = {1994}, url = {https://doi.org/10.1108/09685229410072582}, doi = {10.1108/09685229410072582}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ButlerF94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Caelli94, author = {William J. Caelli}, title = {Security in Open and Distributed Systems}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {1}, pages = {18--24}, year = {1994}, url = {https://doi.org/10.1108/09685229410058759}, doi = {10.1108/09685229410058759}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Caelli94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/EbbsR94, author = {Geoffrey Ebbs and Howard Rheingold}, title = {Censorship on the Information Highway}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {4}, pages = {30--31}, year = {1994}, url = {https://doi.org/10.1108/09685229410068244}, doi = {10.1108/09685229410068244}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/EbbsR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Edwards94, author = {Bruce Edwards}, title = {Developing a Successful Network Disaster Recovery Plan}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {3}, pages = {37--42}, year = {1994}, url = {https://doi.org/10.1108/09685229410066200}, doi = {10.1108/09685229410066200}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Edwards94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Fink94, author = {Dieter Fink}, title = {A Security Framework for Information Systems Outsourcing}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {4}, pages = {3--8}, year = {1994}, url = {https://doi.org/10.1108/09685229410068235}, doi = {10.1108/09685229410068235}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Fink94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Fitzgerald94, author = {Kevin J. Fitzgerald}, title = {The Importance of a Network Disaster Recovery Plan}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {1}, pages = {41--43}, year = {1994}, url = {https://doi.org/10.1108/09685229410058786}, doi = {10.1108/09685229410058786}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Fitzgerald94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Fitzgerald94a, author = {Kevin J. Fitzgerald}, title = {Establishing Security in a Multi-platform, Multi-vendor Enterprise-wide {IT} Environment}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {4}, pages = {9--15}, year = {1994}, url = {https://doi.org/10.1108/09685229410068226}, doi = {10.1108/09685229410068226}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Fitzgerald94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FletcherD94, author = {Keith Fletcher and Mark Donaghy}, title = {The Role of Competitor Information Systems}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {3}, pages = {4--18}, year = {1994}, url = {https://doi.org/10.1108/09685229410792952}, doi = {10.1108/09685229410792952}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FletcherD94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ForchtO94, author = {Karen A. Forcht and Morey Oare}, title = {The Information Highway: The Interstate Highway System for Computer Networks}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {5}, pages = {4--8}, year = {1994}, url = {https://doi.org/10.1108/09685229410072573}, doi = {10.1108/09685229410072573}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ForchtO94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ForchtT94, author = {Karen A. Forcht and Daphyne Saunders Thomas}, title = {Information Compilation and Disbursement: Moral, Legal and Ethical Considerations}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {2}, pages = {23--28}, year = {1994}, url = {https://doi.org/10.1108/09685229410059550}, doi = {10.1108/09685229410059550}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ForchtT94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ForchtT94a, author = {Karen A. Forcht and Yuan{-}Wen Aven Tsai}, title = {Security and Network Management: Changes in the Way We Work}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {4}, pages = {35--41}, year = {1994}, url = {https://doi.org/10.1108/09685229410068190}, doi = {10.1108/09685229410068190}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ForchtT94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Geary94, author = {James M. Geary}, title = {Executive Liability for Computer Crime and How to Prevent It}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {2}, pages = {29--31}, year = {1994}, url = {https://doi.org/10.1108/09685229410059569}, doi = {10.1108/09685229410059569}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Geary94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Gluck94, author = {Fredric B. Gluck}, title = {Protection of Electronic Mail and Electronic Messages: Challenges and Solutions}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {1}, pages = {28--40}, year = {1994}, url = {https://doi.org/10.1108/09685229410058777}, doi = {10.1108/09685229410058777}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Gluck94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Hains94, author = {David Hains}, title = {Authentication: {A} Prominent Issue for Data Communications}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {1}, pages = {25--27}, year = {1994}, url = {https://doi.org/10.1108/09685229410058768}, doi = {10.1108/09685229410058768}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Hains94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Hains94a, author = {David Hains}, title = {{EDI} Security Issues Can Be Overcome}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {3}, pages = {46}, year = {1994}, url = {https://doi.org/10.1108/09685229410066219}, doi = {10.1108/09685229410066219}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Hains94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Johannessen94, author = {Jon{-}Arild Johannessen}, title = {Information Technology and Innovation: Identifying Critical Innovation Factors}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {2}, pages = {4--9}, year = {1994}, url = {https://doi.org/10.1108/09685229410059532}, doi = {10.1108/09685229410059532}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Johannessen94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JohannessenK94, author = {Jon{-}Arild Johannessen and Lars Kolvereid}, title = {Information Search Behaviour during Business Gestation}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {5}, pages = {31--41}, year = {1994}, url = {https://doi.org/10.1108/09685229410072609}, doi = {10.1108/09685229410072609}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JohannessenK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Karake94, author = {Zeinab A. Karake}, title = {A Study of Information Technology Structure: Firm Ownership and Managerial Characteristics}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {5}, pages = {21--30}, year = {1994}, url = {https://doi.org/10.1108/09685229410072591}, doi = {10.1108/09685229410072591}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Karake94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Macdonald94, author = {K. Hugh Macdonald}, title = {Organisational Transformation and Alignment: Misalignment as an Impediment to Progress in Organisational Development}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {4}, pages = {16--29}, year = {1994}, url = {https://doi.org/10.1108/09685229410068217}, doi = {10.1108/09685229410068217}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Macdonald94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MaduK94, author = {Christian N. Madu and Chu{-}hua Kuei}, title = {Optimum Information Technology for Socioeconomic Development}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {1}, pages = {4--11}, year = {1994}, url = {https://doi.org/10.1108/09685229410058731}, doi = {10.1108/09685229410058731}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MaduK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RogersonF94, author = {Simon Rogerson and Christine Fidler}, title = {Strategic Information Systems Planning: Its Adoption and Use}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {1}, pages = {12--17}, year = {1994}, url = {https://doi.org/10.1108/09685229410058740}, doi = {10.1108/09685229410058740}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RogersonF94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SouthernM94, author = {G. Southern and Allistair U. Murray}, title = {Quality Information Management: The Way to a Better Company Culture}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {2}, pages = {32--35}, year = {1994}, url = {https://doi.org/10.1108/09685229410059578}, doi = {10.1108/09685229410059578}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SouthernM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Weiss94, author = {Kenneth P. Weiss}, title = {To Serve and Protect: Reconciling Information Protection with {LAN} Environments}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {3}, pages = {19--25}, year = {1994}, url = {https://doi.org/10.1108/09685229410792934}, doi = {10.1108/09685229410792934}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Weiss94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Weiss94a, author = {Kenneth P. Weiss}, title = {New Initiatives which May Erode Your Privacy: Or George Orwell Was Off by Only a Decade}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {3}, pages = {43--45}, year = {1994}, url = {https://doi.org/10.1108/09685229410792943}, doi = {10.1108/09685229410792943}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Weiss94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/White94, author = {Stewart White}, title = {The Data Network Disaster Recovery Plan: Considerations and Concerns}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {3}, pages = {29--36}, year = {1994}, url = {https://doi.org/10.1108/09685229410066192}, doi = {10.1108/09685229410066192}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/White94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Zeffane94, author = {Rachid M. Zeffane}, title = {Computer Usage and Job Satisfaction: An Empirical Exploration}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {2}, pages = {10--22}, year = {1994}, url = {https://doi.org/10.1108/09685229410059541}, doi = {10.1108/09685229410059541}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Zeffane94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Bakewell93, author = {Kenneth Graham Bartlett Bakewell}, title = {Information: The Seventh Management Function?}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {2}, year = {1993}, url = {https://doi.org/10.1108/09685229310033379}, doi = {10.1108/09685229310033379}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Bakewell93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Berner93, author = {Philip Berner}, title = {Software Auditing: Effectively Combating the Five Deadly Sins}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {2}, year = {1993}, url = {https://doi.org/10.1108/EUM0000000001703}, doi = {10.1108/EUM0000000001703}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Berner93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BirdBB93, author = {Andrew Bird and Tom Blaney and John Burton}, title = {DataComms 2000: {A} Strategic Exploration of a Transforming Industry}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {3}, pages = {18--31}, year = {1993}, url = {https://doi.org/10.1108/09685229310041901}, doi = {10.1108/09685229310041901}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BirdBB93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/EdwardsP93, author = {Chris Edwards and Joe Peppard}, title = {A Taxonomy of Executive Information Systems: Let the 4 Cs Penetrate the Fog}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {2}, year = {1993}, url = {https://doi.org/10.1108/09685229310033405}, doi = {10.1108/09685229310033405}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/EdwardsP93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FidlerRS93, author = {Christine Fidler and Simon Rogerson and Nicola Spiers}, title = {Current {IS} Practices within UK-based Organizations}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {2}, year = {1993}, url = {https://doi.org/10.1108/09685229310033351}, doi = {10.1108/09685229310033351}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FidlerRS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FinkD93, author = {Dieter Fink and Daniel C. Duffy}, title = {Security Officers' Attitudes to the Use of Shared Logons}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {1}, pages = {19--21}, year = {1993}, url = {https://doi.org/10.1108/09685229310026485}, doi = {10.1108/09685229310026485}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FinkD93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Fitzgerald93, author = {Kevin J. Fitzgerald}, title = {Business Continuity Planning in a Distributed Downsized Environment}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {2}, year = {1993}, url = {https://doi.org/10.1108/09685229310033388}, doi = {10.1108/09685229310033388}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Fitzgerald93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Fitzgerald93a, author = {Kevin J. Fitzgerald}, title = {Risk Analysis: Ten Years On}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {5}, year = {1993}, url = {https://doi.org/10.1108/09685229310048328}, doi = {10.1108/09685229310048328}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Fitzgerald93a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ForchtBSC93, author = {Karen A. Forcht and Robert G. Brookshire and Scott Paul Stevens and Rodney J. Clarke}, title = {Computer Ethics of University Students: An International Exploratory Study}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {5}, year = {1993}, url = {https://doi.org/10.1108/09685229310048346}, doi = {10.1108/09685229310048346}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ForchtBSC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GabbottS93, author = {Mark Gabbott and Ewan Sutherland}, title = {Studying Potential Customers: The Applications of Marketing Information Systems in University Recruitment}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {4}, year = {1993}, url = {https://doi.org/10.1108/09685229310045349}, doi = {10.1108/09685229310045349}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GabbottS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Gluck93, author = {Fredric B. Gluck}, title = {The Open Security Architecture}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {3}, pages = {4--11}, year = {1993}, url = {https://doi.org/10.1108/EUM0000000001704}, doi = {10.1108/EUM0000000001704}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Gluck93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HaarS93, author = {Helen van de Haar and Rossouw von Solms}, title = {A Tool for Information Security Management}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {1}, pages = {4--10}, year = {1993}, url = {https://doi.org/10.1108/09685229310026467}, doi = {10.1108/09685229310026467}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HaarS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Hains93, author = {David Hains}, title = {Computer Security as a Liability Control Tool}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {4}, year = {1993}, url = {https://doi.org/10.1108/09685229310045321}, doi = {10.1108/09685229310045321}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Hains93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Hamilton93, author = {Ross Hamilton}, title = {Does {IT} Matter When Companies Merge?}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {2}, year = {1993}, url = {https://doi.org/10.1108/09685229310033397}, doi = {10.1108/09685229310033397}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Hamilton93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JamesC93, author = {H. James and Roger A. Coldwell}, title = {Corporate Security: An Australian Ostrich}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {4}, year = {1993}, url = {https://doi.org/10.1108/09685229310045303}, doi = {10.1108/09685229310045303}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JamesC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JohannessenO93, author = {Jon{-}Arild Johannessen and Johan Olaisen}, title = {Information, Communication and Innovation: Identifying Critical Innovation Factors {(CIF)}}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {4}, year = {1993}, url = {https://doi.org/10.1108/09685229310045358}, doi = {10.1108/09685229310045358}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JohannessenO93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KamayA93, author = {Vic Kamay and Tony Adams}, title = {The 1992 Profile of Computer Abuse in Australia: Part 2}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {2}, year = {1993}, url = {https://doi.org/10.1108/09685229310033360}, doi = {10.1108/09685229310033360}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KamayA93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Kirby93, author = {Justice Michael Kirby}, title = {The Human Genome Project: Promise or Problems?}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {5}, year = {1993}, url = {https://doi.org/10.1108/09685229310048300}, doi = {10.1108/09685229310048300}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Kirby93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Kirby93a, author = {Justice Michael Kirby}, title = {Legal Aspects of the Human Genome Project: Reflections on the Bilbao Conference}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {5}, year = {1993}, url = {https://doi.org/10.1108/09685229310048319}, doi = {10.1108/09685229310048319}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Kirby93a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MartinA93, author = {William J. Martin and Michael Armstrong}, title = {{STAR} and Economic Regeneration: Some Feedback from Northern Ireland}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {1}, pages = {29--38}, year = {1993}, url = {https://doi.org/10.1108/09685229310026511}, doi = {10.1108/09685229310026511}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MartinA93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Moore93, author = {Pat Williams Moore}, title = {{BMS} {CAT} in Action: Electronic/Communications Recovery at the World Trade Centre, New York}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {4}, year = {1993}, url = {https://doi.org/10.1108/09685229310045312}, doi = {10.1108/09685229310045312}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Moore93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Newman93, author = {Tom Newman}, title = {Information Loss Rarely Recovered}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {4}, year = {1993}, url = {https://doi.org/10.1108/09685229310045330}, doi = {10.1108/09685229310045330}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Newman93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SolmsSC93, author = {Rossouw von Solms and Sebastiaan H. von Solms and William J. Caelli}, title = {A Model for Information Security Management}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {3}, pages = {12--17}, year = {1993}, url = {https://doi.org/10.1108/09685229310041893}, doi = {10.1108/09685229310041893}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SolmsSC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TaftiN93, author = {Mohammed H. A. Tafti and Ehsan Nikbakht}, title = {Neural Networks and Expert Systems: New Horizons in Business Finance Applications}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {1}, pages = {22--28}, year = {1993}, url = {https://doi.org/10.1108/09685229310026502}, doi = {10.1108/09685229310026502}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TaftiN93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Weiss93, author = {Kenneth P. Weiss}, title = {Data Integrity and Security: Who's in Charge Here Anyway?}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {4}, year = {1993}, url = {https://doi.org/10.1108/EUM0000000001705}, doi = {10.1108/EUM0000000001705}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Weiss93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Wood93, author = {Charles Cresson Wood}, title = {Dreams Come True with Password Genie}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {5}, year = {1993}, url = {https://doi.org/10.1108/09685229310048337}, doi = {10.1108/09685229310048337}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Wood93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/YavasY93, author = {Ugur Yavas and Mahmoud M. Yasin}, title = {Computing Environment in an Arabian Gulf Country: An Organizational Perspective}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {1}, pages = {11--18}, year = {1993}, url = {https://doi.org/10.1108/09685229310026476}, doi = {10.1108/09685229310026476}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/YavasY93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.