Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/imcs/imcs17.bht:"
@article{DBLP:journals/imcs/Abu-Musa09, author = {Ahmad Abu{-}Musa}, title = {Exploring the importance and implementation of {COBIT} processes in Saudi organizations: An empirical study}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {2}, pages = {73--95}, year = {2009}, url = {https://doi.org/10.1108/09685220910963974}, doi = {10.1108/09685220910963974}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Abu-Musa09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ahmed09, author = {Zeeshan Ahmed}, title = {Proposing semantic-oriented agent and knowledge base product data management}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {5}, pages = {360--371}, year = {2009}, url = {https://doi.org/10.1108/09685220911006669}, doi = {10.1108/09685220911006669}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Ahmed09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Al-BadiAAM09, author = {Ali H. Al{-}Badi and Rafi Ashrafi and Ali O. Al{-}Majeeni and Pam J. Mayhew}, title = {{IT} disaster recovery: Oman and Cyclone Gonu lessons learned}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {2}, pages = {114--126}, year = {2009}, url = {https://doi.org/10.1108/09685220910963992}, doi = {10.1108/09685220910963992}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Al-BadiAAM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BakhshiPF09, author = {Taimur Bakhshi and Maria Papadaki and Steven Furnell}, title = {Social engineering: assessing vulnerabilities in practice}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {1}, pages = {53--63}, year = {2009}, url = {https://doi.org/10.1108/09685220910944768}, doi = {10.1108/09685220910944768}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BakhshiPF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BennettS09, author = {David James Bennett and Paul Stephens}, title = {A cognitive walkthrough of Autopsy Forensic Browser}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {1}, pages = {20--29}, year = {2009}, url = {https://doi.org/10.1108/09685220910944731}, doi = {10.1108/09685220910944731}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BennettS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChouL09, author = {Tzu{-}Chuan Chou and An{-}Sheng Lee}, title = {A process model for customer relational assets creation: {A} case study of online securities trading platform}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {3}, pages = {218--233}, year = {2009}, url = {https://doi.org/10.1108/09685220910978095}, doi = {10.1108/09685220910978095}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChouL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChowH09, author = {Wing S. Chow and Wai On Ha}, title = {Determinants of the critical success factor of disaster recovery planning for information systems}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {3}, pages = {248--275}, year = {2009}, url = {https://doi.org/10.1108/09685220910978103}, doi = {10.1108/09685220910978103}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChowH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/EfraimidisDNT09, author = {Pavlos S. Efraimidis and George Drosatos and Fotis Nalbadis and Aimilia Tasidou}, title = {Towards privacy in personal data management}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {4}, pages = {311--329}, year = {2009}, url = {https://doi.org/10.1108/09685220910993971}, doi = {10.1108/09685220910993971}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/EfraimidisDNT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GurungLL09, author = {Anil Gurung and Xin (Robert) Luo and Qinyu Liao}, title = {Consumer motivations in taking action against spyware: an empirical investigation}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {3}, pages = {276--289}, year = {2009}, url = {https://doi.org/10.1108/09685220910978112}, doi = {10.1108/09685220910978112}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GurungLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HagenA09, author = {Janne Merete Hagen and Eirik Albrechtsen}, title = {Effects on employees' information security abilities by e-learning}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {5}, pages = {388--407}, year = {2009}, url = {https://doi.org/10.1108/09685220911006687}, doi = {10.1108/09685220911006687}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HagenA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HelkalaS09, author = {Kirsi Helkala and Einar Snekkenes}, title = {Formalizing the ranking of authentication products}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {1}, pages = {30--43}, year = {2009}, url = {https://doi.org/10.1108/09685220910944740}, doi = {10.1108/09685220910944740}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HelkalaS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ifinedo09, author = {Princely Ifinedo}, title = {Information technology security management concerns in global financial services institutions: Is national culture a differentiator?}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {5}, pages = {372--387}, year = {2009}, url = {https://doi.org/10.1108/09685220911006678}, doi = {10.1108/09685220911006678}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Ifinedo09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LeeHL09, author = {Cheng{-}Chi Lee and Min{-}Shiang Hwang and Chih{-}Wei Lin}, title = {A new English auction scheme using the bulletin board system}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {5}, pages = {408--417}, year = {2009}, url = {https://doi.org/10.1108/09685220911006696}, doi = {10.1108/09685220911006696}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LeeHL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RanjanB09, author = {Jayanthi Ranjan and Vishal Bhatnagar}, title = {A holistic framework for mCRM - data mining perspective}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {2}, pages = {151--165}, year = {2009}, url = {https://doi.org/10.1108/09685220910964018}, doi = {10.1108/09685220910964018}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RanjanB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RocaGV09, author = {Juan Carlos Roca and Juan Jos{\'{e}} Garc{\'{\i}}a and Juan Jos{\'{e}} de la Vega}, title = {The importance of perceived trust, security and privacy in online trading systems}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {2}, pages = {96--113}, year = {2009}, url = {https://doi.org/10.1108/09685220910963983}, doi = {10.1108/09685220910963983}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RocaGV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RouibahA09, author = {Kamel Rouibah and Sulaiman Al{-}Rafee}, title = {Requirement engineering elicitation methods: {A} Kuwaiti empirical study about familiarity, usage and perceived value}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {3}, pages = {192--217}, year = {2009}, url = {https://doi.org/10.1108/09685220910978086}, doi = {10.1108/09685220910978086}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RouibahA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SalwaniMNC09, author = {Mohamed Intan Salwani and Govindan Marthandan and Mohd Daud Norzaidi and Siong Choy Chong}, title = {E-commerce usage and business performance in the Malaysian tourism sector: empirical analysis}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {2}, pages = {166--185}, year = {2009}, url = {https://doi.org/10.1108/09685220910964027}, doi = {10.1108/09685220910964027}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SalwaniMNC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Shropshire09, author = {Jordan Shropshire}, title = {A canonical analysis of intentional information security breaches by insiders}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {4}, pages = {296--310}, year = {2009}, url = {https://doi.org/10.1108/09685220910993962}, doi = {10.1108/09685220910993962}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Shropshire09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Smith09, author = {Alan D. Smith}, title = {Internet retail banking: {A} competitive analysis in an increasingly financially troubled environment}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {2}, pages = {127--150}, year = {2009}, url = {https://doi.org/10.1108/09685220910964009}, doi = {10.1108/09685220910964009}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Smith09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/StylesT09, author = {Martyn Styles and Theo Tryfonas}, title = {Using penetration testing feedback to cultivate an atmosphere of proactive security amongst end-users}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {1}, pages = {44--52}, year = {2009}, url = {https://doi.org/10.1108/09685220910944759}, doi = {10.1108/09685220910944759}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/StylesT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/VincentFA09, author = {Olufunke R. Vincent and Olusegun Folorunso and Ayodele Akinde}, title = {On consolidation model in e-bill presentment and payment}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {3}, pages = {234--247}, year = {2009}, url = {https://doi.org/10.1108/09685220910978121}, doi = {10.1108/09685220910978121}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/VincentFA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/WerlingerHB09, author = {Rodrigo Werlinger and Kirstie Hawkey and Konstantin Beznosov}, title = {An integrated view of human, organizational, and technological challenges of {IT} security management}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {1}, pages = {4--19}, year = {2009}, url = {https://doi.org/10.1108/09685220910944722}, doi = {10.1108/09685220910944722}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/WerlingerHB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Workman09, author = {Michael Workman}, title = {How perceptions of justice affect security attitudes: suggestions for practitioners and researchers}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {4}, pages = {341--353}, year = {2009}, url = {https://doi.org/10.1108/09685220910993999}, doi = {10.1108/09685220910993999}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Workman09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ZhangRL09, author = {Jie Zhang and Brian J. Reithel and Han Li}, title = {Impact of perceived technical protection on security behaviors}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {4}, pages = {330--340}, year = {2009}, url = {https://doi.org/10.1108/09685220910993980}, doi = {10.1108/09685220910993980}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ZhangRL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.