Search dblp for Publications

export results for "toc:db/journals/imcs/imcs17.bht:"

 download as .bib file

@article{DBLP:journals/imcs/Abu-Musa09,
  author       = {Ahmad Abu{-}Musa},
  title        = {Exploring the importance and implementation of {COBIT} processes in
                  Saudi organizations: An empirical study},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {73--95},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910963974},
  doi          = {10.1108/09685220910963974},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Abu-Musa09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ahmed09,
  author       = {Zeeshan Ahmed},
  title        = {Proposing semantic-oriented agent and knowledge base product data
                  management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {360--371},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220911006669},
  doi          = {10.1108/09685220911006669},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Ahmed09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Al-BadiAAM09,
  author       = {Ali H. Al{-}Badi and
                  Rafi Ashrafi and
                  Ali O. Al{-}Majeeni and
                  Pam J. Mayhew},
  title        = {{IT} disaster recovery: Oman and Cyclone Gonu lessons learned},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {114--126},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910963992},
  doi          = {10.1108/09685220910963992},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Al-BadiAAM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BakhshiPF09,
  author       = {Taimur Bakhshi and
                  Maria Papadaki and
                  Steven Furnell},
  title        = {Social engineering: assessing vulnerabilities in practice},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {53--63},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910944768},
  doi          = {10.1108/09685220910944768},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BakhshiPF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BennettS09,
  author       = {David James Bennett and
                  Paul Stephens},
  title        = {A cognitive walkthrough of Autopsy Forensic Browser},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {20--29},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910944731},
  doi          = {10.1108/09685220910944731},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BennettS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChouL09,
  author       = {Tzu{-}Chuan Chou and
                  An{-}Sheng Lee},
  title        = {A process model for customer relational assets creation: {A} case
                  study of online securities trading platform},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {218--233},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910978095},
  doi          = {10.1108/09685220910978095},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChouL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChowH09,
  author       = {Wing S. Chow and
                  Wai On Ha},
  title        = {Determinants of the critical success factor of disaster recovery planning
                  for information systems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {248--275},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910978103},
  doi          = {10.1108/09685220910978103},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChowH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/EfraimidisDNT09,
  author       = {Pavlos S. Efraimidis and
                  George Drosatos and
                  Fotis Nalbadis and
                  Aimilia Tasidou},
  title        = {Towards privacy in personal data management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {311--329},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910993971},
  doi          = {10.1108/09685220910993971},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/EfraimidisDNT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GurungLL09,
  author       = {Anil Gurung and
                  Xin (Robert) Luo and
                  Qinyu Liao},
  title        = {Consumer motivations in taking action against spyware: an empirical
                  investigation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {276--289},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910978112},
  doi          = {10.1108/09685220910978112},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GurungLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HagenA09,
  author       = {Janne Merete Hagen and
                  Eirik Albrechtsen},
  title        = {Effects on employees' information security abilities by e-learning},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {388--407},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220911006687},
  doi          = {10.1108/09685220911006687},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HagenA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HelkalaS09,
  author       = {Kirsi Helkala and
                  Einar Snekkenes},
  title        = {Formalizing the ranking of authentication products},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {30--43},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910944740},
  doi          = {10.1108/09685220910944740},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HelkalaS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ifinedo09,
  author       = {Princely Ifinedo},
  title        = {Information technology security management concerns in global financial
                  services institutions: Is national culture a differentiator?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {372--387},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220911006678},
  doi          = {10.1108/09685220911006678},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Ifinedo09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LeeHL09,
  author       = {Cheng{-}Chi Lee and
                  Min{-}Shiang Hwang and
                  Chih{-}Wei Lin},
  title        = {A new English auction scheme using the bulletin board system},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {408--417},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220911006696},
  doi          = {10.1108/09685220911006696},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LeeHL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RanjanB09,
  author       = {Jayanthi Ranjan and
                  Vishal Bhatnagar},
  title        = {A holistic framework for mCRM - data mining perspective},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {151--165},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910964018},
  doi          = {10.1108/09685220910964018},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RanjanB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RocaGV09,
  author       = {Juan Carlos Roca and
                  Juan Jos{\'{e}} Garc{\'{\i}}a and
                  Juan Jos{\'{e}} de la Vega},
  title        = {The importance of perceived trust, security and privacy in online
                  trading systems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {96--113},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910963983},
  doi          = {10.1108/09685220910963983},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RocaGV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RouibahA09,
  author       = {Kamel Rouibah and
                  Sulaiman Al{-}Rafee},
  title        = {Requirement engineering elicitation methods: {A} Kuwaiti empirical
                  study about familiarity, usage and perceived value},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {192--217},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910978086},
  doi          = {10.1108/09685220910978086},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RouibahA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SalwaniMNC09,
  author       = {Mohamed Intan Salwani and
                  Govindan Marthandan and
                  Mohd Daud Norzaidi and
                  Siong Choy Chong},
  title        = {E-commerce usage and business performance in the Malaysian tourism
                  sector: empirical analysis},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {166--185},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910964027},
  doi          = {10.1108/09685220910964027},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SalwaniMNC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Shropshire09,
  author       = {Jordan Shropshire},
  title        = {A canonical analysis of intentional information security breaches
                  by insiders},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {296--310},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910993962},
  doi          = {10.1108/09685220910993962},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Shropshire09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Smith09,
  author       = {Alan D. Smith},
  title        = {Internet retail banking: {A} competitive analysis in an increasingly
                  financially troubled environment},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {127--150},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910964009},
  doi          = {10.1108/09685220910964009},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Smith09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/StylesT09,
  author       = {Martyn Styles and
                  Theo Tryfonas},
  title        = {Using penetration testing feedback to cultivate an atmosphere of proactive
                  security amongst end-users},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {44--52},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910944759},
  doi          = {10.1108/09685220910944759},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/StylesT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/VincentFA09,
  author       = {Olufunke R. Vincent and
                  Olusegun Folorunso and
                  Ayodele Akinde},
  title        = {On consolidation model in e-bill presentment and payment},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {234--247},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910978121},
  doi          = {10.1108/09685220910978121},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/VincentFA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/WerlingerHB09,
  author       = {Rodrigo Werlinger and
                  Kirstie Hawkey and
                  Konstantin Beznosov},
  title        = {An integrated view of human, organizational, and technological challenges
                  of {IT} security management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {4--19},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910944722},
  doi          = {10.1108/09685220910944722},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/WerlingerHB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Workman09,
  author       = {Michael Workman},
  title        = {How perceptions of justice affect security attitudes: suggestions
                  for practitioners and researchers},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {341--353},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910993999},
  doi          = {10.1108/09685220910993999},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Workman09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ZhangRL09,
  author       = {Jie Zhang and
                  Brian J. Reithel and
                  Han Li},
  title        = {Impact of perceived technical protection on security behaviors},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {330--340},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910993980},
  doi          = {10.1108/09685220910993980},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ZhangRL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics