Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/imcs/imcs18.bht:"
@article{DBLP:journals/imcs/Abu-Musa10, author = {Ahmad Abu{-}Musa}, title = {Information security governance in Saudi organizations: an empirical study}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {4}, pages = {226--276}, year = {2010}, url = {https://doi.org/10.1108/09685221011079180}, doi = {10.1108/09685221011079180}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Abu-Musa10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Al-AwadiS10, author = {K. Al{-}Awadi and Messaoud Saidani}, title = {Justifying the need for a data security management plan for the {UAE}}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {3}, pages = {173--184}, year = {2010}, url = {https://doi.org/10.1108/09685221011064708}, doi = {10.1108/09685221011064708}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Al-AwadiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AsaiH10, author = {Tatsuo Asai and Aline Uwera Hakizabera}, title = {Human-Related Problems of Information Security in East African Cross-Cultural Environments}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {5}, pages = {328--338}, year = {2010}, url = {https://doi.org/10.1108/09685221011095245}, doi = {10.1108/09685221011095245}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AsaiH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/CaceresT10, author = {Guillermo Horacio Ramirez Caceres and Yoshimi Teshigawara}, title = {Security Guideline Tool for Home Users Based on International Standards}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {2}, pages = {101--123}, year = {2010}, url = {https://doi.org/10.1108/09685221011048346}, doi = {10.1108/09685221011048346}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/CaceresT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChangYP10, author = {Ting{-}Yi Chang and Yu{-}Ju Yang and Chun{-}Cheng Peng}, title = {A Personalized Rhythm Click-Based Authentication System}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {2}, pages = {72--85}, year = {2010}, url = {https://doi.org/10.1108/09685221011048328}, doi = {10.1108/09685221011048328}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChangYP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChristodoulakiF10, author = {Meltini Christodoulaki and Paraskevi Fragopoulou}, title = {SafeLine: reporting illegal internet content}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {1}, pages = {54--65}, year = {2010}, url = {https://doi.org/10.1108/09685221011035269}, doi = {10.1108/09685221011035269}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ChristodoulakiF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FailyF10, author = {Shamal Faily and Ivan Flechais}, title = {Designing and Aligning e-Science Security Culture with Design}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {5}, pages = {339--349}, year = {2010}, url = {https://doi.org/10.1108/09685221011095254}, doi = {10.1108/09685221011095254}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FailyF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FutchersS10, author = {Lynn Futcher and Cheryl Schroder and Rossouw von Solms}, title = {Information Security Education in South Africa}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {5}, pages = {366--374}, year = {2010}, url = {https://doi.org/10.1108/09685221011095272}, doi = {10.1108/09685221011095272}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FutchersS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GoldsteinPS10, author = {Zvi Goldstein and David Petrie and Yosef Sherif}, title = {Finding middle ground management strategy for software development}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {3}, pages = {185--197}, year = {2010}, url = {https://doi.org/10.1108/09685221011064717}, doi = {10.1108/09685221011064717}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GoldsteinPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Goode10, author = {Sigi Goode}, title = {Exploring the supply of pirate software for mobile devices: An analysis of software types and piracy groups}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {4}, pages = {204--225}, year = {2010}, url = {https://doi.org/10.1108/09685221011079171}, doi = {10.1108/09685221011079171}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Goode10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Hui10, author = {Wendy Hui}, title = {Brand, knowledge, and false sense of security}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {3}, pages = {162--172}, year = {2010}, url = {https://doi.org/10.1108/09685221011064690}, doi = {10.1108/09685221011064690}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Hui10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JaliFD10, author = {Mohd Zalisham Jali and Steven Furnell and Paul Dowland}, title = {Assessing image-based authentication techniques in a web-based environment}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {1}, pages = {43--53}, year = {2010}, url = {https://doi.org/10.1108/09685221011035250}, doi = {10.1108/09685221011035250}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JaliFD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KrugerDS10, author = {Hennie A. Kruger and Lynette Drevin and Tjaart Steyn}, title = {A Vocabulary Test to Assess Information Security Awareness}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {5}, pages = {316--327}, year = {2010}, url = {https://doi.org/10.1108/09685221011095236}, doi = {10.1108/09685221011095236}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KrugerDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Lacey10, author = {David Lacey}, title = {Understanding and transforming organizational security culture}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {1}, pages = {4--13}, year = {2010}, url = {https://doi.org/10.1108/09685221011035223}, doi = {10.1108/09685221011035223}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Lacey10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PatelQW10, author = {Ahmed Patel and Wei Qi and Christopher Wills}, title = {A review and future research directions of secure and trustworthy mobile agent-based e-marketplace systems}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {3}, pages = {144--161}, year = {2010}, url = {https://doi.org/10.1108/09685221011064681}, doi = {10.1108/09685221011064681}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PatelQW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PatelQW10a, author = {Ahmed Patel and Qais Qassim and Christopher Wills}, title = {A survey of intrusion detection and prevention systems}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {4}, pages = {277--290}, year = {2010}, url = {https://doi.org/10.1108/09685221011079199}, doi = {10.1108/09685221011079199}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PatelQW10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PatsosMD10, author = {Dimitrios Patsos and Sarandis Mitropoulos and Christos Douligeris}, title = {Expanding topological vulnerability analysis to intrusion detection through the incident response intelligence system}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {4}, pages = {291--309}, year = {2010}, url = {https://doi.org/10.1108/09685221011079207}, doi = {10.1108/09685221011079207}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PatsosMD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PearceZH10, author = {Michael Pearce and Sherali Zeadally and Ray Hunt}, title = {Assessing and Improving Authentication Confidence Management}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {2}, pages = {124--139}, year = {2010}, url = {https://doi.org/10.1108/09685221011048355}, doi = {10.1108/09685221011048355}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PearceZH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Tsohou10, author = {Aggeliki Tsohou}, title = {A Security Standards' Framework to Facilitate Best Practices' Awareness and Conformity}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {5}, pages = {350--365}, year = {2010}, url = {https://doi.org/10.1108/09685221011095263}, doi = {10.1108/09685221011095263}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Tsohou10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/WerlingerMHB10, author = {Rodrigo Werlinger and Kasia Muldner and Kirstie Hawkey and Konstantin Beznosov}, title = {Preparation, detection, and analysis: the diagnostic work of {IT} security incident response}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {1}, pages = {26--42}, year = {2010}, url = {https://doi.org/10.1108/09685221011035241}, doi = {10.1108/09685221011035241}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/WerlingerMHB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/WhalenG10, author = {Tara Whalen and Carrie Gates}, title = {Watching the watchers: "voluntary monitoring" of infosec employees}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {1}, pages = {14--25}, year = {2010}, url = {https://doi.org/10.1108/09685221011035232}, doi = {10.1108/09685221011035232}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/WhalenG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/YangC10, author = {Seung S. Yang and Hongsik Choi}, title = {Vulnerability Analysis and the Practical Implications of a Server-challenge-based One-time Password System}, journal = {Inf. Manag. Comput. Secur.}, volume = {18}, number = {2}, pages = {86--100}, year = {2010}, url = {https://doi.org/10.1108/09685221011048337}, doi = {10.1108/09685221011048337}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/YangC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.