Search dblp for Publications

export results for "toc:db/journals/imcs/imcs18.bht:"

 download as .bib file

@article{DBLP:journals/imcs/Abu-Musa10,
  author       = {Ahmad Abu{-}Musa},
  title        = {Information security governance in Saudi organizations: an empirical
                  study},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {226--276},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011079180},
  doi          = {10.1108/09685221011079180},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Abu-Musa10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Al-AwadiS10,
  author       = {K. Al{-}Awadi and
                  Messaoud Saidani},
  title        = {Justifying the need for a data security management plan for the {UAE}},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {173--184},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011064708},
  doi          = {10.1108/09685221011064708},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Al-AwadiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AsaiH10,
  author       = {Tatsuo Asai and
                  Aline Uwera Hakizabera},
  title        = {Human-Related Problems of Information Security in East African Cross-Cultural
                  Environments},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {328--338},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011095245},
  doi          = {10.1108/09685221011095245},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AsaiH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/CaceresT10,
  author       = {Guillermo Horacio Ramirez Caceres and
                  Yoshimi Teshigawara},
  title        = {Security Guideline Tool for Home Users Based on International Standards},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {101--123},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011048346},
  doi          = {10.1108/09685221011048346},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/CaceresT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChangYP10,
  author       = {Ting{-}Yi Chang and
                  Yu{-}Ju Yang and
                  Chun{-}Cheng Peng},
  title        = {A Personalized Rhythm Click-Based Authentication System},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {72--85},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011048328},
  doi          = {10.1108/09685221011048328},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChangYP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChristodoulakiF10,
  author       = {Meltini Christodoulaki and
                  Paraskevi Fragopoulou},
  title        = {SafeLine: reporting illegal internet content},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {54--65},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011035269},
  doi          = {10.1108/09685221011035269},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChristodoulakiF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FailyF10,
  author       = {Shamal Faily and
                  Ivan Flechais},
  title        = {Designing and Aligning e-Science Security Culture with Design},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {339--349},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011095254},
  doi          = {10.1108/09685221011095254},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FailyF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FutchersS10,
  author       = {Lynn Futcher and
                  Cheryl Schroder and
                  Rossouw von Solms},
  title        = {Information Security Education in South Africa},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {366--374},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011095272},
  doi          = {10.1108/09685221011095272},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FutchersS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GoldsteinPS10,
  author       = {Zvi Goldstein and
                  David Petrie and
                  Yosef Sherif},
  title        = {Finding middle ground management strategy for software development},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {185--197},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011064717},
  doi          = {10.1108/09685221011064717},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GoldsteinPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Goode10,
  author       = {Sigi Goode},
  title        = {Exploring the supply of pirate software for mobile devices: An analysis
                  of software types and piracy groups},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {204--225},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011079171},
  doi          = {10.1108/09685221011079171},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Goode10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Hui10,
  author       = {Wendy Hui},
  title        = {Brand, knowledge, and false sense of security},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {162--172},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011064690},
  doi          = {10.1108/09685221011064690},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Hui10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JaliFD10,
  author       = {Mohd Zalisham Jali and
                  Steven Furnell and
                  Paul Dowland},
  title        = {Assessing image-based authentication techniques in a web-based environment},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {43--53},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011035250},
  doi          = {10.1108/09685221011035250},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JaliFD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KrugerDS10,
  author       = {Hennie A. Kruger and
                  Lynette Drevin and
                  Tjaart Steyn},
  title        = {A Vocabulary Test to Assess Information Security Awareness},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {316--327},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011095236},
  doi          = {10.1108/09685221011095236},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KrugerDS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Lacey10,
  author       = {David Lacey},
  title        = {Understanding and transforming organizational security culture},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {4--13},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011035223},
  doi          = {10.1108/09685221011035223},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Lacey10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PatelQW10,
  author       = {Ahmed Patel and
                  Wei Qi and
                  Christopher Wills},
  title        = {A review and future research directions of secure and trustworthy
                  mobile agent-based e-marketplace systems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {144--161},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011064681},
  doi          = {10.1108/09685221011064681},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PatelQW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PatelQW10a,
  author       = {Ahmed Patel and
                  Qais Qassim and
                  Christopher Wills},
  title        = {A survey of intrusion detection and prevention systems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {277--290},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011079199},
  doi          = {10.1108/09685221011079199},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PatelQW10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PatsosMD10,
  author       = {Dimitrios Patsos and
                  Sarandis Mitropoulos and
                  Christos Douligeris},
  title        = {Expanding topological vulnerability analysis to intrusion detection
                  through the incident response intelligence system},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {291--309},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011079207},
  doi          = {10.1108/09685221011079207},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PatsosMD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PearceZH10,
  author       = {Michael Pearce and
                  Sherali Zeadally and
                  Ray Hunt},
  title        = {Assessing and Improving Authentication Confidence Management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {124--139},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011048355},
  doi          = {10.1108/09685221011048355},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PearceZH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Tsohou10,
  author       = {Aggeliki Tsohou},
  title        = {A Security Standards' Framework to Facilitate Best Practices' Awareness
                  and Conformity},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {350--365},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011095263},
  doi          = {10.1108/09685221011095263},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Tsohou10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/WerlingerMHB10,
  author       = {Rodrigo Werlinger and
                  Kasia Muldner and
                  Kirstie Hawkey and
                  Konstantin Beznosov},
  title        = {Preparation, detection, and analysis: the diagnostic work of {IT}
                  security incident response},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {26--42},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011035241},
  doi          = {10.1108/09685221011035241},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/WerlingerMHB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/WhalenG10,
  author       = {Tara Whalen and
                  Carrie Gates},
  title        = {Watching the watchers: "voluntary monitoring" of infosec employees},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {14--25},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011035232},
  doi          = {10.1108/09685221011035232},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/WhalenG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/YangC10,
  author       = {Seung S. Yang and
                  Hongsik Choi},
  title        = {Vulnerability Analysis and the Practical Implications of a Server-challenge-based
                  One-time Password System},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {86--100},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011048337},
  doi          = {10.1108/09685221011048337},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/YangC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics