Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/imcs/imcs20.bht:"
@article{DBLP:journals/imcs/AnguloFWP12, author = {Julio Angulo and Simone Fischer{-}H{\"{u}}bner and Erik W{\"{a}}stlund and Tobias Pulls}, title = {Towards Usable Privacy Policy Display {\&} Management for PrimeLife}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {1}, pages = {4--17}, year = {2012}, url = {https://doi.org/10.1108/09685221211219155}, doi = {10.1108/09685221211219155}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AnguloFWP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DesaiDP12, author = {Mayur S. Desai and Kiran J. Desai and Lonnie D. Phelps}, title = {E-commerce policies and customer privacy: a longitudinal study {(2000-2010)}}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {3}, pages = {222--244}, year = {2012}, url = {https://doi.org/10.1108/09685221211247325}, doi = {10.1108/09685221211247325}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DesaiDP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Goldman12, author = {Eric H. Goldman}, title = {The effect of acquisition decision making on security posture}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {5}, pages = {350--363}, year = {2012}, url = {https://doi.org/10.1108/09685221211286520}, doi = {10.1108/09685221211286520}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Goldman12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Jarvelainen12, author = {Jonna J{\"{a}}rvel{\"{a}}inen}, title = {Information security and business continuity management in interorganizational {IT} relationships}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {5}, pages = {332--349}, year = {2012}, url = {https://doi.org/10.1108/09685221211286511}, doi = {10.1108/09685221211286511}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Jarvelainen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Johnsen12, author = {Stig Ole Johnsen}, title = {Resilience at Interfaces - Improvement of Safety and Security in Distributed Control Systems by Web of Influence}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {2}, pages = {71--87}, year = {2012}, url = {https://doi.org/10.1108/09685221211235607}, doi = {10.1108/09685221211235607}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Johnsen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Katos12, author = {Vasilios Katos}, title = {An integrated model for online transactions: illuminating the black box}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {3}, pages = {184--206}, year = {2012}, url = {https://doi.org/10.1108/09685221211247299}, doi = {10.1108/09685221211247299}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Katos12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KrugerM12, author = {Cornelius Johannes Kruger and Mavis Noxolo Mama}, title = {Incorporating business strategy formulation with identity management strategy formulation}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {3}, pages = {152--169}, year = {2012}, url = {https://doi.org/10.1108/09685221211247271}, doi = {10.1108/09685221211247271}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KrugerM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MohamedS12, author = {Norshidah Mohamed and Jasber Kaur A. P. Gian Singh}, title = {A Conceptual Framework for Information Technology Governance Effectiveness in Private Organizations}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {2}, pages = {88--106}, year = {2012}, url = {https://doi.org/10.1108/09685221211235616}, doi = {10.1108/09685221211235616}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MohamedS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MontesinoFB12, author = {Raydel Montesino and Stefan Fenz and Walter Baluja}, title = {SIEM-based framework for security controls automation}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {4}, pages = {248--263}, year = {2012}, url = {https://doi.org/10.1108/09685221211267639}, doi = {10.1108/09685221211267639}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MontesinoFB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PatelQT12, author = {Ahmed Patel and Wei Qi and Mona Taghavi}, title = {An Evaluation of a Secure and Trustworthy Mobile Agent-based E-marketplace System}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {2}, pages = {123--146}, year = {2012}, url = {https://doi.org/10.1108/09685221211235634}, doi = {10.1108/09685221211235634}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PatelQT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PathariS12, author = {Vinod Pathari and Rajendra M. Sonar}, title = {Identifying linkages between statements in information security policy, procedures and controls}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {4}, pages = {264--280}, year = {2012}, url = {https://doi.org/10.1108/09685221211267648}, doi = {10.1108/09685221211267648}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PathariS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PattinsonJPMB12, author = {Malcolm Robert Pattinson and Cate Jerram and Kathryn Parsons and Agata McCormac and Marcus A. Butavicius}, title = {Why Do Some People Manage Phishing Emails Better Than Others?}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {1}, pages = {18--28}, year = {2012}, url = {https://doi.org/10.1108/09685221211219173}, doi = {10.1108/09685221211219173}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PattinsonJPMB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PramodLG12, author = {Vandana Pramod and Jinghua Li and Ping Gao}, title = {A framework for preventing money laundering in banks}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {3}, pages = {170--183}, year = {2012}, url = {https://doi.org/10.1108/09685221211247280}, doi = {10.1108/09685221211247280}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PramodLG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Purkait12, author = {Swapan Purkait}, title = {Phishing counter measures and their effectiveness - literature review}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {5}, pages = {382--420}, year = {2012}, url = {https://doi.org/10.1108/09685221211286548}, doi = {10.1108/09685221211286548}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Purkait12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SadanS12, author = {Zac Sadan and David G. Schwartz}, title = {Social Network Analysis for Cluster-Based {IP} Spam Reputation}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {4}, pages = {281--295}, year = {2012}, url = {https://doi.org/10.1108/09685221211267657}, doi = {10.1108/09685221211267657}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SadanS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ShengHFDC12, author = {Weiguo Sheng and Gareth Howells and Michael C. Fairhurst and Farzin Deravi and Shengyong Chen}, title = {Reliable and secure encryption key generation from fingerprints}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {3}, pages = {207--221}, year = {2012}, url = {https://doi.org/10.1108/09685221211247307}, doi = {10.1108/09685221211247307}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ShengHFDC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SommestadHE12, author = {Teodor Sommestad and Hannes Holm and Mathias Ekstedt}, title = {Estimates of success rates of remote arbitrary code execution attacks}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {2}, pages = {107--122}, year = {2012}, url = {https://doi.org/10.1108/09685221211235625}, doi = {10.1108/09685221211235625}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SommestadHE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Stewart12, author = {Andrew Stewart}, title = {Can spending on information security be justified? Evaluating the security spending decision from the perspective of a rational actor}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {4}, pages = {312--326}, year = {2012}, url = {https://doi.org/10.1108/09685221211267675}, doi = {10.1108/09685221211267675}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Stewart12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/StewartL12, author = {Geordie Stewart and David Lacey}, title = {Death by a Thousand Facts: Criticising the Technocratic Approach to Information Security Awareness}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {1}, pages = {29--38}, year = {2012}, url = {https://doi.org/10.1108/09685221211219182}, doi = {10.1108/09685221211219182}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/StewartL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TanA12, author = {Margaret Tan and Kathrine Sagala Aguilar}, title = {An investigation of students' perception of Bluetooth security}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {5}, pages = {364--381}, year = {2012}, url = {https://doi.org/10.1108/09685221211286539}, doi = {10.1108/09685221211286539}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TanA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ThomsonN12, author = {Kerry{-}Lynn Thomson and Johan Van Niekerk}, title = {Combating Information Security Apathy by Encouraging Prosocial Organisational Behaviour}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {1}, pages = {39--46}, year = {2012}, url = {https://doi.org/10.1108/09685221211219191}, doi = {10.1108/09685221211219191}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ThomsonN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Workman12, author = {Michael Workman}, title = {Validation of a Biases Model in Strategic Security Decision-Making}, journal = {Inf. Manag. Comput. Secur.}, volume = {20}, number = {2}, pages = {52--70}, year = {2012}, url = {https://doi.org/10.1108/09685221211235599}, doi = {10.1108/09685221211235599}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Workman12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.