Search dblp for Publications

export results for "toc:db/journals/imcs/imcs20.bht:"

 download as .bib file

@article{DBLP:journals/imcs/AnguloFWP12,
  author       = {Julio Angulo and
                  Simone Fischer{-}H{\"{u}}bner and
                  Erik W{\"{a}}stlund and
                  Tobias Pulls},
  title        = {Towards Usable Privacy Policy Display {\&} Management for PrimeLife},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {4--17},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211219155},
  doi          = {10.1108/09685221211219155},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AnguloFWP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DesaiDP12,
  author       = {Mayur S. Desai and
                  Kiran J. Desai and
                  Lonnie D. Phelps},
  title        = {E-commerce policies and customer privacy: a longitudinal study {(2000-2010)}},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {222--244},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211247325},
  doi          = {10.1108/09685221211247325},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DesaiDP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Goldman12,
  author       = {Eric H. Goldman},
  title        = {The effect of acquisition decision making on security posture},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {350--363},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211286520},
  doi          = {10.1108/09685221211286520},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Goldman12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Jarvelainen12,
  author       = {Jonna J{\"{a}}rvel{\"{a}}inen},
  title        = {Information security and business continuity management in interorganizational
                  {IT} relationships},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {332--349},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211286511},
  doi          = {10.1108/09685221211286511},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Jarvelainen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Johnsen12,
  author       = {Stig Ole Johnsen},
  title        = {Resilience at Interfaces - Improvement of Safety and Security in Distributed
                  Control Systems by Web of Influence},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {71--87},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211235607},
  doi          = {10.1108/09685221211235607},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Johnsen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Katos12,
  author       = {Vasilios Katos},
  title        = {An integrated model for online transactions: illuminating the black
                  box},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {184--206},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211247299},
  doi          = {10.1108/09685221211247299},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Katos12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KrugerM12,
  author       = {Cornelius Johannes Kruger and
                  Mavis Noxolo Mama},
  title        = {Incorporating business strategy formulation with identity management
                  strategy formulation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {152--169},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211247271},
  doi          = {10.1108/09685221211247271},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KrugerM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MohamedS12,
  author       = {Norshidah Mohamed and
                  Jasber Kaur A. P. Gian Singh},
  title        = {A Conceptual Framework for Information Technology Governance Effectiveness
                  in Private Organizations},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {88--106},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211235616},
  doi          = {10.1108/09685221211235616},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MohamedS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MontesinoFB12,
  author       = {Raydel Montesino and
                  Stefan Fenz and
                  Walter Baluja},
  title        = {SIEM-based framework for security controls automation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {248--263},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211267639},
  doi          = {10.1108/09685221211267639},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MontesinoFB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PatelQT12,
  author       = {Ahmed Patel and
                  Wei Qi and
                  Mona Taghavi},
  title        = {An Evaluation of a Secure and Trustworthy Mobile Agent-based E-marketplace
                  System},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {123--146},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211235634},
  doi          = {10.1108/09685221211235634},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PatelQT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PathariS12,
  author       = {Vinod Pathari and
                  Rajendra M. Sonar},
  title        = {Identifying linkages between statements in information security policy,
                  procedures and controls},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {264--280},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211267648},
  doi          = {10.1108/09685221211267648},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PathariS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PattinsonJPMB12,
  author       = {Malcolm Robert Pattinson and
                  Cate Jerram and
                  Kathryn Parsons and
                  Agata McCormac and
                  Marcus A. Butavicius},
  title        = {Why Do Some People Manage Phishing Emails Better Than Others?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {18--28},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211219173},
  doi          = {10.1108/09685221211219173},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PattinsonJPMB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PramodLG12,
  author       = {Vandana Pramod and
                  Jinghua Li and
                  Ping Gao},
  title        = {A framework for preventing money laundering in banks},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {170--183},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211247280},
  doi          = {10.1108/09685221211247280},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PramodLG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Purkait12,
  author       = {Swapan Purkait},
  title        = {Phishing counter measures and their effectiveness - literature review},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {382--420},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211286548},
  doi          = {10.1108/09685221211286548},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Purkait12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SadanS12,
  author       = {Zac Sadan and
                  David G. Schwartz},
  title        = {Social Network Analysis for Cluster-Based {IP} Spam Reputation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {281--295},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211267657},
  doi          = {10.1108/09685221211267657},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SadanS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ShengHFDC12,
  author       = {Weiguo Sheng and
                  Gareth Howells and
                  Michael C. Fairhurst and
                  Farzin Deravi and
                  Shengyong Chen},
  title        = {Reliable and secure encryption key generation from fingerprints},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {207--221},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211247307},
  doi          = {10.1108/09685221211247307},
  timestamp    = {Fri, 15 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ShengHFDC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SommestadHE12,
  author       = {Teodor Sommestad and
                  Hannes Holm and
                  Mathias Ekstedt},
  title        = {Estimates of success rates of remote arbitrary code execution attacks},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {107--122},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211235625},
  doi          = {10.1108/09685221211235625},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SommestadHE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Stewart12,
  author       = {Andrew Stewart},
  title        = {Can spending on information security be justified? Evaluating the
                  security spending decision from the perspective of a rational actor},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {312--326},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211267675},
  doi          = {10.1108/09685221211267675},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Stewart12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/StewartL12,
  author       = {Geordie Stewart and
                  David Lacey},
  title        = {Death by a Thousand Facts: Criticising the Technocratic Approach to
                  Information Security Awareness},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {29--38},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211219182},
  doi          = {10.1108/09685221211219182},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/StewartL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TanA12,
  author       = {Margaret Tan and
                  Kathrine Sagala Aguilar},
  title        = {An investigation of students' perception of Bluetooth security},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {364--381},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211286539},
  doi          = {10.1108/09685221211286539},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TanA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ThomsonN12,
  author       = {Kerry{-}Lynn Thomson and
                  Johan Van Niekerk},
  title        = {Combating Information Security Apathy by Encouraging Prosocial Organisational
                  Behaviour},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {39--46},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211219191},
  doi          = {10.1108/09685221211219191},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ThomsonN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Workman12,
  author       = {Michael Workman},
  title        = {Validation of a Biases Model in Strategic Security Decision-Making},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {52--70},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211235599},
  doi          = {10.1108/09685221211235599},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Workman12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics