Five dimensions of information security awareness
ACM SIGCAS Computers and Society
A paradigmatic analysis of conventional approaches for developing and managing secure IS
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Advanced topics in information resources management
An integrative model of computer abuse based on social control and general deterrence theories
Information and Management
An incentive system for reducing malware attacks
Communications of the ACM - 3d hard copy
Fighting cybercrime: a review and the Taiwan experience
Decision Support Systems - Special issue: Intelligence and security informatics
A review of information security issues and respective research contributions
ACM SIGMIS Database
Understanding the perpetration of employee computer crime in the organisational context
Information and Organization
Overcoming the insider: reducing employee computer crime through Situational Crime Prevention
Communications of the ACM - The Status of the P versus NP Problem
Fighting cybercrime: a review and the Taiwan experience
Decision Support Systems - Special issue: Intelligence and security informatics
Processing multi-parameter attacktrees with estimated parameter values
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
An international perspective on fighting cybercrime
ISI'03 Proceedings of the 1st NSF/NIJ conference on Intelligence and security informatics
Metrics for characterizing the form of security policies
The Journal of Strategic Information Systems
Using the Parkerian Hexad to introduce security in an information literacy class
2010 Information Security Curriculum Development Conference
Non risk assessment information security assurance model
2009 Information Security Curriculum Development Conference
A policy that deters violation of security policy
Communications of the ACM
ISC'06 Proceedings of the 9th international conference on Information Security
Cybercrime in taiwan – an analysis of suspect records
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
A two-dimensional circumplex approach to the development of a hacker taxonomy
Digital Investigation: The International Journal of Digital Forensics & Incident Response
International Journal of Information Management: The Journal for Information Professionals
Security analysis of public cloud computing
International Journal of Communication Networks and Distributed Systems
Information Resources Management Journal
Hi-index | 0.02 |