Using relevance feedback to detect misuse for information retrieval systems
Proceedings of the thirteenth ACM international conference on Information and knowledge management
An incentive system for reducing malware attacks
Communications of the ACM - 3d hard copy
Query length impact on misuse detection in information retrieval systems
Proceedings of the 2005 ACM symposium on Applied computing
Is Information Security Under Control?: Investigating Quality in Information Security Management
IEEE Security and Privacy
Threats and countermeasures for information system security: A cross-industry study
Information and Management
Necessary measures: metric-driven information security risk assessment and decision making
Communications of the ACM
Optimal resource allocation for securing an enterprise information infrastructure
Proceedings of the 4th international IFIP/ACM Latin American conference on Networking
Implementing the ISO/IEC 17799 standard in practice: experiences on audit phases
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
Managing security from the perspective of the business executive
Proceedings of the 4th annual conference on Information security curriculum development
The near real time statistical asset priority driven (nrtsapd) risk assessment methodology
SIGITE '08 Proceedings of the 9th ACM SIGITE conference on Information technology education
Improved security through information security governance
Communications of the ACM - Rural engineering development
Journal of the American Society for Information Science and Technology
Information Security Threats: A Comparative Analysis of Impact, Probability, and Preparedness
Information Systems Management
Formalizing information security knowledge
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Information Systems Research
Challenges and complexities of managing information security
International Journal of Electronic Security and Digital Forensics
Information Security: Facilitating User Precautions Vis-à-Vis Enforcement Against Attackers
Journal of Management Information Systems
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
A survey of factors influencing people's perception of information security
HCI'07 Proceedings of the 12th international conference on Human-computer interaction: applications and services
Securing code in services oriented architecture
ICWE'07 Proceedings of the 7th international conference on Web engineering
Metrics for characterizing the form of security policies
The Journal of Strategic Information Systems
Assessing the severity of phishing attacks: A hybrid data mining approach
Decision Support Systems
Risk assessment of voting systems for teaching the art of information security
2010 Information Security Curriculum Development Conference
The enemy is still at the gates: threats to information security revisited
2010 Information Security Curriculum Development Conference
The Damage Index: an aggregation tool for usability problem prioritisation
BCS '10 Proceedings of the 24th BCS Interaction Specialist Group Conference
Security measures in wired and wireless networks
ISIICT'09 Proceedings of the Third international conference on Innovation and Information and Communication Technology
An economic modelling approach to information security risk management
International Journal of Information Management: The Journal for Information Professionals
Towards an empirical examination of IT security infrastructures in SME
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Interleaving tasks to improve performance: Users maximise the marginal rate of return
International Journal of Human-Computer Studies
A Composite Framework for Behavioral Compliance with Information Security Policies
Journal of Organizational and End User Computing
A Composite Framework for Behavioral Compliance with Information Security Policies
Journal of Organizational and End User Computing
Knowing the Enemy at the Gates: Measuring Attacker Motivation
International Journal of Interdisciplinary Telecommunications and Networking
Hi-index | 0.02 |
A firm can build more effective security strategies by identifying and ranking the severity of potential threats to its IS efforts.