Aligning Security and Usability
IEEE Security and Privacy
Secrecy, flagging, and paranoia: adoption criteria in encrypted email
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Password management strategies for online accounts
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Web crawling ethics revisited: Cost, privacy, and denial of service
Journal of the American Society for Information Science and Technology
Defining Misuse within the Development Process
IEEE Security and Privacy
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Protection against unauthorized access and computer crime in Norwegian enterprises
Journal of Computer Security - The Third IEEE International Symposium on Security in Networks and Distributed Systems
Journal of Systems and Software
Information Systems Management
Securing uniqueness of rights e-documents: a deontic process perspective
Journal of Theoretical and Applied Electronic Commerce Research
Challenges in supporting end-user privacy and security management with social navigation
Proceedings of the 5th Symposium on Usable Privacy and Security
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Security risk management using internal controls
Proceedings of the first ACM workshop on Information security governance
Journal of Theoretical and Applied Electronic Commerce Research
Internet voting: structural governance principles for election cyber security in democratic nations
Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies
Cross-organizational security - the service-oriented difference
ICSOC/ServiceWave'09 Proceedings of the 2009 international conference on Service-oriented computing
Privacy-enhanced social-network routing
Computer Communications
Using open source for forensic purposes
Proceedings of the Workshop on Open Source and Design of Communication
Decentralized semantic threat graphs
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Managing the investment in information security technology by use of a quantitative modeling
Information Processing and Management: an International Journal
Privacy is a process, not a PET: a theory for effective privacy practice
Proceedings of the 2012 workshop on New security paradigms
Hi-index | 0.01 |