Campus-wide spyware and virus removal as a method of teaching information security
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Integrating a security awareness program into an information security course
Journal of Computing Sciences in Colleges
A proactive wireless self-protection system
Proceedings of the 5th international conference on Pervasive services
Information Security Threats: A Comparative Analysis of Impact, Probability, and Preparedness
Information Systems Management
Wireless insecurity: examining user security behavior on public networks
Communications of the ACM
Usability improvements for WLAN access
HCI'07 Proceedings of the 12th international conference on Human-computer interaction: interaction design and usability
Adaptive security protocol selection for mobile computing
Journal of Network and Computer Applications
Technology Innovation and the Policy Vacuum: A Call for Ethics, Norms, and Laws to Fill the Void
International Journal of Technoethics
Hi-index | 0.02 |
Laptops and PDAs are so vulnerable in wireless hotspots, users would do well to turn them off.