![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://fanyv88.com/img/search.dark.16x16.png)
default search action
Information Management & Computer Security, Volume 18
Volume 18, Number 1, 2010
- David Lacey:
Understanding and transforming organizational security culture. 4-13 - Tara Whalen, Carrie Gates:
Watching the watchers: "voluntary monitoring" of infosec employees. 14-25 - Rodrigo Werlinger, Kasia Muldner, Kirstie Hawkey, Konstantin Beznosov:
Preparation, detection, and analysis: the diagnostic work of IT security incident response. 26-42 - Mohd Zalisham Jali
, Steven Furnell
, Paul Dowland
:
Assessing image-based authentication techniques in a web-based environment. 43-53 - Meltini Christodoulaki, Paraskevi Fragopoulou:
SafeLine: reporting illegal internet content. 54-65
Volume 18, Number 2
- Guillermo Horacio Ramirez Caceres, Yoshimi Teshigawara:
Security Guideline Tool for Home Users Based on International Standards. 101-123 - Ting-Yi Chang, Yu-Ju Yang, Chun-Cheng Peng:
A Personalized Rhythm Click-Based Authentication System. 72-85 - Seung S. Yang, Hongsik Choi:
Vulnerability Analysis and the Practical Implications of a Server-challenge-based One-time Password System. 86-100 - Michael Pearce, Sherali Zeadally, Ray Hunt:
Assessing and Improving Authentication Confidence Management. 124-139
Volume 18, Number 3, 2010
- Ahmed Patel, Wei Qi, Christopher Wills:
A review and future research directions of secure and trustworthy mobile agent-based e-marketplace systems. 144-161 - Wendy Hui
:
Brand, knowledge, and false sense of security. 162-172 - K. Al-Awadi, Messaoud Saidani
:
Justifying the need for a data security management plan for the UAE. 173-184 - Zvi Goldstein, David Petrie, Yosef Sherif:
Finding middle ground management strategy for software development. 185-197
Volume 18, Number 4, 2010
- Sigi Goode
:
Exploring the supply of pirate software for mobile devices: An analysis of software types and piracy groups. 204-225 - Ahmad A. Abu-Musa
:
Information security governance in Saudi organizations: an empirical study. 226-276 - Ahmed Patel, Qais Qassim
, Christopher Wills
:
A survey of intrusion detection and prevention systems. 277-290 - Dimitrios Patsos, Sarandis Mitropoulos, Christos Douligeris:
Expanding topological vulnerability analysis to intrusion detection through the incident response intelligence system. 291-309
Volume 18, Number 5, 2010
- Hennie A. Kruger, Lynette Drevin
, Tjaart Steyn:
A Vocabulary Test to Assess Information Security Awareness. 316-327 - Tatsuo Asai, Aline Uwera Hakizabera:
Human-Related Problems of Information Security in East African Cross-Cultural Environments. 328-338 - Shamal Faily, Ivan Flechais:
Designing and Aligning e-Science Security Culture with Design. 339-349 - Aggeliki Tsohou:
A Security Standards' Framework to Facilitate Best Practices' Awareness and Conformity. 350-365 - Lynn Futcher, Cheryl Schroder, Rossouw von Solms:
Information Security Education in South Africa. 366-374
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
![](https://fanyv88.com/img/new-feature-top-right.156x64.png)