Search
  Advanced Search
 
Journal search
Journal cover: Information Management & Computer Security

Information Management & Computer Security

ISSN: 0968-5227

Online from: 1993

Subject Area: Information and Knowledge Management

Content: Latest Issue | icon: RSS Latest Issue RSS | Previous Issues

 

Table of contents:
Volume 17 issue 1

Published: 2009, Start page: p4
Special Issue: Selected papers from the HAISA 2008 symposium

Icon key:  Icon: Access. You have access to this item   Icon: Backfiles.  Backfiles   Icon: Earlycite.  Earlycite   Icon: Abstract.  Abstract only   
Details of your active accounts, and the resources you can access
Articles
Article Id: Article Information:
1776079 An integrated view of human, organizational, and technological challenges of IT security management
Rodrigo Werlinger, Kirstie Hawkey, Konstantin Beznosov (pp. 4 - 19)
Keywords: Communication technologies, Data security
Article type: Research paper
Please login  |  Abstract & purchase  [ HTML & PDF (106kb) ]  |  Reprints & permissions
1776080 A cognitive walkthrough of Autopsy Forensic Browser
David J. Bennett, Paul Stephens (pp. 20 - 29)
Keywords: Computer software, Crime research, Software tools, User interfaces
Article type: Research paper
Please login  |  Abstract & purchase  [ HTML & PDF (70kb) ]  |  Reprints & permissions
1776081 Formalizing the ranking of authentication products
Kirsi Helkala, Einar Snekkenes (pp. 30 - 43)
Keywords: Data security, Message authentication, Norway, User interfaces
Article type: Research paper
Please login  |  Abstract & purchase  [ HTML & PDF (101kb) ]  |  Reprints & permissions
1776082 Using penetration testing feedback to cultivate an atmosphere of proactive security amongst end-users
Martyn Styles, Theo Tryfonas (pp. 44 - 52)
Keywords: Data security, Employee behaviour, Training
Article type: Case study
Please login  |  Abstract & purchase  [ HTML & PDF (71kb) ]  |  Reprints & permissions
1776083 Social engineering: assessing vulnerabilities in practice
Taimur Bakhshi, Maria Papadaki, Steven Furnell (pp. 53 - 63)
Keywords: Computer crimes, Data security, Electronic mail
Article type: Research paper
Please login  |  Abstract & purchase  [ HTML & PDF (299kb) ]  |  Reprints & permissions

Article Id: Article Information: