Skip to main content

Publisher: Emerald Group Publishing Limited

Volume 15, Number 5, 2007

Comply! Resistance is futile
pp. 339-349(11)
Author: Lazarides, Themistokles

Favourites:
ADD
Favourites:
ADD

How well are information risks being communicated to your computer end-users?
pp. 362-371(10)
Authors: Pattinson, Malcolm R.; Anderson, Grantley

Favourites:
ADD

User-centred security applied to the development of a management information system
pp. 372-381(10)
Authors: Nohlberg, Marcus; Bäckström, Johannes

Favourites:
ADD

Improving protection mechanisms by understanding online risk
pp. 382-393(12)
Authors: Atkinson, Shirley; Johnson, Chris; Phippen, Andy

Favourites:
ADD

Usable set-up of runtime security policies
pp. 394-407(14)
Authors: Herzog, Almut; Shahmehri, Nahid

Favourites:
ADD

Toward viable information security reporting systems
pp. 408-419(12)
Authors: Sveen, Finn Olav; Sarriegi, Jose M.; Rich, Eliot; Gonzalez, Jose J.

Favourites:
ADD

On the imbalance of the security problem space and its expected consequences
pp. 420-431(12)
Authors: Beznosov, Konstantin; Beznosova, Olga

Favourites:
ADD

  • Access Key
  • Free content
  • Partial Free content
  • New content
  • Open access content
  • Partial Open access content
  • Subscribed content
  • Partial Subscribed content
  • Free trial content
Cookie Policy
X
Cookie Policy
Ingenta Connect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more