If you are experiencing problems downloading PDF or HTML fulltext, our helpdesk recommend clearing your browser cache and trying again. If you need help in clearing your cache, please click here . Still need help? Email email@example.com
Publisher: Emerald Group Publishing Limited
< previous issue
next issue >
Comply! Resistance is futile
Vendor availability: a key factor for outsourcing in Chilean ICT sector
Kini, Ranjan B.
How well are information risks being communicated to your computer end-users?
Pattinson, Malcolm R.; Anderson, Grantley
User-centred security applied to the development of a management information system
Nohlberg, Marcus; Bäckström, Johannes
Improving protection mechanisms by understanding online risk
Atkinson, Shirley; Johnson, Chris; Phippen, Andy
Usable set-up of runtime security policies
Herzog, Almut; Shahmehri, Nahid
Toward viable information security reporting systems
Sveen, Finn Olav; Sarriegi, Jose M.; Rich, Eliot; Gonzalez, Jose J.
On the imbalance of the security problem space and its expected consequences
Beznosov, Konstantin; Beznosova, Olga