Publisher: Emerald Group Publishing Limited

Related content
Volume 15, Number 5, 2007

< previous issue | all issues | next issue >

Favourites:Add to Favourites

Comply! Resistance is futile
pp. 339-349(11)
Author: Lazarides, Themistokles

Favourites:Add to Favourites
Favourites:Add to Favourites

How well are information risks being communicated to your computer end-users?
pp. 362-371(10)
Authors: Pattinson, Malcolm R.; Anderson, Grantley

Favourites:Add to Favourites

User-centred security applied to the development of a management information system
pp. 372-381(10)
Authors: Nohlberg, Marcus; Bäckström, Johannes

Favourites:Add to Favourites

Improving protection mechanisms by understanding online risk
pp. 382-393(12)
Authors: Atkinson, Shirley; Johnson, Chris; Phippen, Andy

Favourites:Add to Favourites

Usable set-up of runtime security policies
pp. 394-407(14)
Authors: Herzog, Almut; Shahmehri, Nahid

Favourites:Add to Favourites

Toward viable information security reporting systems
pp. 408-419(12)
Authors: Sveen, Finn Olav; Sarriegi, Jose M.; Rich, Eliot; Gonzalez, Jose J.

Favourites:Add to Favourites

On the imbalance of the security problem space and its expected consequences
pp. 420-431(12)
Authors: Beznosov, Konstantin; Beznosova, Olga

Share Content

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
Cookie Policy
ingentaconnect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more