Publisher: Emerald Group Publishing Limited

Related content
Volume 16, Number 3, 2008

< previous issue | all issues | next issue >

Favourites:Add to Favourites
Favourites:Add to Favourites

Information security management objectives and practices: a parsimonious framework
pp. 251-270(20)
Authors: Ma, Qingxiong; Johnston, Allen C.; Pearson, J. Michael

Favourites:Add to Favourites

Process-variance models in information security awareness research
pp. 271-287(17)
Authors: Tsohou, Aggeliki; Kokolakis, Spyros; Karyda, Maria; Kiountouzis, Evangelos

Favourites:Add to Favourites

Efficient anonymous secure auction schema (ASAS) without fully trustworthy auctioneer
pp. 288-304(17)
Authors: Sekhavat, Yoones Asgharzadeh; Fathian, Mohammad

Favourites:Add to Favourites

An agent-based privacy-enhancing model
pp. 305-319(15)
Authors: Lee, Hsu-Hui; Stamp, Mark

Share Content

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
Cookie Policy
ingentaconnect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more