-
1
-
-
0043232732
-
Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures
-
Adams, A. and Sasse, M.A. (1999), "Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures", Communications of the ACM, Vol. 42, pp. 41-46.
-
(1999)
Communications of the ACM
, vol.42
, pp. 41-46
-
-
Adams, A.1
Sasse, M.A.2
-
2
-
-
84857928039
-
Security challenges and approaches in online social networks: A survey
-
Ajami, R., Ramadan, N., Mohamed, N. and Al-Jaroodi, J. (2011), "Security challenges and approaches in online social networks: a survey", International Journal of Computer Science and Network Security, Vol. 11 No. 8, pp. 1-12.
-
(2011)
International Journal of Computer Science and Network Security
, vol.11
, Issue.8
, pp. 1-12
-
-
Ajami, R.1
Ramadan, N.2
Mohamed, N.3
Al-Jaroodi, J.4
-
3
-
-
77957587422
-
Towards a formal foundation of web security
-
Akhawe, D., Barth, A., Lam, P.E., Mitchell, J. and Song, D. (2010), "Towards a formal foundation of web security", Proceedings of the 23rd IEEE Computer Security Foundations Symposium (CSF), pp. 290-304.
-
(2010)
Proceedings of the 23rd IEEE Computer Security Foundations Symposium (CSF)
, pp. 290-304
-
-
Akhawe, D.1
Barth, A.2
Lam, P.E.3
Mitchell, J.4
Song, D.5
-
4
-
-
84869204350
-
Web 2.0 technologies and social networking security fears in enterprises
-
Almeida, F. (2012), "Web 2.0 technologies and social networking security fears in enterprises", International Journal of Advanced Computer Science and Applications, Vol. 3 No. 2, pp. 152-156.
-
(2012)
International Journal of Advanced Computer Science and Applications
, vol.3
, Issue.2
, pp. 152-156
-
-
Almeida, F.1
-
5
-
-
79957585144
-
Inglorious installers: Security in the application marketplace
-
Anderson, J., Bonneau, J. and Stajano, F. (2010), "Inglorious installers: security in the application marketplace", Proc. 9th Workshop Economics of Information Security, available at: http://weis2010.econinfosec. org/papers/session3/weis2010-anderson-j.pdf
-
(2010)
Proc. 9th Workshop Economics of Information Security
-
-
Anderson, J.1
Bonneau, J.2
Stajano, F.3
-
6
-
-
84860619315
-
Reducing the window of opportunity for Android malware Gotta catch'em all
-
Apvrille, A. and Strazzere, T. (2012), "Reducing the window of opportunity for Android malware Gotta catch'em all", Journal in Computer Virology, Vol. 8 Nos 1/2, pp. 61-71.
-
(2012)
Journal in Computer Virology
, vol.8
, Issue.1-2
, pp. 61-71
-
-
Apvrille, A.1
Strazzere, T.2
-
8
-
-
79957604407
-
Secure software installation on smartphones
-
Barrera, D. and Van Oorschot, P. (2011), "Secure software installation on smartphones", IEEE Security & Privacy, Vol. 9 No. 3, pp. 42-48.
-
(2011)
IEEE Security & Privacy
, vol.9
, Issue.3
, pp. 42-48
-
-
Barrera, D.1
Van Oorschot, P.2
-
9
-
-
70849109966
-
Solutions to security and privacy issues in mobile social networking
-
Beach, A., Gartrell, M. and Han, R. (2009), "Solutions to security and privacy issues in mobile social networking", Proc. International Conference on Computational Science and Engineering, pp. 1036-1042.
-
(2009)
Proc. International Conference on Computational Science and Engineering
, pp. 1036-1042
-
-
Beach, A.1
Gartrell, M.2
Han, R.3
-
10
-
-
84899223096
-
Cyber security and privacy in the age of social networks
-
Zubairi, J. and Mahboob, A. (Eds), IGI Global, Hershey, PA
-
Bhatti, B. (2012), "Cyber security and privacy in the age of social networks", in Zubairi, J. and Mahboob, A. (Eds), Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies, IGI Global, Hershey, PA, pp. 57-74.
-
(2012)
Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies
, pp. 57-74
-
-
Bhatti, B.1
-
11
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
Breckenridge, CO, USA
-
Bose, A., Xin, H., Kang, G. and Taejoon, P. (2008), "Behavioral detection of malware on mobile handsets", Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, Breckenridge, CO, USA, pp. 225-238.
-
(2008)
Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services
, pp. 225-238
-
-
Bose, A.1
Xin, H.2
Kang, G.3
Taejoon, P.4
-
12
-
-
84887452840
-
Improving security and mobility for personally owned devices
-
Buchholz, D., Dunlop, J. and Ross, A. (2012), "Improving security and mobility for personally owned devices", Intel White Paper, available at: http://communities.intel.com/docs/DOC- 19277
-
(2012)
Intel White Paper
-
-
Buchholz, D.1
Dunlop, J.2
Ross, A.3
-
13
-
-
84862003184
-
Social networking in undergraduate education
-
Buzzetto-More, N. (2012), "Social networking in undergraduate education", Interdisciplinary Journal of Information, Knowledge, and Management, Vol. 7, pp. 63-90.
-
(2012)
Interdisciplinary Journal of Information, Knowledge, and Management
, vol.7
, pp. 63-90
-
-
Buzzetto-More, N.1
-
14
-
-
79952786946
-
Understanding consumer conversations around ads in a Web 2.0 world
-
Campbell, C., Pitt, L., Parent, M. and Berthon, P. (2011), "Understanding consumer conversations around ads in a Web 2.0 world", Journal of Advertising, Vol. 40 No. 1, pp. 87-102.
-
(2011)
Journal of Advertising
, vol.40
, Issue.1
, pp. 87-102
-
-
Campbell, C.1
Pitt, L.2
Parent, M.3
Berthon, P.4
-
15
-
-
33751163289
-
Mining communities and their relationships in blogs: A study of hate groups
-
Chau, M. and Xu, J. (2007), "Mining communities and their relationships in blogs: a study of hate groups", International Journal of Human-Computer Studies, Vol. 65, pp. 57-70.
-
(2007)
International Journal of Human-Computer Studies
, vol.65
, pp. 57-70
-
-
Chau, M.1
Xu, J.2
-
16
-
-
84868008189
-
Business intelligence in blogs: Understanding consumer interactions and communities
-
Chau, M. and Xu, J. (2012), "Business intelligence in blogs: understanding consumer interactions and communities", MIS Quarterly (MISQ), Vol. 36 No. 4, pp. 1189-1216.
-
(2012)
MIS Quarterly (MISQ)
, vol.36
, Issue.4
, pp. 1189-1216
-
-
Chau, M.1
Xu, J.2
-
17
-
-
84861550985
-
-
(accessed 9 November 2011)
-
Chi, M. (2011), "Security policy and social media use", available at: www.sans.org/reading-room/whitepapers/policyissues/reducing-risks- social-media-organization-33749 (accessed 9 November 2011).
-
(2011)
Security Policy and Social Media Use
-
-
Chi, M.1
-
18
-
-
78649239469
-
Mobile malware behavioral analysis and preventive strategy using ontology
-
Chiang, H.S. and Tsaur, W.J. (2010), "Mobile malware behavioral analysis and preventive strategy using ontology", Proceedings of the 2010 IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2010), pp. 1080-1085.
-
(2010)
Proceedings of the 2010 IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2010)
, pp. 1080-1085
-
-
Chiang, H.S.1
Tsaur, W.J.2
-
20
-
-
80955142795
-
The cyber threat landscape: Challenges and future research directions
-
Choo, K.R. (2011), "The cyber threat landscape: challenges and future research directions", Computers & Security, Vol. 30 No. 8, pp. 719-731.
-
(2011)
Computers & Security
, vol.30
, Issue.8
, pp. 719-731
-
-
Choo, K.R.1
-
22
-
-
34547919197
-
The future of mobile malware
-
Coursen, S. (2007), "The future of mobile malware", Network Security, No. 8, pp. 7-11.
-
(2007)
Network Security
, Issue.8
, pp. 7-11
-
-
Coursen, S.1
-
23
-
-
84876570327
-
Future directions for behavioral information security research
-
Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M. and Baskerville, R. (2013), "Future directions for behavioral information security research", Computers & Security, Vol. 32, pp. 90-101.
-
(2013)
Computers & Security
, vol.32
, pp. 90-101
-
-
Crossler, R.E.1
Johnston, A.C.2
Lowry, P.B.3
Hu, Q.4
Warkentin, M.5
Baskerville, R.6
-
24
-
-
78549255566
-
Behavior-based malware detection on mobile phone
-
Dai, S., Liu, Y., Wang, T., Wei, T. and Zou, W. (2010), "Behavior-based malware detection on mobile phone", Proceedings of the 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), pp. 1-4.
-
(2010)
Proceedings of the 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM)
, pp. 1-4
-
-
Dai, S.1
Liu, Y.2
Wang, T.3
Wei, T.4
Zou, W.5
-
26
-
-
75549083466
-
Redefining social marketing with contemporary commercial marketing definitions
-
Dann, S. (2010), "Redefining social marketing with contemporary commercial marketing definitions", Journal of Business Research, Vol. 63 No. 2, pp. 147-153.
-
(2010)
Journal of Business Research
, vol.63
, Issue.2
, pp. 147-153
-
-
Dann, S.1
-
27
-
-
84870387829
-
Enabling information security culture: Influences and challenges for Australian SMEs
-
Paper 61
-
Dojkovski, S., Lichtenstein, S. and Warren, M. (2010), "Enabling information security culture: influences and challenges for Australian SMEs", ACIS 2010 Proceedings, Paper 61.
-
(2010)
ACIS 2010 Proceedings
-
-
Dojkovski, S.1
Lichtenstein, S.2
Warren, M.3
-
28
-
-
84885866197
-
An integrated approach to snowmelt flood forecasting in water resource management
-
in press)
-
Fang, S., Xu, L., Pei, H., Liu, Y., Liu, Z., Zhu, Y., Yan, J. and Zhang, H. (2013), "An integrated approach to snowmelt flood forecasting in water resource management", IEEE Transactions on Industrial Informatics (in press).
-
(2013)
IEEE Transactions on Industrial Informatics
-
-
Fang, S.1
Xu, L.2
Pei, H.3
Liu, Y.4
Liu, Z.5
Zhu, Y.6
Yan, J.7
Zhang, H.8
-
30
-
-
80755181021
-
A survey of mobile malware in the wild
-
Felt, A.P., Finifter, M., Chin, E., Hanna, S. and Wagner, D. (2011), "A survey of mobile malware in the wild", Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM).
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
31
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E. and Wagner, D. (2012), "Android permissions: user attention, comprehension, and behavior", Proceedings of the Symposium on Usable Privacy and Security (SOUPS).
-
(2012)
Proceedings of the Symposium on Usable Privacy and Security (SOUPS)
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
32
-
-
84975764717
-
Google Android: An updated security review
-
Fledel, Y., Shabtai, A., Potashnik, D. and Elovici, Y. (2012), "Google Android: an updated security review", Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 9, Part 9, pp. 401-414.
-
(2012)
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, vol.9
, Issue.PART 9
, pp. 401-414
-
-
Fledel, Y.1
Shabtai, A.2
Potashnik, D.3
Elovici, Y.4
-
33
-
-
20344390532
-
Handheld hazards: The rise of malware on mobile devices
-
Furnell, S. (2005), "Handheld hazards: the rise of malware on mobile devices", Computer Fraud & Security, No. 5, pp. 4-8.
-
(2005)
Computer Fraud & Security
, Issue.5
, pp. 4-8
-
-
Furnell, S.1
-
35
-
-
84864544614
-
Improving multilingual semantic interoperation in cross-organizational enterprise systems through concept disambiguation
-
Guo, J., Xu, L., Xiao, G. and Gong, Z. (2012a), "Improving multilingual semantic interoperation in cross-organizational enterprise systems through concept disambiguation", IEEE Transactions on Industrial Informatics, Vol. 8 No. 3, pp. 647-658.
-
(2012)
IEEE Transactions on Industrial Informatics
, vol.8
, Issue.3
, pp. 647-658
-
-
Guo, J.1
Xu, L.2
Xiao, G.3
Gong, Z.4
-
36
-
-
84857502559
-
Semantic inference on heterogeneous e-marketplace activities
-
Guo, J., Xu, L., Gong, Z., Che, C. and Chaudhry, S. (2012b), "Semantic inference on heterogeneous e-marketplace activities", IEEE Transactions on SMC Part A, Vol. 42 No. 2, pp. 316-330.
-
(2012)
IEEE Transactions on SMC Part A
, vol.42
, Issue.2
, pp. 316-330
-
-
Guo, J.1
Xu, L.2
Gong, Z.3
Che, C.4
Chaudhry, S.5
-
37
-
-
84861549713
-
A review of social media security risks and mitigation techniques
-
He, W. (2012), "A review of social media security risks and mitigation techniques", Journal of Systems and Information Technology, Vol. 14 No. 2, pp. 171-180.
-
(2012)
Journal of Systems and Information Technology
, vol.14
, Issue.2
, pp. 171-180
-
-
He, W.1
-
38
-
-
84868671545
-
Integration of distributed enterprise applications: A survey
-
in press)
-
He, W. and Xu, L. (2013), "Integration of distributed enterprise applications: a survey", IEEE Transactions on Industrial Informatics (in press).
-
(2013)
IEEE Transactions on Industrial Informatics
-
-
He, W.1
Xu, L.2
-
39
-
-
58349108259
-
Insight into interface design of web-based case-based reasoning retrieval systems
-
He, W., Wang, F., Means, T. and Xu, L. (2009a), "Insight into interface design of web-based case-based reasoning retrieval systems", Expert Systems with Applications, Vol. 36 No. 3, pp. 7280-7287.
-
(2009)
Expert Systems with Applications
, vol.36
, Issue.3
, pp. 7280-7287
-
-
He, W.1
Wang, F.2
Means, T.3
Xu, L.4
-
40
-
-
70350134774
-
Integrating Web 2.0 with the case-based reasoning cycle: A systems approach
-
He, W., Xu, L., Means, T. and Wang, P. (2009b), "Integrating Web 2.0 with the case-based reasoning cycle: a systems approach", Systems Research and Behavioral Science, Vol. 26 No. 6, pp. 717-728.
-
(2009)
Systems Research and Behavioral Science
, vol.26
, Issue.6
, pp. 717-728
-
-
He, W.1
Xu, L.2
Means, T.3
Wang, P.4
-
41
-
-
84869439440
-
Scriptless attacks: Stealing the pie without touching the sill
-
New York, NY, USA
-
Heiderich, M., Niemietz, M., Schuster, F., Holz, T. and Schwenk, J. (2012), "Scriptless attacks: stealing the pie without touching the sill", Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS'12, New York, NY, USA, pp. 760-771.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS'12
, pp. 760-771
-
-
Heiderich, M.1
Niemietz, M.2
Schuster, F.3
Holz, T.4
Schwenk, J.5
-
42
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organizations
-
Herath, T. and Rao, H.R. (2009), "Protection motivation and deterrence: a framework for security policy compliance in organizations", European Journal of Information Systems, Vol. 8 No. 2, pp. 106-125.
-
(2009)
European Journal of Information Systems
, vol.8
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
44
-
-
0036388121
-
Concept mapping as an alternative approach for the analysis of open-ended survey responses
-
Jackson, K. and Trochim, W.K.M. (2002), "Concept mapping as an alternative approach for the analysis of open-ended survey responses", Organizational Research Methods, Vol. 5 No. 4, pp. 307-336.
-
(2002)
Organizational Research Methods
, vol.5
, Issue.4
, pp. 307-336
-
-
Jackson, K.1
Trochim, W.K.M.2
-
45
-
-
84887487195
-
-
Javelin Strategy & Research (2012), "Identity fraud rose 13 percent in 2011", available at: www.javelinstrategy.com/news/1314/92/ Identity-Fraud-Rose-13-Percent-in-2011-According-to- New-Javelin-Strategy- Research-Report/d,pressRoomDetail
-
(2012)
Identity Fraud Rose 13 Percent in 2011
-
-
-
47
-
-
71149088987
-
Users of the world, unite! the challenges and opportunities of social media
-
Kaplan, A. and Haenlein, M. (2010), "Users of the world, unite! The challenges and opportunities of social media", Business Horizons, Vol. 53, pp. 59-68.
-
(2010)
Business Horizons
, vol.53
, pp. 59-68
-
-
Kaplan, A.1
Haenlein, M.2
-
48
-
-
84861551431
-
-
Kaspersky Labs (accessed 16 November 2011)
-
Kaspersky Labs (2009), "Kaspersky security bulletin: malware evolution 2008", available at: www.securelist.com/en/analysis?pubid= 204792051 (accessed 16 November 2011).
-
(2009)
Kaspersky Security Bulletin: Malware Evolution 2008
-
-
-
49
-
-
84867438639
-
A conundrum of permissions: Installing applications on an Android smartphone
-
February
-
Kelley, P., Consolvo, S., Cranor, L., Jung, J., Sadeh, N. and Wetherall, D. (2012), "A conundrum of permissions: installing applications on an Android smartphone", Proceedings of the Workshop on Usable Security (USEC), February, available at: http://infosecon.net/usec12/papers/kelley-usec12.pdf
-
(2012)
Proceedings of the Workshop on Usable Security (USEC)
-
-
Kelley, P.1
Consolvo, S.2
Cranor, L.3
Jung, J.4
Sadeh, N.5
Wetherall, D.6
-
51
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
Kim, H., Smith, J. and Shin, K. (2008), "Detecting energy-greedy anomalies and mobile malware variants", Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, pp. 239-252.
-
(2008)
Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services
, pp. 239-252
-
-
Kim, H.1
Smith, J.2
Shin, K.3
-
52
-
-
77953876778
-
Getting users to pay attention to anti-phishing education: Evaluation of retention and transfer
-
4-5 October, Pittsburgh, PA
-
Kumaraguru, P., Rhee, Y., Sheng, S., Hasan, S., Acquisti, A., Cranor, L.F. and Hong, J. (2007), "Getting users to pay attention to anti-phishing education: evaluation of retention and transfer", Proceedings of the 2nd Annual eCrime Researchers Summit, 4-5 October, Pittsburgh, PA, pp. 70-81.
-
(2007)
Proceedings of the 2nd Annual ECrime Researchers Summit
, pp. 70-81
-
-
Kumaraguru, P.1
Rhee, Y.2
Sheng, S.3
Hasan, S.4
Acquisti, A.5
Cranor, L.F.6
Hong, J.7
-
53
-
-
82255175850
-
Fighting identity theft: The coping perspective
-
Lai, F., Li, D. and Hsieh, C. (2012), "Fighting identity theft: the coping perspective", Decision Support Systems, Vol. 52, pp. 353-363.
-
(2012)
Decision Support Systems
, vol.52
, pp. 353-363
-
-
Lai, F.1
Li, D.2
Hsieh, C.3
-
54
-
-
79959333760
-
Mobile security: Finally a serious problem?
-
Leavitt, N. (2011), "Mobile security: finally a serious problem?", IEEE Computer, Vol. 44 No. 6, pp. 11-14.
-
(2011)
IEEE Computer
, vol.44
, Issue.6
, pp. 11-14
-
-
Leavitt, N.1
-
55
-
-
84887419507
-
-
Leximancer Brisbane
-
Leximancer (2010), Leximancer White Paper, Leximancer, Brisbane, available at:www.leximancer.com/lmedia/Leximancer-White-Paper-2010.pdf
-
(2010)
Leximancer White Paper
-
-
-
56
-
-
84896989071
-
-
Version 4, Leximancer, Brisbane
-
Leximancer (2011), Leximancer Manual: Version 4, Leximancer, Brisbane, available at: www.leximancer.com/lp/4.00.20L1173952/m/doc/LeximancerManual.pdf
-
(2011)
Leximancer Manual
-
-
-
57
-
-
84887461836
-
-
Lookout (2011), 2011 Mobile Threat Report, available at:www.mylookout. com/mobile-threat-report
-
(2011)
2011 Mobile Threat Report
-
-
-
58
-
-
84887445016
-
-
Lumension and Ponemon Institute
-
Lumension and Ponemon Institute (2012), Growing Insecurity: 2012 State of the Endpoint Report, available at: www.lumension.com/2012-state-of-the- endpoint.aspx
-
(2012)
Growing Insecurity 2012 State of the Endpoint Report
-
-
-
59
-
-
84876259472
-
-
McAfee (2012), 2012 Threats Predictions, available at: www.mcafee.com/us/resources/reports/rp-threat-predictions-2012.pdf
-
(2012)
2012 Threats Predictions
-
-
-
60
-
-
70350608971
-
-
PhD dissertation, Harvard University, Cambridge, MA
-
Malan, D.J. (2007), "Rapid detection of botnets through collaborative networks of peers", PhD dissertation, Harvard University, Cambridge, MA.
-
(2007)
Rapid Detection of Botnets Through Collaborative Networks of Peers
-
-
Malan, D.J.1
-
61
-
-
84887444640
-
Botnets and cyber security: Battling online threats
-
Zubairi, J. and Mahboob, A. (Eds), IGI Global, Hershey, PA
-
Manasrah, A.M., Abouabdalla, O.A., Mayeh, M. and Suppiah, N.N. (2012), "Botnets and cyber security: battling online threats", in Zubairi, J. and Mahboob, A. (Eds), Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies, IGI Global, Hershey, PA, pp. 75-89.
-
(2012)
Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies
, pp. 75-89
-
-
Manasrah, A.M.1
Abouabdalla, O.A.2
Mayeh, M.3
Suppiah, N.N.4
-
62
-
-
84887421621
-
Mobile devices and corporate data security
-
Markelj, B. and Bernik, I. (2012), "Mobile devices and corporate data security", International Journal of Education and Information Technologies, Vol. 1 No. 6, pp. 97-104.
-
(2012)
International Journal of Education and Information Technologies
, vol.1
, Issue.6
, pp. 97-104
-
-
Markelj, B.1
Bernik, I.2
-
63
-
-
80955163816
-
Cybercrime: Understanding and addressing the concerns of stakeholders
-
Martin, N. and Rice, J. (2011), "Cybercrime: understanding and addressing the concerns of stakeholders", Computers & Security, Vol. 30 No. 8, pp. 803-814.
-
(2011)
Computers & Security
, vol.30
, Issue.8
, pp. 803-814
-
-
Martin, N.1
Rice, J.2
-
64
-
-
84867375385
-
BYOD: Security and privacy considerations
-
Miller, K.W., Voas, J. and Hurlburt, G.F. (2012), "BYOD: security and privacy considerations", IT Professional, Vol. 14 No. 5, pp. 53-55.
-
(2012)
IT Professional
, vol.14
, Issue.5
, pp. 53-55
-
-
Miller, K.W.1
Voas, J.2
Hurlburt, G.F.3
-
65
-
-
77954796523
-
A review and future research directions of secure and trustworthy mobile agent-based e-marketplace systems
-
Patel, A., Qi, W. and Wills, C. (2010), "A review and future research directions of secure and trustworthy mobile agent-based e-marketplace systems", Information Management & Computer Security, Vol. 18 No. 3, pp. 144-161.
-
(2010)
Information Management & Computer Security
, vol.18
, Issue.3
, pp. 144-161
-
-
Patel, A.1
Qi, W.2
Wills, C.3
-
66
-
-
84861538043
-
Social engineering: Concepts and solutions
-
Peltier, T.R. (2006), "Social engineering: concepts and solutions", Information Systems Security, Vol. 15 No. 5, pp. 13-21.
-
(2006)
Information Systems Security
, vol.15
, Issue.5
, pp. 13-21
-
-
Peltier, T.R.1
-
67
-
-
84861101642
-
Leveraging behavioral science to mitigate cyber security risk
-
Pfleeger, S.L. and Caputo, D. (2012), "Leveraging behavioral science to mitigate cyber security risk", Computers & Security, Vol. 31 No. 4, pp. 597-611.
-
(2012)
Computers & Security
, vol.31
, Issue.4
, pp. 597-611
-
-
Pfleeger, S.L.1
Caputo, D.2
-
68
-
-
84869397228
-
Collaborative TCP sequence number inference attack - How to crack sequence number under a second
-
Qian, Z., Mao, Z.M. and Xie, Y. (2012), "Collaborative TCP sequence number inference attack - how to crack sequence number under a second", Proceedings of ACM Computers and Communications Security Conference (ACM-CCS), pp. 593-604.
-
(2012)
Proceedings of ACM Computers and Communications Security Conference (ACM-CCS)
, pp. 593-604
-
-
Qian, Z.1
Mao, Z.M.2
Xie, Y.3
-
69
-
-
20444466128
-
Knowledge, economy, technology and society: The politics of discourse
-
Rooney, D. (2005), "Knowledge, economy, technology and society: the politics of discourse", Telematics and Informatics, Vol. 22 No. 4, pp. 405-422.
-
(2005)
Telematics and Informatics
, vol.22
, Issue.4
, pp. 405-422
-
-
Rooney, D.1
-
70
-
-
80053018618
-
Facets of serendipity in everyday chance encounters: A grounded theory approach to blog analysis
-
Rubin, V.L., Burkel, J. and Quan-Haase, A. (2011), "Facets of serendipity in everyday chance encounters: a grounded theory approach to blog analysis", Information Research: An International Electronic Journal, Vol. 16 No. 3, available at: http://informationr.net/ir/16- 3/paper488.html
-
(2011)
Information Research: An International Electronic Journal
, vol.16
, Issue.3
-
-
Rubin, V.L.1
Burkel, J.2
Quan-Haase, A.3
-
71
-
-
77956395261
-
Ethical decision making: Improving the quality of acceptable use policies
-
Ruighaver, A.B., Maynard, S.B. and Warren, M. (2010), "Ethical decision making: improving the quality of acceptable use policies", Computers & Security, Vol. 29 No. 7, pp. 731-736.
-
(2010)
Computers & Security
, vol.29
, Issue.7
, pp. 731-736
-
-
Ruighaver, A.B.1
Maynard, S.B.2
Warren, M.3
-
72
-
-
84874232182
-
New security perspectives around BYOD
-
Scarfo, A. (2012), "New security perspectives around BYOD", Proceedings of the 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications, pp. 446-451.
-
(2012)
Proceedings of the 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications
, pp. 446-451
-
-
Scarfo, A.1
-
74
-
-
79951646815
-
Automated static code analysis for classifying Android applications using machine learning
-
Shabtai, A., Fledel, Y. and Elovici, Y. (2010), "Automated static code analysis for classifying Android applications using machine learning", Proceedings of 2010 International Conference on Computational Intelligence and Security (CIS), pp. 329-333.
-
(2010)
Proceedings of 2010 International Conference on Computational Intelligence and Security (CIS)
, pp. 329-333
-
-
Shabtai, A.1
Fledel, Y.2
Elovici, Y.3
-
75
-
-
84856225193
-
'Andromaly': A behavioral malware detection framework for Android devices
-
Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C. and Weiss, Y. (2012), "'Andromaly': a behavioral malware detection framework for Android devices", Journal of Intelligent Information Systems, Vol. 38 No. 1, pp. 161-190.
-
(2012)
Journal of Intelligent Information Systems
, vol.38
, Issue.1
, pp. 161-190
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
76
-
-
36849073159
-
Anti-Phishing Phil: The design and evaluation of a game that teaches people not to fall for phish
-
Pittsburgh, PA
-
Sheng, S., Magnien, B., Kumaraguru, P., Acquisti, A., Cranor, L.F., Hong, J. and Nunge, E. (2007), "Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish", Proceedings of the Third Symposium on Usable Privacy and Security, Pittsburgh, PA, pp. 88-99.
-
(2007)
Proceedings of the Third Symposium on Usable Privacy and Security
, pp. 88-99
-
-
Sheng, S.1
Magnien, B.2
Kumaraguru, P.3
Acquisti, A.4
Cranor, L.F.5
Hong, J.6
Nunge, E.7
-
77
-
-
42549166924
-
Security aspects of mobile phone virus: A critical survey
-
Shih, D., Lin, B., Chiang, H. and Shih, M. (2008), "Security aspects of mobile phone virus: a critical survey", Industrial Management & Data Systems, Vol. 108 No. 4, pp. 478-494.
-
(2008)
Industrial Management & Data Systems
, vol.108
, Issue.4
, pp. 478-494
-
-
Shih, D.1
Lin, B.2
Chiang, H.3
Shih, M.4
-
79
-
-
33748991451
-
Evaluation of unsupervised semantic mapping of natural language with Leximancer concept mapping
-
Smith, A.E. and Humphreys, M.S. (2006), "Evaluation of unsupervised semantic mapping of natural language with Leximancer concept mapping", Behavior Research Methods, Vol. 38 No. 2, pp. 262-279.
-
(2006)
Behavior Research Methods
, vol.38
, Issue.2
, pp. 262-279
-
-
Smith, A.E.1
Humphreys, M.S.2
-
80
-
-
80054707541
-
Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies
-
Son, J.Y. (2011), "Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies", Information & Management, Vol. 48 No. 7, pp. 296-302.
-
(2011)
Information & Management
, vol.48
, Issue.7
, pp. 296-302
-
-
Son, J.Y.1
-
81
-
-
84869206387
-
-
Sophos (2012), Security Threat Report 2012, available at: www.sophos.com/en-us/security-newstrends/reports/security-threat-report.aspx
-
(2012)
Security Threat Report 2012
-
-
-
84
-
-
56049089609
-
A business process intelligence system for enterprise process performance management
-
Tan, W., Shen, W., Xu, L., Zhou, B. and Li, L. (2008), "A business process intelligence system for enterprise process performance management", IEEE Transactions on SMC Part C, Vol. 38 No. 6, pp. 745-756.
-
(2008)
IEEE Transactions on SMC Part C
, vol.38
, Issue.6
, pp. 745-756
-
-
Tan, W.1
Shen, W.2
Xu, L.3
Zhou, B.4
Li, L.5
-
85
-
-
77952924818
-
Efficient signature based malware detection on mobile devices
-
Venugopal, D. and Hu, G. (2008), "Efficient signature based malware detection on mobile devices", Mobile Information Systems, Vol. 4 No. 1, pp. 33-49.
-
(2008)
Mobile Information Systems
, vol.4
, Issue.1
, pp. 33-49
-
-
Venugopal, D.1
Hu, G.2
-
86
-
-
84861453131
-
Towards information security behavioral compliance
-
Vroom, C. and von Solms, R. (2004), "Towards information security behavioral compliance", Information Management & Computer Security, Vol. 6 No. 4, pp. 167-173.
-
(2004)
Information Management & Computer Security
, vol.6
, Issue.4
, pp. 167-173
-
-
Vroom, C.1
Von Solms, R.2
-
87
-
-
84878151777
-
Data filtering for RFID and WSN integration
-
in press)
-
Wang, L., Xu, L., Bi, Z. and Xu, Y. (2013), "Data filtering for RFID and WSN integration", IEEE Transactions on Industrial Informatics (in press).
-
(2013)
IEEE Transactions on Industrial Informatics
-
-
Wang, L.1
Xu, L.2
Bi, Z.3
Xu, Y.4
-
88
-
-
0242708745
-
Pretty good persuasion: A first step towards effective password security for the real world
-
ACM Press, New York, NY
-
Weirich, D. and Sasse, M.A. (2001), "Pretty good persuasion: a first step towards effective password security for the real world", Proceedings of the New Security Paradigms Workshop, ACM Press, New York, NY, pp. 137-143.
-
(2001)
Proceedings of the New Security Paradigms Workshop
, pp. 137-143
-
-
Weirich, D.1
Sasse, M.A.2
-
89
-
-
0141549587
-
-
4th ed., Course Technology, Boston, MA
-
Whitman, M.E. and Mattord, H.J. (2012), Principles of Information Security, 4th ed., Course Technology, Boston, MA.
-
(2012)
Principles of Information Security
-
-
Whitman, M.E.1
Mattord, H.J.2
-
90
-
-
81255151151
-
Enterprise systems: State-of-the-art and future trends
-
Xu, L. (2011), "Enterprise systems: state-of-the-art and future trends", IEEE Transactions on Industrial Informatics, Vol. 7 No. 4, pp. 630-640.
-
(2011)
IEEE Transactions on Industrial Informatics
, vol.7
, Issue.4
, pp. 630-640
-
-
Xu, L.1
-
91
-
-
46849118987
-
An integrated approach for agricultural ecosystem management
-
Xu, L., Liang, N. and Gao, Q. (2008), "An integrated approach for agricultural ecosystem management", IEEE Transactions on SMC Part C, Vol. 38 No. 4, pp. 590-599.
-
(2008)
IEEE Transactions on SMC Part C
, vol.38
, Issue.4
, pp. 590-599
-
-
Xu, L.1
Liang, N.2
Gao, Q.3
-
92
-
-
73349129963
-
Insights into malware detection and prevention on mobile phones
-
Yan, Q., Li, Y., Li, T. and Deng, R. (2009), "Insights into malware detection and prevention on mobile phones", Communications in Computer and Information Science, Vol. 58, pp. 242-249.
-
(2009)
Communications in Computer and Information Science
, vol.58
, pp. 242-249
-
-
Yan, Q.1
Li, Y.2
Li, T.3
Deng, R.4
-
93
-
-
84862954570
-
Enhancing mobile malware detection with social collaboration
-
Yang, L., Ganapathy, V. and Iftode, L. (2011), "Enhancing mobile malware detection with social collaboration", Proceedings of 2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing, pp. 572-576.
-
(2011)
Proceedings of 2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing
, pp. 572-576
-
-
Yang, L.1
Ganapathy, V.2
Iftode, L.3
-
95
-
-
34447298085
-
Threats and countermeasures for information system security: A crossindustry study
-
Yeh, Q. and Chang, A. (2007), "Threats and countermeasures for information system security: a crossindustry study", Information & Management, Vol. 44 No. 5, pp. 480-491.
-
(2007)
Information & Management
, vol.44
, Issue.5
, pp. 480-491
-
-
Yeh, Q.1
Chang, A.2
-
97
-
-
84863087619
-
A new open door: The smartphone's impact on work-to-life conflict, stress, and resistance
-
Yun, H., Kettinger, W. and Lee, C. (2012), "A new open door: the smartphone's impact on work-to-life conflict, stress, and resistance", International Journal of Electronic Commerce, Vol. 16 No. 4, pp. 121-152.
-
(2012)
International Journal of Electronic Commerce
, vol.16
, Issue.4
, pp. 121-152
-
-
Yun, H.1
Kettinger, W.2
Lee, C.3
-
100
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets
-
February
-
Zhou, Y., Wang, Z., Zhou, W. and Jiang, X. (2012), "Hey, you, get off of my market: detecting malicious apps in official and alternative Android markets", Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS'12, February.
-
(2012)
Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS'12
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
101
-
-
77951204516
-
Improving information security awareness and behaviour through dialogue, participation and collective reflection - An intervention study
-
Albrechtsen, E. and Hovden, J. (2010), "Improving information security awareness and behaviour through dialogue, participation and collective reflection - an intervention study", Computers & Security, Vol. 29 No. 4, pp. 432-445.
-
(2010)
Computers & Security
, vol.29
, Issue.4
, pp. 432-445
-
-
Albrechtsen, E.1
Hovden, J.2
|