| 1 |
|
Consumer motivations in taking action against spyware: an empirical investigation
|
Gurung, A.; Luo, X.; Liao, Q.
|
Emerald Group Publishing Limited
|
2009
|
|
|
|
| 2 |
|
A security standards' framework to facilitate best practices' awareness and conformity
|
Tsohou, A.; Kokolakis, S.; Lambrinoudakis, C.; Gritzalis, S.
|
Emerald Group Publishing Limited
|
2010
|
|
|
|
| 3 |
|
Quantifying information dynamics through a new valuation system
|
Vaish, A.; Prabhakar, A.; Mishra, H.; Dayal, N.; Singh, S. K.; Goel, U.; Coull, N.
|
Emerald Group Publishing Limited
|
2011
|
|
|
|
| 4 |
|
Personalized cognitive passwords: an exploratory assessment
|
Lazar, L.; Tikolsky, O.; Glezer, C.; Zviran, M.
|
Emerald Group Publishing Limited
|
2011
|
|
|
|
| 5 |
|
Addressing dynamic issues in information security management
|
Abbas, H.; Magnusson, C.; Yngstrom, L.; Hemani, A.
|
Emerald Group Publishing Limited
|
2011
|
|
|
|
| 6 |
|
A longitudinal analysis of data breaches
|
Garrison, C. P.; Ncube, M.
|
Emerald Group Publishing Limited
|
2011
|
|
|
|
| 7 |
|
Exploring the supply of pirate software for mobile devices: An analysis of software types and piracy groups
|
Goode, S.
|
Emerald Group Publishing Limited
|
2010
|
|
|
|
| 8 |
|
Understanding consumer intention with respect to purchase and use of pirated software
|
Suki, N. M.; Ramayah, T.; Suki, N. M.
|
Emerald Group Publishing Limited
|
2011
|
|
|
|
| 9 |
|
Leadership styles and information security in small businesses
|
Bhattacharya, D.
|
Emerald Group Publishing Limited
|
2011
|
|
|
|
| 10 |
|
The 14-layered framework for including social and organizational aspects in security management
|
Monfelt, Y.; Pilemalm, S.; Hallberg, J.; Yngstrom, L.
|
Emerald Group Publishing Limited
|
2011
|
|
|
|