- Info
Search results
—
732 items matching your search terms
Subscribe to an always-updated feed of these search terms
-
Volume 20, Number 1
-
This is JISSec Volume 20, Number 1 launch announcement
-
JISSec_V20N1_Kaur_p49_CI
-
A Secure and Safe Deep Learning-Driven Blockchain Application for Advanced Plant Stress Phenotyping, by Manjit Kaur and Upinder Kaur - Cart Item
-
V20N1_Kaur.html
-
-
JISSec_V20N1_Li_p27_CI
-
Defeat Data Breachers' Minds: Blockchain with Bounded Rationality to Advance Information Security, by Yuanxiang John Li, Benjamin K. Ngugi and Frank M. Lin - ...
-
V20N1_Li.html
-
-
V20N1_Dhillon_p3.pdf
-
Coordinating in Threes: Unraveling Complexity in Information Systems Security Management, by Gurpreet Dhillon - Full Text
-
V20N1.html
-
JISSec Volume 20, Number 1 (2023) contents
-
N1
-
JISSec Volume 20, Number 1
-
V20.html
-
JISSec contents: Volume 20
-
Volume 19, Number 3
-
This is JISSec Volume 19, Number 3 launch announcement
-
N3
-
JISSec Volume 19, Number 3
-
JISSec_V19N3_AlAbdullah_p195_CI
-
How Does Vulnerability Awareness Impact Consumer Behavioral Intention: Evidence from POS Systems, by Muhmmad Al-Abdullah,
Yazan Alnsour and Mohamad Alsharo - ...
-
V19N3_AlAbdullah.html
-
-
JISSec_V19N3_Lapke_p183_CI
-
Envisioning Organizational IoT: Embracing Design Science to Address the IoT Vulnerabilities, by Michael Lapke, Jackson Walker and Malayo Magee - Cart Item
-
V19N3_Lapke.html
-
-
JISSec_V19N3_Dweik_p169_CI
-
Review of AES Methods and Suggested Abstract Ciphering for Secured Image Data Communication in IoT and AI Applications, by Haneen Dweik,
Mohammed Abutaha, ...
-
V19N3_Dweik.html
-
-
V19N3_Dhillon_p165.pdf
-
Cybersecurity Challenges in an AI Enabled World, by Gurpreet Dhillon - Full Text
-
V19N3_Dhillon.html
-
-
V19N3_Editorial.pdf
-
JISSec Volume 19, Number 3 Editorial
-
V19N3_FrontMatter.pdf
-
JISSec Volume 19, Number 3 Front Matter
-
Volume 19, Number 2
-
This is JISSec Volume 19, Number 2 launch announcement
-
V19N2_Dhillon_p91.pdf
-
The Intellectual Core of Information Systems Security, by Gurpreet Dhillon - Full Text
-
JISSec_V19N2_Alshammari_p133_CI
-
House of Cards: Developing KPIs for Monitoring Cybersecurity Awareness (CSA), by Mohammad Mulayh Alshammari and Dionysios S. Demetis - Cart Item
-
V19N2_Alshammari.html
-
-
JISSec_V19N2_Schwartz_p115_CI
-
The Next Big Strategic Play: Cybersecurity as a Competitive Advantage, by Tamara Schwartz,
Jose Ignacio Parada, Fred Cohn, George Wrenn and Keri E. Pearlson - ...
-
V19N2_Schwartz.html
-
-
V19N2_Editorial.pdf
-
JISSec Volume 19, Number 2 Editorial
-
V19N2_FrontMatter.pdf
-
JISSec Volume 19, Number 2 Front Matter
-
N2
-
JISSec Volume 19, Number 2