You are here: Home
Personal tools

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 732 items matching your search terms

Subscribe to an always-updated feed of these search terms

News Item Volume 20, Number 1
This is JISSec Volume 20, Number 1 launch announcement
Cart Item JISSec_V20N1_Kaur_p49_CI
A Secure and Safe Deep Learning-Driven Blockchain Application for Advanced Plant Stress Phenotyping, by Manjit Kaur and Upinder Kaur - Cart Item
Record V20N1_Kaur.html
Cart Item JISSec_V20N1_Li_p27_CI
Defeat Data Breachers' Minds: Blockchain with Bounded Rationality to Advance Information Security, by Yuanxiang John Li, Benjamin K. Ngugi and Frank M. Lin - ...
Record V20N1_Li.html
File V20N1_Dhillon_p3.pdf
Coordinating in Threes: Unraveling Complexity in Information Systems Security Management, by Gurpreet Dhillon - Full Text
Document V20N1.html
JISSec Volume 20, Number 1 (2023) contents
Folder N1
JISSec Volume 20, Number 1
Document V20.html
JISSec contents: Volume 20
News Item Volume 19, Number 3
This is JISSec Volume 19, Number 3 launch announcement
Folder N3
JISSec Volume 19, Number 3
Cart Item JISSec_V19N3_AlAbdullah_p195_CI
How Does Vulnerability Awareness Impact Consumer Behavioral Intention: Evidence from POS Systems, by Muhmmad Al-Abdullah, Yazan Alnsour and Mohamad Alsharo - ...
Record V19N3_AlAbdullah.html
Cart Item JISSec_V19N3_Lapke_p183_CI
Envisioning Organizational IoT: Embracing Design Science to Address the IoT Vulnerabilities, by Michael Lapke, Jackson Walker and Malayo Magee - Cart Item
Record V19N3_Lapke.html
Cart Item JISSec_V19N3_Dweik_p169_CI
Review of AES Methods and Suggested Abstract Ciphering for Secured Image Data Communication in IoT and AI Applications, by Haneen Dweik, Mohammed Abutaha, ...
Record V19N3_Dweik.html
File V19N3_Dhillon_p165.pdf
Cybersecurity Challenges in an AI Enabled World, by Gurpreet Dhillon - Full Text
Record V19N3_Dhillon.html
File V19N3_Editorial.pdf
JISSec Volume 19, Number 3 Editorial
File V19N3_FrontMatter.pdf
JISSec Volume 19, Number 3 Front Matter
News Item Volume 19, Number 2
This is JISSec Volume 19, Number 2 launch announcement
File V19N2_Dhillon_p91.pdf
The Intellectual Core of Information Systems Security, by Gurpreet Dhillon - Full Text
Cart Item JISSec_V19N2_Alshammari_p133_CI
House of Cards: Developing KPIs for Monitoring Cybersecurity Awareness (CSA), by Mohammad Mulayh Alshammari and Dionysios S. Demetis - Cart Item
Record V19N2_Alshammari.html
Cart Item JISSec_V19N2_Schwartz_p115_CI
The Next Big Strategic Play: Cybersecurity as a Competitive Advantage, by Tamara Schwartz, Jose Ignacio Parada, Fred Cohn, George Wrenn and Keri E. Pearlson - ...
Record V19N2_Schwartz.html
File V19N2_Editorial.pdf
JISSec Volume 19, Number 2 Editorial
File V19N2_FrontMatter.pdf
JISSec Volume 19, Number 2 Front Matter
Folder N2
JISSec Volume 19, Number 2