You are here: Home
Personal tools

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 787 items matching your search terms

Subscribe to an always-updated feed of these search terms

News Item Volume 21, Number 2
This is JISSec Volume 21, Number 2 launch announcement
Cart Item JISSec_V21N2_Samara_p149_CI
Managing the Cybersecurity of e-Government Programmes: The Case of Jordan, by Nadia Samara and Dionysios Demetis - Cart Item
Record V21N2_Samara.html
Cart Item JISSec_V21N2_Clarke_p131_CI
An Executive Guide to Secure-by-Design AI, by Nathan Clarke, Gaseb Alotibi, Dany Joy, Fudong Li, Steven Furnell, Ali Alshumrani and Hussam Mohammed - ...
Record V21N2_Clarke.html
File V21N2_Dhillon_p87.pdf
Redefining Information Systems Security: A Reflective Perspective
Record V21N2_Dhillon.html
File V21N2_Editorial.pdf
JISSec Volume 21, Number 2 Editorial
File V21N2_FrontMatter.pdf
JISSec Volume 21, Number 2 Front Matter
Document V21N2.html
JISSec Volume 21, Number 2 (2025) contents
Folder N2
JISSec Volume 21, Number 2
News Item Volume 21, Number 1
This is JISSec Volume 21, Number 1 launch announcement
Folder V21
JISSec contents: Volume 21
Folder N1
JISSec Volume 21, Number 1
Document V21N1.html
JISSec Volume 21, Number 1 (2025) contents
Cart Item JISSec_V21N1_Mulgund_p51_CI
Defense-in-Depth Model of Countermeasures against Adversarial AI Attacks: Literature Review and Classification, by Pavankumar Mulgund, Raghvendra Singh, Raj ...
Cart Item JISSec_V21N1_Jennex_p29_CI
Observations and Learnings from Cybersecurity Audits of SMEs, by Murray E. Jennex, Jeffry Babb and Amjad Abdullat - Cart Item
Cart Item JISSec_V21N1_Singh_p9_CI
Secure Captcha Generation with Blockchain Integration: The Case of Historical Gurmukhi Numeral Recognition, by Harpal Singh, Simpel Rani and Gurpreet Singh ...
Record V21N1_Singh.html
File V21N1_Dhillon_p3.pdf
Cybercrime: The Ever-Persistent Problem, by Gurpreet Dhillon - Full Text
Record V21N1_Dhillon.html
File V21N1_Editorial.pdf
JISSec Volume 21, Number 1 Editorial
News Item Volume 20, Number 3
This is JISSec Volume 20, Number 3 launch announcement
Cart Item JISSec_V20N3_Joubert_p185_CI
A Synthesis of Research on Insider Threats in Cybersecurity, by Daniël Joubert and Jan Eloff - Cart Item
Record V20N3_Joubert.html
Cart Item JISSec_V20N3_Caldeira_p167_CI
The Future of Cybersecurity: The Quantum Challenge, by Mário Caldeira and João Sabino - Cart Item
Record V20N3_Caldeira.html
Cart Item JISSec_V20N3_Li_p147_CI
Media Impact on Mobile Phishing Avoidance Behavior, by Xiaoqing Li - Cart Item
File V20N3_Dhillon_p143.pdf
The Power of Empowerment, by Gurpreet Dhillon - Full Text
Record V20N3_Dhillon.html