<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
         xmlns:dc="http://purl.org/dc/elements/1.1/"
         xmlns:syn="http://purl.org/rss/1.0/modules/syndication/"
         xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://www.jissec.org/search_rss">
  <title>Journal of Information Systems Security</title>
  <link>https://www.jissec.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1 to 15.
        
  </description>
  
  
  
  
  <image rdf:resource="https://www.jissec.org/logo.jpg"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://www.jissec.org/news/volume-21-number-3-1"/>
        
        
            <rdf:li rdf:resource="https://www.jissec.org/Contents/V21/N3/jissec-v21n3-aljuaid-p227-ci"/>
        
        
            <rdf:li rdf:resource="https://www.jissec.org/Contents/V21/N3/V21N3-Aljuaid.html"/>
        
        
            <rdf:li rdf:resource="https://www.jissec.org/Contents/V21/N3/jissec-v21n3-jennex-p201-ci"/>
        
        
            <rdf:li rdf:resource="https://www.jissec.org/Contents/V21/N3/jissec-v21n3-lombard-p185-ci"/>
        
        
            <rdf:li rdf:resource="https://www.jissec.org/Contents/V21/N3/V21N3-Dhillon-p179.pdf"/>
        
        
            <rdf:li rdf:resource="https://www.jissec.org/Contents/V21/N3/V21N3-Dhillon.html"/>
        
        
            <rdf:li rdf:resource="https://www.jissec.org/Contents/V21/N3/V21N3-Editorial.pdf"/>
        
        
            <rdf:li rdf:resource="https://www.jissec.org/Contents/V21/N3/V21N3-FrontMatter.pdf"/>
        
        
            <rdf:li rdf:resource="https://www.jissec.org/Contents/V21/N3/V21N3.html"/>
        
        
            <rdf:li rdf:resource="https://www.jissec.org/Contents/V21/N3"/>
        
        
            <rdf:li rdf:resource="https://www.jissec.org/news/volume-21-number-2"/>
        
        
            <rdf:li rdf:resource="https://www.jissec.org/Contents/V21/N2/jissec-v21n2-samara-p149-ci"/>
        
        
            <rdf:li rdf:resource="https://www.jissec.org/Contents/V21/N2/V21N2-Samara.html"/>
        
        
            <rdf:li rdf:resource="https://www.jissec.org/Contents/V21/N2/jissec-v21n2-clarke-p131-ci"/>
        
    </rdf:Seq>
  </items>

</channel>

    <item rdf:about="https://www.jissec.org/news/volume-21-number-3-1">        <title>Volume 21, Number 3</title>        <link>https://www.jissec.org/news/volume-21-number-3-1</link>        <description>This is JISSec Volume 21, Number 3 launch announcement</description>        <dc:publisher>No publisher</dc:publisher>        <dc:creator>MEditor</dc:creator>        <dc:rights></dc:rights>                <dc:date>2025-11-20T12:11:59Z</dc:date>        <dc:type>News Item</dc:type>    </item>
    <item rdf:about="https://www.jissec.org/Contents/V21/N3/jissec-v21n3-aljuaid-p227-ci">        <title>JISSec_V21N3_Aljuaid_p227_CI</title>        <link>https://www.jissec.org/Contents/V21/N3/jissec-v21n3-aljuaid-p227-ci</link>        <description>Adversarial Attacks on Natural Language Processing (NLP) Systems: An Emerging Threat in Cybersecurity, by Alanoud Aljuaid and Xiang Liu - Cart Item</description>        <dc:publisher>No publisher</dc:publisher>        <dc:creator>MEditor</dc:creator>        <dc:rights></dc:rights>                <dc:date>2025-11-19T21:16:36Z</dc:date>        <dc:type>Cart Item</dc:type>    </item>
    <item rdf:about="https://www.jissec.org/Contents/V21/N3/V21N3-Aljuaid.html">        <title>V21N3_Aljuaid.html</title>        <link>https://www.jissec.org/Contents/V21/N3/V21N3-Aljuaid.html</link>        <description></description>        <dc:publisher>No publisher</dc:publisher>        <dc:creator>MEditor</dc:creator>        <dc:rights></dc:rights>                <dc:date>2025-11-19T20:09:57Z</dc:date>        <dc:type>Record</dc:type>    </item>
    <item rdf:about="https://www.jissec.org/Contents/V21/N3/jissec-v21n3-jennex-p201-ci">        <title>JISSec_V21N3_Jennex_p201_CI</title>        <link>https://www.jissec.org/Contents/V21/N3/jissec-v21n3-jennex-p201-ci</link>        <description>Not All SMEs Are the Same: Categorizing Security Needs of SMEs, by Murray E. Jennex, Jeffry Babb, Amjad Abdullat, Abraham Abby Sen and Kareem Dana- Cart Item</description>        <dc:publisher>No publisher</dc:publisher>        <dc:creator>MEditor</dc:creator>        <dc:rights></dc:rights>                <dc:date>2025-11-19T19:49:51Z</dc:date>        <dc:type>Cart Item</dc:type>    </item>
    <item rdf:about="https://www.jissec.org/Contents/V21/N3/jissec-v21n3-lombard-p185-ci">        <title>JISSec_V21N3_Lombard_p185_CI</title>        <link>https://www.jissec.org/Contents/V21/N3/jissec-v21n3-lombard-p185-ci</link>        <description>Exploring the Risks of AI Human Worth, by Adriaan Lombard and Stephen Flowerday - Cart Item</description>        <dc:publisher>No publisher</dc:publisher>        <dc:creator>MEditor</dc:creator>        <dc:rights></dc:rights>                <dc:date>2025-11-19T19:24:19Z</dc:date>        <dc:type>Cart Item</dc:type>    </item>
    <item rdf:about="https://www.jissec.org/Contents/V21/N3/V21N3-Dhillon-p179.pdf">        <title>V21N3_Dhillon_p179.pdf</title>        <link>https://www.jissec.org/Contents/V21/N3/V21N3-Dhillon-p179.pdf</link>        <description>What Would Foucault Say about AI, Surveillance, and Cybersecurity?</description>        <dc:publisher>No publisher</dc:publisher>        <dc:creator>MEditor</dc:creator>        <dc:rights></dc:rights>                <dc:date>2025-11-19T19:01:53Z</dc:date>        <dc:type>File</dc:type>    </item>
    <item rdf:about="https://www.jissec.org/Contents/V21/N3/V21N3-Dhillon.html">        <title>V21N3_Dhillon.html</title>        <link>https://www.jissec.org/Contents/V21/N3/V21N3-Dhillon.html</link>        <description></description>        <dc:publisher>No publisher</dc:publisher>        <dc:creator>MEditor</dc:creator>        <dc:rights></dc:rights>                <dc:date>2025-11-19T19:01:01Z</dc:date>        <dc:type>Record</dc:type>    </item>
    <item rdf:about="https://www.jissec.org/Contents/V21/N3/V21N3-Editorial.pdf">        <title>V21N3_Editorial.pdf</title>        <link>https://www.jissec.org/Contents/V21/N3/V21N3-Editorial.pdf</link>        <description>JISSec Volume 21, Number 3 Editorial</description>        <dc:publisher>No publisher</dc:publisher>        <dc:creator>MEditor</dc:creator>        <dc:rights></dc:rights>                <dc:date>2025-11-19T18:57:35Z</dc:date>        <dc:type>File</dc:type>    </item>
    <item rdf:about="https://www.jissec.org/Contents/V21/N3/V21N3-FrontMatter.pdf">        <title>V21N3_FrontMatter.pdf</title>        <link>https://www.jissec.org/Contents/V21/N3/V21N3-FrontMatter.pdf</link>        <description>JISSec Volume 21, Number 3 Front Matter</description>        <dc:publisher>No publisher</dc:publisher>        <dc:creator>MEditor</dc:creator>        <dc:rights></dc:rights>                <dc:date>2025-11-19T18:56:48Z</dc:date>        <dc:type>File</dc:type>    </item>
    <item rdf:about="https://www.jissec.org/Contents/V21/N3/V21N3.html">        <title>V21N3.html</title>        <link>https://www.jissec.org/Contents/V21/N3/V21N3.html</link>        <description>JISSec Volume 21, Number 3 (2025) contents</description>        <dc:publisher>No publisher</dc:publisher>        <dc:creator>MEditor</dc:creator>        <dc:rights></dc:rights>                <dc:date>2025-11-19T18:55:44Z</dc:date>        <dc:type>Page</dc:type>    </item>
    <item rdf:about="https://www.jissec.org/Contents/V21/N3">        <title>N3</title>        <link>https://www.jissec.org/Contents/V21/N3</link>        <description>JISSec Volume 21, Number 3</description>        <dc:publisher>No publisher</dc:publisher>        <dc:creator>MEditor</dc:creator>        <dc:rights></dc:rights>                <dc:date>2025-11-19T18:47:02Z</dc:date>        <dc:type>Folder</dc:type>    </item>
    <item rdf:about="https://www.jissec.org/news/volume-21-number-2">        <title>Volume 21, Number 2</title>        <link>https://www.jissec.org/news/volume-21-number-2</link>        <description>This is JISSec Volume 21, Number 2 launch announcement</description>        <dc:publisher>No publisher</dc:publisher>        <dc:creator>MEditor</dc:creator>        <dc:rights></dc:rights>                <dc:date>2025-07-10T11:49:13Z</dc:date>        <dc:type>News Item</dc:type>    </item>
    <item rdf:about="https://www.jissec.org/Contents/V21/N2/jissec-v21n2-samara-p149-ci">        <title>JISSec_V21N2_Samara_p149_CI</title>        <link>https://www.jissec.org/Contents/V21/N2/jissec-v21n2-samara-p149-ci</link>        <description>Managing the Cybersecurity of e-Government Programmes: The Case of Jordan, by Nadia Samara and Dionysios Demetis - Cart Item</description>        <dc:publisher>No publisher</dc:publisher>        <dc:creator>MEditor</dc:creator>        <dc:rights></dc:rights>                <dc:date>2025-07-10T11:13:37Z</dc:date>        <dc:type>Cart Item</dc:type>    </item>
    <item rdf:about="https://www.jissec.org/Contents/V21/N2/V21N2-Samara.html">        <title>V21N2_Samara.html</title>        <link>https://www.jissec.org/Contents/V21/N2/V21N2-Samara.html</link>        <description></description>        <dc:publisher>No publisher</dc:publisher>        <dc:creator>MEditor</dc:creator>        <dc:rights></dc:rights>                <dc:date>2025-07-10T11:10:04Z</dc:date>        <dc:type>Record</dc:type>    </item>
    <item rdf:about="https://www.jissec.org/Contents/V21/N2/jissec-v21n2-clarke-p131-ci">        <title>JISSec_V21N2_Clarke_p131_CI</title>        <link>https://www.jissec.org/Contents/V21/N2/jissec-v21n2-clarke-p131-ci</link>        <description>An Executive Guide to Secure-by-Design AI, by Nathan Clarke, 
Gaseb Alotibi, Dany Joy, Fudong Li, 
Steven Furnell, Ali Alshumrani and 
Hussam Mohammed - Cart Item</description>        <dc:publisher>No publisher</dc:publisher>        <dc:creator>MEditor</dc:creator>        <dc:rights></dc:rights>                <dc:date>2025-07-10T11:03:45Z</dc:date>        <dc:type>Cart Item</dc:type>    </item>



</rdf:RDF>
