Table of contents
Information security and business continuity management in interorganizational IT relationships
Jonna JärveläinenThis paper aims to understand how managers of IT and information security aim to enhance information security and business continuity management in interorganizational IT…
The effect of acquisition decision making on security posture
Eric H. GoldmanThe purpose of this paper is to examine the effectiveness of decision making in IT acquisition and security, and the disparity between the two domains. The paper postulates that…
An investigation of students' perception of Bluetooth security
Margaret Tan, Kathrine Sagala AguilarVarious research investigations have found that students' awareness of information security issues continues to be poor and this is indeed a concern especially when students use…
Phishing counter measures and their effectiveness – literature review
Swapan PurkaitPhishing is essentially a social engineering crime on the Web, whose rampant occurrences and technique advancements are posing big challenges for researchers in both academia and…