Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
Performance of Adaptive Space Sharing Processor Allocation Policies for Distributed-Memory MulticomputersDandamudi, Sivarama P. ; Yu, HaiJournal of parallel and distributed computing, 1999-07, Vol.58 (1), p.109-125 [Periódico revisado por pares]San Diego, CA: Elsevier IncTexto completo disponível |
|
2 |
Material Type: Artigo
|
Employees’ adherence to information security policies: An exploratory field studySiponen, Mikko ; Adam Mahmood, M. ; Pahnila, SeppoInformation & management, 2014-03, Vol.51 (2), p.217-224 [Periódico revisado por pares]Kidlington: Elsevier B.VTexto completo disponível |
|
3 |
Material Type: Artigo
|
Attribute-Based Encryption With Verifiable Outsourced DecryptionJunzuo Lai ; Deng, Robert H. ; Chaowen Guan ; Jian WengIEEE transactions on information forensics and security, 2013-08, Vol.8 (8), p.1343-1354 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |
|
4 |
Material Type: Artigo
|
Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)Parsons, Kathryn ; McCormac, Agata ; Butavicius, Marcus ; Pattinson, Malcolm ; Jerram, CateComputers & security, 2014-05, Vol.42, p.165-176 [Periódico revisado por pares]Amsterdam: Elsevier LtdTexto completo disponível |
|
5 |
Material Type: Artigo
|
On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection SystemsElhag, Salma ; Fernández, Alberto ; Bawakid, Abdullah ; Alshomrani, Saleh ; Herrera, FranciscoExpert systems with applications, 2015-01, Vol.42 (1), p.193-202 [Periódico revisado por pares]Amsterdam: Elsevier LtdTexto completo disponível |
|
6 |
Material Type: Artigo
|
Motivating IS security compliance: Insights from Habit and Protection Motivation TheoryVance, Anthony ; Siponen, Mikko ; Pahnila, SeppoInformation & management, 2012-05, Vol.49 (3-4), p.190-198 [Periódico revisado por pares]Kidlington: Elsevier B.VTexto completo disponível |
|
7 |
Material Type: Artigo
|
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access StructuresZhen Liu ; Zhenfu Cao ; Wong, D. S.IEEE transactions on information forensics and security, 2013-01, Vol.8 (1), p.76-88 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |
|
8 |
Material Type: Artigo
|
Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognitionIfinedo, PrincelyInformation & management, 2014-01, Vol.51 (1), p.69-79 [Periódico revisado por pares]Kidlington: Elsevier B.VTexto completo disponível |
|
9 |
Material Type: Artigo
|
Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theoryCheng, Lijiao ; Li, Ying ; Li, Wenli ; Holm, Eric ; Zhai, QingguoComputers & security, 2013-11, Vol.39, p.447-459 [Periódico revisado por pares]Amsterdam: Elsevier LtdTexto completo disponível |
|
10 |
Material Type: Artigo
|
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectivenessHerath, Tejaswini ; Rao, H.R.Decision Support Systems, 2009-05, Vol.47 (2), p.154-165 [Periódico revisado por pares]Amsterdam: Elsevier B.VTexto completo disponível |