Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Patricia A. H. Williams |
Physician secure thyself. |
AISM |
2005 |
DBLP BibTeX RDF |
|
1 | Patricia A. H. Williams |
The underestimation of threats to patient data in clinical practice. |
AISM |
2005 |
DBLP BibTeX RDF |
|
1 | Craig Valli, Andrew Woodward (eds.) |
Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005 |
AISM |
2005 |
DBLP BibTeX RDF |
|
1 | Leanne Ngo, Wanlei Zhou 0001, Matthew J. Warren |
Understanding Transition towards Information Security Culture Change. |
AISM |
2005 |
DBLP BibTeX RDF |
|
1 | Reijo Savola |
Architecture for Self-Estimation of Security Level in Ad Hoc Network Nodes. |
AISM |
2005 |
DBLP BibTeX RDF |
|
1 | Lih Wern Wong |
Potential Bluetooth Vulnerabilities in Smartphones. |
AISM |
2005 |
DBLP BibTeX RDF |
|
1 | Wayne A. Jansen, Serban I. Gavrila, Clément Séveillac |
Smart Card Authentication for Mobile Devices. |
AISM |
2005 |
DBLP BibTeX RDF |
|
1 | Andrew Woodward |
Recommendations for wireless network security policy: an analysis and classification of current and emerging threats and solutions for different organisations. |
AISM |
2005 |
DBLP BibTeX RDF |
|
1 | Martin Dart |
Seeking information superiority: strategies for business in the commercial application of information operations. |
AISM |
2005 |
DBLP BibTeX RDF |
|
1 | Zhiqi Tao, Anthonie B. Ruighaver |
Detecting Rogue Access Points that endanger the Maginot Line of Wireless Authentication. |
AISM |
2005 |
DBLP BibTeX RDF |
|
1 | Mahdi Seify |
Risk Management in CRM Security Management. |
AISM |
2005 |
DBLP BibTeX RDF |
|
1 | Rosanna Fanciulli |
An investigation into the paradox of organisational flexibility versus security: A research project overview. |
AISM |
2005 |
DBLP BibTeX RDF |
|
1 | Lennon Hopkins |
Identity Synthesis: Creating An Identity From Scratch. |
AISM |
2005 |
DBLP BibTeX RDF |
|
1 | Marwan Al-Zarouni |
Taxonomy of WRT54G(S) Hardware and Custom Firmware. |
AISM |
2005 |
DBLP BibTeX RDF |
|
1 | Aaron Olding, Paul Turner |
My Problem or Our Problem? - Exploring the use of information sharing as a component of a holistic approach to e-security in response to the growth of 'Malicious Targeted Attacks'. |
AISM |
2005 |
DBLP BibTeX RDF |
|
1 | Yi-Chi Lin, Jill Slay |
Non-Repudiation in Pure Mobile Ad Hoc Network. |
AISM |
2005 |
DBLP BibTeX RDF |
|
1 | Graeme Pye, Matthew J. Warren |
Benchmarking E-business Security: A Model and Framework. |
AISM |
2005 |
DBLP BibTeX RDF |
|
1 | William Hutchinson |
Information Security: a Misnomer. |
AISM |
2005 |
DBLP BibTeX RDF |
|
1 | K. Koh, Anthonie B. Ruighaver, Sean B. Maynard, Atif Ahmad |
Security Governance: Its Impact on Security Culture. |
AISM |
2005 |
DBLP BibTeX RDF |
|
1 | |
Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004 |
AISM |
2004 |
DBLP BibTeX RDF |
|
1 | Jill Slay, Gerald Quirchmayr |
A Formal Model for the Relationship between Culture and Trust within is Security Management. |
AISM |
2004 |
DBLP BibTeX RDF |
|
1 | Emiko Terado, Patricia A. H. Williams |
Securing PDAs in the Healthcare Environment. |
AISM |
2004 |
DBLP BibTeX RDF |
|
1 | C. C. Terence Tan |
Developing a framework for understanding Security Governance. |
AISM |
2004 |
DBLP BibTeX RDF |
|
1 | Christopher Bolan |
Need to Know: Security or Liability? |
AISM |
2004 |
DBLP BibTeX RDF |
|
1 | Malcolm R. Pattinson |
Risk Homeostasis as a Factor of Information Security. |
AISM |
2004 |
DBLP BibTeX RDF |
|
1 | Omar Zakaria |
Understanding Challenges of Information Security Culture: A Methodological Issue. |
AISM |
2004 |
DBLP BibTeX RDF |
|
1 | Justin D. Pierce, Matthew J. Warren, David R. Mackay, Jason G. Wells |
Graphical Authentication: Justifications and Objectives. |
AISM |
2004 |
DBLP BibTeX RDF |
|
1 | Sabbir Ahmed, Leisa Armstrong |
Securing Web Services with XML aware Digital Signatures. |
AISM |
2004 |
DBLP BibTeX RDF |
|
1 | Girish Bhagwan Gokhale, David A. Banks |
Organisational Information Security: A Viable System Perspective. |
AISM |
2004 |
DBLP BibTeX RDF |
|
1 | Peter Wolski |
SOHO Wireless Intrusion Detection Systems - Cure or Placebo. |
AISM |
2004 |
DBLP BibTeX RDF |
|
1 | Gim Hiong Soh, Timo Vuori |
New Form of Identity (ID) Theft Crime: Acquiring Personal Information from Your Online Newsletter Providers. |
AISM |
2004 |
DBLP BibTeX RDF |
|
1 | Warren Brooks, Matthew J. Warren |
Health Information Security Evaluation: Continued Development of an Object-Oriented Method. |
AISM |
2004 |
DBLP BibTeX RDF |
|
1 | Mathew Hannan, Basil Tucker |
Risk Management and Organisational Culture: The Implications of Computer Network Attacks and Malware Incidents on Organizational Risk Management. |
AISM |
2004 |
DBLP BibTeX RDF |
|
1 | Michael Wynne, Peter James |
Securing Data at Rest. |
AISM |
2004 |
DBLP BibTeX RDF |
|
1 | A. Jancic, Matthew J. Warren |
PKI - Advantages and Obstacles. |
AISM |
2004 |
DBLP BibTeX RDF |
|
1 | Paul Ashley |
Enforcement of a P3P Privacy Policy. |
AISM |
2004 |
DBLP BibTeX RDF |
|
1 | Christopher Bolan, Daniel Mende |
Computer Security Research: Approaches and Assumptions. |
AISM |
2004 |
DBLP BibTeX RDF |
|
1 | G. Murphy |
An Examination of the Security of Routing Protocol Updates. |
AISM |
2004 |
DBLP BibTeX RDF |
|
1 | Vassilis Dimopoulos, Steven Furnell, Murray E. Jennex, Ioannis Kritharas |
Approaches to IT Security in Small and Medium Enterprises. |
AISM |
2004 |
DBLP BibTeX RDF |
|