Skip to content
Librarians
Authors & Editors
Societies
Register
Sign in
Mobile
Browse
Products
Open access
Shortlist
Cart
The online platform for Taylor & Francis Group content
Cookies Notification
This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.
Find out more.
Search
Advanced and citation search
Within current journal
Entire site
Home
>
List of Issues
> Table of Contents
Browse journal
View all volumes and issues
Current issue
Most read articles
Most cited articles
Authors and submissions
Instructions for authors
Submit online
Subscribe
About this journal
Aims & scope
Journal information
Editorial board
Abstracting & indexing
Editorial biographies
Related websites
News & offers
Volume 23
, Issue 4-6, 2014
< Prev
Taylor & Francis
Publication History
Sample this title
TOC email alert
Alert me
TOC email alert
TOC RSS feed
Information Security Journal: A Global Perspective
The official journal of (ISC)
2
ISSN
1939-3555 (Print), 1939-3547 (Online)
Purchase issue
Publication Frequency
6 issues per year
Add to shortlist
Recommend to:
A friend
A librarian
To select/unselect all items click here
Choose an action
Add to shortlist
Download citation
Special Issue:
Cybercrimes, Secure Emerging Web Environments, and Digital Forensics
Guest Editorial
Introduction to the Special Issue
Olga Angelopoulou
pages 123-124
View full text
Download full text
Access options
DOI:
10.1080/19393555.2014.987063
Published online:
25 Nov 2014
Citing articles:
0
Article Views:
116
Article usage statistics combine cumulative total PDF downloads and full-text HTML views from publication date (but no earlier than 25 Jun 2011, launch date of this website) to 01 Feb 2015. Article views are only counted from this site. Although these data are updated every 24 hours, there may be a 48-hour delay before the most recent numbers are available.
Article usage statistics combine cumulative total PDF downloads and full-text HTML views from publication date (but no earlier than 25 Jun 2011, launch date of this website) to 01 Feb 2015. Article views are only counted from this site. Although these data are updated every 24 hours, there may be a 48-hour delay before the most recent numbers are available.
Further Information
First Page Preview
References
Related articles
Articles
An Agent-Based Socio-Technical Approach to Impact Assessment for Cyber Defense
Konstantinia Charitoudi
&
Andrew J. C. Blyth
pages 125-136
View full text
Download full text
Access options
DOI:
10.1080/19393555.2014.931492
Published online:
23 Oct 2014
Citing articles:
0
Article Views:
67
Article usage statistics combine cumulative total PDF downloads and full-text HTML views from publication date (but no earlier than 25 Jun 2011, launch date of this website) to 01 Feb 2015. Article views are only counted from this site. Although these data are updated every 24 hours, there may be a 48-hour delay before the most recent numbers are available.
Article usage statistics combine cumulative total PDF downloads and full-text HTML views from publication date (but no earlier than 25 Jun 2011, launch date of this website) to 01 Feb 2015. Article views are only counted from this site. Although these data are updated every 24 hours, there may be a 48-hour delay before the most recent numbers are available.
Further Information
Abstract
References
Related articles
Classification of Clickjacking Attacks and Detection Techniques
Hossain Shahriar
&
Vamshee Krishna Devendran
pages 137-147
View full text
Download full text
Access options
DOI:
10.1080/19393555.2014.931489
Published online:
22 Oct 2014
Citing articles:
0
Article Views:
71
Article usage statistics combine cumulative total PDF downloads and full-text HTML views from publication date (but no earlier than 25 Jun 2011, launch date of this website) to 01 Feb 2015. Article views are only counted from this site. Although these data are updated every 24 hours, there may be a 48-hour delay before the most recent numbers are available.
Article usage statistics combine cumulative total PDF downloads and full-text HTML views from publication date (but no earlier than 25 Jun 2011, launch date of this website) to 01 Feb 2015. Article views are only counted from this site. Although these data are updated every 24 hours, there may be a 48-hour delay before the most recent numbers are available.
Further Information
Abstract
References
Related articles
Policing as a Service in the Cloud
Shahrzad A. Zargari
&
Anthony Smith
pages 148-158
View full text
Download full text
Access options
DOI:
10.1080/19393555.2014.931490
Published online:
22 Oct 2014
Citing articles:
0
Article Views:
59
Article usage statistics combine cumulative total PDF downloads and full-text HTML views from publication date (but no earlier than 25 Jun 2011, launch date of this website) to 01 Feb 2015. Article views are only counted from this site. Although these data are updated every 24 hours, there may be a 48-hour delay before the most recent numbers are available.
Article usage statistics combine cumulative total PDF downloads and full-text HTML views from publication date (but no earlier than 25 Jun 2011, launch date of this website) to 01 Feb 2015. Article views are only counted from this site. Although these data are updated every 24 hours, there may be a 48-hour delay before the most recent numbers are available.
Further Information
Abstract
References
Related articles
Toward a Monopoly Botnet Market
Zhen Li
&
Qi Liao
pages 159-171
View full text
Download full text
Access options
DOI:
10.1080/19393555.2014.931488
Published online:
22 Oct 2014
Citing articles:
0
Article Views:
61
Article usage statistics combine cumulative total PDF downloads and full-text HTML views from publication date (but no earlier than 25 Jun 2011, launch date of this website) to 01 Feb 2015. Article views are only counted from this site. Although these data are updated every 24 hours, there may be a 48-hour delay before the most recent numbers are available.
Article usage statistics combine cumulative total PDF downloads and full-text HTML views from publication date (but no earlier than 25 Jun 2011, launch date of this website) to 01 Feb 2015. Article views are only counted from this site. Although these data are updated every 24 hours, there may be a 48-hour delay before the most recent numbers are available.
Further Information
Abstract
References
Related articles
Proposed Methodology for Cyber Criminal Profiling
Arun Warikoo
pages 172-178
View full text
Download full text
Access options
DOI:
10.1080/19393555.2014.931491
Published online:
22 Oct 2014
Citing articles:
0
Article Views:
165
Article usage statistics combine cumulative total PDF downloads and full-text HTML views from publication date (but no earlier than 25 Jun 2011, launch date of this website) to 01 Feb 2015. Article views are only counted from this site. Although these data are updated every 24 hours, there may be a 48-hour delay before the most recent numbers are available.
Article usage statistics combine cumulative total PDF downloads and full-text HTML views from publication date (but no earlier than 25 Jun 2011, launch date of this website) to 01 Feb 2015. Article views are only counted from this site. Although these data are updated every 24 hours, there may be a 48-hour delay before the most recent numbers are available.
Further Information
Abstract
References
Related articles
Editorial Board
EOV Editorial Board
page ebi
View full text
Download full text
Access options
DOI:
10.1080/19393555.2014.996460
Published online:
08 Dec 2014
Citing articles:
0
Article Views:
26
Article usage statistics combine cumulative total PDF downloads and full-text HTML views from publication date (but no earlier than 25 Jun 2011, launch date of this website) to 01 Feb 2015. Article views are only counted from this site. Although these data are updated every 24 hours, there may be a 48-hour delay before the most recent numbers are available.
Article usage statistics combine cumulative total PDF downloads and full-text HTML views from publication date (but no earlier than 25 Jun 2011, launch date of this website) to 01 Feb 2015. Article views are only counted from this site. Although these data are updated every 24 hours, there may be a 48-hour delay before the most recent numbers are available.
Further Information
First Page Preview
Related articles
To select/unselect all items click here
Choose an action
Add to shortlist
Download citation
Most read
Most cited
Security in Cloud Computing: An Analysis of Key Drivers and Constraints
Derek Mohammed
Volume 20, Issue 3, 2011
Gaining Access with Social Engineering: An Empirical Study of the Threat
Michael Workman
Volume 16, Issue 6, 2007
How Can We Deter Cyber Terrorism?
Jian Hua, et al.
Volume 21, Issue 2, 2012
Alternate Approaches to Business Impact Analysis
Priti Sikdar
Volume 20, Issue 3, 2011
Security and Control in the Cloud
Klaus Julisch, et al.
Volume 19, Issue 6, 2010
More
Gaining Access with Social Engineering: An Empirical Study of the Threat
Michael Workman
Volume 16, Issue 6, 2007
Security and Control in the Cloud
Klaus Julisch, et al.
Volume 19, Issue 6, 2010
Do Information Security Professionals and Business Managers View Information Security Issues Differently?
R. Kelly Rainer, et al.
Volume 16, Issue 2, 2007
The Financial Impact of IT Security Breaches: What Do Investors Think?
Ashish Garg, et al.
Volume 12, Issue 1, 2003
Internet Acceptable Use Policies: Navigating the Management, Legal, and Technical Issues
Farley Stewart
Volume 9, Issue 3, 2000
More
Librarians
Librarians' area
Pricing
Institutional account
Access entitlements
Co-branding
IP ranges
Link resolver preferences
Usage reports
Authors & Editors
Book authors
Journal authors
Reference work authors
Editors
Societies
Current partners
Publish with us
Help & Information
Help
FAQs
Contact us
Press releases
Taylor & Francis Group
Privacy Policy & Cookies
Terms & Conditions
Accessibility
Powered by
Atypon® Literatum
©
Informa UK Limited, an Informa Group Company