How Effective Is Your Security Awareness Program? An Evaluation Methodology (English)
- New search for: Rantos, K.
- New search for: Fysarakis, K.
- New search for: Manifavas, C.
- New search for: Rantos, K.
- New search for: Fysarakis, K.
- New search for: Manifavas, C.
In:
INFORMATION SECURITY JOURNAL
;
21
, 6
;
328-345
;
2012
-
ISSN:
- Article (Journal) / Print
-
Title:How Effective Is Your Security Awareness Program? An Evaluation Methodology
-
Contributors:
-
Published in:INFORMATION SECURITY JOURNAL ; 21, 6 ; 328-345
-
Publisher:
- New search for: TAYLOR & FRANCIS
-
Publication date:2012-01-01
-
Size:18 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 005.8
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 005.8 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 21, Issue 6
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 297
-
A Hybrid Attribute-Based Encryption Technique Supporting Expressive Policies and Dynamic AttributesWeber, Stefan G. et al. | 2012
- 306
-
Dempster-Shafer Evidence Combining for (Anti)-Honeypot TechnologiesHayatle, Osama / Youssef, Amr / Otrok, Hadi et al. | 2012
- 317
-
Hiding Information in Vector Layer While Extracting Layers from Raster DataKumar, Vinay / Bansal, Abhishek / Muttoo, Sunil Kumar et al. | 2012
- 328
-
How Effective Is Your Security Awareness Program? An Evaluation MethodologyRantos, Konstantinos / Fysarakis, Konstantinos / Manifavas, Charalampos et al. | 2012
- 346
-
Code Analysis for Software and System Security Using Open Source ToolsChahar, Chandrapal / Chauhan, Vishal Singh / Das, Manik Lal et al. | 2012
- 353
-
Privacy and Big Data, by Craig, T., and Ludloff, M. E.Magzoub, Abubakr et al. | 2012
- 353
-
Book Review: Privacy and Big Data, by Craig, T., and Ludloff, M. E. Sebastopol, CA: O'Reilly Media,2011, 91p. $14.99. ISBN: 978-1-449-30500-0Magzoub, A. et al. | 2012
- 355
-
Blackjacking: Security Threats to Blackberry Devices, PDAs and Cell Phones in the Enterprise, by Hoffman, Daniel V.Marks, Larry et al. | 2012
- 355
-
Book Review: Blackjacking: Security Threats to Blackberry Devices, PDAs and Cell Phones in the Enterprise, by Hoffman, Daniel V. New York: Wiley, 2007, 292p., $39.99.ISBN 978-0-470-12754-4Marks, L. et al. | 2012