Filter your results
- 6
- 6
- 6
- 2
- 1
- 1
- 1
- 1
- 6
- 1
- 1
- 1
- 6
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Defining Objectives for Preventing Cyberstalking31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.76-87, ⟨10.1007/978-3-319-33630-5_6⟩
Conference papers
hal-01369544v1
|
||
|
Secure Outsourcing: An Investigation of the Fit between Clients and Providers28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.405-418, ⟨10.1007/978-3-642-39218-4_30⟩
Conference papers
hal-01463842v1
|
||
|
Organizational Transformation and Information Security Culture: A Telecom Case Study29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.431-437, ⟨10.1007/978-3-642-55415-5_36⟩
Conference papers
hal-01370391v1
|
||
|
Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.49-61, ⟨10.1007/978-3-319-33630-5_4⟩
Conference papers
hal-01369541v1
|
||
|
When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.352-363, ⟨10.1007/978-3-642-30436-1_29⟩
Conference papers
hal-01518211v1
|
||
|
Organizational Power and Information Security Rule Compliance26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.185-196, ⟨10.1007/978-3-642-21424-0_15⟩
Conference papers
hal-01567592v1
|