Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,798,523 papers from all fields of science
Search
Sign In
Create Free Account
Computer Security Institute
Known as:
CSI
The Computer Security Institute (CSI) was a professional membership organization serving practitioners of information, network, and computer-enabled…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Crimeware
Encryption
Internet
Laptop theft
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios
A. Arafa
,
W. Shin
,
M. Vaezi
,
H. Poor
IEEE Transactions on Information Forensics and…
2018
Corpus ID: 52074284
A downlink single-input single-output non-orthogonal multiple access setting is considered, in which a base station (BS) is…
Expand
Review
2011
Review
2011
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
Ken H. Guo
,
Yufei Yuan
,
N. Archer
,
C. Connelly
Journal of Management Information Systems
2011
Corpus ID: 2688095
End users are said to be "the weakest link" in information systems (IS) security management in the workplace. They often…
Expand
Highly Cited
2011
Highly Cited
2011
Decision support for Cybersecurity risk planning
L. Rees
,
J. Deane
,
T. R. Rakes
,
W. Baker
Decision Support Systems
2011
Corpus ID: 5928433
2010
2010
A web-based multi-perspective decision support system for information security planning
O. El-Gayar
,
Brian D. Fritz
Decision Support Systems
2010
Corpus ID: 15682401
Review
2010
Review
2010
Decision-Making Styles of Young-Adult Consumers in the Republic of Macedonia
Ivan-Damir Anić
,
A. Suleska
,
E. Rajh
2010
Corpus ID: 39391822
Abstract The purpose of this research is to examine decision making styles and to test the Sproles and Kendall’s (1986) CSI…
Expand
Review
2006
Review
2006
Perceptions of Information Security at the Workplace : Linking Information Security Climate to Compliant Behavior
Mark Chan
2006
Corpus ID: 14337040
A large number of information security breaches at the workplace result from employees’ failure to comply with organizational…
Expand
2004
2004
Password Pitfalls and Dynamic Biometrics: Toward a Multi-Layer User Authentication Approach for Electronic Business
Leslie Leong
,
Edward J. Yerzak
2004
Corpus ID: 7209013
ABSTRACT With the increased awareness of the dangers of cyber-terrorism and identity fraud, the security of information systems…
Expand
Highly Cited
2003
Highly Cited
2003
Analyzing security costs
Rebecca T. Mercuri
CACM
2003
Corpus ID: 12580345
Quantification tools, if applied prudently, can assist in the anticipation, budgeting, and control of direct and indirect…
Expand
Highly Cited
2002
Highly Cited
2002
Scene of the Cybercrime
D. Shinder
,
Michael B. Cross
2002
Corpus ID: 62118677
Highly Cited
2002
Highly Cited
2002
Information Security Governance Reporting
R. Garigue
,
M. Stefaniu
Information Security Journal
2002
Corpus ID: 11049500
Abstract Imagine you are the Chief Information Security Officer (CISO) and your boss, the CIO or CEO, is asking some simple…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE