Journal Navigation
Special Issue on Socio-Technical Perspectives on Information Systems Security
Volume 4
Editorial Preface Editorial Preface Special Issue
Editorial Preface
For Volume 4, Issue 2
View Full Issue
Frank Stowell
Volume 4
Moufida Sadok
Published: Jul 1, 2017
DOI: 10.4018/IJSS.2017070101
Volume 4
Penny Hart
This article contends that there are two increasingly important phenomena for organisations: the existence of virtual teams and the realisation that information needs to be protected more... Show More
Download Sample (PDF): Article
Cite Article

MLA

Hart, Penny. "Information Security and Virtual Teams." IJSS vol.4, no.2 2017: pp.1-7. http://doi.org/10.4018/IJSS.2017070101

APA

Hart, P. (2017). Information Security and Virtual Teams. International Journal of Systems and Society (IJSS), 4(2), 1-7. http://doi.org/10.4018/IJSS.2017070101

Chicago

Hart, Penny. "Information Security and Virtual Teams," International Journal of Systems and Society (IJSS) 4, no.2: 1-7. http://doi.org/10.4018/IJSS.2017070101

Export Reference

Mendeley
Published: Jul 1, 2017
DOI: 10.4018/IJSS.2017070102
Volume 4
Bilal AlSabbagh, Stewart Kowalski
This article discusses the design and specifications of a Socio-Technical Security Information and Event Management System (ST-SIEM). This newly-developed artifact addresses an important limitation... Show More
Download Sample (PDF): Article
Cite Article

MLA

AlSabbagh, Bilal, and Stewart Kowalski. "Socio-Technical SIEM (ST-SIEM): Towards Bridging the Gap in Security Incident Response." IJSS vol.4, no.2 2017: pp.8-21. http://doi.org/10.4018/IJSS.2017070102

APA

AlSabbagh, B. & Kowalski, S. (2017). Socio-Technical SIEM (ST-SIEM): Towards Bridging the Gap in Security Incident Response. International Journal of Systems and Society (IJSS), 4(2), 8-21. http://doi.org/10.4018/IJSS.2017070102

Chicago

AlSabbagh, Bilal, and Stewart Kowalski. "Socio-Technical SIEM (ST-SIEM): Towards Bridging the Gap in Security Incident Response," International Journal of Systems and Society (IJSS) 4, no.2: 8-21. http://doi.org/10.4018/IJSS.2017070102

Export Reference

Mendeley
Published: Jul 1, 2017
DOI: 10.4018/IJSS.2017070103
Volume 4
Duy Dang Pham Thien, Karlheinz Kautz, Siddhi Pittayachawan, Vince Bruno
As modern organisations are using strategic information systems as their competitive advantage, the management of information security (IS) is regarded as a top priority. However, technical measures... Show More
Download Sample (PDF): Article
Cite Article

MLA

Thien, Duy Dang Pham, et al. "A Canonical Action Research Approach to the Effective Diffusion of Information Security with Social Network Analysis." IJSS vol.4, no.2 2017: pp.22-43. http://doi.org/10.4018/IJSS.2017070103

APA

Thien, D. D., Kautz, K., Pittayachawan, S., & Bruno, V. (2017). A Canonical Action Research Approach to the Effective Diffusion of Information Security with Social Network Analysis. International Journal of Systems and Society (IJSS), 4(2), 22-43. http://doi.org/10.4018/IJSS.2017070103

Chicago

Thien, Duy Dang Pham, et al. "A Canonical Action Research Approach to the Effective Diffusion of Information Security with Social Network Analysis," International Journal of Systems and Society (IJSS) 4, no.2: 22-43. http://doi.org/10.4018/IJSS.2017070103

Export Reference

Mendeley
Published: Jul 1, 2017
DOI: 10.4018/IJSS.2017070104
Volume 4
Stephan Mühe, Andreas Drechsler
In this article, an IT risk management (ITRM) framework for small and medium enterprises (SMEs) is designed and evaluated. The framework's objective is to provide an uncomplicated and accessible... Show More
Download Sample (PDF): Article
Cite Article

MLA

Mühe, Stephan, and Andreas Drechsler. "Towards a Framework to Improve IT Security and IT Risk Management in Small and Medium Enterprises." IJSS vol.4, no.2 2017: pp.44-56. http://doi.org/10.4018/IJSS.2017070104

APA

Mühe, S. & Drechsler, A. (2017). Towards a Framework to Improve IT Security and IT Risk Management in Small and Medium Enterprises. International Journal of Systems and Society (IJSS), 4(2), 44-56. http://doi.org/10.4018/IJSS.2017070104

Chicago

Mühe, Stephan, and Andreas Drechsler. "Towards a Framework to Improve IT Security and IT Risk Management in Small and Medium Enterprises," International Journal of Systems and Society (IJSS) 4, no.2: 44-56. http://doi.org/10.4018/IJSS.2017070104

Export Reference

Mendeley
Published: Jul 1, 2017
DOI: 10.4018/IJSS.2017070105
Volume 4
Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios Baltatzis, George J Pangalos
In this article, a DFR framework is proposed focusing on the prioritization, triaging and selection of Indicators of Compromise (IoC) to be used when investigating of security incidents. A core... Show More
Download Sample (PDF): Article
Cite Article

MLA

Serketzis, Nikolaos, et al. "A Socio-Technical Perspective on Threat Intelligence Informed Digital Forensic Readiness." IJSS vol.4, no.2 2017: pp.57-68. http://doi.org/10.4018/IJSS.2017070105

APA

Serketzis, N., Katos, V., Ilioudis, C., Baltatzis, D., & Pangalos, G. J. (2017). A Socio-Technical Perspective on Threat Intelligence Informed Digital Forensic Readiness. International Journal of Systems and Society (IJSS), 4(2), 57-68. http://doi.org/10.4018/IJSS.2017070105

Chicago

Serketzis, Nikolaos, et al. "A Socio-Technical Perspective on Threat Intelligence Informed Digital Forensic Readiness," International Journal of Systems and Society (IJSS) 4, no.2: 57-68. http://doi.org/10.4018/IJSS.2017070105

Export Reference

Mendeley
Published: Jul 1, 2017
DOI: 10.4018/IJSS.2017070106
Volume 4
Steven Alter
This article presents six ways to use work system concepts for describing, analyzing, or evaluating IS security at the system rather than enterprise level. As a whole, this theory-based view delves... Show More
Download Sample (PDF): Article
Cite Article

MLA

Alter, Steven. "Six Work System Lenses for Describing, Analyzing, or Evaluating Important Aspects of IS Security." IJSS vol.4, no.2 2017: pp.69-82. http://doi.org/10.4018/IJSS.2017070106

APA

Alter, S. (2017). Six Work System Lenses for Describing, Analyzing, or Evaluating Important Aspects of IS Security. International Journal of Systems and Society (IJSS), 4(2), 69-82. http://doi.org/10.4018/IJSS.2017070106

Chicago

Alter, Steven. "Six Work System Lenses for Describing, Analyzing, or Evaluating Important Aspects of IS Security," International Journal of Systems and Society (IJSS) 4, no.2: 69-82. http://doi.org/10.4018/IJSS.2017070106

Export Reference

Mendeley
Volume 4
The Last Word The Last Word Special Issue
Invited Commentary
For Volume 4, Issue 2
View Full Issue
For Volume 4, Issue 2
The Last Word View Full Issue
Richard Baskerville
IGI Global Open Access Collection

IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface that can easily searched or integrated into library discovery systems. Browse IGI Global Open
Access Collection

Contact
Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.com

Open Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.com

Production-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.com

Rights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.com

Publication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.com

Discoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com

Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100