When computer monitoring backfires: Privacy invasions and organizational injustice as precursors to computer abuse.Published in:Journal of Information System Security, 2011, v. 7, n. 1, p. 24By:Posey, Clay;Bennett, Rebecca J.;Roberts, Tom L.;Lowry, Paul BenjaminPublication type:Article
Certainly Verifiable Cryptography Using the Verifiable Uncertainty of Quantum Physics: A Primer on Quantum Key Distribution (QKD).Published in:Journal of Information System Security, 2011, v. 7, n. 1, p. 48By:Pant, Vik;Wagner, William P.Publication type:Article
Research Directions in Security Metrics.Published in:Journal of Information System Security, 2011, v. 7, n. 1, p. 3By:Jansen, WaynePublication type:Article
Editorial.Published in:Journal of Information System Security, 2011, v. 7, n. 1, p. 1By:Dhillon, GurpreetPublication type:Article