Cyber warfare and cyber terrorism L Janczewski, A Colarik IGI Global, 2007 | 318 | 2007 |
Softlifting and piracy: Behavior across cultures B Shore, AR Venkatachalam, E Solorzano, JM Burn, SZ Hassan, ... Technology in Society 23 (4), 563-581, 2001 | 134 | 2001 |
A taxonomy for social engineering attacks K Ivaturi, L Janczewski | 116 | 2011 |
Technological, organizational and environmental security and privacy issues of big data: A literature review KA Salleh, L Janczewski Procedia computer science 100, 19-28, 2016 | 78 | 2016 |
Adoption of Big Data Solutions: A study on its security determinants using Sec-TOE Framework KA Salleh, L Janczewski | 73 | 2016 |
Development of information security baselines for healthcare information systems in New Zealand L Janczewski, FX Shi Computers & Security 21 (2), 172-192, 2002 | 70 | 2002 |
Clustering and topic modelling: A new approach for analysis of national cyber security strategies F Kolini, L Janczewski | 67 | 2017 |
Social engineering-based attacks: Model and new zealand perspective LJ Janczewski, L Fu Proceedings of the international multiconference on computer science and …, 2010 | 60 | 2010 |
Managerial guide for handling cyber-terrorism and information warfare L Janczewski, AM Colarik IGI Global, 2005 | 44 | 2005 |
Establishing cyber warfare doctrine A Colarik, L Janczewski Journal of Strategic Security 5 (1), 31-48, 2012 | 40 | 2012 |
Security considerations in big data solutions adoption: Lessons from a case study on a banking institution KA Salleh, L Janczewski Procedia Computer Science 164, 168-176, 2019 | 39 | 2019 |
SEC-TOE framework: Exploring security determinants in big data solutions adoption K Ahmad Salleh, L Janczewski, F Beltran | 34 | 2015 |
Governance life cycle framework for managing security in public cloud: From user perspective R Ahmad, L Janczewski 2011 IEEE 4th International Conference on Cloud Computing, 372-379, 2011 | 32 | 2011 |
Cyber defense capability model: A foundation taxonomy F Kolini, L Janczewski | 25 | 2015 |
Factors of information technology implementation in under-developed countries: Example of the West African nations LJ Janczewski The global issues of information technology management, 187-212, 1992 | 24 | 1992 |
Cyber warfare and cyber terrorism AM Colarik, L Janczewski Idea Group Reference, 2007 | 21 | 2007 |
Internet and Intranet Security Management: Risks and Solutions: Risks and Solutions L Janczewski IGI Global, 1999 | 20 | 1999 |
Cloud supply chain resilience model: Development and validation A Herrera, L Janczewski 2016 49th Hawaii International Conference on System Sciences (HICSS), 3938-3947, 2016 | 18 | 2016 |
Social engineering preparedness of online banks: An Asia-Pacific perspective K Ivaturi, L Janczewski Journal of Global Information Technology Management 16 (4), 21-46, 2013 | 17 | 2013 |
Introduction to cyber warfare and cyber terrorism AM Colarik, LJ Janczewski Janczewski and Colarik. Cyber Warfare and Cyber Terrorism. Hershey …, 2008 | 17 | 2008 |