Cyber warfare and cyber terrorism L Janczewski, A Colarik IGI Global, 2007 | 305 | 2007 |
Softlifting and piracy: Behavior across cultures B Shore, AR Venkatachalam, E Solorzano, JM Burn, SZ Hassan, ... Technology in Society 23 (4), 563-581, 2001 | 131 | 2001 |
A taxonomy for social engineering attacks K Ivaturi, L Janczewski | 105 | 2011 |
Technological, organizational and environmental security and privacy issues of big data: A literature review KA Salleh, L Janczewski Procedia computer science 100, 19-28, 2016 | 70 | 2016 |
Development of information security baselines for healthcare information systems in New Zealand L Janczewski, FX Shi Computers & Security 21 (2), 172-192, 2002 | 70 | 2002 |
Clustering and topic modelling: A new approach for analysis of national cyber security strategies F Kolini, L Janczewski | 58 | 2017 |
Adoption of Big Data Solutions: A study on its security determinants using Sec-TOE Framework KA Salleh, L Janczewski | 58 | 2016 |
Social engineering-based attacks: Model and new zealand perspective LJ Janczewski, L Fu Proceedings of the international multiconference on computer science and …, 2010 | 56 | 2010 |
Managerial guide for handling cyber-terrorism and information warfare L Janczewski, AM Colarik IGI Global, 2005 | 43 | 2005 |
Establishing cyber warfare doctrine A Colarik, L Janczewski Journal of Strategic Security 5 (1), 31-48, 2012 | 40 | 2012 |
SEC-TOE framework: Exploring security determinants in big data solutions adoption K Ahmad Salleh, L Janczewski, F Beltran | 33 | 2015 |
Governance life cycle framework for managing security in public cloud: From user perspective R Ahmad, L Janczewski 2011 IEEE 4th International Conference on Cloud Computing, 372-379, 2011 | 31 | 2011 |
Security considerations in big data solutions adoption: Lessons from a case study on a banking institution KA Salleh, L Janczewski Procedia Computer Science 164, 168-176, 2019 | 27 | 2019 |
Factors of information technology implementation in under-developed countries: Example of the West African nations LJ Janczewski The global issues of information technology management, 187-212, 1992 | 24 | 1992 |
Cyber defense capability model: A foundation taxonomy F Kolini, L Janczewski | 22 | 2015 |
Internet and Intranet Security Management: Risks and Solutions: Risks and Solutions L Janczewski IGI Global, 1999 | 21 | 1999 |
Cyber warfare and cyber terrorism AM Colarik, L Janczewski Idea Group Reference, 2007 | 19 | 2007 |
Cloud supply chain resilience model: Development and validation A Herrera, L Janczewski 2016 49th Hawaii International Conference on System Sciences (HICSS), 3938-3947, 2016 | 17 | 2016 |
“Need‐to‐know” principle and fuzzy security clearances modelling LJ Janczewski, V Portougal Information management & computer security 8 (5), 210-217, 2000 | 17 | 2000 |
Issues in the study of organisational resilience in cloud computing environments A Herrera, L Janczewski Procedia Technology 16, 32-41, 2014 | 16 | 2014 |