default search action
Information and Computer Security, Volume 31
Volume 31, Number 1, 2023
- Lily Pharris, Begona Perez-Mira:
Preventing social engineering: a phenomenological inquiry. 1-31 - Kristina Gyllensten, Marianne Törner, Anders Pousette:
The impact of psychosocial working conditions on information security behaviour in the nuclear industry. 32-50 - Adrian Ford, Ameer Al-Nemrat, Seyed Ali Ghorashi, Julia Claire Davidson:
The impact of GDPR infringement fines on the market value of firms. 51-64 - Ramaraj Palanisamy, Yi Shi:
Users' attitude on perceived security of mobile cloud computing: empirical evidence from SME users in China. 65-87 - Aamna Tariq, Jawad Manzoor, Muhammad Ammar Aziz, Zain Ul Abideen Tariq, Ammar Masood:
Open source SIEM solutions for an enterprise. 88-107 - Anne Fortin, Sylvie Héroux:
Limited usefulness of firm-provided cybersecurity information in institutional investors' investment analysis. 108-123
Volume 31, Number 2, 2023
- Thomas M. Tegethoff, Ricardo Santa, Glaucya Daú, Jimy Cortes:
Online security in e-government as an antecedent of cost-effectiveness and quality in business operations. 125-144 - Haritha P. H.:
Mobile payment service adoption: understanding customers for an application of emerging financial technology. 145-171 - Cynthia K. Riemenschneider, Laurie L. Burney, Saman Bina:
The influence of organizational values on employee attitude and information security behavior: the mediating role of psychological capital. 172-198 - Tianhao Xu, Prashanth Rajivan:
Determining psycholinguistic features of deception in phishing messages. 199-220 - Kiara Jordan Butler, Irwin Brown:
COVID-19 pandemic-induced organisational cultural shifts and employee information security compliance behaviour: a South African case study. 221-243 - Alireza Shojaifar, Samuel A. Fricker:
Design and evaluation of a self-paced cybersecurity tool. 244-262
Volume 31, Number 3, 2023
- Nathan L. Clarke, Steven Furnell:
Editorial: Human aspects of cyber security. 265-266 - Anusha Bhana, Jacques Ophoff:
Risk homeostasis and security fatigue: a case study of data specialists. 267-280 - Adéle da Veiga:
A model for information security culture with creativity and innovation as enablers - refined with an expert panel. 281-303 - Gunnar Lindqvist, Joakim Kävrestad:
How privacy concerns impact Swedish citizens' willingness to report crimes: a quantitative mobile phone survey. 304-315 - Magdalena Glas, Manfred Vielberth, Tobias Reittinger, Fabian Böhm, Günther Pernul:
Improving cybersecurity skill development through visual programming. 316-330 - Elham Rostami, Fredrik Karlsson, Shang Gao:
Policy components - a conceptual model for modularizing and tailoring of information security policies. 331-352 - Aleatha Shanley, Mike Johnstone, Patryk Szewczyk, Michael Crowley:
An exploration of Australian attitudes towards privacy. 353-367 - Chola Chhetri, Vivian Genaro Motti:
Enhancing the design of data-related privacy controls for smart home devices. 368-384
Volume 31, Number 4, 2023
- Katherine Taken Smith, Lawrence Murphy Smith, Marcus Burger, Erik S. Boyle:
Cyber terrorism cases and stock market valuation effects. 385-403 - Giddeon Njamngang Angafor, Iryna Yevseyeva, Leandros Maglaras:
Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise. 404-426 - Hui Na Chua, Vi Vien Khor, Siew Fan Wong:
Examining the effect of different knowledge aspects on information security awareness. 427-448 - Simon Andersson:
Problems in information classification: insights from practice. 449-462 - Kristian Kannelønning, Sokratis K. Katsikas:
A systematic literature review of how cybersecurity-related behavior has been assessed. 463-477 - Alain Tambe Ebot:
Advance fee fraud scammers' criminal expertise and deceptive strategies: a qualitative case study. 478-503 - Noman H. Chowdhury, Marc T. P. Adam, Timm Teubner:
Rushing for security: a document analysis on the sources and effects of time pressure on organizational cybersecurity. 504-526
Volume 31, Number 5, 2023
- Khalid Shaheen, Ali Hussein Zolait:
The impacts of the cyber-trust program on the cybersecurity maturity of government entities in the Kingdom of Bahrain. 529-544 - N'guessan Yves-Roland Douha, Karen Renaud, Yuzo Taenaka, Youki Kadobayashi:
Smart home cybersecurity awareness and behavioral incentives. 545-575 - Pintu Shah, Anuja Agarwal:
Cyber Suraksha: a card game for smartphone security awareness. 576-600 - Ruti Gafni, Yair Levy:
Experts' feedback on the cybersecurity footprint elements: in pursuit of a quantifiable measure of SMBs' cybersecurity posture. 601-623 - Stephen Mujeye:
An analysis of differences in behaviors and practices of security-conscious users and regular users on mobile devices. 624-634 - Ishtiaq Ahmad Bajwa, Shabir Ahmad, Maqsood Mahmud, Farooq Ahmad Bajwa:
The impact of cyberattacks awareness on customers' trust and commitment: an empirical evidence from the Pakistani banking sector. 635-654 - Richard G. Mathieu, Alan E. Turovlin:
Lost in the middle - a pragmatic approach for ERP managers to prioritize known vulnerabilities by applying classification and regression trees (CART). 655-674
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.