default search action
Information and Computer Security, Volume 29
Volume 29, Number 1, 2021
- Sheshadri Chatterjee, Soumya Kanti Ghosh, Ranjan Chaudhuri, Sumana Chaudhuri:
Adoption of AI-integrated CRM system by Indian industry: from security and privacy perspective. 1-24 - Fayez Ghazai Alotaibi, Nathan Luke Clarke, Steven M. Furnell:
A novel approach for improving information security management and awareness for home environments. 25-48 - Bilal Naqvi, Nathan Luke Clarke, Jari Porras:
Incorporating the human facet of security in developing systems and services. 49-72 - Rohit Gupta, Baidyanath Biswas, Indranil Biswas, Shib Sankar Sana:
Firm investment decisions for information security under a fuzzy environment: a game-theoretic approach. 73-104 - Stylianos Karagiannis, Emmanouil Magkos:
Adapting CTF challenges into virtual cybersecurity learning environments. 105-132 - Spela Orehek, Gregor Petric:
A systematic review of scales for measuring information security culture. 133-158 - Ramaraj Palanisamy, Yang Wu:
Users' attitude on perceived security of enterprise systems mobility: an empirical study. 159-186 - Suparak Janjarasjit, Siew H. Chan:
Reaction of users as potential victims of information security breach. 187-206
Volume 29, Number 2, 2021
- Erik Bergström, Fredrik Karlsson, Rose-Mharie Åhlfeldt:
Developing an information classification method. 209-239 - Thanos Papaioannou, Aggeliki Tsohou, Maria Karyda:
Forming digital identities in social networks: the role of privacy concerns and self-esteem. 240-262 - Kenneth Albert Saban, Stephen Rau, Charles A. Wood:
"SME executives' perceptions and the information security preparedness model". 263-282 - Sovantharith Seng, Mahdi Nasrullah Al-Ameen, Matthew Wright:
A look into user privacy andthird-party applications in Facebook. 283-313 - Keith S. Jones, Miriam E. Armstrong, McKenna K. Tornblad, Akbar Siami Namin:
How social engineers use persuasion principles during vishing attacks. 314-331 - Manfred Vielberth, Ludwig Englbrecht, Günther Pernul:
Improving data quality for human-as-a-security-sensor. A process driven quality improvement approach for user-provided incident information. 332-349 - Susan Ramlo, John B. Nicholas:
The human factor: assessing individuals' perceptions related to cybersecurity. 350-364 - Sindhuja P. N.:
The impact of information security initiatives on supply chain robustness and performance: an empirical study. 365-391
Volume 29, Number 3, 2021
- Andrew R. Gillam, Alina M. Waite:
Gender differences in predictors of technology threat avoidance. 393-412 - Heather J. Parker, Stephen Flowerday:
Understanding the disclosure of personal data online. 413-434 - Aliya Kintonova, Alexander Vasyaev, Viktor Shestak:
Cyberbullying and cyber-mobbing in developing countries. 435-456 - Oluwafemi Oriola, Adesesan B. Adeyemo, Maria Papadaki, Eduan Kotzé:
A collaborative approach for national cybersecurity incident management. 457-484 - Julie M. Haney, Wayne G. Lutters:
Cybersecurity advocates: discovering the characteristics and skills of an emergent role. 485-499 - Atiya Avery:
After the disclosure: measuring the short-term and long-term impacts of data breach disclosures on the financial performance of organizations. 500-525 - Karen Renaud, Suzanne Prior:
The "three M's" counter-measures to children's risky online behaviors: mentor, mitigate and monitor. 526-557 - Nik Thompson, Atif Ahmad, Sean B. Maynard:
Do privacy concerns determine online information disclosure? The case of internet addiction. 558-569
Volume 29, Number 4, 2021
- Mahdi Nasrullah Al-Ameen, Apoorva Chauhan, M. A. Manazir Ahsan, Huzeyfe Kocabas:
A look into user's privacy perceptions and data practices of IoT devices. 573-588 - Dirk P. Snyman, Hennie A. Kruger:
Collective information security behaviour: a technology-driven framework. 589-603 - Karen Renaud, Graham Johnson, Jacques Ophoff:
Accessible authentication: dyslexia and password strategies. 604-624 - Yotamu Gangire, Adéle da Veiga, Marlien Herselman:
Assessing information security behaviour: a self-determination theory perspective. 625-646 - Markus Lennartsson, Joakim Kävrestad, Marcus Nohlberg:
Exploring the meaning of usable security - a literature review. 647-663 - Ram Herkanaidu, Steven M. Furnell, Maria Papadaki:
Towards a cross-cultural education framework for online safety awareness. 664-679 - Behnood Momenzadeh, Shakthidhar Gopavaram, Sanchari Das, L. Jean Camp:
Bayesian evaluation of privacy-preserving risk communication for user android app preferences. 680-693
Volume 29, Number 5, 2021
- Nabin Chowdhury, Vasileios Gkioulos:
Key competencies for critical infrastructure cyber-security: a systematic literature review. 697-723 - Yair Levy, Ruti Gafni:
Introducing the concept of cybersecurity footprint. 724-736 - Ben Krishna, M. P. Sebastian:
Examining the relationship between e-government development, nation's cyber-security commitment, business usage and economic prosperity: a cross-country analysis. 737-760 - Paulus Swartz, Adéle da Veiga, Nico Martins:
Validating an information privacy governance questionnaire to measure the perception of employees. 761-786 - Shamal Faily, Claudia Iacob, Raian Ali, Duncan Ki-Aries:
Visualising personas as goal models to find security tensions. 787-815 - Hongjiang Xu, Sakthi Mahenthiran:
Users' perception of cybersecurity, trust and cloud computing providers' performance. 816-835 - Laila Dahabiyeh:
Factors affecting organizational adoption and acceptance of computer-based security awareness training tools. 836-849 - Tanya McGill, Nik Thompson:
Exploring potential gender differences in information security and privacy. 850-865 - Nurul Asmui Azmi Md Azmi, Ai Ping Teoh, Ali Vafaei-Zadeh, Haniruzila Hanifah:
Predicting information security culture among employees of telecommunication companies in an emerging market. 866-882
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.