default search action
Information and Computer Security, Volume 23
Volume 23, Number 1, 2015
- Steven Furnell:
Editorial. - Yan Sun, Ian Davidson:
Influential factors of online fraud occurrence in retailing banking sectors from a global prospective: An empirical study of individual customers in the UK and China. 3-19 - Kent Marett:
Checking the manipulation checks in information security research. 20-30 - Ahmed Ahmim, Nacira Ghoualmi-Zine:
A new hierarchical intrusion detection system based on a binary tree of classifiers. 31-57 - Phillip J. Brooke, Richard F. Paige:
User-visible cryptography in email and web scenarios. 58-72 - Eugene Ferry, John O'Raw, Kevin Curran:
Security evaluation of the OAuth 2.0 framework. 73-101 - Hasan M. Al-Mukahal, Khaled A. Alshare:
An examination of factors that influence the number of information security policy violations in Qatari organizations. 102-118
Volume 23, Number 2, 2015
- Sushma Mishra:
Organizational objectives for information security governance: a value focused assessment. 122-144 - Yung-Shen Yen:
Managing perceived risk for customer retention in e-commerce: The role of switching costs. 145-160 - Li-Hsing Ho, Ming-Tsai Hsu, Tieh-Min Yen:
Identifying core control items of information security management and improvement strategies by applying fuzzy DEMATEL. 161-177 - Waldo Rocha Flores, Hannes Holm, Marcus Nohlberg, Mathias Ekstedt:
Investigating personal determinants of phishing and the effect of national culture. 178-199 - Teodor Sommestad, Henrik Karlzén, Jonas Hallberg:
The sufficiency of the theory of planned behavior for explaining information security policy compliance. 200-217 - Maryam Shahpasand, Mehdi Shajari, Seyed Alireza Hashemi Golpaygani, Hoda Ghavamipoor:
A comprehensive security control selection model for inter-dependent organizational assets structure. 218-242
Volume 23, Number 3, 2015
- Fredrik Karlsson, Joachim Åström, Martin Karlsson:
Information security culture - state-of-the-art review between 2000 and 2013. 246-285 - Ioannis Tsimperidis, Vasilios Katos, Nathan L. Clarke:
Language-independent gender identification through keystroke analysis. 286-301 - Ruth Østgaard Skotnes:
Management commitment and awareness creation - ICT safety and security in electric power supply network companies. 302-316 - Randy Borum, John Felker, Sean Kern, Kristen Dennesen, Tonya Feyes:
Strategic cyber intelligence. 317-332 - Swapan Purkait:
Examining the effectiveness of phishing filters against DNS based phishing attacks. 333-346 - Muhammad Adnan, Mike Just, Lynne Baillie, Hilmi Günes Kayacik:
Investigating the work practices of network security professionals. 347-367
Volume 23, Number 4, 2015
- André Lötter, Lynn Futcher:
A framework to assist email users in the identification of phishing attacks. 370-381 - Thomas Hughes-Roberts:
Privacy as a secondary goal problem: an experiment examining control. 382-393 - Matina Tsavli, Pavlos S. Efraimidis, Vasilios Katos, Lilian Mitrou:
Reengineering the user: privacy concerns about personal data on smartphones. 394-405 - Bukelwa Ngoqo, Stephen V. Flowerday:
Exploring the relationship between student mobile information security awareness and behavioural intent. 406-420 - Martin J. Butler, Rika Butler:
Investigating the possibility to use differentiated authentication based on risk profiling to secure online banking. 421-434 - Shamal Faily:
Engaging stakeholders during late stage security design with assumption personas. 435-446
Volume 23, Number 5, 2015
- Himanshu Srivastava, Shashikala Tapaswi:
Logical acquisition and analysis of data from android mobile devices. 450-475 - Sindhuja P. N., Anand S. Kunnathur:
Information security in supply chains: a management control perspective. 476-496 - Alain Forget, Sonia Chiasson, Robert Biddle:
User-centred authentication feature framework. 497-515 - Teodor Sommestad, Fredrik Sandström:
An empirical test of the accuracy of an attack graph analysis tool. 516-531 - Abdulrahman Alqahtani:
Towards a framework for the potential cyber-terrorist threat to critical national infrastructure: A quantitative study. 532-569 - Mario Silic, Andrea Back, Dario Silic:
Taxonomy of technological risks of open source software in the enterprise adoption context. 570-583
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.