default search action
Information and Computer Security, Volume 32
Volume 32, Number 1, 2024
- Hamid Reza Nikkhah, Varun Grover, Rajiv Sabherwal:
Post hoc security and privacy concerns in mobile apps: the moderating roles of mobile apps' features and providers. 1-37 - Martina Neri, Federico Niccolini, Luigi Martino:
Organizational cybersecurity readiness in the ICT sector: a quanti-qualitative assessment. 38-52 - Areej Alyami, David Sammon, Karen Neville, Carolanne Mahony:
Critical success factors for Security Education, Training and Awareness (SETA) programme effectiveness: an empirical comparison of practitioner perspectives. 53-73 - Manimay Dev, Debashis Saha:
Does e-government development moderate the impact of female labor participation on national cybersecurity maturity? An empirical investigation. 74-92 - Zainab Batool Rizvi, Chaudry Bilal Ahmad Khan, Michael O'Sullivan:
Analytical hierarchy process model for managing cloud security. 93-111 - Prasetyo Adi Wibowo Putro, Dana Indra Sensuse, Wahyu Setiawan Setiawan Wibowo:
Framework for critical information infrastructure protection in smart government: a case study in Indonesia. 112-129
Volume 32, Number 2, 2024
- Miguel Calvo, Marta Beltrán:
Applying the Goal, Question, Metric method to derive tailored dynamic cyber risk metrics. 133-158 - Shao-Fang Wen, Basel Katt:
Exploring the role of assurance context in system security assurance evaluation: a conceptual model. 159-178 - Peter Dornheim, Rüdiger Zarnekow:
Determining cybersecurity culture maturity and deriving verifiable improvement measures. 179-196 - Gregory Lyon:
Informational inequality: the role of resources and attributes in information security awareness. 197-217 - Herbert J. Mattord, Kathleen Kotwica, Michael E. Whitman, Evan Battaglia:
Organizational perspectives on converged security operations. 218-235 - Eylem Thron, Shamal Faily, Huseyin Dogan, Martin Freer:
Human factors and cyber-security risks on the railway - the critical role played by signalling operations. 236-263
Volume 32, Number 3, 2024
- Konstantinos Kalodanis, Panagiotis Rizomiliotis, Dimosthenis Anagnostopoulos:
European Artificial Intelligence Act: an AI security approach. 265-281 - Prakriti Dumaru, Ankit Shrestha, Rizu Paudel, Cassity Haverkamp, Maryellen Brunson McClain, Mahdi Nasrullah Al-Ameen:
"...I have my dad, sister, brother, and mom's password": unveiling users' mental models of security and privacy-preserving tools. 282-303 - Wei-Lee Lim, Uma Thevi Munikrishnan, Choi-Meng Leong, Lee-Chea Hiew, Mei-Wei Leong, Liu Yang:
Do you want a secure e-wallet? Understanding the role of risk and security in e-wallet continuance intention. 304-321 - Andreas Skalkos, Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis:
Exploring users' attitude towards privacy-preserving search engines: a protection motivation theory approach. 322-343 - Keshnee Padayachee:
An exploration of dark and light triad personality traits towards situational crime prevention and compliant information security behaviour. 344-364 - Arne Roar Nygård, Sokratis K. Katsikas:
Ethical hardware reverse engineering for securing the digital supply chain in critical infrastructure. 365-377 - Akmal Mirsadikov, Ali Vedadi, Kent Marett:
Detecting deception in computer-mediated communication: the role of popularity information across media types. 378-401
Volume 32, Number 4, 2024
- Nathan L. Clarke, Steven Furnell:
Editorial: Human aspects of cyber security. 405-406 - David Hedberg, Martin Lundgren, Marcus Nohlberg:
Cybersecurity in modern cars: awareness and readiness of auto workshops. 407-419 - Rufai Ahmad, Sotirios Terzis, Karen Renaud:
Getting users to click: a content analysis of phishers' tactics and techniques in mobile instant messaging phishing. 420-435 - Tim Wright, Zainab Ruhwanya, Jacques Ophoff:
Using the theory of interpersonal behaviour to explain employees' cybercrime preventative behaviour during the pandemic. 436-458 - Marcus Gerdin, Ella Kolkowska, Åke Grönlund:
What goes around comes around: an in-depth analysis of how respondents interpret ISP non-/compliance questionnaire items. 459-476 - Andrew Reeves, Malcolm Pattinson, Marcus A. Butavicius:
The sleepless sentinel: factors that predict burnout and sleep quality in cybersecurity professionals. 477-491 - Elham Rostami, Fredrik Karlsson:
Qualitative content analysis of actionable advice in information security policies - introducing the keyword loss of specificity metric. 492-508 - Monica T. Whitty, Christopher Ruddy, David A. Keatley, Marcus A. Butavicius, Marthie Grobler:
The prince of insiders: a multiple pathway approach to understanding IP theft insider attacks. 509-522 - Eliana Stavrou, Andriani Piki:
Cultivating self-efficacy to empower professionals' re-up skilling in cybersecurity. 523-541
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.