


default search action
Information and Computer Security, Volume 24
Volume 24, Number 1, 2016
- Aimilia Tasidou, Pavlos S. Efraimidis, Yannis Soupionis, Lilian Mitrou, Vasilios Katos

:
Privacy-preserving, user-centric VoIP CAPTCHA challenges: An integrated solution in the SIP environment. 2-19 - Maria Bartnes Line, Eirik Albrechtsen:

Examining the suitability of industrial safety management approaches for information security incident management. 20-37 - Kosmas Pipyros

, Lilian Mitrou, Dimitris Gritzalis, Theodoros K. Apostolopoulos:
Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare. 38-52 - Panagiotis Andriotis

, George C. Oikonomou
, Alexios Mylonas
, Theo Tryfonas
:
A study on usability and security features of the Android pattern lock screen. 53-72 - Daniel Schatz

, Rabih Bashroush:
The impact of repeated data breach events on organisations' market value. 73-92 - Xiaoying Yu, Qi Liao:

User password repetitive patterns analysis and visualization. 93-115 - Amit Das

, Habib Ullah Khan
:
Security behaviors of smartphone users. 116-134
Volume 24, Number 2, 2016
- Steven Furnell

, Nathan Luke Clarke
:
Guest editorial. 138 - Adéle da Veiga

:
Comparing the information security culture of employees who had read the information security policy and those who had not: Illustrated through an empirical study. 139-151 - Kirsi Helkala

, Benjamin Knox, Øyvind Jøsok, Silje Knox, Mass Soldal Lund:
Factors to affect improvement in cyber officer performance. 152-163 - Timothy Kelley, Bennett I. Bertenthal:

Attention and past behavior, not security knowledge, modulate users' decisions to login to insecure websites. 164-176 - Rayne Reid, Johan Van Niekerk:

Decoding audience interpretations of awareness campaign messages. 177-193 - Teodor Sommestad, Henrik Karlzén, Peter Nilsson, Jonas Hallberg:

An empirical test of the perceived relationship between risk and the constituents severity and probability. 194-204 - Reza Alavi, Shareeful Islam, Haralambos Mouratidis:

An information security risk-driven investment model for analysing human factors. 205-227 - Malcolm Robert Pattinson, Kathryn Parsons, Marcus A. Butavicius, Agata McCormac, Dragana Calic:

Assessing information security attitudes: a comparison of two studies. 228-240
Volume 24, Number 3, 2016
- Artem Shumilov, Andrey Philippovich

:
Gesture-based animated CAPTCHA. 242-254 - Sarah Elizabeth Kennedy:

The pathway to security - mitigating user negligence. 255-264 - Wenjuan Li

, Weizhi Meng
:
Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks. 265-276 - Weizhi Meng

:
Evaluating the effect of multi-touch behaviours on Android unlock patterns. 277-287 - Armando Miraglia, Matteo Casenove:

Fight fire with fire: the ultimate active defence. 288-296
Volume 24, Number 4, 2016
- Abdelaziz Amara Korba, Mehdi Nafaa, Salim Ghanemi:

An efficient intrusion detection and prevention framework for ad hoc networks. 298-325 - Cong Hiep Pham

, Jamal El-Den
, Joan Richardson:
Stress-based security compliance model - an exploratory study. 326-347 - Anil Gurung

, M. K. Raja:
Online privacy and security concerns of consumers. 348-371 - Melanie Volkamer, Karen Renaud

, Paul Gerber:
Spot the phish by checking the pruned URL. 372-385 - Mahdi Nasrullah Al-Ameen, S. M. Taiabul Haque, Matthew K. Wright

:
Leveraging autobiographical memory for two-factor online authentication. 386-399 - Karen Renaud

, Stephen Flowerday
, Rosanne English
, Melanie Volkamer:
Why don't UK citizens protest against privacy-invading dragnet surveillance? 400-415
Volume 24, Number 5, 2016
- Fredrik Karlsson

, Ella Kolkowska, Frans Prenkert
:
Inter-organisational information security: a systematic literature review. 418-451 - Stefan Fenz, Stefanie Plieschnegger, Heidi Hobel:

Mapping information security standard ISO 27002 to an ontological structure. 452-473 - Mark A. Harris

, Amita Goyal Chin:
Consumer trust in Google's top developers' apps: an exploratory study. 474-495 - Wayne D. Kearney, Hennie A. Kruger

:
Theorising on risk homeostasis in the context of information security behaviour. 496-513 - Osama El-Temtamy, Munir Majdalawieh

, Lela Pumphrey:
Assessing IT disaster recovery plans: The case of publicly listed firms on Abu Dhabi/UAE security exchange. 514-533 - Eli Rohn, Gilad Sabari, Guy Leshem:

Explaining small business InfoSec posture using social theories. 534-556

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














