


Остановите войну!
for scientists:


default search action
Information and Computer Security, Volume 24
Volume 24, Number 1, 2016
- Aimilia Tasidou, Pavlos S. Efraimidis, Yannis Soupionis, Lilian Mitrou, Vasilios Katos
:
Privacy-preserving, user-centric VoIP CAPTCHA challenges: An integrated solution in the SIP environment. 2-19 - Maria Bartnes Line, Eirik Albrechtsen:
Examining the suitability of industrial safety management approaches for information security incident management. 20-37 - Kosmas Pipyros, Lilian Mitrou, Dimitris Gritzalis, Theodoros K. Apostolopoulos:
Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare. 38-52 - Panagiotis Andriotis
, George C. Oikonomou
, Alexios Mylonas
, Theo Tryfonas
:
A study on usability and security features of the Android pattern lock screen. 53-72 - Daniel Schatz
, Rabih Bashroush:
The impact of repeated data breach events on organisations' market value. 73-92 - Xiaoying Yu, Qi Liao:
User password repetitive patterns analysis and visualization. 93-115 - Amit Das
, Habib Ullah Khan
:
Security behaviors of smartphone users. 116-134
Volume 24, Number 2, 2016
- Steven Furnell
, Nathan Luke Clarke
:
Guest editorial. 138 - Adéle da Veiga
:
Comparing the information security culture of employees who had read the information security policy and those who had not: Illustrated through an empirical study. 139-151 - Kirsi Helkala
, Benjamin Knox, Øyvind Jøsok, Silje Knox, Mass Soldal Lund:
Factors to affect improvement in cyber officer performance. 152-163 - Timothy Kelley, Bennett I. Bertenthal:
Attention and past behavior, not security knowledge, modulate users' decisions to login to insecure websites. 164-176 - Rayne Reid, Johan Van Niekerk:
Decoding audience interpretations of awareness campaign messages. 177-193 - Teodor Sommestad, Henrik Karlzén, Peter Nilsson, Jonas Hallberg:
An empirical test of the perceived relationship between risk and the constituents severity and probability. 194-204 - Reza Alavi, Shareeful Islam, Haralambos Mouratidis:
An information security risk-driven investment model for analysing human factors. 205-227 - Malcolm Robert Pattinson, Kathryn Parsons, Marcus A. Butavicius, Agata McCormac, Dragana Calic:
Assessing information security attitudes: a comparison of two studies. 228-240
Volume 24, Number 3, 2016
- Artem Shumilov, Andrey Philippovich
:
Gesture-based animated CAPTCHA. 242-254 - Sarah Elizabeth Kennedy:
The pathway to security - mitigating user negligence. 255-264 - Wenjuan Li
, Weizhi Meng
:
Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks. 265-276 - Weizhi Meng
:
Evaluating the effect of multi-touch behaviours on Android unlock patterns. 277-287 - Armando Miraglia, Matteo Casenove:
Fight fire with fire: the ultimate active defence. 288-296
Volume 24, Number 4, 2016
- Abdelaziz Amara Korba, Mehdi Nafaa, Salim Ghanemi:
An efficient intrusion detection and prevention framework for ad hoc networks. 298-325 - Cong Hiep Pham, Jamal El-Den
, Joan Richardson:
Stress-based security compliance model - an exploratory study. 326-347 - Anil Gurung
, M. K. Raja:
Online privacy and security concerns of consumers. 348-371 - Melanie Volkamer, Karen Renaud
, Paul Gerber:
Spot the phish by checking the pruned URL. 372-385 - Mahdi Nasrullah Al-Ameen, S. M. Taiabul Haque, Matthew K. Wright
:
Leveraging autobiographical memory for two-factor online authentication. 386-399 - Karen Renaud
, Stephen Flowerday
, Rosanne English, Melanie Volkamer:
Why don't UK citizens protest against privacy-invading dragnet surveillance? 400-415
Volume 24, Number 5, 2016
- Fredrik Karlsson, Ella Kolkowska, Frans Prenkert
:
Inter-organisational information security: a systematic literature review. 418-451 - Stefan Fenz, Stefanie Plieschnegger, Heidi Hobel:
Mapping information security standard ISO 27002 to an ontological structure. 452-473 - Mark A. Harris, Amita Goyal Chin:
Consumer trust in Google's top developers' apps: an exploratory study. 474-495 - Wayne D. Kearney, Hennie A. Kruger:
Theorising on risk homeostasis in the context of information security behaviour. 496-513 - Osama El-Temtamy, Munir Majdalawieh
, Lela Pumphrey:
Assessing IT disaster recovery plans: The case of publicly listed firms on Abu Dhabi/UAE security exchange. 514-533 - Eli Rohn, Gilad Sabari, Guy Leshem:
Explaining small business InfoSec posture using social theories. 534-556

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.