


default search action
Information and Computer Security, Volume 25
Volume 25, Number 1, 2017
- Alessandro Aldini

, Jean-Marc Seigneur
, Carlos Ballester Lafuente, Xavier Titi, Jonathan Guislain:
Design and validation of a trust-based opportunity-enabled risk management system. 2-25 - Rossouw von Solms, Melanie Willett:

Cloud computing assurance - a review of literature guidance. 26-46 - Hannes Holm

, Teodor Sommestad:
So long, and thanks for only using readily available scripts. 47-61 - Nikolaos Polatidis

, Christos K. Georgiadis
, Elias Pimenidis, Emmanouil Stiakakis:
Privacy-preserving recommendations in context-aware mobile environments. 62-79 - Kristen K. Greene, Yee-Yin Choong:

Must I, can I? I don't understand your ambiguous password rules. 80-99 - Aggelos Kiayias, Thomas Zacharias

, Bingsheng Zhang
:
Auditing for privacy in threshold PKE e-voting. 100-116
Volume 25, Number 2, 2017
- Lena Yuryna Connolly

, Michael Lang
, John Gathegi, J. Doug Tygar:
Organisational culture, procedural countermeasures, and employee security behaviour: A qualitative study. 118-136 - Peter Mayer

, Nina Gerber
, Ronja McDermott, Melanie Volkamer, Joachim Vogt:
Productivity vs security: mitigating conflicting goals in organizations. 137-151 - Dirk Snyman

, Hennie A. Kruger
:
The application of behavioural thresholds to analyse collective behaviour in information security. 152-164 - Jurjen Jansen, Paul van Schaik:

Comparing three models to explain precautionary online behavioural intentions. 165-180 - Malcolm Robert Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Dragana Calic:

Managing information security awareness at an Australian bank: a comparative study. 181-189 - Prashanth Rajivan, Pablo Moriano

, Timothy Kelley, L. Jean Camp:
Factors in an end user security expertise instrument. 190-205 - Peter Schaab, Kristian Beckers, Sebastian Pape

:
Social engineering defence mechanisms and counteracting training strategies. 206-222
Volume 25, Number 3, 2017
- Jesse Kaukola, Jukka Ruohonen

, Antti Tuomisto
, Sami Hyrynsalmi
, Ville Leppänen
:
Tightroping between APT and BCI in small enterprises. 226-239 - Noluxolo Gcaza, Rossouw von Solms, Marthie Grobler

, Joey Jansen van Vuuren:
A general morphological analysis: delineating a cyber-security culture. 259-278 - Fredrik Karlsson

, Martin Karlsson
, Joachim Åström:
Measuring employees' compliance - the importance of value pluralism. 279-299 - Erastus Karanja:

The role of the chief information security officer in the management of IT security. 300-329 - Hao Chen

, Wenli Li:
Mobile device users' privacy security assurance behavior: A technology threat avoidance perspective. 330-344 - Adrian Munteanu

:
Running the risk IT - more perception and less probabilities in uncertain systems. 345-354
Volume 25, Number 4, 2017
- Nicholas Charles Patterson

, Michael Hobbs, Tianqing Zhu:
A cyber-threat analytic model for autonomous detection of virtual property theft. 358-381 - Argha Ray, Anjali Kaushik:

State transgression on electronic expression: is it for real? 382-401 - Rogier Woltjer

:
Workarounds and trade-offs in information security - an exploratory study. 402-420 - Salvatore Aurigemma, Thomas Mattson:

Deterrence and punishment experience impacts on ISP compliance attitudes. 421-436 - Jeremiah D. Still

, Ashley A. Cain, David Schuster
:
Human-centered authentication guidelines. 437-453 - Jacqueline Cope, François Siewe, Feng Chen, Leandros A. Maglaras

, Helge Janicke
:
On data leakage from non-production systems. 454-474 - Abubakar Garba Bello, David Murray

, Jocelyn Armarego:
A systematic approach to investigating how information security and privacy can be achieved in BYOD environments. 475-492
Volume 25, Number 5, 2017
- Harrison Stewart

, Jan Jürjens:
Information security management and the human aspect in organizations. 494-534 - Hamed Taherdoost

:
Understanding of e-service security dimensions and its effect on quality and intention to use. 535-559 - Joyce Hoese Addae, Michael A. Brown, Xu Sun

, Dave Towey
, Milena Radenkovic
:
Measuring attitude towards personal data for adaptive cybersecurity. 560-579 - Dmitriy V. Chulkov

:
Escalation of commitment and information security: theories and implications. 580-592 - Jan-Willem Bullee

, Lorena Montoya
, Marianne Junger, Pieter H. Hartel:
Spear phishing in organisations explained. 593-613 - Christos Kalloniatis:

Incorporating privacy in the design of cloud-based systems: a conceptual meta-model. 614-633 - Takahiko Kajiyama, Murray E. Jennex

, Theophilus B. A. Addo:
To cloud or not to cloud: how risks and threats are affecting cloud adoption decisions. 634-659

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














