


default search action
Information and Computer Security, Volume 31
Volume 31, Number 1, 2023
- Lily Pharris, Begona Perez-Mira:

Preventing social engineering: a phenomenological inquiry. 1-31 - Kristina Gyllensten, Marianne Törner, Anders Pousette:

The impact of psychosocial working conditions on information security behaviour in the nuclear industry. 32-50 - Adrian Ford, Ameer Al-Nemrat, Seyed Ali Ghorashi

, Julia Claire Davidson:
The impact of GDPR infringement fines on the market value of firms. 51-64 - Ramaraj Palanisamy, Yi Shi:

Users' attitude on perceived security of mobile cloud computing: empirical evidence from SME users in China. 65-87 - Aamna Tariq, Jawad Manzoor

, Muhammad Ammar Aziz, Zain Ul Abideen Tariq, Ammar Masood:
Open source SIEM solutions for an enterprise. 88-107 - Anne Fortin, Sylvie Héroux:

Limited usefulness of firm-provided cybersecurity information in institutional investors' investment analysis. 108-123
Volume 31, Number 2, 2023
- Thomas M. Tegethoff

, Ricardo Santa, Glaucya Daú, Jimy Cortes:
Online security in e-government as an antecedent of cost-effectiveness and quality in business operations. 125-144 - Haritha P. H.

:
Mobile payment service adoption: understanding customers for an application of emerging financial technology. 145-171 - Cynthia K. Riemenschneider, Laurie L. Burney, Saman Bina

:
The influence of organizational values on employee attitude and information security behavior: the mediating role of psychological capital. 172-198 - Tianhao Xu, Prashanth Rajivan:

Determining psycholinguistic features of deception in phishing messages. 199-220 - Kiara Jordan Butler, Irwin Brown

:
COVID-19 pandemic-induced organisational cultural shifts and employee information security compliance behaviour: a South African case study. 221-243 - Alireza Shojaifar, Samuel A. Fricker:

Design and evaluation of a self-paced cybersecurity tool. 244-262
Volume 31, Number 3, 2023
- Nathan L. Clarke

, Steven Furnell:
Editorial: Human aspects of cyber security. 265-266 - Anusha Bhana, Jacques Ophoff

:
Risk homeostasis and security fatigue: a case study of data specialists. 267-280 - Adéle da Veiga:

A model for information security culture with creativity and innovation as enablers - refined with an expert panel. 281-303 - Gunnar Lindqvist, Joakim Kävrestad:

How privacy concerns impact Swedish citizens' willingness to report crimes: a quantitative mobile phone survey. 304-315 - Magdalena Glas

, Manfred Vielberth
, Tobias Reittinger
, Fabian Böhm
, Günther Pernul
:
Improving cybersecurity skill development through visual programming. 316-330 - Elham Rostami, Fredrik Karlsson

, Shang Gao
:
Policy components - a conceptual model for modularizing and tailoring of information security policies. 331-352 - Aleatha Shanley, Mike Johnstone, Patryk Szewczyk, Michael Crowley:

An exploration of Australian attitudes towards privacy. 353-367 - Chola Chhetri

, Vivian Genaro Motti
:
Enhancing the design of data-related privacy controls for smart home devices. 368-384
Volume 31, Number 4, 2023
- Katherine Taken Smith, Lawrence Murphy Smith, Marcus Burger, Erik S. Boyle

:
Cyber terrorism cases and stock market valuation effects. 385-403 - Giddeon Njamngang Angafor, Iryna Yevseyeva, Leandros Maglaras

:
Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise. 404-426 - Hui Na Chua, Vi Vien Khor, Siew Fan Wong:

Examining the effect of different knowledge aspects on information security awareness. 427-448 - Simon Andersson

:
Problems in information classification: insights from practice. 449-462 - Kristian Kannelønning, Sokratis K. Katsikas:

A systematic literature review of how cybersecurity-related behavior has been assessed. 463-477 - Alain Tambe Ebot:

Advance fee fraud scammers' criminal expertise and deceptive strategies: a qualitative case study. 478-503 - Noman H. Chowdhury, Marc T. P. Adam, Timm Teubner:

Rushing for security: a document analysis on the sources and effects of time pressure on organizational cybersecurity. 504-526
Volume 31, Number 5, 2023
- Khalid Shaheen, Ali Hussein Zolait

:
The impacts of the cyber-trust program on the cybersecurity maturity of government entities in the Kingdom of Bahrain. 529-544 - N'guessan Yves-Roland Douha

, Karen Renaud
, Yuzo Taenaka, Youki Kadobayashi:
Smart home cybersecurity awareness and behavioral incentives. 545-575 - Pintu Shah

, Anuja Agarwal
:
Cyber Suraksha: a card game for smartphone security awareness. 576-600 - Ruti Gafni

, Yair Levy:
Experts' feedback on the cybersecurity footprint elements: in pursuit of a quantifiable measure of SMBs' cybersecurity posture. 601-623 - Stephen Mujeye:

An analysis of differences in behaviors and practices of security-conscious users and regular users on mobile devices. 624-634 - Ishtiaq Ahmad Bajwa

, Shabir Ahmad, Maqsood Mahmud
, Farooq Ahmad Bajwa:
The impact of cyberattacks awareness on customers' trust and commitment: an empirical evidence from the Pakistani banking sector. 635-654 - Richard G. Mathieu, Alan E. Turovlin:

Lost in the middle - a pragmatic approach for ERP managers to prioritize known vulnerabilities by applying classification and regression trees (CART). 655-674

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














