Stop the war!
Остановите войну!
for scientists:
default search action
Information and Computer Security, Volume 32
Volume 32, Number 1, 2024
- Hamid Reza Nikkhah, Varun Grover, Rajiv Sabherwal:
Post hoc security and privacy concerns in mobile apps: the moderating roles of mobile apps' features and providers. 1-37 - Martina Neri, Federico Niccolini, Luigi Martino:
Organizational cybersecurity readiness in the ICT sector: a quanti-qualitative assessment. 38-52 - Areej Alyami, David Sammon, Karen Neville, Carolanne Mahony:
Critical success factors for Security Education, Training and Awareness (SETA) programme effectiveness: an empirical comparison of practitioner perspectives. 53-73 - Manimay Dev, Debashis Saha:
Does e-government development moderate the impact of female labor participation on national cybersecurity maturity? An empirical investigation. 74-92 - Zainab Batool Rizvi, Chaudry Bilal Ahmad Khan, Michael O'Sullivan:
Analytical hierarchy process model for managing cloud security. 93-111 - Prasetyo Adi Wibowo Putro, Dana Indra Sensuse, Wahyu Setiawan Setiawan Wibowo:
Framework for critical information infrastructure protection in smart government: a case study in Indonesia. 112-129
Volume 32, Number 2, 2024
- Miguel Calvo, Marta Beltrán:
Applying the Goal, Question, Metric method to derive tailored dynamic cyber risk metrics. 133-158 - Shao-Fang Wen, Basel Katt:
Exploring the role of assurance context in system security assurance evaluation: a conceptual model. 159-178 - Peter Dornheim, Rüdiger Zarnekow:
Determining cybersecurity culture maturity and deriving verifiable improvement measures. 179-196 - Gregory Lyon:
Informational inequality: the role of resources and attributes in information security awareness. 197-217 - Herbert J. Mattord, Kathleen Kotwica, Michael E. Whitman, Evan Battaglia:
Organizational perspectives on converged security operations. 218-235 - Eylem Thron, Shamal Faily, Huseyin Dogan, Martin Freer:
Human factors and cyber-security risks on the railway - the critical role played by signalling operations. 236-263
Volume 32, Number 3, 2024
- Konstantinos Kalodanis, Panagiotis Rizomiliotis, Dimosthenis Anagnostopoulos:
European Artificial Intelligence Act: an AI security approach. 265-281 - Prakriti Dumaru, Ankit Shrestha, Rizu Paudel, Cassity Haverkamp, Maryellen Brunson McClain, Mahdi Nasrullah Al-Ameen:
"...I have my dad, sister, brother, and mom's password": unveiling users' mental models of security and privacy-preserving tools. 282-303 - Wei-Lee Lim, Uma Thevi Munikrishnan, Choi-Meng Leong, Lee-Chea Hiew, Mei-Wei Leong, Liu Yang:
Do you want a secure e-wallet? Understanding the role of risk and security in e-wallet continuance intention. 304-321 - Andreas Skalkos, Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis:
Exploring users' attitude towards privacy-preserving search engines: a protection motivation theory approach. 322-343 - Keshnee Padayachee:
An exploration of dark and light triad personality traits towards situational crime prevention and compliant information security behaviour. 344-364 - Arne Roar Nygård, Sokratis K. Katsikas:
Ethical hardware reverse engineering for securing the digital supply chain in critical infrastructure. 365-377 - Akmal Mirsadikov, Ali Vedadi, Kent Marett:
Detecting deception in computer-mediated communication: the role of popularity information across media types. 378-401
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.