


default search action
Information and Computer Security, Volume 32
Volume 32, Number 1, 2024
- Hamid Reza Nikkhah, Varun Grover, Rajiv Sabherwal:

Post hoc security and privacy concerns in mobile apps: the moderating roles of mobile apps' features and providers. 1-37 - Martina Neri

, Federico Niccolini, Luigi Martino
:
Organizational cybersecurity readiness in the ICT sector: a quanti-qualitative assessment. 38-52 - Areej Alyami, David Sammon

, Karen Neville, Carolanne Mahony
:
Critical success factors for Security Education, Training and Awareness (SETA) programme effectiveness: an empirical comparison of practitioner perspectives. 53-73 - Manimay Dev, Debashis Saha

:
Does e-government development moderate the impact of female labor participation on national cybersecurity maturity? An empirical investigation. 74-92 - Zainab Batool Rizvi, Chaudry Bilal Ahmad Khan, Michael O'Sullivan:

Analytical hierarchy process model for managing cloud security. 93-111 - Prasetyo Adi Wibowo Putro

, Dana Indra Sensuse, Wahyu Setiawan Setiawan Wibowo
:
Framework for critical information infrastructure protection in smart government: a case study in Indonesia. 112-129
Volume 32, Number 2, 2024
- Miguel Calvo, Marta Beltrán:

Applying the Goal, Question, Metric method to derive tailored dynamic cyber risk metrics. 133-158 - Shao-Fang Wen, Basel Katt:

Exploring the role of assurance context in system security assurance evaluation: a conceptual model. 159-178 - Peter Dornheim

, Rüdiger Zarnekow:
Determining cybersecurity culture maturity and deriving verifiable improvement measures. 179-196 - Gregory Lyon:

Informational inequality: the role of resources and attributes in information security awareness. 197-217 - Herbert J. Mattord

, Kathleen Kotwica, Michael E. Whitman, Evan Battaglia:
Organizational perspectives on converged security operations. 218-235 - Eylem Thron, Shamal Faily, Huseyin Dogan, Martin Freer:

Human factors and cyber-security risks on the railway - the critical role played by signalling operations. 236-263
Volume 32, Number 3, 2024
- Konstantinos Kalodanis

, Panagiotis Rizomiliotis, Dimosthenis Anagnostopoulos:
European Artificial Intelligence Act: an AI security approach. 265-281 - Prakriti Dumaru, Ankit Shrestha, Rizu Paudel, Cassity Haverkamp, Maryellen Brunson McClain, Mahdi Nasrullah Al-Ameen:

"...I have my dad, sister, brother, and mom's password": unveiling users' mental models of security and privacy-preserving tools. 282-303 - Wei-Lee Lim, Uma Thevi Munikrishnan, Choi-Meng Leong, Lee-Chea Hiew

, Mei-Wei Leong, Liu Yang:
Do you want a secure e-wallet? Understanding the role of risk and security in e-wallet continuance intention. 304-321 - Andreas Skalkos

, Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis:
Exploring users' attitude towards privacy-preserving search engines: a protection motivation theory approach. 322-343 - Keshnee Padayachee:

An exploration of dark and light triad personality traits towards situational crime prevention and compliant information security behaviour. 344-364 - Arne Roar Nygård, Sokratis K. Katsikas:

Ethical hardware reverse engineering for securing the digital supply chain in critical infrastructure. 365-377 - Akmal Mirsadikov, Ali Vedadi, Kent Marett:

Detecting deception in computer-mediated communication: the role of popularity information across media types. 378-401
Volume 32, Number 4, 2024
- Nathan L. Clarke

, Steven Furnell:
Editorial: Human aspects of cyber security. 405-406 - David Hedberg, Martin Lundgren, Marcus Nohlberg:

Cybersecurity in modern cars: awareness and readiness of auto workshops. 407-419 - Rufai Ahmad, Sotirios Terzis

, Karen Renaud
:
Getting users to click: a content analysis of phishers' tactics and techniques in mobile instant messaging phishing. 420-435 - Tim Wright, Zainab Ruhwanya

, Jacques Ophoff
:
Using the theory of interpersonal behaviour to explain employees' cybercrime preventative behaviour during the pandemic. 436-458 - Marcus Gerdin, Ella Kolkowska, Åke Grönlund

:
What goes around comes around: an in-depth analysis of how respondents interpret ISP non-/compliance questionnaire items. 459-476 - Andrew Reeves

, Malcolm Pattinson, Marcus A. Butavicius:
The sleepless sentinel: factors that predict burnout and sleep quality in cybersecurity professionals. 477-491 - Elham Rostami, Fredrik Karlsson

:
Qualitative content analysis of actionable advice in information security policies - introducing the keyword loss of specificity metric. 492-508 - Monica T. Whitty

, Christopher Ruddy
, David A. Keatley
, Marcus A. Butavicius, Marthie Grobler
:
The prince of insiders: a multiple pathway approach to understanding IP theft insider attacks. 509-522 - Eliana Stavrou, Andriani Piki:

Cultivating self-efficacy to empower professionals' re-up skilling in cybersecurity. 523-541
Volume 32, Number 5, 2024
- Hao Chen

, Yuge Hai:
Exploring the critical success factors of information security management: a mixed-method approach. 545-572 - Joshua Nterful

, Ibrahim Osman Adam, Muftawu Dzang Alhassan, Abdallah Abdul-Salam, Abubakar Gbambegu Umar:
An assessment of critical success factors in information security implementation in organizations in Ghana. 573-597 - Binh Huu Nguyen, Huong Nguyen Quynh Le:

Investigation on information security awareness based on KAB model: the moderating role of age and education level. 598-612 - Amir Schreiber

, Ilan Schreiber
:
Bridging knowledge gap: the contribution of employees' awareness of AI cyber risks comprehensive program to reducing emerging AI digital threats. 613-635 - Chen Zhong, Hong Liu, Hwee-Joo Kam:

Mining Reddit users' perspectives on cybersecurity competitions: a mixed method approach. 636-655 - Morné Owen, Stephen V. Flowerday, Karl van der Schyff

:
Optimism bias in susceptibility to phishing attacks: an empirical study. 656-675 - Ian Slesinger

, Niki Panteli
, Lizzie Coles-Kemp:
Regulating digital security by design? Implications of the perspectives from DSbD programme stakeholders. 676-690 - Rodney Adriko

, Jason R. C. Nurse:
Cybersecurity, cyber insurance and small-to-medium-sized enterprises: a systematic Review. 691-710 - Ruti Gafni

, Yair Levy:
The role of artificial intelligence (AI) in improving technical and managerial cybersecurity tasks' efficiency. 711-728 - Marcel Spruit, Deborah Oosting, Celine Kreffer:

Factors that influence secure behaviour while using mobile digital devices. 729-747

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














