Search dblp for Publications

export results for "stream:streams/journals/imcs:"

 download as .bib file

@article{DBLP:journals/imcs/AlyamiSNM24,
  author       = {Areej Alyami and
                  David Sammon and
                  Karen Neville and
                  Carolanne Mahony},
  title        = {Critical success factors for Security Education, Training and Awareness
                  {(SETA)} programme effectiveness: an empirical comparison of practitioner
                  perspectives},
  journal      = {Inf. Comput. Secur.},
  volume       = {32},
  number       = {1},
  pages        = {53--73},
  year         = {2024},
  url          = {https://doi.org/10.1108/ICS-08-2022-0133},
  doi          = {10.1108/ICS-08-2022-0133},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AlyamiSNM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/CalvoB24,
  author       = {Miguel Calvo and
                  Marta Beltr{\'{a}}n},
  title        = {Applying the Goal, Question, Metric method to derive tailored dynamic
                  cyber risk metrics},
  journal      = {Inf. Comput. Secur.},
  volume       = {32},
  number       = {2},
  pages        = {133--158},
  year         = {2024},
  url          = {https://doi.org/10.1108/ICS-03-2023-0043},
  doi          = {10.1108/ICS-03-2023-0043},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/CalvoB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DevS24,
  author       = {Manimay Dev and
                  Debashis Saha},
  title        = {Does e-government development moderate the impact of female labor
                  participation on national cybersecurity maturity? An empirical investigation},
  journal      = {Inf. Comput. Secur.},
  volume       = {32},
  number       = {1},
  pages        = {74--92},
  year         = {2024},
  url          = {https://doi.org/10.1108/ICS-03-2023-0042},
  doi          = {10.1108/ICS-03-2023-0042},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/DevS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DornheimZ24,
  author       = {Peter Dornheim and
                  R{\"{u}}diger Zarnekow},
  title        = {Determining cybersecurity culture maturity and deriving verifiable
                  improvement measures},
  journal      = {Inf. Comput. Secur.},
  volume       = {32},
  number       = {2},
  pages        = {179--196},
  year         = {2024},
  url          = {https://doi.org/10.1108/ICS-07-2023-0116},
  doi          = {10.1108/ICS-07-2023-0116},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DornheimZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Lyon24,
  author       = {Gregory Lyon},
  title        = {Informational inequality: the role of resources and attributes in
                  information security awareness},
  journal      = {Inf. Comput. Secur.},
  volume       = {32},
  number       = {2},
  pages        = {197--217},
  year         = {2024},
  url          = {https://doi.org/10.1108/ICS-04-2023-0063},
  doi          = {10.1108/ICS-04-2023-0063},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Lyon24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MattordKWB24,
  author       = {Herbert J. Mattord and
                  Kathleen Kotwica and
                  Michael E. Whitman and
                  Evan Battaglia},
  title        = {Organizational perspectives on converged security operations},
  journal      = {Inf. Comput. Secur.},
  volume       = {32},
  number       = {2},
  pages        = {218--235},
  year         = {2024},
  url          = {https://doi.org/10.1108/ICS-03-2023-0029},
  doi          = {10.1108/ICS-03-2023-0029},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MattordKWB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/NeriNM24,
  author       = {Martina Neri and
                  Federico Niccolini and
                  Luigi Martino},
  title        = {Organizational cybersecurity readiness in the {ICT} sector: a quanti-qualitative
                  assessment},
  journal      = {Inf. Comput. Secur.},
  volume       = {32},
  number       = {1},
  pages        = {38--52},
  year         = {2024},
  url          = {https://doi.org/10.1108/ICS-05-2023-0084},
  doi          = {10.1108/ICS-05-2023-0084},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/NeriNM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/NikkhahGS24,
  author       = {Hamid Reza Nikkhah and
                  Varun Grover and
                  Rajiv Sabherwal},
  title        = {Post hoc security and privacy concerns in mobile apps: the moderating
                  roles of mobile apps' features and providers},
  journal      = {Inf. Comput. Secur.},
  volume       = {32},
  number       = {1},
  pages        = {1--37},
  year         = {2024},
  url          = {https://doi.org/10.1108/ICS-02-2023-0015},
  doi          = {10.1108/ICS-02-2023-0015},
  timestamp    = {Sun, 25 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/NikkhahGS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PutroSW24,
  author       = {Prasetyo Adi Wibowo Putro and
                  Dana Indra Sensuse and
                  Wahyu Setiawan Setiawan Wibowo},
  title        = {Framework for critical information infrastructure protection in smart
                  government: a case study in Indonesia},
  journal      = {Inf. Comput. Secur.},
  volume       = {32},
  number       = {1},
  pages        = {112--129},
  year         = {2024},
  url          = {https://doi.org/10.1108/ICS-03-2023-0031},
  doi          = {10.1108/ICS-03-2023-0031},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PutroSW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RizviKO24,
  author       = {Zainab Batool Rizvi and
                  Chaudry Bilal Ahmad Khan and
                  Michael O'Sullivan},
  title        = {Analytical hierarchy process model for managing cloud security},
  journal      = {Inf. Comput. Secur.},
  volume       = {32},
  number       = {1},
  pages        = {93--111},
  year         = {2024},
  url          = {https://doi.org/10.1108/ICS-07-2022-0121},
  doi          = {10.1108/ICS-07-2022-0121},
  timestamp    = {Sun, 25 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/RizviKO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ThronFDF24,
  author       = {Eylem Thron and
                  Shamal Faily and
                  Huseyin Dogan and
                  Martin Freer},
  title        = {Human factors and cyber-security risks on the railway - the critical
                  role played by signalling operations},
  journal      = {Inf. Comput. Secur.},
  volume       = {32},
  number       = {2},
  pages        = {236--263},
  year         = {2024},
  url          = {https://doi.org/10.1108/ICS-05-2023-0078},
  doi          = {10.1108/ICS-05-2023-0078},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ThronFDF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/WenK24,
  author       = {Shao{-}Fang Wen and
                  Basel Katt},
  title        = {Exploring the role of assurance context in system security assurance
                  evaluation: a conceptual model},
  journal      = {Inf. Comput. Secur.},
  volume       = {32},
  number       = {2},
  pages        = {159--178},
  year         = {2024},
  url          = {https://doi.org/10.1108/ICS-06-2023-0101},
  doi          = {10.1108/ICS-06-2023-0101},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/WenK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Andersson23,
  author       = {Simon Andersson},
  title        = {Problems in information classification: insights from practice},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {4},
  pages        = {449--462},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-10-2022-0163},
  doi          = {10.1108/ICS-10-2022-0163},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/Andersson23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AngaforYM23,
  author       = {Giddeon Njamngang Angafor and
                  Iryna Yevseyeva and
                  Leandros Maglaras},
  title        = {Scenario-based incident response training: lessons learnt from conducting
                  an experiential learning virtual incident response tabletop exercise},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {4},
  pages        = {404--426},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-05-2022-0085},
  doi          = {10.1108/ICS-05-2022-0085},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/AngaforYM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BajwaAMB23,
  author       = {Ishtiaq Ahmad Bajwa and
                  Shabir Ahmad and
                  Maqsood Mahmud and
                  Farooq Ahmad Bajwa},
  title        = {The impact of cyberattacks awareness on customers' trust and commitment:
                  an empirical evidence from the Pakistani banking sector},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {635--654},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-11-2022-0179},
  doi          = {10.1108/ICS-11-2022-0179},
  timestamp    = {Wed, 20 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/BajwaAMB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BhanaO23,
  author       = {Anusha Bhana and
                  Jacques Ophoff},
  title        = {Risk homeostasis and security fatigue: a case study of data specialists},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {3},
  pages        = {267--280},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-11-2022-0172},
  doi          = {10.1108/ICS-11-2022-0172},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BhanaO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ButlerB23,
  author       = {Kiara Jordan Butler and
                  Irwin Brown},
  title        = {{COVID-19} pandemic-induced organisational cultural shifts and employee
                  information security compliance behaviour: a South African case study},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {2},
  pages        = {221--243},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-09-2022-0152},
  doi          = {10.1108/ICS-09-2022-0152},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ButlerB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChhetriM23,
  author       = {Chola Chhetri and
                  Vivian Genaro Motti},
  title        = {Enhancing the design of data-related privacy controls for smart home
                  devices},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {3},
  pages        = {368--384},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-11-2022-0173},
  doi          = {10.1108/ICS-11-2022-0173},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/ChhetriM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChowdhuryAT23,
  author       = {Noman H. Chowdhury and
                  Marc T. P. Adam and
                  Timm Teubner},
  title        = {Rushing for security: a document analysis on the sources and effects
                  of time pressure on organizational cybersecurity},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {4},
  pages        = {504--526},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-01-2021-0013},
  doi          = {10.1108/ICS-01-2021-0013},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/ChowdhuryAT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChuaKW23,
  author       = {Hui Na Chua and
                  Vi Vien Khor and
                  Siew Fan Wong},
  title        = {Examining the effect of different knowledge aspects on information
                  security awareness},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {4},
  pages        = {427--448},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-11-2022-0183},
  doi          = {10.1108/ICS-11-2022-0183},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/ChuaKW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ClarkeF23,
  author       = {Nathan L. Clarke and
                  Steven Furnell},
  title        = {Editorial: Human aspects of cyber security},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {3},
  pages        = {265--266},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-07-2023-213},
  doi          = {10.1108/ICS-07-2023-213},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ClarkeF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DouhaRTK23,
  author       = {N'guessan Yves{-}Roland Douha and
                  Karen Renaud and
                  Yuzo Taenaka and
                  Youki Kadobayashi},
  title        = {Smart home cybersecurity awareness and behavioral incentives},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {545--575},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-03-2023-0032},
  doi          = {10.1108/ICS-03-2023-0032},
  timestamp    = {Wed, 20 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/DouhaRTK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ebot23,
  author       = {Alain Tambe Ebot},
  title        = {Advance fee fraud scammers' criminal expertise and deceptive strategies:
                  a qualitative case study},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {4},
  pages        = {478--503},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-01-2022-0007},
  doi          = {10.1108/ICS-01-2022-0007},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/Ebot23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FordAGD23,
  author       = {Adrian Ford and
                  Ameer Al{-}Nemrat and
                  Seyed Ali Ghorashi and
                  Julia Claire Davidson},
  title        = {The impact of {GDPR} infringement fines on the market value of firms},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {1},
  pages        = {51--64},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-03-2022-0049},
  doi          = {10.1108/ICS-03-2022-0049},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FordAGD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FortinH23,
  author       = {Anne Fortin and
                  Sylvie H{\'{e}}roux},
  title        = {Limited usefulness of firm-provided cybersecurity information in institutional
                  investors' investment analysis},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {1},
  pages        = {108--123},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-07-2022-0122},
  doi          = {10.1108/ICS-07-2022-0122},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FortinH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GafniL23,
  author       = {Ruti Gafni and
                  Yair Levy},
  title        = {Experts' feedback on the cybersecurity footprint elements: in pursuit
                  of a quantifiable measure of SMBs' cybersecurity posture},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {601--623},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-05-2023-0083},
  doi          = {10.1108/ICS-05-2023-0083},
  timestamp    = {Wed, 20 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/GafniL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GlasVRBP23,
  author       = {Magdalena Glas and
                  Manfred Vielberth and
                  Tobias Reittinger and
                  Fabian B{\"{o}}hm and
                  G{\"{u}}nther Pernul},
  title        = {Improving cybersecurity skill development through visual programming},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {3},
  pages        = {316--330},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-11-2022-0170},
  doi          = {10.1108/ICS-11-2022-0170},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GlasVRBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GyllenstenTP23,
  author       = {Kristina Gyllensten and
                  Marianne T{\"{o}}rner and
                  Anders Pousette},
  title        = {The impact of psychosocial working conditions on information security
                  behaviour in the nuclear industry},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {1},
  pages        = {32--50},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-05-2022-0089},
  doi          = {10.1108/ICS-05-2022-0089},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GyllenstenTP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/H23,
  author       = {Haritha P. H.},
  title        = {Mobile payment service adoption: understanding customers for an application
                  of emerging financial technology},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {2},
  pages        = {145--171},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-04-2022-0058},
  doi          = {10.1108/ICS-04-2022-0058},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/H23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KannelonningK23,
  author       = {Kristian Kannel{\o}nning and
                  Sokratis K. Katsikas},
  title        = {A systematic literature review of how cybersecurity-related behavior
                  has been assessed},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {4},
  pages        = {463--477},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-08-2022-0139},
  doi          = {10.1108/ICS-08-2022-0139},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/KannelonningK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LindqvistK23,
  author       = {Gunnar Lindqvist and
                  Joakim K{\"{a}}vrestad},
  title        = {How privacy concerns impact Swedish citizens' willingness to report
                  crimes: a quantitative mobile phone survey},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {3},
  pages        = {304--315},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-10-2022-0167},
  doi          = {10.1108/ICS-10-2022-0167},
  timestamp    = {Fri, 14 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LindqvistK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MathieuT23,
  author       = {Richard G. Mathieu and
                  Alan E. Turovlin},
  title        = {Lost in the middle - a pragmatic approach for {ERP} managers to prioritize
                  known vulnerabilities by applying classification and regression trees
                  {(CART)}},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {655--674},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-02-2023-0027},
  doi          = {10.1108/ICS-02-2023-0027},
  timestamp    = {Wed, 20 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/MathieuT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Mujeye23,
  author       = {Stephen Mujeye},
  title        = {An analysis of differences in behaviors and practices of security-conscious
                  users and regular users on mobile devices},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {624--634},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-05-2023-0086},
  doi          = {10.1108/ICS-05-2023-0086},
  timestamp    = {Wed, 20 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/Mujeye23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PalanisamyS23,
  author       = {Ramaraj Palanisamy and
                  Yi Shi},
  title        = {Users' attitude on perceived security of mobile cloud computing: empirical
                  evidence from {SME} users in China},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {1},
  pages        = {65--87},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-03-2022-0048},
  doi          = {10.1108/ICS-03-2022-0048},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PalanisamyS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PharrisP23,
  author       = {Lily Pharris and
                  Begona Perez{-}Mira},
  title        = {Preventing social engineering: a phenomenological inquiry},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {1},
  pages        = {1--31},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-09-2021-0137},
  doi          = {10.1108/ICS-09-2021-0137},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PharrisP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RiemenschneiderBB23,
  author       = {Cynthia K. Riemenschneider and
                  Laurie L. Burney and
                  Saman Bina},
  title        = {The influence of organizational values on employee attitude and information
                  security behavior: the mediating role of psychological capital},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {2},
  pages        = {172--198},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-10-2022-0156},
  doi          = {10.1108/ICS-10-2022-0156},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RiemenschneiderBB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RostamiKG23,
  author       = {Elham Rostami and
                  Fredrik Karlsson and
                  Shang Gao},
  title        = {Policy components - a conceptual model for modularizing and tailoring
                  of information security policies},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {3},
  pages        = {331--352},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-10-2022-0160},
  doi          = {10.1108/ICS-10-2022-0160},
  timestamp    = {Fri, 14 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RostamiKG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ShahA23,
  author       = {Pintu Shah and
                  Anuja Agarwal},
  title        = {Cyber Suraksha: a card game for smartphone security awareness},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {576--600},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-05-2022-0087},
  doi          = {10.1108/ICS-05-2022-0087},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/ShahA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ShaheenZ23,
  author       = {Khalid Shaheen and
                  Ali Hussein Zolait},
  title        = {The impacts of the cyber-trust program on the cybersecurity maturity
                  of government entities in the Kingdom of Bahrain},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {529--544},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-06-2022-0108},
  doi          = {10.1108/ICS-06-2022-0108},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/ShaheenZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ShanleyJSC23,
  author       = {Aleatha Shanley and
                  Mike Johnstone and
                  Patryk Szewczyk and
                  Michael Crowley},
  title        = {An exploration of Australian attitudes towards privacy},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {3},
  pages        = {353--367},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-11-2022-0171},
  doi          = {10.1108/ICS-11-2022-0171},
  timestamp    = {Fri, 14 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ShanleyJSC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ShojaifarF23,
  author       = {Alireza Shojaifar and
                  Samuel A. Fricker},
  title        = {Design and evaluation of a self-paced cybersecurity tool},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {2},
  pages        = {244--262},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-09-2021-0145},
  doi          = {10.1108/ICS-09-2021-0145},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ShojaifarF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SmithSBB23,
  author       = {Katherine Taken Smith and
                  Lawrence Murphy Smith and
                  Marcus Burger and
                  Erik S. Boyle},
  title        = {Cyber terrorism cases and stock market valuation effects},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {4},
  pages        = {385--403},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-09-2022-0147},
  doi          = {10.1108/ICS-09-2022-0147},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/SmithSBB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TariqMATM23,
  author       = {Aamna Tariq and
                  Jawad Manzoor and
                  Muhammad Ammar Aziz and
                  Zain Ul Abideen Tariq and
                  Ammar Masood},
  title        = {Open source {SIEM} solutions for an enterprise},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {1},
  pages        = {88--107},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-09-2021-0146},
  doi          = {10.1108/ICS-09-2021-0146},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TariqMATM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TegethoffSDC23,
  author       = {Thomas M. Tegethoff and
                  Ricardo Santa and
                  Glaucya Da{\'{u}} and
                  Jimy Cortes},
  title        = {Online security in e-government as an antecedent of cost-effectiveness
                  and quality in business operations},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {2},
  pages        = {125--144},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-10-2021-0159},
  doi          = {10.1108/ICS-10-2021-0159},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TegethoffSDC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Veiga23,
  author       = {Ad{\'{e}}le da Veiga},
  title        = {A model for information security culture with creativity and innovation
                  as enablers - refined with an expert panel},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {3},
  pages        = {281--303},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-11-2022-0178},
  doi          = {10.1108/ICS-11-2022-0178},
  timestamp    = {Fri, 14 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Veiga23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/XuR23,
  author       = {Tianhao Xu and
                  Prashanth Rajivan},
  title        = {Determining psycholinguistic features of deception in phishing messages},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {2},
  pages        = {199--220},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-11-2021-0185},
  doi          = {10.1108/ICS-11-2021-0185},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/XuR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AmankwaLK22,
  author       = {Eric Amankwa and
                  Marianne Loock and
                  Elmarie Kritzinger},
  title        = {The determinants of an information security policy compliance culture
                  in organisations: the combined effects of organisational and behavioural
                  factors},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {4},
  pages        = {583--614},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-10-2021-0169},
  doi          = {10.1108/ICS-10-2021-0169},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AmankwaLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Baker-EvelethSE22,
  author       = {Lori Baker{-}Eveleth and
                  Robert W. Stone and
                  Daniel M. Eveleth},
  title        = {Understanding social media users' privacy-protection behaviors},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {3},
  pages        = {324--345},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-07-2021-0099},
  doi          = {10.1108/ICS-07-2021-0099},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Baker-EvelethSE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Bayl-SmithTYW22,
  author       = {Piers Bayl{-}Smith and
                  Ronnie Taib and
                  Kun Yu and
                  Mark W. Wiggins},
  title        = {Response to a phishing attack: persuasion and protection motivation
                  in an organizational context},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {1},
  pages        = {63--78},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-02-2021-0021},
  doi          = {10.1108/ICS-02-2021-0021},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Bayl-SmithTYW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BenrhoumaAANB22,
  author       = {Oussama Benrhouma and
                  Ali Alzahrani and
                  Ahmad B. Alkhodre and
                  Abdallah Namoun and
                  Wasim Ahmad Bhat},
  title        = {To sell, or not to sell: social media data-breach in second-hand Android
                  devices},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {1},
  pages        = {117--136},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-03-2021-0038},
  doi          = {10.1108/ICS-03-2021-0038},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/BenrhoumaAANB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BergquistTG22,
  author       = {Jan{-}Halvard Bergquist and
                  Samantha Tinet and
                  Shang Gao},
  title        = {An information classification model for public sector organizations
                  in Sweden: a case study of a Swedish municipality},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {2},
  pages        = {153--172},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-03-2021-0032},
  doi          = {10.1108/ICS-03-2021-0032},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BergquistTG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BhadauriaC22,
  author       = {Vikram S. Bhadauria and
                  Anitha Chennamaneni},
  title        = {Do desire, anxiety and personal innovativeness impact the adoption
                  of IoT devices?},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {5},
  pages        = {730--750},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-07-2021-0096},
  doi          = {10.1108/ICS-07-2021-0096},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/BhadauriaC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BhanaF22,
  author       = {Bhaveer Bhana and
                  Stephen V. Flowerday},
  title        = {Usability of the login authentication process: passphrases and passwords},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {2},
  pages        = {280--305},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-07-2021-0093},
  doi          = {10.1108/ICS-07-2021-0093},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BhanaF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BongiovanniRBBC22,
  author       = {Ivano Bongiovanni and
                  Karen Renaud and
                  Humphrey Brydon and
                  R{\'{e}}nette J. Blignaut and
                  Angelo Cavallo},
  title        = {A quantification mechanism for assessing adherence to information
                  security governance guidelines},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {4},
  pages        = {517--548},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-08-2021-0112},
  doi          = {10.1108/ICS-08-2021-0112},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/BongiovanniRBBC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChenLL22,
  author       = {Hao Chen and
                  Mengya Liu and
                  Tu Lyu},
  title        = {Understanding employees' information security-related stress and policy
                  compliance intention: the roles of information security fatigue and
                  psychological capital},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {5},
  pages        = {751--770},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-03-2022-0047},
  doi          = {10.1108/ICS-03-2022-0047},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChenLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DasNC22,
  author       = {Sanchari Das and
                  Christena Nippert{-}Eng and
                  L. Jean Camp},
  title        = {Evaluating user susceptibility to phishing attacks},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {1},
  pages        = {1--18},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-12-2020-0204},
  doi          = {10.1108/ICS-12-2020-0204},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DasNC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/El-KhatibB22,
  author       = {Rima El{-}Khatib and
                  Henri Barki},
  title        = {How different rewards tend to influence employee non-compliance with
                  information security policies},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {1},
  pages        = {97--116},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-01-2021-0008},
  doi          = {10.1108/ICS-01-2021-0008},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/El-KhatibB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FaiziPN22,
  author       = {Ana Faizi and
                  Ali Mohammad Padyab and
                  Andreas Naess},
  title        = {From rationale to lessons learned in the cloud information security
                  risk assessment: a study of organizations in Sweden},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {2},
  pages        = {190--205},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-03-2021-0034},
  doi          = {10.1108/ICS-03-2021-0034},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FaiziPN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GafniP22,
  author       = {Ruti Gafni and
                  Tal Pavel},
  title        = {Cyberattacks against the health-care sectors during the {COVID-19}
                  pandemic},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {1},
  pages        = {137--150},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-05-2021-0059},
  doi          = {10.1108/ICS-05-2021-0059},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GafniP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Gharib22,
  author       = {Mohamad Gharib},
  title        = {Toward an architecture to improve privacy and informational self-determination
                  through informed consent},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {4},
  pages        = {549--561},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-12-2021-0209},
  doi          = {10.1108/ICS-12-2021-0209},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Gharib22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GyllenstenPT22,
  author       = {Kristina Gyllensten and
                  Anders Pousette and
                  Marianne T{\"{o}}rner},
  title        = {Value conflicts and information security - a mixed-methods study in
                  high-risk industry},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {3},
  pages        = {346--363},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-09-2021-0139},
  doi          = {10.1108/ICS-09-2021-0139},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GyllenstenPT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HadzidedicFR22,
  author       = {Suncica Hadzidedic and
                  Silvia Berenice Fajardo Flores and
                  Belma Ramic{-}Brkic},
  title        = {User perceptions and use of authentication methods: insights from
                  youth in Mexico and Bosnia and Herzegovina},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {4},
  pages        = {615--632},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-07-2021-0105},
  doi          = {10.1108/ICS-07-2021-0105},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HadzidedicFR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HwangH22,
  author       = {Mark I. Hwang and
                  Susan Helser},
  title        = {Cybersecurity educational games: a theoretical framework},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {2},
  pages        = {225--242},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-10-2020-0173},
  doi          = {10.1108/ICS-10-2020-0173},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HwangH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JohansenPFJSRZS22,
  author       = {Johanna Johansen and
                  Tore Pedersen and
                  Simone Fischer{-}H{\"{u}}bner and
                  Christian Johansen and
                  Gerardo Schneider and
                  Arnold Roosendaal and
                  Harald Zwingelberg and
                  Anders Jakob Sivesind and
                  Josef Noll},
  title        = {A multidisciplinary definition of privacy labels},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {3},
  pages        = {452--469},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-06-2021-0080},
  doi          = {10.1108/ICS-06-2021-0080},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JohansenPFJSRZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JonesLWNMA22,
  author       = {Keith S. Jones and
                  Natalie R. Lodinger and
                  Benjamin P. Widlus and
                  Akbar Siami Namin and
                  Emily Maw and
                  Miriam E. Armstrong},
  title        = {How do non experts think about cyber attack consequences?},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {4},
  pages        = {473--489},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-11-2020-0184},
  doi          = {10.1108/ICS-11-2020-0184},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JonesLWNMA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KarlssonKAD22,
  author       = {Martin Karlsson and
                  Fredrik Karlsson and
                  Joachim {\AA}str{\"{o}}m and
                  Thomas Denk},
  title        = {The effect of perceived organizational culture on employees' information
                  security compliance},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {3},
  pages        = {382--401},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-06-2021-0073},
  doi          = {10.1108/ICS-06-2021-0073},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KarlssonKAD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KhalidAI22,
  author       = {Marium Khalid and
                  Mehreen Afzal and
                  Waseem Iqbal},
  title        = {A game model design using test bed for Malware analysis training},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {4},
  pages        = {633--650},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-09-2021-0152},
  doi          = {10.1108/ICS-09-2021-0152},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KhalidAI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KwatengAT22,
  author       = {Kwame Owusu Kwateng and
                  Christopher Amanor and
                  Francis Kamewor Tetteh},
  title        = {Enterprise risk management and information technology security in
                  the financial sector},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {3},
  pages        = {422--451},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-11-2020-0185},
  doi          = {10.1108/ICS-11-2020-0185},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KwatengAT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LeiteSA22,
  author       = {Lu{\'{\i}}s Leite and
                  Daniel Rodrigues dos Santos and
                  Fernando Almeida},
  title        = {The impact of general data protection regulation on software engineering
                  practices},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {1},
  pages        = {79--96},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-03-2020-0043},
  doi          = {10.1108/ICS-03-2020-0043},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/LeiteSA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MalatjiMS22,
  author       = {Masike Malatji and
                  Annliz{\'{e}} Marnewick and
                  Sun{\'{e}} von Solms},
  title        = {Cybersecurity capabilities for critical infrastructure resilience},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {2},
  pages        = {255--279},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-06-2021-0091},
  doi          = {10.1108/ICS-06-2021-0091},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MalatjiMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ManoharanKHA22,
  author       = {Suganthi Manoharan and
                  Norliza Katuk and
                  Syahida Hassan and
                  Rahayu Ahmad},
  title        = {To click or not to click the link: the factors influencing internet
                  banking users' intention in responding to phishing emails},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {1},
  pages        = {37--62},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-04-2021-0046},
  doi          = {10.1108/ICS-04-2021-0046},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/ManoharanKHA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/NgugiHL22,
  author       = {Benjamin K. Ngugi and
                  Kuo{-}Ting Hung and
                  Yuanxiang John Li},
  title        = {Reducing tax identity theft by identifying vulnerability points in
                  the electronic tax filing process},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {2},
  pages        = {173--189},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-05-2021-0056},
  doi          = {10.1108/ICS-05-2021-0056},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/NgugiHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PerasM22,
  author       = {Dijana Peras and
                  Renata Mekovec},
  title        = {A conceptualization of the privacy concerns of cloud users},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {5},
  pages        = {653--671},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-11-2021-0182},
  doi          = {10.1108/ICS-11-2021-0182},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PerasM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RamakrishnanHSP22,
  author       = {Thiagarajan Ramakrishnan and
                  Dwight M. Hite and
                  Joseph H. Schuessler and
                  Victor R. Prybutok},
  title        = {Work ethic and information security behavior},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {3},
  pages        = {364--381},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-02-2021-0017},
  doi          = {10.1108/ICS-02-2021-0017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RamakrishnanHSP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RensburgBS22,
  author       = {Ebenhaeser Otto Janse van Rensburg and
                  Reinhardt A. Botha and
                  Rossouw von Solms},
  title        = {Utility indicator for emotion detection in a speaker authentication
                  system},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {5},
  pages        = {672--686},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-07-2021-0097},
  doi          = {10.1108/ICS-07-2021-0097},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/RensburgBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ShanY22,
  author       = {Mridula Shan and
                  Jeong Yang},
  title        = {Investigating the accessibility and impacts of cybersecurity programs
                  on high-school girls' long-term industry engagement},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {3},
  pages        = {309--323},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-05-2021-0067},
  doi          = {10.1108/ICS-05-2021-0067},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ShanY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Stewart22,
  author       = {Harrison Stewart},
  title        = {The hindrance of cloud computing acceptance within the financial sectors
                  in Germany},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {2},
  pages        = {206--224},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-01-2021-0002},
  doi          = {10.1108/ICS-01-2021-0002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Stewart22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Stewart22a,
  author       = {Harrison Stewart},
  title        = {A systematic framework to explore the determinants of information
                  security policy development and outcomes},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {4},
  pages        = {490--516},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-06-2021-0076},
  doi          = {10.1108/ICS-06-2021-0076},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Stewart22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/StyliosKSC22,
  author       = {Ioannis Stylios and
                  Spyros Kokolakis and
                  Andreas Skalkos and
                  Sotirios Chatzis},
  title        = {BioGames: a new paradigm and a behavioral biometrics collection tool
                  for research purposes},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {2},
  pages        = {243--254},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-12-2020-0196},
  doi          = {10.1108/ICS-12-2020-0196},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/StyliosKSC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/StyliosKTC22,
  author       = {Ioannis Stylios and
                  Spyros Kokolakis and
                  Olga Thanou and
                  Sotirios Chatzis},
  title        = {Key factors driving the adoption of behavioral biometrics and continuous
                  authentication technology: an empirical research},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {4},
  pages        = {562--582},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-08-2021-0124},
  doi          = {10.1108/ICS-08-2021-0124},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/StyliosKTC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/StyliosSKK22,
  author       = {Ioannis Stylios and
                  Andreas Skalkos and
                  Spyros Kokolakis and
                  Maria Karyda},
  title        = {BioPrivacy: a behavioral biometrics continuous authentication system
                  based on keystroke dynamics and touch gestures},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {5},
  pages        = {687--704},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-12-2021-0212},
  doi          = {10.1108/ICS-12-2021-0212},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/StyliosSKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/VgenaKK22,
  author       = {Katerina Vgena and
                  Angeliki Kitsiou and
                  Christos Kalloniatis},
  title        = {Understanding the role of users' socio-location attributes and their
                  privacy implications on social media},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {5},
  pages        = {705--729},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-12-2021-0211},
  doi          = {10.1108/ICS-12-2021-0211},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/VgenaKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Withanaarachchi22,
  author       = {Amila S. Withanaarachchi and
                  Nisansala Vithana},
  title        = {Female underrepresentation in the cybersecurity workforce - a study
                  on cybersecurity professionals in Sri Lanka},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {3},
  pages        = {402--421},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-08-2021-0129},
  doi          = {10.1108/ICS-08-2021-0129},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Withanaarachchi22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/YeH22,
  author       = {Xiaoyun Ye and
                  Myung{-}Mook Han},
  title        = {An improved feature extraction algorithm for insider threat using
                  hidden Markov model on user behavior detection},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {1},
  pages        = {19--36},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-12-2019-0142},
  doi          = {10.1108/ICS-12-2019-0142},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/YeH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Al-AmeenCAK21,
  author       = {Mahdi Nasrullah Al{-}Ameen and
                  Apoorva Chauhan and
                  M. A. Manazir Ahsan and
                  Huzeyfe Kocabas},
  title        = {A look into user's privacy perceptions and data practices of IoT devices},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {4},
  pages        = {573--588},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-08-2020-0134},
  doi          = {10.1108/ICS-08-2020-0134},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Al-AmeenCAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AlotaibiCF21,
  author       = {Fayez Ghazai Alotaibi and
                  Nathan Luke Clarke and
                  Steven M. Furnell},
  title        = {A novel approach for improving information security management and
                  awareness for home environments},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {25--48},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-05-2020-0073},
  doi          = {10.1108/ICS-05-2020-0073},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AlotaibiCF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Avery21,
  author       = {Atiya Avery},
  title        = {After the disclosure: measuring the short-term and long-term impacts
                  of data breach disclosures on the financial performance of organizations},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {3},
  pages        = {500--525},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-10-2020-0161},
  doi          = {10.1108/ICS-10-2020-0161},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Avery21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AzmiPVH21,
  author       = {Nurul Asmui Azmi Md Azmi and
                  Teoh Ai Ping and
                  Ali Vafaei{-}Zadeh and
                  Haniruzila Hanifah},
  title        = {Predicting information security culture among employees of telecommunication
                  companies in an emerging market},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {866--882},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-02-2021-0020},
  doi          = {10.1108/ICS-02-2021-0020},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AzmiPVH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BergstromKA21,
  author       = {Erik Bergstr{\"{o}}m and
                  Fredrik Karlsson and
                  Rose{-}Mharie {\AA}hlfeldt},
  title        = {Developing an information classification method},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {2},
  pages        = {209--239},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-07-2020-0110},
  doi          = {10.1108/ICS-07-2020-0110},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BergstromKA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChatterjeeGCC21,
  author       = {Sheshadri Chatterjee and
                  Soumya Kanti Ghosh and
                  Ranjan Chaudhuri and
                  Sumana Chaudhuri},
  title        = {Adoption of AI-integrated {CRM} system by Indian industry: from security
                  and privacy perspective},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {1--24},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-02-2019-0029},
  doi          = {10.1108/ICS-02-2019-0029},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChatterjeeGCC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChowdhuryG21,
  author       = {Nabin Chowdhury and
                  Vasileios Gkioulos},
  title        = {Key competencies for critical infrastructure cyber-security: a systematic
                  literature review},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {697--723},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-07-2020-0121},
  doi          = {10.1108/ICS-07-2020-0121},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChowdhuryG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Dahabiyeh21,
  author       = {Laila Dahabiyeh},
  title        = {Factors affecting organizational adoption and acceptance of computer-based
                  security awareness training tools},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {836--849},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-12-2020-0200},
  doi          = {10.1108/ICS-12-2020-0200},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Dahabiyeh21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FailyIAK21,
  author       = {Shamal Faily and
                  Claudia Iacob and
                  Raian Ali and
                  Duncan Ki{-}Aries},
  title        = {Visualising personas as goal models to find security tensions},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {787--815},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-03-2021-0035},
  doi          = {10.1108/ICS-03-2021-0035},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FailyIAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GangireVH21,
  author       = {Yotamu Gangire and
                  Ad{\'{e}}le da Veiga and
                  Marlien Herselman},
  title        = {Assessing information security behaviour: a self-determination theory
                  perspective},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {4},
  pages        = {625--646},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-11-2020-0179},
  doi          = {10.1108/ICS-11-2020-0179},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GangireVH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GillamW21,
  author       = {Andrew R. Gillam and
                  Alina M. Waite},
  title        = {Gender differences in predictors of technology threat avoidance},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {3},
  pages        = {393--412},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-01-2020-0008},
  doi          = {10.1108/ICS-01-2020-0008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GillamW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GuptaBBS21,
  author       = {Rohit Gupta and
                  Baidyanath Biswas and
                  Indranil Biswas and
                  Shib Sankar Sana},
  title        = {Firm investment decisions for information security under a fuzzy environment:
                  a game-theoretic approach},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {73--104},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-02-2020-0028},
  doi          = {10.1108/ICS-02-2020-0028},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GuptaBBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HaneyL21,
  author       = {Julie M. Haney and
                  Wayne G. Lutters},
  title        = {Cybersecurity advocates: discovering the characteristics and skills
                  of an emergent role},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {3},
  pages        = {485--499},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-08-2020-0131},
  doi          = {10.1108/ICS-08-2020-0131},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HaneyL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HerkanaiduFP21,
  author       = {Ram Herkanaidu and
                  Steven M. Furnell and
                  Maria Papadaki},
  title        = {Towards a cross-cultural education framework for online safety awareness},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {4},
  pages        = {664--679},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-11-2020-0183},
  doi          = {10.1108/ICS-11-2020-0183},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HerkanaiduFP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JanjarasjitC21,
  author       = {Suparak Janjarasjit and
                  Siew H. Chan},
  title        = {Reaction of users as potential victims of information security breach},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {187--206},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-07-2020-0118},
  doi          = {10.1108/ICS-07-2020-0118},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JanjarasjitC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JonesATN21,
  author       = {Keith S. Jones and
                  Miriam E. Armstrong and
                  McKenna K. Tornblad and
                  Akbar Siami Namin},
  title        = {How social engineers use persuasion principles during vishing attacks},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {2},
  pages        = {314--331},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-07-2020-0113},
  doi          = {10.1108/ICS-07-2020-0113},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JonesATN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KaragiannisM21,
  author       = {Stylianos Karagiannis and
                  Emmanouil Magkos},
  title        = {Adapting {CTF} challenges into virtual cybersecurity learning environments},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {105--132},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-04-2019-0050},
  doi          = {10.1108/ICS-04-2019-0050},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KaragiannisM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KintonovaVS21,
  author       = {Aliya Kintonova and
                  Alexander Vasyaev and
                  Viktor Shestak},
  title        = {Cyberbullying and cyber-mobbing in developing countries},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {3},
  pages        = {435--456},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-02-2020-0031},
  doi          = {10.1108/ICS-02-2020-0031},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KintonovaVS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KrishnaS21,
  author       = {Ben Krishna and
                  M. P. Sebastian},
  title        = {Examining the relationship between e-government development, nation's
                  cyber-security commitment, business usage and economic prosperity:
                  a cross-country analysis},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {737--760},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-12-2020-0205},
  doi          = {10.1108/ICS-12-2020-0205},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KrishnaS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LennartssonKN21,
  author       = {Markus Lennartsson and
                  Joakim K{\"{a}}vrestad and
                  Marcus Nohlberg},
  title        = {Exploring the meaning of usable security - a literature review},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {4},
  pages        = {647--663},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-10-2020-0167},
  doi          = {10.1108/ICS-10-2020-0167},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LennartssonKN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LevyG21,
  author       = {Yair Levy and
                  Ruti Gafni},
  title        = {Introducing the concept of cybersecurity footprint},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {724--736},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-04-2020-0054},
  doi          = {10.1108/ICS-04-2020-0054},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LevyG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/McGillT21,
  author       = {Tanya McGill and
                  Nik Thompson},
  title        = {Exploring potential gender differences in information security and
                  privacy},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {850--865},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-07-2020-0125},
  doi          = {10.1108/ICS-07-2020-0125},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/McGillT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MomenzadehGDC21,
  author       = {Behnood Momenzadeh and
                  Shakthidhar Gopavaram and
                  Sanchari Das and
                  L. Jean Camp},
  title        = {Bayesian evaluation of privacy-preserving risk communication for user
                  android app preferences},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {4},
  pages        = {680--693},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-11-2020-0182},
  doi          = {10.1108/ICS-11-2020-0182},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MomenzadehGDC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/N21,
  author       = {Sindhuja P. N.},
  title        = {The impact of information security initiatives on supply chain robustness
                  and performance: an empirical study},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {2},
  pages        = {365--391},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-07-2020-0128},
  doi          = {10.1108/ICS-07-2020-0128},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/N21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/NaqviCP21,
  author       = {Bilal Naqvi and
                  Nathan Luke Clarke and
                  Jari Porras},
  title        = {Incorporating the human facet of security in developing systems and
                  services},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {49--72},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-11-2019-0130},
  doi          = {10.1108/ICS-11-2019-0130},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/NaqviCP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/OrehekP21,
  author       = {Spela Orehek and
                  Gregor Petric},
  title        = {A systematic review of scales for measuring information security culture},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {133--158},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-12-2019-0140},
  doi          = {10.1108/ICS-12-2019-0140},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/OrehekP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/OriolaAPK21,
  author       = {Oluwafemi Oriola and
                  Adesesan B. Adeyemo and
                  Maria Papadaki and
                  Eduan Kotz{\'{e}}},
  title        = {A collaborative approach for national cybersecurity incident management},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {3},
  pages        = {457--484},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-02-2020-0027},
  doi          = {10.1108/ICS-02-2020-0027},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/OriolaAPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PalanisamyW21,
  author       = {Ramaraj Palanisamy and
                  Yang Wu},
  title        = {Users' attitude on perceived security of enterprise systems mobility:
                  an empirical study},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {159--186},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-05-2020-0069},
  doi          = {10.1108/ICS-05-2020-0069},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PalanisamyW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PapaioannouTK21,
  author       = {Thanos Papaioannou and
                  Aggeliki Tsohou and
                  Maria Karyda},
  title        = {Forming digital identities in social networks: the role of privacy
                  concerns and self-esteem},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {2},
  pages        = {240--262},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-01-2020-0003},
  doi          = {10.1108/ICS-01-2020-0003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PapaioannouTK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ParkerF21,
  author       = {Heather J. Parker and
                  Stephen Flowerday},
  title        = {Understanding the disclosure of personal data online},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {3},
  pages        = {413--434},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-10-2020-0168},
  doi          = {10.1108/ICS-10-2020-0168},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ParkerF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RamloN21,
  author       = {Susan Ramlo and
                  John B. Nicholas},
  title        = {The human factor: assessing individuals' perceptions related to cybersecurity},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {2},
  pages        = {350--364},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-04-2020-0052},
  doi          = {10.1108/ICS-04-2020-0052},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RamloN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RenaudJO21,
  author       = {Karen Renaud and
                  Graham Johnson and
                  Jacques Ophoff},
  title        = {Accessible authentication: dyslexia and password strategies},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {4},
  pages        = {604--624},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-11-2020-0192},
  doi          = {10.1108/ICS-11-2020-0192},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RenaudJO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RenaudP21,
  author       = {Karen Renaud and
                  Suzanne Prior},
  title        = {The "three M's" counter-measures to children's risky online behaviors:
                  mentor, mitigate and monitor},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {3},
  pages        = {526--557},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-07-2020-0115},
  doi          = {10.1108/ICS-07-2020-0115},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/RenaudP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SabanRW21,
  author       = {Kenneth Albert Saban and
                  Stephen Rau and
                  Charles A. Wood},
  title        = {"SME executives' perceptions and the information security preparedness
                  model"},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {2},
  pages        = {263--282},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-01-2020-0014},
  doi          = {10.1108/ICS-01-2020-0014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SabanRW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SengAW21,
  author       = {Sovantharith Seng and
                  Mahdi Nasrullah Al{-}Ameen and
                  Matthew Wright},
  title        = {A look into user privacy andthird-party applications in Facebook},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {2},
  pages        = {283--313},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-08-2019-0108},
  doi          = {10.1108/ICS-08-2019-0108},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/SengAW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SnymanK21,
  author       = {Dirk P. Snyman and
                  Hennie A. Kruger},
  title        = {Collective information security behaviour: a technology-driven framework},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {4},
  pages        = {589--603},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-11-2020-0180},
  doi          = {10.1108/ICS-11-2020-0180},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SnymanK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SwartzVM21,
  author       = {Paulus Swartz and
                  Ad{\'{e}}le da Veiga and
                  Nico Martins},
  title        = {Validating an information privacy governance questionnaire to measure
                  the perception of employees},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {761--786},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-08-2020-0135},
  doi          = {10.1108/ICS-08-2020-0135},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SwartzVM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ThompsonAM21,
  author       = {Nik Thompson and
                  Atif Ahmad and
                  Sean B. Maynard},
  title        = {Do privacy concerns determine online information disclosure? The case
                  of internet addiction},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {3},
  pages        = {558--569},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-11-2020-0190},
  doi          = {10.1108/ICS-11-2020-0190},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/ThompsonAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/VielberthEP21,
  author       = {Manfred Vielberth and
                  Ludwig Englbrecht and
                  G{\"{u}}nther Pernul},
  title        = {Improving data quality for human-as-a-security-sensor. {A} process
                  driven quality improvement approach for user-provided incident information},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {2},
  pages        = {332--349},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-06-2020-0100},
  doi          = {10.1108/ICS-06-2020-0100},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/VielberthEP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/XuM21,
  author       = {Hongjiang Xu and
                  Sakthi Mahenthiran},
  title        = {Users' perception of cybersecurity, trust and cloud computing providers'
                  performance},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {816--835},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-09-2020-0153},
  doi          = {10.1108/ICS-09-2020-0153},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/XuM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AkinsanyaPS20,
  author       = {Opeoluwa Ore Akinsanya and
                  Maria Papadaki and
                  Lingfen Sun},
  title        = {Towards a maturity model for health-care cloud security {(M2HCS)}},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {3},
  pages        = {321--345},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-05-2019-0060},
  doi          = {10.1108/ICS-05-2019-0060},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AkinsanyaPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Al-JabriEA20,
  author       = {Ibrahim M. Al{-}Jabri and
                  Mustafa I. M. Eid and
                  Amer Abed},
  title        = {The willingness to disclose personal information},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {2},
  pages        = {161--181},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-01-2018-0012},
  doi          = {10.1108/ICS-01-2018-0012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Al-JabriEA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AnassSTR20,
  author       = {Rabii Anass and
                  Assoul Saliha and
                  Khadija Ouazzani Touhami and
                  Ounsa Roudi{\`{e}}s},
  title        = {Information and cyber security maturity models: a systematic literature
                  review},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {4},
  pages        = {627--644},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-03-2019-0039},
  doi          = {10.1108/ICS-03-2019-0039},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AnassSTR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BahsiFF20,
  author       = {Hayretdin Bahsi and
                  Ulrik Franke and
                  Even Langfeldt Friberg},
  title        = {The cyber-insurance market in Norway},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {1},
  pages        = {54--67},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-01-2019-0012},
  doi          = {10.1108/ICS-01-2019-0012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BahsiFF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Bouaynaya20,
  author       = {Wafa Bouaynaya},
  title        = {Cloud computing in SMEs: towards delegation of the {CIO} role},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {2},
  pages        = {199--213},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-01-2017-0001},
  doi          = {10.1108/ICS-01-2017-0001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Bouaynaya20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BulleeJ20,
  author       = {Jan{-}Willem Bullee and
                  Marianne Junger},
  title        = {How effective are social engineering interventions? {A} meta-analysis},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {5},
  pages        = {801--830},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-07-2019-0078},
  doi          = {10.1108/ICS-07-2019-0078},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BulleeJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Butler20,
  author       = {Rika Butler},
  title        = {A systematic literature review of the factors affecting smartphone
                  user threat avoidance behaviour},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {4},
  pages        = {555--574},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-01-2020-0016},
  doi          = {10.1108/ICS-01-2020-0016},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Butler20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DiamantopoulouT20,
  author       = {Vasiliki Diamantopoulou and
                  Aggeliki Tsohou and
                  Maria Karyda},
  title        = {From {ISO/IEC27001:} 2013 and {ISO/IEC27002:} 2013 to {GDPR} compliance
                  controls},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {4},
  pages        = {645--662},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-01-2020-0004},
  doi          = {10.1108/ICS-01-2020-0004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DiamantopoulouT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DzidzahKA20,
  author       = {Esther Dzidzah and
                  Kwame Owusu Kwateng and
                  Benjamin Kofi Asante},
  title        = {Security behaviour of mobile financial service users},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {5},
  pages        = {719--741},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-02-2020-0021},
  doi          = {10.1108/ICS-02-2020-0021},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DzidzahKA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/El-KhatibB20,
  author       = {Rima El{-}Khatib and
                  Henri Barki},
  title        = {An activity theory approach to information security non-compliance},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {4},
  pages        = {485--501},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-11-2018-0128},
  doi          = {10.1108/ICS-11-2018-0128},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/El-KhatibB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FoltzF20,
  author       = {C. Bryan Foltz and
                  Laura Foltz},
  title        = {Mobile users' information privacy concerns instrument and IoT},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {3},
  pages        = {359--371},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-07-2019-0090},
  doi          = {10.1108/ICS-07-2019-0090},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FoltzF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GeorgiopoulouML20,
  author       = {Zafeiroula Georgiopoulou and
                  Eleni{-}Laskarina Makri and
                  Costas Lambrinoudakis},
  title        = {{GDPR} compliance: proposed technical and organizational measures
                  for cloud provider},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {5},
  pages        = {665--680},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-01-2020-0009},
  doi          = {10.1108/ICS-01-2020-0009},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GeorgiopoulouML20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GoelKH20,
  author       = {Rajni Goel and
                  Anupam Kumar and
                  James Haddow},
  title        = {{PRISM:} a strategic decision framework for cybersecurity risk assessment},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {4},
  pages        = {591--625},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-11-2018-0131},
  doi          = {10.1108/ICS-11-2018-0131},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GoelKH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KavrestadLBN20,
  author       = {Joakim K{\"{a}}vrestad and
                  Markus Lennartsson and
                  Marcus Birath and
                  Marcus Nohlberg},
  title        = {Constructing secure and memorable passwords},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {5},
  pages        = {701--717},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-07-2019-0077},
  doi          = {10.1108/ICS-07-2019-0077},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KavrestadLBN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KavrestadZN20,
  author       = {Joakim K{\"{a}}vrestad and
                  Johan Zaxmy and
                  Marcus Nohlberg},
  title        = {Analyzing the usage of character groups and keyboard patterns in password
                  creation},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {3},
  pages        = {347--358},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-11-2019-0132},
  doi          = {10.1108/ICS-11-2019-0132},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KavrestadZN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Kurowski20,
  author       = {Sebastian Kurowski},
  title        = {Response biases in policy compliance research},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {3},
  pages        = {445--465},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-02-2019-0025},
  doi          = {10.1108/ICS-02-2019-0025},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/Kurowski20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MakriGL20,
  author       = {Eleni{-}Laskarina Makri and
                  Zafeiroula Georgiopoulou and
                  Costas Lambrinoudakis},
  title        = {Utilizing a privacy impact assessment method using metrics in the
                  healthcare sector},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {4},
  pages        = {503--529},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-01-2020-0007},
  doi          = {10.1108/ICS-01-2020-0007},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MakriGL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MavrikiK20,
  author       = {Paola Mavriki and
                  Maria Karyda},
  title        = {Automated data-driven profiling: threats for group privacy},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {2},
  pages        = {183--197},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-04-2019-0048},
  doi          = {10.1108/ICS-04-2019-0048},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MavrikiK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MichaelE20,
  author       = {Antonia Michael and
                  Jan H. P. Eloff},
  title        = {Discovering "Insider {IT} Sabotage" based on human behaviour},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {4},
  pages        = {575--589},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-12-2019-0141},
  doi          = {10.1108/ICS-12-2019-0141},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MichaelE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MoukafihOE20,
  author       = {Nabil Moukafih and
                  Ghizlane Orhanou and
                  Said Elhajji},
  title        = {Mobile agent-based {SIEM} for event collection and normalization externalization},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {1},
  pages        = {15--34},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-01-2019-0008},
  doi          = {10.1108/ICS-01-2019-0008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MoukafihOE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MukhopadhyayBCR20,
  author       = {Surma Mukhopadhyay and
                  Ramsankar Basak and
                  Darrell Carpenter and
                  Brian J. Reithel},
  title        = {Patient use of online medical records: an application of technology
                  acceptance framework},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {1},
  pages        = {97--115},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-07-2019-0076},
  doi          = {10.1108/ICS-07-2019-0076},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MukhopadhyayBCR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PaspatisTK20,
  author       = {Ioannis Paspatis and
                  Aggeliki Tsohou and
                  Spyros Kokolakis},
  title        = {AppAware: a policy visualization model for mobile applications},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {1},
  pages        = {116--132},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-04-2019-0049},
  doi          = {10.1108/ICS-04-2019-0049},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PaspatisTK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PattinsonBLCPCM20,
  author       = {Malcolm R. Pattinson and
                  Marcus A. Butavicius and
                  Meredith Lillie and
                  Beau Ciccarello and
                  Kathryn Parsons and
                  Dragana Calic and
                  Agata McCormac},
  title        = {Matching training to individual learning styles improves information
                  security awareness},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {1},
  pages        = {1--14},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-01-2019-0022},
  doi          = {10.1108/ICS-01-2019-0022},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PattinsonBLCPCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PhamBPPUNN20,
  author       = {Cong Hiep Pham and
                  Linda Brennan and
                  Lukas Parker and
                  Nhat Tram Phan{-}Le and
                  Irfan Ulhaq and
                  Mathews Zanda Nkhoma and
                  Minh Nhat Nguyen},
  title        = {Enhancing cyber security behavior: an internal social marketing approach},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {2},
  pages        = {133--159},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-01-2019-0023},
  doi          = {10.1108/ICS-01-2019-0023},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/PhamBPPUNN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RostamiKK20,
  author       = {Elham Rostami and
                  Fredrik Karlsson and
                  Ella Kolkowska},
  title        = {The hunt for computerized support in information security policy management},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {2},
  pages        = {215--259},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-07-2019-0079},
  doi          = {10.1108/ICS-07-2019-0079},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RostamiKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SadokAB20,
  author       = {Moufida Sadok and
                  Steven Alter and
                  Peter M. Bednar},
  title        = {It is not my job: exploring the disconnect between corporate security
                  policies and actual security practices in SMEs},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {3},
  pages        = {467--483},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-01-2019-0010},
  doi          = {10.1108/ICS-01-2019-0010},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SadokAB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SadokB20,
  author       = {Moufida Sadok and
                  Peter M. Bednar},
  title        = {Editorial},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {3},
  pages        = {397--398},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-07-2020-148},
  doi          = {10.1108/ICS-07-2020-148},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/SadokB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SchinaglS20,
  author       = {Stef Schinagl and
                  Abbas Shahim},
  title        = {What do we know about information security governance?},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {2},
  pages        = {261--292},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-02-2019-0033},
  doi          = {10.1108/ICS-02-2019-0033},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SchinaglS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ShahA20,
  author       = {Pintu Shah and
                  Anuja Agarwal},
  title        = {Cybersecurity behaviour of smartphone users in India: an empirical
                  analysis},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {2},
  pages        = {293--318},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-04-2019-0041},
  doi          = {10.1108/ICS-04-2019-0041},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ShahA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TsegayeF20,
  author       = {Tamir Tsegaye and
                  Stephen Flowerday},
  title        = {A Clark-Wilson and {ANSI} role-based access control model},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {3},
  pages        = {373--395},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-08-2019-0100},
  doi          = {10.1108/ICS-08-2019-0100},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TsegayeF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TsohouMMCPPDRC20,
  author       = {Aggeliki Tsohou and
                  Emmanouil Magkos and
                  Haralambos Mouratidis and
                  George Chrysoloras and
                  Luca Piras and
                  Michalis Pavlidis and
                  Julien Debussche and
                  Marco Rotoloni and
                  Beatriz Gallego{-}Nicasio Crespo},
  title        = {Privacy, security, legal and technology acceptance elicited and consolidated
                  requirements for a {GDPR} compliance platform},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {4},
  pages        = {531--553},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-01-2020-0002},
  doi          = {10.1108/ICS-01-2020-0002},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TsohouMMCPPDRC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/VeigaVLCF20,
  author       = {Ad{\'{e}}le da Veiga and
                  Ruthea Vorster and
                  Fudong Li and
                  Nathan L. Clarke and
                  Steven M. Furnell},
  title        = {Comparing the protection and use of online personal information in
                  South Africa and the United Kingdom in line with data protection requirements},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {3},
  pages        = {399--422},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-11-2018-0135},
  doi          = {10.1108/ICS-11-2018-0135},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/VeigaVLCF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/VemouK20,
  author       = {Konstantina Vemou and
                  Maria Karyda},
  title        = {Evaluating privacy impact assessment methods: guidelines and best
                  practice},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {1},
  pages        = {35--53},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-04-2019-0047},
  doi          = {10.1108/ICS-04-2019-0047},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/VemouK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/VemouK20a,
  author       = {Konstantina Vemou and
                  Maria Karyda},
  title        = {Requirements for private communications over public spheres},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {1},
  pages        = {68--96},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-01-2019-0002},
  doi          = {10.1108/ICS-01-2019-0002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/VemouK20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/WeidmanG20,
  author       = {Jake Weidman and
                  Jens Grossklags},
  title        = {Assessing the current state of information security policies in academic
                  organizations},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {3},
  pages        = {423--444},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-12-2018-0142},
  doi          = {10.1108/ICS-12-2018-0142},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/WeidmanG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/WiafeKWOY20,
  author       = {Isaac Wiafe and
                  Felix Nti Koranteng and
                  Abigail Wiafe and
                  Emmanuel Nyarko Obeng and
                  Winfred Yaokumah},
  title        = {The role of norms in information security policy compliance},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {5},
  pages        = {743--761},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-08-2019-0095},
  doi          = {10.1108/ICS-08-2019-0095},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/WiafeKWOY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ZainiMS20,
  author       = {Muhamad Khairulnizam Zaini and
                  Mohamad Noorman Masrek and
                  Mad Khir Johari Abdullah Sani},
  title        = {The impact of information security management practices on organisational
                  agility},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {5},
  pages        = {681--700},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-02-2020-0020},
  doi          = {10.1108/ICS-02-2020-0020},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ZainiMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Zineddine20,
  author       = {Mhamed Zineddine},
  title        = {A novel trust model for fog computing using fuzzy neural networks
                  and weighted weakest link},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {5},
  pages        = {763--800},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-04-2019-0046},
  doi          = {10.1108/ICS-04-2019-0046},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Zineddine20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AbdelhamidKS19,
  author       = {Mohamed Abdelhamid and
                  Victoria Kisekka and
                  Spyridon Samonas},
  title        = {Mitigating e-services avoidance: the role of government cybersecurity
                  preparedness},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {26--46},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-02-2018-0024},
  doi          = {10.1108/ICS-02-2018-0024},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AbdelhamidKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AbdullahQ19,
  author       = {Lamya Abdullah and
                  Juan Quintero},
  title        = {Sealed computation: a mechanism to support privacy-aware trustworthy
                  cloud service},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {5},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-11-2018-0133},
  doi          = {10.1108/ICS-11-2018-0133},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AbdullahQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AbidinNS19,
  author       = {Mohd Aizuddin Zainal Abidin and
                  Anuar Nawawi and
                  Ahmad Saiful Azlin Puteh Salin},
  title        = {Customer data security and theft: a Malaysian organization's experience},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {81--100},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-04-2018-0043},
  doi          = {10.1108/ICS-04-2018-0043},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AbidinNS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AgrawalT19,
  author       = {Vinayak Agrawal and
                  Shashikala Tapaswi},
  title        = {Forensic analysis of Google Allo messenger on Android platform},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {62--80},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-03-2017-0011},
  doi          = {10.1108/ICS-03-2017-0011},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AgrawalT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AhmadOLN19,
  author       = {Zauwiyah Ahmad and
                  Thian Song Ong and
                  Tze Hui Liew and
                  Mariati Norhashim},
  title        = {Security monitoring and information security assurance behaviour among
                  employees},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {2},
  pages        = {165--188},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-10-2017-0073},
  doi          = {10.1108/ICS-10-2017-0073},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AhmadOLN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AlotaibiFC19,
  author       = {Mutlaq Jalimid Alotaibi and
                  Steven Furnell and
                  Nathan L. Clarke},
  title        = {A framework for reporting and dealing with end-user security policy
                  compliance},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {2--25},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-12-2017-0097},
  doi          = {10.1108/ICS-12-2017-0097},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/AlotaibiFC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AlsuhibanyAAA19,
  author       = {Suliman A. Alsuhibany and
                  Muna Almushyti and
                  Noorah Alghasham and
                  Fatimah Alkhudhayr},
  title        = {The impact of using different keyboards on free-text keystroke dynamics
                  authentication for Arabic language},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {2},
  pages        = {221--232},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-09-2017-0062},
  doi          = {10.1108/ICS-09-2017-0062},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AlsuhibanyAAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ArchibaldR19,
  author       = {Jacqueline M. Archibald and
                  Karen Renaud},
  title        = {Refining the PoinTER "human firewall" pentesting framework},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {4},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-01-2019-0019},
  doi          = {10.1108/ICS-01-2019-0019},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ArchibaldR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AurigemmaM19,
  author       = {Salvatore Aurigemma and
                  Thomas Mattson},
  title        = {Effect of long-term orientation on voluntary security actions},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {122--142},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-07-2018-0086},
  doi          = {10.1108/ICS-07-2018-0086},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AurigemmaM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BadaN19,
  author       = {Maria Bada and
                  Jason R. C. Nurse},
  title        = {Developing cybersecurity education and awareness programmes for small-
                  and medium-sized enterprises (SMEs)},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {3},
  pages        = {393--410},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-07-2018-0080},
  doi          = {10.1108/ICS-07-2018-0080},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BadaN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BergstromLE19,
  author       = {Erik Bergstr{\"{o}}m and
                  Martin Lundgren and
                  {\AA}sa Ericson},
  title        = {Revisiting information security risk management challenges: a practice
                  perspective},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {3},
  pages        = {358--372},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-09-2018-0106},
  doi          = {10.1108/ICS-09-2018-0106},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BergstromLE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/CarltonLR19,
  author       = {Melissa Carlton and
                  Yair Levy and
                  Michelle M. Ramim},
  title        = {Mitigating cyber attacks through the measurement of non-IT professionals'
                  cybersecurity skills},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {101--121},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-11-2016-0088},
  doi          = {10.1108/ICS-11-2016-0088},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/CarltonLR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/CossD19,
  author       = {David Lewis Coss and
                  Gurpreet Dhillon},
  title        = {Cloud privacy objectives a value based approach},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {2},
  pages        = {189--220},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-05-2017-0034},
  doi          = {10.1108/ICS-05-2017-0034},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/CossD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DedekeM19,
  author       = {Adenekan Dedeke and
                  Katherine Masterson},
  title        = {Contrasting cybersecurity implementation frameworks {(CIF)} from three
                  countries},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {3},
  pages        = {373--392},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-10-2018-0122},
  doi          = {10.1108/ICS-10-2018-0122},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DedekeM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DiamantopoulouM19,
  author       = {Vasiliki Diamantopoulou and
                  Haralambos Mouratidis},
  title        = {Practical evaluation of a reference architecture for the management
                  of privacy level agreements},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {5},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-04-2019-0052},
  doi          = {10.1108/ICS-04-2019-0052},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DiamantopoulouM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/EvansHYJ19,
  author       = {Mark Glenn Evans and
                  Ying He and
                  Iryna Yevseyeva and
                  Helge Janicke},
  title        = {Published incidents and their proportions of human error},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {3},
  pages        = {343--357},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-12-2018-0147},
  doi          = {10.1108/ICS-12-2018-0147},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/EvansHYJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FramnerFLAP19,
  author       = {Erik Framner and
                  Simone Fischer{-}H{\"{u}}bner and
                  Thomas Lor{\"{u}}nser and
                  Ala Sarah Alaqra and
                  John S{\"{o}}ren Pettersson},
  title        = {Making secret sharing based cloud storage usable},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {5},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-01-2019-0016},
  doi          = {10.1108/ICS-01-2019-0016},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FramnerFLAP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KavrestadEN19,
  author       = {Joakim K{\"{a}}vrestad and
                  Fredrik Eriksson and
                  Marcus Nohlberg},
  title        = {Understanding passwords - a taxonomy of password creation strategies},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {3},
  pages        = {453--467},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-06-2018-0077},
  doi          = {10.1108/ICS-06-2018-0077},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KavrestadEN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KumahYO19,
  author       = {Peace Kumah and
                  Winfred Yaokumah and
                  Eric Saviour Aryee Okai},
  title        = {A conceptual model and empirical assessment of {HR} security risk
                  management},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {3},
  pages        = {411--433},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-05-2018-0057},
  doi          = {10.1108/ICS-05-2018-0057},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KumahYO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LanktonSG19,
  author       = {Nancy K. Lankton and
                  Charles T. Stivason and
                  Anil Gurung},
  title        = {Information protection behaviors: morality and organizational criticality},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {3},
  pages        = {468--488},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-07-2018-0092},
  doi          = {10.1108/ICS-07-2018-0092},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LanktonSG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LavranouT19,
  author       = {Rena Lavranou and
                  Aggeliki Tsohou},
  title        = {Developing and validating a common body of knowledge for information
                  privacy},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {5},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-08-2018-0099},
  doi          = {10.1108/ICS-08-2018-0099},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LavranouT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MalatjiSM19,
  author       = {Masike Malatji and
                  Sun{\'{e}} von Solms and
                  Annliz{\'{e}} Marnewick},
  title        = {Socio-technical systems cybersecurity framework},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {2},
  pages        = {233--272},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-03-2018-0031},
  doi          = {10.1108/ICS-03-2018-0031},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MalatjiSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MelandBFLS19,
  author       = {Per H{\aa}kon Meland and
                  Karin Bernsmed and
                  Christian Fr{\o}ystad and
                  Jingyue Li and
                  Guttorm Sindre},
  title        = {An experimental evaluation of bow-tie analysis for security},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {4},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-11-2018-0132},
  doi          = {10.1108/ICS-11-2018-0132},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MelandBFLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MirK19,
  author       = {Abdul Wahid Mir and
                  Ramachandran Ramkumar Ketti},
  title        = {Security gaps assessment of smart grid based {SCADA} systems},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {3},
  pages        = {434--452},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-12-2018-0146},
  doi          = {10.1108/ICS-12-2018-0146},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MirK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MmangaFMWKM19,
  author       = {Andrew M'manga and
                  Shamal Faily and
                  John McAlaney and
                  Chris Williams and
                  Youki Kadobayashi and
                  Daisuke Miyamoto},
  title        = {A normative decision-making model for cyber security},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {5},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-01-2019-0021},
  doi          = {10.1108/ICS-01-2019-0021},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MmangaFMWKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Mutchler19,
  author       = {Leigh A. Mutchler},
  title        = {Response awareness and instructional self-efficacy: influences on
                  intent},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {4},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-05-2018-0061},
  doi          = {10.1108/ICS-05-2018-0061},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Mutchler19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/NelD19,
  author       = {Frans Nel and
                  Lynette Drevin},
  title        = {Key elements of an information security culture in organisations},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {2},
  pages        = {146--164},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-12-2016-0095},
  doi          = {10.1108/ICS-12-2016-0095},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/NelD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/OsliakSM19,
  author       = {Oleksii Osliak and
                  Andrea Saracino and
                  Fabio Martinelli},
  title        = {A scheme for the sticky policy representation supporting secure cyber-threat
                  intelligence analysis and sharing},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {5},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-01-2019-0011},
  doi          = {10.1108/ICS-01-2019-0011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/OsliakSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/QassimJDPJ19,
  author       = {Qais Saif Qassim and
                  Norziana Jamil and
                  Maslina Daud and
                  Ahmed Patel and
                  Norhamadi Ja'affar},
  title        = {A review of security assessment methodologies in industrial control
                  systems},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {47--61},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-04-2018-0048},
  doi          = {10.1108/ICS-04-2018-0048},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/QassimJDPJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SerketzisKIBP19,
  author       = {Nikolaos Serketzis and
                  Vasilios Katos and
                  Christos Ilioudis and
                  Dimitrios A. Baltatzis and
                  George J. Pangalos},
  title        = {Actionable threat intelligence for digital forensics readiness},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {2},
  pages        = {273--291},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-09-2018-0110},
  doi          = {10.1108/ICS-09-2018-0110},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SerketzisKIBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TondelJCW19,
  author       = {Inger Anne T{\o}ndel and
                  Martin Gilje Jaatun and
                  Daniela Soares Cruzes and
                  Laurie A. Williams},
  title        = {Collaborative security risk estimation in agile software development},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {4},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-12-2018-0138},
  doi          = {10.1108/ICS-12-2018-0138},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/TondelJCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TopaK19,
  author       = {Ioanna Topa and
                  Maria Karyda},
  title        = {From theory to practice: guidelines for enhancing information security
                  management},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {3},
  pages        = {326--342},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-09-2018-0108},
  doi          = {10.1108/ICS-09-2018-0108},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TopaK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/WaltE19,
  author       = {Est{\'{e}}e van der Walt and
                  Jan H. P. Eloff},
  title        = {Identity deception detection: requirements and a model},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {4},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-01-2019-0017},
  doi          = {10.1108/ICS-01-2019-0017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/WaltE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/YousufM19,
  author       = {Omerah Yousuf and
                  Roohie Naaz Mir},
  title        = {A survey on the Internet of Things security},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {2},
  pages        = {292--323},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-07-2018-0084},
  doi          = {10.1108/ICS-07-2018-0084},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/YousufM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ZimmermannGMKPS19,
  author       = {Verena Zimmermann and
                  Nina Gerber and
                  Peter Mayer and
                  Marius Kleboth and
                  Alexandra von Preuschen and
                  Konstantin Schmidt},
  title        = {Keep on rating - on the systematic rating and comparison of authentication
                  schemes},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {5},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-01-2019-0020},
  doi          = {10.1108/ICS-01-2019-0020},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ZimmermannGMKPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AlohaliCLF18,
  author       = {Manal Alohali and
                  Nathan L. Clarke and
                  Fudong Li and
                  Steven Furnell},
  title        = {Identifying and predicting the factors affecting end-users' risk-taking
                  behavior},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {306--326},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-03-2018-0037},
  doi          = {10.1108/ICS-03-2018-0037},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AlohaliCLF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AlshammariS18,
  author       = {Majed Alshammari and
                  Andrew Simpson},
  title        = {A model-based approach to support privacy compliance},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {437--453},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-11-2017-0084},
  doi          = {10.1108/ICS-11-2017-0084},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AlshammariS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AlshareLL18,
  author       = {Khaled A. Alshare and
                  Peggy Lane and
                  Michael R. Lane},
  title        = {Information security policy compliance: a higher education case study},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {91--108},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-09-2016-0073},
  doi          = {10.1108/ICS-09-2016-0073},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/AlshareLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Alzamil18,
  author       = {Zakarya A. Alzamil},
  title        = {Information security practice in Saudi Arabia: case study on Saudi
                  organizations},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {5},
  pages        = {568--583},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-01-2018-0006},
  doi          = {10.1108/ICS-01-2018-0006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Alzamil18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AmankwaLK18,
  author       = {Eric Amankwa and
                  Marianne Loock and
                  Elmarie Kritzinger},
  title        = {Establishing information security policy compliance culture in organizations},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {420--436},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-09-2017-0063},
  doi          = {10.1108/ICS-09-2017-0063},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/AmankwaLK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AnandMSMB18,
  author       = {Rashmi Anand and
                  Sanjay Medhavi and
                  Vivek Soni and
                  Charru Malhotra and
                  D. K. Banwet},
  title        = {Transforming information security governance in India {(A} {SAP-LAP}
                  based case study of security, {IT} policy and e-governance)},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {58--90},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-12-2016-0090},
  doi          = {10.1108/ICS-12-2016-0090},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AnandMSMB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ArgyropoulosAMF18,
  author       = {Nikolaos Argyropoulos and
                  Konstantinos Angelopoulos and
                  Haralambos Mouratidis and
                  Andrew Fish},
  title        = {Risk-aware decision support with constrained goal models},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {472--490},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-01-2018-0010},
  doi          = {10.1108/ICS-01-2018-0010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ArgyropoulosAMF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ashenden18,
  author       = {Debi Ashenden},
  title        = {In their own words: employee attitudes towards information security},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {327--337},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-04-2018-0042},
  doi          = {10.1108/ICS-04-2018-0042},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Ashenden18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BerndtssonJK18,
  author       = {Joakim Berndtsson and
                  Peter Johansson and
                  Martin Karlsson},
  title        = {Value conflicts and non-compliance: Attitudes to whistleblowing in
                  Swedish organisations},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {246--258},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-08-2017-0057},
  doi          = {10.1108/ICS-08-2017-0057},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BerndtssonJK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ButlerB18,
  author       = {Rika Butler and
                  Martin J. Butler},
  title        = {Assessing the information quality of phishing-related content on financial
                  institutions' websites},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {5},
  pages        = {514--532},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-09-2017-0067},
  doi          = {10.1108/ICS-09-2017-0067},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ButlerB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DiamantopoulouM18,
  author       = {Vasiliki Diamantopoulou and
                  Haralambos Mouratidis},
  title        = {Applying the physics of notation to the evaluation of a security and
                  privacy requirements engineering methodology},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {382--400},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-12-2017-0087},
  doi          = {10.1108/ICS-12-2017-0087},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DiamantopoulouM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ebot18,
  author       = {Alain Claude Tambe Ebot},
  title        = {Using stage theorizing to make anti-phishing recommendations more
                  effective},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {401--419},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-06-2017-0040},
  doi          = {10.1108/ICS-06-2017-0040},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/Ebot18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FenzN18,
  author       = {Stefan Fenz and
                  Thomas Neubauer},
  title        = {Ontology-based information security compliance determination and control
                  selection on the example of {ISO} 27002},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {5},
  pages        = {551--567},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-02-2018-0020},
  doi          = {10.1108/ICS-02-2018-0020},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FenzN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FoleyR18,
  author       = {Simon N. Foley and
                  Vivien M. Rooney},
  title        = {A grounded theory approach to security policy elicitation},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {454--471},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-12-2017-0086},
  doi          = {10.1108/ICS-12-2017-0086},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FoleyR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FurnellC18,
  author       = {Steven Furnell and
                  Nathan L. Clarke},
  title        = {Guest editorial},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {262--263},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-06-2018-0065},
  doi          = {10.1108/ICS-06-2018-0065},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FurnellC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JansenS18,
  author       = {Jurjen Jansen and
                  Paul van Schaik},
  title        = {Persuading end users to act cautiously online: a fear appeals study
                  on phishing},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {264--276},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-03-2018-0038},
  doi          = {10.1108/ICS-03-2018-0038},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JansenS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KajtaziCBH18,
  author       = {Miranda Kajtazi and
                  Hasan Cavusoglu and
                  Izak Benbasat and
                  Darek M. Haftor},
  title        = {Escalation of commitment as an antecedent to noncompliance with information
                  security policy},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {171--193},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-09-2017-0066},
  doi          = {10.1108/ICS-09-2017-0066},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KajtaziCBH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KarlssonDA18,
  author       = {Martin Karlsson and
                  Thomas Denk and
                  Joachim {\AA}str{\"{o}}m},
  title        = {Perceptions of organizational culture and value conflicts in information
                  security management},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {213--229},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-08-2017-0058},
  doi          = {10.1108/ICS-08-2017-0058},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KarlssonDA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KarlssonKT18,
  author       = {Fredrik Karlsson and
                  Ella Kolkowska and
                  Marianne T{\"{o}}rner},
  title        = {Guest editorial},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {146--149},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-02-2018-0019},
  doi          = {10.1108/ICS-02-2018-0019},
  timestamp    = {Thu, 23 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KarlssonKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/McCormacCPBPL18,
  author       = {Agata McCormac and
                  Dragana Calic and
                  Kathryn Parsons and
                  Marcus A. Butavicius and
                  Malcolm Robert Pattinson and
                  Meredith Lillie},
  title        = {The effect of resilience and job stress on information security awareness},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {277--289},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-03-2018-0032},
  doi          = {10.1108/ICS-03-2018-0032},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/McCormacCPBPL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MicallefA18,
  author       = {Nicholas Micallef and
                  Nalin Asanka Gamagedara Arachchilage},
  title        = {Security questions education: exploring gamified features and functionalities},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {365--378},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-03-2018-0033},
  doi          = {10.1108/ICS-03-2018-0033},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MicallefA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Miloslavskaya18,
  author       = {Natalia G. Miloslavskaya},
  title        = {Designing blockchain-based {SIEM} 3.0 system},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {491--512},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-10-2017-0075},
  doi          = {10.1108/ICS-10-2017-0075},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Miloslavskaya18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/NawawiS18,
  author       = {Anuar Nawawi and
                  Ahmad Saiful Azlin Puteh Salin},
  title        = {Employee fraud and misconduct: empirical evidence from a telecommunication
                  company},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {129--144},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-07-2017-0046},
  doi          = {10.1108/ICS-07-2017-0046},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/NawawiS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Nicho18,
  author       = {Mathew Nicho},
  title        = {A process model for implementing information systems security governance},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {10--38},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-07-2016-0061},
  doi          = {10.1108/ICS-07-2016-0061},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Nicho18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SmithDH18,
  author       = {Kane Smith and
                  Gurpreet Dhillon and
                  Karin Hedstr{\"{o}}m},
  title        = {Reconciling value-based objectives for security and identity management},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {194--212},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-08-2017-0059},
  doi          = {10.1108/ICS-08-2017-0059},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SmithDH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SnymanKK18,
  author       = {Dirk Snyman and
                  Hennie A. Kruger and
                  Wayne D. Kearney},
  title        = {I shall, we shall, and all others will: paradoxical information security
                  behaviour},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {290--305},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-03-2018-0034},
  doi          = {10.1108/ICS-03-2018-0034},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SnymanKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SolmsS18,
  author       = {Basie von Solms and
                  Rossouw von Solms},
  title        = {Cybersecurity and information security - what goes where?},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {2--9},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-04-2017-0025},
  doi          = {10.1108/ICS-04-2017-0025},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SolmsS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Sommestad18,
  author       = {Teodor Sommestad},
  title        = {Work-related groups and information security policy compliance},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {5},
  pages        = {533--550},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-08-2017-0054},
  doi          = {10.1108/ICS-08-2017-0054},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/Sommestad18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SonowalK18,
  author       = {Gunikhan Sonowal and
                  K. S. Kuppusamy},
  title        = {MMSPhiD: a phoneme based phishing verification model for persons with
                  visual impairments},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {5},
  pages        = {613--636},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-12-2017-0091},
  doi          = {10.1108/ICS-12-2017-0091},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SonowalK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Stewart18,
  author       = {Andrew Stewart},
  title        = {A utilitarian re-examination of enterprise-scale information security
                  management},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {39--57},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-03-2017-0012},
  doi          = {10.1108/ICS-03-2017-0012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Stewart18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/StewartJ18,
  author       = {Harrison Stewart and
                  Jan J{\"{u}}rjens},
  title        = {Data security and consumer trust in FinTech innovation in Germany},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {109--128},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-06-2017-0039},
  doi          = {10.1108/ICS-06-2017-0039},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/StewartJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TuYAC18,
  author       = {Zhiling Tu and
                  Yufei Yuan and
                  Norm Archer and
                  Catherine E. Connelly},
  title        = {Strategic value alignment for information security management: a critical
                  success factor analysis},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {150--170},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-06-2017-0042},
  doi          = {10.1108/ICS-06-2017-0042},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TuYAC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Tweneboah-Koduah18,
  author       = {Samuel Tweneboah{-}Koduah and
                  Francis Atsu and
                  William J. Buchanan},
  title        = {Impact of cyberattacks on stock performance: a comparative study},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {5},
  pages        = {637--652},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-05-2018-0060},
  doi          = {10.1108/ICS-05-2018-0060},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/Tweneboah-Koduah18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Veiga18,
  author       = {Ad{\'{e}}le da Veiga},
  title        = {An information privacy culture instrument to measure consumer privacy
                  expectations and confidence},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {338--364},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-03-2018-0036},
  doi          = {10.1108/ICS-03-2018-0036},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Veiga18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Veiga18a,
  author       = {Ad{\'{e}}le da Veiga},
  title        = {An approach to information security culture change combining {ADKAR}
                  and the {ISCA} questionnaire to aid transition to the desired culture},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {5},
  pages        = {584--612},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-08-2017-0056},
  doi          = {10.1108/ICS-08-2017-0056},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Veiga18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/YaylaL18,
  author       = {Ali Alper Yayla and
                  Yu Lei},
  title        = {Information security policies and value conflict in multinational
                  companies},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {230--245},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-08-2017-0061},
  doi          = {10.1108/ICS-08-2017-0061},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/YaylaL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AddaeBSTR17,
  author       = {Joyce Hoese Addae and
                  Michael A. Brown and
                  Xu Sun and
                  Dave Towey and
                  Milena Radenkovic},
  title        = {Measuring attitude towards personal data for adaptive cybersecurity},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {5},
  pages        = {560--579},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-11-2016-0085},
  doi          = {10.1108/ICS-11-2016-0085},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AddaeBSTR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AldiniSLTG17,
  author       = {Alessandro Aldini and
                  Jean{-}Marc Seigneur and
                  Carlos Ballester Lafuente and
                  Xavier Titi and
                  Jonathan Guislain},
  title        = {Design and validation of a trust-based opportunity-enabled risk management
                  system},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {1},
  pages        = {2--25},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-05-2016-0037},
  doi          = {10.1108/ICS-05-2016-0037},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AldiniSLTG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AurigemmaM17,
  author       = {Salvatore Aurigemma and
                  Thomas Mattson},
  title        = {Deterrence and punishment experience impacts on {ISP} compliance attitudes},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {4},
  pages        = {421--436},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-11-2016-0089},
  doi          = {10.1108/ICS-11-2016-0089},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AurigemmaM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BelloMA17,
  author       = {Abubakar Garba Bello and
                  David Murray and
                  Jocelyn Armarego},
  title        = {A systematic approach to investigating how information security and
                  privacy can be achieved in {BYOD} environments},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {4},
  pages        = {475--492},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-03-2016-0025},
  doi          = {10.1108/ICS-03-2016-0025},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BelloMA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BulleeMJH17,
  author       = {Jan{-}Willem Bullee and
                  Lorena Montoya and
                  Marianne Junger and
                  Pieter H. Hartel},
  title        = {Spear phishing in organisations explained},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {5},
  pages        = {593--613},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-03-2017-0009},
  doi          = {10.1108/ICS-03-2017-0009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BulleeMJH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChenL17,
  author       = {Hao Chen and
                  Wenli Li},
  title        = {Mobile device users' privacy security assurance behavior: {A} technology
                  threat avoidance perspective},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {3},
  pages        = {330--344},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-04-2016-0027},
  doi          = {10.1108/ICS-04-2016-0027},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChenL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Chulkov17,
  author       = {Dmitriy V. Chulkov},
  title        = {Escalation of commitment and information security: theories and implications},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {5},
  pages        = {580--592},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-02-2016-0015},
  doi          = {10.1108/ICS-02-2016-0015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Chulkov17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ConnollyLGT17,
  author       = {Lena Yuryna Connolly and
                  Michael Lang and
                  John Gathegi and
                  J. Doug Tygar},
  title        = {Organisational culture, procedural countermeasures, and employee security
                  behaviour: {A} qualitative study},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {118--136},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-03-2017-0013},
  doi          = {10.1108/ICS-03-2017-0013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ConnollyLGT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/CopeSCMJ17,
  author       = {Jacqueline Cope and
                  Fran{\c{c}}ois Siewe and
                  Feng Chen and
                  Leandros A. Maglaras and
                  Helge Janicke},
  title        = {On data leakage from non-production systems},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {4},
  pages        = {454--474},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-02-2017-0004},
  doi          = {10.1108/ICS-02-2017-0004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/CopeSCMJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DamenuB17,
  author       = {Temesgen Kitaw Damenu and
                  Chris Beaumont},
  title        = {Analysing information security in a bank using soft systems methodology},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {3},
  pages        = {240--258},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-07-2016-0053},
  doi          = {10.1108/ICS-07-2016-0053},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DamenuB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GcazaSGV17,
  author       = {Noluxolo Gcaza and
                  Rossouw von Solms and
                  Marthie Grobler and
                  Joey Jansen van Vuuren},
  title        = {A general morphological analysis: delineating a cyber-security culture},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {3},
  pages        = {259--278},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-12-2015-0046},
  doi          = {10.1108/ICS-12-2015-0046},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GcazaSGV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GreeneC17,
  author       = {Kristen K. Greene and
                  Yee{-}Yin Choong},
  title        = {Must I, can I? {I} don't understand your ambiguous password rules},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {1},
  pages        = {80--99},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-06-2016-0043},
  doi          = {10.1108/ICS-06-2016-0043},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GreeneC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HolmS17,
  author       = {Hannes Holm and
                  Teodor Sommestad},
  title        = {So long, and thanks for only using readily available scripts},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {1},
  pages        = {47--61},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-08-2016-0069},
  doi          = {10.1108/ICS-08-2016-0069},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HolmS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JansenS17,
  author       = {Jurjen Jansen and
                  Paul van Schaik},
  title        = {Comparing three models to explain precautionary online behavioural
                  intentions},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {165--180},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-03-2017-0018},
  doi          = {10.1108/ICS-03-2017-0018},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JansenS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KajiyamaJA17,
  author       = {Takahiko Kajiyama and
                  Murray E. Jennex and
                  Theophilus B. A. Addo},
  title        = {To cloud or not to cloud: how risks and threats are affecting cloud
                  adoption decisions},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {5},
  pages        = {634--659},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-07-2016-0051},
  doi          = {10.1108/ICS-07-2016-0051},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KajiyamaJA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Kalloniatis17,
  author       = {Christos Kalloniatis},
  title        = {Incorporating privacy in the design of cloud-based systems: a conceptual
                  meta-model},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {5},
  pages        = {614--633},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-06-2016-0044},
  doi          = {10.1108/ICS-06-2016-0044},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Kalloniatis17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Karanja17,
  author       = {Erastus Karanja},
  title        = {The role of the chief information security officer in the management
                  of {IT} security},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {3},
  pages        = {300--329},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-02-2016-0013},
  doi          = {10.1108/ICS-02-2016-0013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Karanja17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KarlssonKA17,
  author       = {Fredrik Karlsson and
                  Martin Karlsson and
                  Joachim {\AA}str{\"{o}}m},
  title        = {Measuring employees' compliance - the importance of value pluralism},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {3},
  pages        = {279--299},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-11-2016-0084},
  doi          = {10.1108/ICS-11-2016-0084},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KarlssonKA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KaukolaRTHL17,
  author       = {Jesse Kaukola and
                  Jukka Ruohonen and
                  Antti Tuomisto and
                  Sami Hyrynsalmi and
                  Ville Lepp{\"{a}}nen},
  title        = {Tightroping between {APT} and {BCI} in small enterprises},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {3},
  pages        = {226--239},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-07-2016-0047},
  doi          = {10.1108/ICS-07-2016-0047},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KaukolaRTHL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KiayiasZZ17,
  author       = {Aggelos Kiayias and
                  Thomas Zacharias and
                  Bingsheng Zhang},
  title        = {Auditing for privacy in threshold {PKE} e-voting},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {1},
  pages        = {100--116},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-07-2016-0056},
  doi          = {10.1108/ICS-07-2016-0056},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/KiayiasZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MayerGMVV17,
  author       = {Peter Mayer and
                  Nina Gerber and
                  Ronja McDermott and
                  Melanie Volkamer and
                  Joachim Vogt},
  title        = {Productivity vs security: mitigating conflicting goals in organizations},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {137--151},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-03-2017-0014},
  doi          = {10.1108/ICS-03-2017-0014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MayerGMVV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Munteanu17,
  author       = {Adrian Munteanu},
  title        = {Running the risk {IT} - more perception and less probabilities in
                  uncertain systems},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {3},
  pages        = {345--354},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-07-2016-0055},
  doi          = {10.1108/ICS-07-2016-0055},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Munteanu17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PattersonHZ17,
  author       = {Nicholas Charles Patterson and
                  Michael Hobbs and
                  Tianqing Zhu},
  title        = {A cyber-threat analytic model for autonomous detection of virtual
                  property theft},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {4},
  pages        = {358--381},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-11-2016-0087},
  doi          = {10.1108/ICS-11-2016-0087},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PattersonHZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PattinsonBPMC17,
  author       = {Malcolm Robert Pattinson and
                  Marcus A. Butavicius and
                  Kathryn Parsons and
                  Agata McCormac and
                  Dragana Calic},
  title        = {Managing information security awareness at an Australian bank: a comparative
                  study},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {181--189},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-03-2017-0017},
  doi          = {10.1108/ICS-03-2017-0017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PattinsonBPMC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PolatidisGPS17,
  author       = {Nikolaos Polatidis and
                  Christos K. Georgiadis and
                  Elias Pimenidis and
                  Emmanouil Stiakakis},
  title        = {Privacy-preserving recommendations in context-aware mobile environments},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {1},
  pages        = {62--79},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-04-2016-0028},
  doi          = {10.1108/ICS-04-2016-0028},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PolatidisGPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RajivanMKC17,
  author       = {Prashanth Rajivan and
                  Pablo Moriano and
                  Timothy Kelley and
                  L. Jean Camp},
  title        = {Factors in an end user security expertise instrument},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {190--205},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-04-2017-0020},
  doi          = {10.1108/ICS-04-2017-0020},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RajivanMKC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RayK17,
  author       = {Argha Ray and
                  Anjali Kaushik},
  title        = {State transgression on electronic expression: is it for real?},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {4},
  pages        = {382--401},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-03-2016-0024},
  doi          = {10.1108/ICS-03-2016-0024},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RayK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SchaabBP17,
  author       = {Peter Schaab and
                  Kristian Beckers and
                  Sebastian Pape},
  title        = {Social engineering defence mechanisms and counteracting training strategies},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {206--222},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-04-2017-0022},
  doi          = {10.1108/ICS-04-2017-0022},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SchaabBP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SnymanK17,
  author       = {Dirk Snyman and
                  Hennie A. Kruger},
  title        = {The application of behavioural thresholds to analyse collective behaviour
                  in information security},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {152--164},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-03-2017-0015},
  doi          = {10.1108/ICS-03-2017-0015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SnymanK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SolmsW17,
  author       = {Rossouw von Solms and
                  Melanie Willett},
  title        = {Cloud computing assurance - a review of literature guidance},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {1},
  pages        = {26--46},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-09-2015-0037},
  doi          = {10.1108/ICS-09-2015-0037},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SolmsW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/StewartJ17,
  author       = {Harrison Stewart and
                  Jan J{\"{u}}rjens},
  title        = {Information security management and the human aspect in organizations},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {5},
  pages        = {494--534},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-07-2016-0054},
  doi          = {10.1108/ICS-07-2016-0054},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/StewartJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/StillCS17,
  author       = {Jeremiah D. Still and
                  Ashley A. Cain and
                  David Schuster},
  title        = {Human-centered authentication guidelines},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {4},
  pages        = {437--453},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-04-2016-0034},
  doi          = {10.1108/ICS-04-2016-0034},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/StillCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Taherdoost17,
  author       = {Hamed Taherdoost},
  title        = {Understanding of e-service security dimensions and its effect on quality
                  and intention to use},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {5},
  pages        = {535--559},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-09-2016-0074},
  doi          = {10.1108/ICS-09-2016-0074},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Taherdoost17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Woltjer17,
  author       = {Rogier Woltjer},
  title        = {Workarounds and trade-offs in information security - an exploratory
                  study},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {4},
  pages        = {402--420},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-02-2016-0017},
  doi          = {10.1108/ICS-02-2016-0017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Woltjer17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AbdelazizNG16,
  author       = {Abdelaziz Amara Korba and
                  Mehdi Nafaa and
                  Salim Ghanemi},
  title        = {An efficient intrusion detection and prevention framework for ad hoc
                  networks},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {298--325},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-08-2015-0034},
  doi          = {10.1108/ICS-08-2015-0034},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AbdelazizNG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Al-AmeenHW16,
  author       = {Mahdi Nasrullah Al{-}Ameen and
                  S. M. Taiabul Haque and
                  Matthew K. Wright},
  title        = {Leveraging autobiographical memory for two-factor online authentication},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {386--399},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-01-2016-0005},
  doi          = {10.1108/ICS-01-2016-0005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Al-AmeenHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AlaviIM16,
  author       = {Reza Alavi and
                  Shareeful Islam and
                  Haralambos Mouratidis},
  title        = {An information security risk-driven investment model for analysing
                  human factors},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {205--227},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-01-2016-0006},
  doi          = {10.1108/ICS-01-2016-0006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AlaviIM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AndriotisOMT16,
  author       = {Panagiotis Andriotis and
                  George C. Oikonomou and
                  Alexios Mylonas and
                  Theo Tryfonas},
  title        = {A study on usability and security features of the Android pattern
                  lock screen},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {1},
  pages        = {53--72},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-01-2015-0001},
  doi          = {10.1108/ICS-01-2015-0001},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/AndriotisOMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DasK16,
  author       = {Amit Das and
                  Habib Ullah Khan},
  title        = {Security behaviors of smartphone users},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {1},
  pages        = {116--134},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-04-2015-0018},
  doi          = {10.1108/ICS-04-2015-0018},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DasK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/El-TemtamyMP16,
  author       = {Osama El{-}Temtamy and
                  Munir Majdalawieh and
                  Lela Pumphrey},
  title        = {Assessing {IT} disaster recovery plans: The case of publicly listed
                  firms on Abu Dhabi/UAE security exchange},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {5},
  pages        = {514--533},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-04-2016-0030},
  doi          = {10.1108/ICS-04-2016-0030},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/El-TemtamyMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FenzPH16,
  author       = {Stefan Fenz and
                  Stefanie Plieschnegger and
                  Heidi Hobel},
  title        = {Mapping information security standard {ISO} 27002 to an ontological
                  structure},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {5},
  pages        = {452--473},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-07-2015-0030},
  doi          = {10.1108/ICS-07-2015-0030},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FenzPH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FurnellC16,
  author       = {Steven Furnell and
                  Nathan Luke Clarke},
  title        = {Guest editorial},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {138},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-05-2016-0036},
  doi          = {10.1108/ICS-05-2016-0036},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/FurnellC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GurungR16,
  author       = {Anil Gurung and
                  M. K. Raja},
  title        = {Online privacy and security concerns of consumers},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {348--371},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-05-2015-0020},
  doi          = {10.1108/ICS-05-2015-0020},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GurungR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HarrisC16,
  author       = {Mark A. Harris and
                  Amita Goyal Chin},
  title        = {Consumer trust in Google's top developers' apps: an exploratory study},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {5},
  pages        = {474--495},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-11-2015-0044},
  doi          = {10.1108/ICS-11-2015-0044},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HarrisC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HelkalaKJKL16,
  author       = {Kirsi Helkala and
                  Benjamin Knox and
                  {\O}yvind J{\o}sok and
                  Silje Knox and
                  Mass Soldal Lund},
  title        = {Factors to affect improvement in cyber officer performance},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {152--163},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-01-2016-0001},
  doi          = {10.1108/ICS-01-2016-0001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HelkalaKJKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KarlssonKP16,
  author       = {Fredrik Karlsson and
                  Ella Kolkowska and
                  Frans Prenkert},
  title        = {Inter-organisational information security: a systematic literature
                  review},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {5},
  pages        = {418--451},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-11-2016-091},
  doi          = {10.1108/ICS-11-2016-091},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KarlssonKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KearneyK16,
  author       = {Wayne D. Kearney and
                  Hennie A. Kruger},
  title        = {Theorising on risk homeostasis in the context of information security
                  behaviour},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {5},
  pages        = {496--513},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-04-2016-0029},
  doi          = {10.1108/ICS-04-2016-0029},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KearneyK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KelleyB16,
  author       = {Timothy Kelley and
                  Bennett I. Bertenthal},
  title        = {Attention and past behavior, not security knowledge, modulate users'
                  decisions to login to insecure websites},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {164--176},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-01-2016-0002},
  doi          = {10.1108/ICS-01-2016-0002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KelleyB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Kennedy16,
  author       = {Sarah Elizabeth Kennedy},
  title        = {The pathway to security - mitigating user negligence},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {255--264},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-10-2014-0065},
  doi          = {10.1108/ICS-10-2014-0065},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Kennedy16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LiM16,
  author       = {Wenjuan Li and
                  Weizhi Meng},
  title        = {Enhancing collaborative intrusion detection networks using intrusion
                  sensitivity in detecting pollution attacks},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {265--276},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-12-2014-0077},
  doi          = {10.1108/ICS-12-2014-0077},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LiM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LineA16,
  author       = {Maria Bartnes Line and
                  Eirik Albrechtsen},
  title        = {Examining the suitability of industrial safety management approaches
                  for information security incident management},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {1},
  pages        = {20--37},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-01-2015-0003},
  doi          = {10.1108/ICS-01-2015-0003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LineA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Meng16,
  author       = {Weizhi Meng},
  title        = {Evaluating the effect of multi-touch behaviours on Android unlock
                  patterns},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {277--287},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-12-2014-0078},
  doi          = {10.1108/ICS-12-2014-0078},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Meng16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MiragliaC16,
  author       = {Armando Miraglia and
                  Matteo Casenove},
  title        = {Fight fire with fire: the ultimate active defence},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {288--296},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-01-2015-0004},
  doi          = {10.1108/ICS-01-2015-0004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MiragliaC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PattinsonPBMC16,
  author       = {Malcolm Robert Pattinson and
                  Kathryn Parsons and
                  Marcus A. Butavicius and
                  Agata McCormac and
                  Dragana Calic},
  title        = {Assessing information security attitudes: a comparison of two studies},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {228--240},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-01-2016-0009},
  doi          = {10.1108/ICS-01-2016-0009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PattinsonPBMC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PhamER16,
  author       = {Cong Hiep Pham and
                  Jamal El{-}Den and
                  Joan Richardson},
  title        = {Stress-based security compliance model - an exploratory study},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {326--347},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-10-2014-0067},
  doi          = {10.1108/ICS-10-2014-0067},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/PhamER16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PipyrosMGA16,
  author       = {Kosmas Pipyros and
                  Lilian Mitrou and
                  Dimitris Gritzalis and
                  Theodoros K. Apostolopoulos},
  title        = {Cyberoperations and international humanitarian law: {A} review of
                  obstacles in applying international law rules in cyber warfare},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {1},
  pages        = {38--52},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-12-2014-0081},
  doi          = {10.1108/ICS-12-2014-0081},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PipyrosMGA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ReidN16,
  author       = {Rayne Reid and
                  Johan Van Niekerk},
  title        = {Decoding audience interpretations of awareness campaign messages},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {177--193},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-01-2016-0003},
  doi          = {10.1108/ICS-01-2016-0003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ReidN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RenaudFEV16,
  author       = {Karen Renaud and
                  Stephen Flowerday and
                  Rosanne English and
                  Melanie Volkamer},
  title        = {Why don't {UK} citizens protest against privacy-invading dragnet surveillance?},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {400--415},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-06-2015-0024},
  doi          = {10.1108/ICS-06-2015-0024},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RenaudFEV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RohnSL16,
  author       = {Eli Rohn and
                  Gilad Sabari and
                  Guy Leshem},
  title        = {Explaining small business InfoSec posture using social theories},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {5},
  pages        = {534--556},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-09-2015-0041},
  doi          = {10.1108/ICS-09-2015-0041},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RohnSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SchatzB16,
  author       = {Daniel Schatz and
                  Rabih Bashroush},
  title        = {The impact of repeated data breach events on organisations' market
                  value},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {1},
  pages        = {73--92},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-03-2014-0020},
  doi          = {10.1108/ICS-03-2014-0020},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/SchatzB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ShumilovP16,
  author       = {Artem Shumilov and
                  Andrey Philippovich},
  title        = {Gesture-based animated {CAPTCHA}},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {242--254},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-12-2014-0082},
  doi          = {10.1108/ICS-12-2014-0082},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ShumilovP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SommestadKNH16,
  author       = {Teodor Sommestad and
                  Henrik Karlz{\'{e}}n and
                  Peter Nilsson and
                  Jonas Hallberg},
  title        = {An empirical test of the perceived relationship between risk and the
                  constituents severity and probability},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {194--204},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-01-2016-0004},
  doi          = {10.1108/ICS-01-2016-0004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SommestadKNH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TasidouESMK16,
  author       = {Aimilia Tasidou and
                  Pavlos S. Efraimidis and
                  Yannis Soupionis and
                  Lilian Mitrou and
                  Vasilios Katos},
  title        = {Privacy-preserving, user-centric VoIP {CAPTCHA} challenges: An integrated
                  solution in the {SIP} environment},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {1},
  pages        = {2--19},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-07-2014-0046},
  doi          = {10.1108/ICS-07-2014-0046},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TasidouESMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Veiga16,
  author       = {Ad{\'{e}}le da Veiga},
  title        = {Comparing the information security culture of employees who had read
                  the information security policy and those who had not: Illustrated
                  through an empirical study},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {139--151},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-12-2015-0048},
  doi          = {10.1108/ICS-12-2015-0048},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Veiga16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/VolkamerRG16,
  author       = {Melanie Volkamer and
                  Karen Renaud and
                  Paul Gerber},
  title        = {Spot the phish by checking the pruned {URL}},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {372--385},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-07-2015-0032},
  doi          = {10.1108/ICS-07-2015-0032},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/VolkamerRG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/YuL16,
  author       = {Xiaoying Yu and
                  Qi Liao},
  title        = {User password repetitive patterns analysis and visualization},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {1},
  pages        = {93--115},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-06-2015-0026},
  doi          = {10.1108/ICS-06-2015-0026},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/YuL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AdnanJBK15,
  author       = {Muhammad Adnan and
                  Mike Just and
                  Lynne Baillie and
                  Hilmi G{\"{u}}nes Kayacik},
  title        = {Investigating the work practices of network security professionals},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {347--367},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-07-2014-0049},
  doi          = {10.1108/ICS-07-2014-0049},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AdnanJBK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AhmimZ15,
  author       = {Ahmed Ahmim and
                  Nacira Ghoualmi{-}Zine},
  title        = {A new hierarchical intrusion detection system based on a binary tree
                  of classifiers},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {31--57},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-04-2013-0031},
  doi          = {10.1108/ICS-04-2013-0031},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AhmimZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Al-MukahalA15,
  author       = {Hasan M. Al{-}Mukahal and
                  Khaled A. Alshare},
  title        = {An examination of factors that influence the number of information
                  security policy violations in Qatari organizations},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {102--118},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-03-2014-0018},
  doi          = {10.1108/ICS-03-2014-0018},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Al-MukahalA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Alqahtani15,
  author       = {Abdulrahman Alqahtani},
  title        = {Towards a framework for the potential cyber-terrorist threat to critical
                  national infrastructure: {A} quantitative study},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {5},
  pages        = {532--569},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-09-2014-0060},
  doi          = {10.1108/ICS-09-2014-0060},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Alqahtani15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BorumFKDF15,
  author       = {Randy Borum and
                  John Felker and
                  Sean Kern and
                  Kristen Dennesen and
                  Tonya Feyes},
  title        = {Strategic cyber intelligence},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {317--332},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-09-2014-0064},
  doi          = {10.1108/ICS-09-2014-0064},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BorumFKDF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BrookeP15,
  author       = {Phillip J. Brooke and
                  Richard F. Paige},
  title        = {User-visible cryptography in email and web scenarios},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {58--72},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-07-2013-0054},
  doi          = {10.1108/ICS-07-2013-0054},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BrookeP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ButlerB15,
  author       = {Martin J. Butler and
                  Rika Butler},
  title        = {Investigating the possibility to use differentiated authentication
                  based on risk profiling to secure online banking},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {421--434},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-11-2014-0074},
  doi          = {10.1108/ICS-11-2014-0074},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ButlerB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Faily15,
  author       = {Shamal Faily},
  title        = {Engaging stakeholders during late stage security design with assumption
                  personas},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {435--446},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-10-2014-0066},
  doi          = {10.1108/ICS-10-2014-0066},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Faily15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FerryOC15,
  author       = {Eugene Ferry and
                  John O'Raw and
                  Kevin Curran},
  title        = {Security evaluation of the OAuth 2.0 framework},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {73--101},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-12-2013-0089},
  doi          = {10.1108/ICS-12-2013-0089},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FerryOC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FloresHNE15,
  author       = {Waldo Rocha Flores and
                  Hannes Holm and
                  Marcus Nohlberg and
                  Mathias Ekstedt},
  title        = {Investigating personal determinants of phishing and the effect of
                  national culture},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {178--199},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-05-2014-0029},
  doi          = {10.1108/ICS-05-2014-0029},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FloresHNE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ForgetCB15,
  author       = {Alain Forget and
                  Sonia Chiasson and
                  Robert Biddle},
  title        = {User-centred authentication feature framework},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {5},
  pages        = {497--515},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-08-2014-0058},
  doi          = {10.1108/ICS-08-2014-0058},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ForgetCB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Furnell15,
  author       = {Steven Furnell},
  title        = {Editorial},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {1},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-01-2015-0002},
  doi          = {10.1108/ICS-01-2015-0002},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/Furnell15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HoHY15,
  author       = {Li{-}Hsing Ho and
                  Ming{-}Tsai Hsu and
                  Tieh{-}Min Yen},
  title        = {Identifying core control items of information security management
                  and improvement strategies by applying fuzzy {DEMATEL}},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {161--177},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-04-2014-0026},
  doi          = {10.1108/ICS-04-2014-0026},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HoHY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Hughes-Roberts15,
  author       = {Thomas Hughes{-}Roberts},
  title        = {Privacy as a secondary goal problem: an experiment examining control},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {382--393},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-10-2014-0068},
  doi          = {10.1108/ICS-10-2014-0068},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Hughes-Roberts15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KarlssonAK15,
  author       = {Fredrik Karlsson and
                  Joachim {\AA}str{\"{o}}m and
                  Martin Karlsson},
  title        = {Information security culture - state-of-the-art review between 2000
                  and 2013},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {246--285},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-05-2014-0033},
  doi          = {10.1108/ICS-05-2014-0033},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KarlssonAK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LotterF15,
  author       = {Andr{\'{e}} L{\"{o}}tter and
                  Lynn Futcher},
  title        = {A framework to assist email users in the identification of phishing
                  attacks},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {370--381},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-10-2014-0070},
  doi          = {10.1108/ICS-10-2014-0070},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LotterF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Marett15,
  author       = {Kent Marett},
  title        = {Checking the manipulation checks in information security research},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {20--30},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-12-2013-0087},
  doi          = {10.1108/ICS-12-2013-0087},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Marett15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Mishra15,
  author       = {Sushma Mishra},
  title        = {Organizational objectives for information security governance: a value
                  focused assessment},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {122--144},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-02-2014-0016},
  doi          = {10.1108/ICS-02-2014-0016},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Mishra15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/NK15,
  author       = {Sindhuja P. N. and
                  Anand S. Kunnathur},
  title        = {Information security in supply chains: a management control perspective},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {5},
  pages        = {476--496},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-07-2014-0050},
  doi          = {10.1108/ICS-07-2014-0050},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/NK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/NgoqoF15,
  author       = {Bukelwa Ngoqo and
                  Stephen V. Flowerday},
  title        = {Exploring the relationship between student mobile information security
                  awareness and behavioural intent},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {406--420},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-10-2014-0072},
  doi          = {10.1108/ICS-10-2014-0072},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/NgoqoF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Purkait15,
  author       = {Swapan Purkait},
  title        = {Examining the effectiveness of phishing filters against {DNS} based
                  phishing attacks},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {333--346},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-02-2013-0009},
  doi          = {10.1108/ICS-02-2013-0009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Purkait15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ShahpasandSGG15,
  author       = {Maryam Shahpasand and
                  Mehdi Shajari and
                  Seyed Alireza Hashemi Golpaygani and
                  Hoda Ghavamipoor},
  title        = {A comprehensive security control selection model for inter-dependent
                  organizational assets structure},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {218--242},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-12-2013-0090},
  doi          = {10.1108/ICS-12-2013-0090},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ShahpasandSGG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SilicBS15,
  author       = {Mario Silic and
                  Andrea Back and
                  Dario Silic},
  title        = {Taxonomy of technological risks of open source software in the enterprise
                  adoption context},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {5},
  pages        = {570--583},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-08-2014-0056},
  doi          = {10.1108/ICS-08-2014-0056},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SilicBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Skotnes15,
  author       = {Ruth {\O}stgaard Skotnes},
  title        = {Management commitment and awareness creation - {ICT} safety and security
                  in electric power supply network companies},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {302--316},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-02-2014-0017},
  doi          = {10.1108/ICS-02-2014-0017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Skotnes15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SommestadKH15,
  author       = {Teodor Sommestad and
                  Henrik Karlz{\'{e}}n and
                  Jonas Hallberg},
  title        = {The sufficiency of the theory of planned behavior for explaining information
                  security policy compliance},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {200--217},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-04-2014-0025},
  doi          = {10.1108/ICS-04-2014-0025},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/SommestadKH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SommestadS15,
  author       = {Teodor Sommestad and
                  Fredrik Sandstr{\"{o}}m},
  title        = {An empirical test of the accuracy of an attack graph analysis tool},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {5},
  pages        = {516--531},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-06-2014-0036},
  doi          = {10.1108/ICS-06-2014-0036},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SommestadS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SrivastavaT15,
  author       = {Himanshu Srivastava and
                  Shashikala Tapaswi},
  title        = {Logical acquisition and analysis of data from android mobile devices},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {5},
  pages        = {450--475},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-02-2014-0013},
  doi          = {10.1108/ICS-02-2014-0013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SrivastavaT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SunD15,
  author       = {Yan Sun and
                  Ian Davidson},
  title        = {Influential factors of online fraud occurrence in retailing banking
                  sectors from a global prospective: An empirical study of individual
                  customers in the {UK} and China},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {3--19},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-10-2013-0076},
  doi          = {10.1108/ICS-10-2013-0076},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SunD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TsavliEKM15,
  author       = {Matina Tsavli and
                  Pavlos S. Efraimidis and
                  Vasilios Katos and
                  Lilian Mitrou},
  title        = {Reengineering the user: privacy concerns about personal data on smartphones},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {394--405},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-10-2014-0071},
  doi          = {10.1108/ICS-10-2014-0071},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TsavliEKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TsimperidisKC15,
  author       = {Ioannis Tsimperidis and
                  Vasilios Katos and
                  Nathan L. Clarke},
  title        = {Language-independent gender identification through keystroke analysis},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {286--301},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-05-2014-0032},
  doi          = {10.1108/ICS-05-2014-0032},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TsimperidisKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Yen15,
  author       = {Yung{-}Shen Yen},
  title        = {Managing perceived risk for customer retention in e-commerce: The
                  role of switching costs},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {145--160},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-12-2013-0088},
  doi          = {10.1108/ICS-12-2013-0088},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Yen15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AhmadM14,
  author       = {Atif Ahmad and
                  Sean B. Maynard},
  title        = {Teaching information security management: reflections and experiences},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {513--536},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-08-2013-0058},
  doi          = {10.1108/IMCS-08-2013-0058},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AhmadM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AlazabHAKA14,
  author       = {Ammar Alazab and
                  Michael Hobbs and
                  Jemal H. Abawajy and
                  Ansam Khraisat and
                  Mamoun Alazab},
  title        = {Using response action with intelligent intrusion detection and prevention
                  system against web application malware},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {431--449},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-02-2013-0007},
  doi          = {10.1108/IMCS-02-2013-0007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AlazabHAKA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AtoumOA14,
  author       = {Issa Atoum and
                  Ahmed Otoom and
                  Amer Abu{-}Ali},
  title        = {A holistic cyber security implementation framework},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {251--264},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-02-2013-0014},
  doi          = {10.1108/IMCS-02-2013-0014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AtoumOA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Azhari14,
  author       = {Firman Azhari},
  title        = {Quick detection of {NFC} vulnerability: Implementation weakness exploitation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {134--140},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-09-2013-0067},
  doi          = {10.1108/IMCS-09-2013-0067},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Azhari14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BahlW14,
  author       = {Sanjay Bahl and
                  Om Prakash Wali},
  title        = {Perceived significance of information security governance to predict
                  the information security service quality in software service industry:
                  An empirical analysis},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {2--23},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-01-2013-0002},
  doi          = {10.1108/IMCS-01-2013-0002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BahlW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChoiN14,
  author       = {Jae Choi and
                  Derek L. Nazareth},
  title        = {Repairing trust in an e-commerce and security context: an agent-based
                  modeling approach},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {490--512},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-09-2013-0069},
  doi          = {10.1108/IMCS-09-2013-0069},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChoiN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DArcyG14,
  author       = {John D'Arcy and
                  Gwen Greene},
  title        = {Security culture and the employment relationship as drivers of employees'
                  security compliance},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {474--489},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-08-2013-0057},
  doi          = {10.1108/IMCS-08-2013-0057},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DArcyG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FenzHNP14,
  author       = {Stefan Fenz and
                  Johannes Heurix and
                  Thomas Neubauer and
                  Fabian Pechstein},
  title        = {Current challenges in information security risk management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {410--430},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-07-2013-0053},
  doi          = {10.1108/IMCS-07-2013-0053},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FenzHNP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FloresHSE14,
  author       = {Waldo Rocha Flores and
                  Hannes Holm and
                  Gustav Svensson and
                  G{\"{o}}ran Ericsson},
  title        = {Using phishing experiments and scenario-based surveys to understand
                  security behaviours in practice},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {393--406},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-11-2013-0083},
  doi          = {10.1108/IMCS-11-2013-0083},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FloresHSE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Gulenko14,
  author       = {Iwan Gulenko},
  title        = {Improving passwords: influence of emotions on security behaviour},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {167--178},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-09-2013-0068},
  doi          = {10.1108/IMCS-09-2013-0068},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Gulenko14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HaggertyHT14,
  author       = {John Haggerty and
                  Sheryllynne Haggerty and
                  Mark John Taylor},
  title        = {Forensic triage of email network narratives through visualisation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {358--370},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-11-2013-0080},
  doi          = {10.1108/IMCS-11-2013-0080},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HaggertyHT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HarrisP14,
  author       = {Mark A. Harris and
                  Karen P. Patten},
  title        = {Mobile device security considerations for small- and medium-sized
                  enterprise business mobility},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {97--114},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-03-2013-0019},
  doi          = {10.1108/IMCS-03-2013-0019},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HarrisP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HelkalaB14,
  author       = {Kirsi Helkala and
                  Tone Hodd{\o} Bak{\aa}s},
  title        = {Extended results of Norwegian password security survey},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {346--357},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-10-2013-0079},
  doi          = {10.1108/IMCS-10-2013-0079},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HelkalaB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JamesG14,
  author       = {Peter James and
                  Don Griffiths},
  title        = {A secure portable execution environment to support teleworking},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {309--330},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-07-2013-0052},
  doi          = {10.1108/IMCS-07-2013-0052},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JamesG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KasperskyF14,
  author       = {Eugene Kaspersky and
                  Steven Furnell},
  title        = {A security education Q{\&}A},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {130--133},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-01-2014-0006},
  doi          = {10.1108/IMCS-01-2014-0006},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KasperskyF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Kim14,
  author       = {Eyong B. Kim},
  title        = {Recommendations for information security awareness training for college
                  students},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {115--126},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-01-2013-0005},
  doi          = {10.1108/IMCS-01-2013-0005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Kim14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ManiCM14,
  author       = {Deepa Mani and
                  Kim{-}Kwang Raymond Choo and
                  Sameera Mubarak},
  title        = {Information security in the South Australian real estate industry:
                  {A} study of 40 real estate organisations},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {24--41},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-10-2012-0060},
  doi          = {10.1108/IMCS-10-2012-0060},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ManiCM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MayayiseO14,
  author       = {Thembekile O. Mayayise and
                  Isaac Olusegun Osunmakinde},
  title        = {E-commerce assurance models and trustworthiness issues: an empirical
                  study},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {76--96},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-01-2013-0001},
  doi          = {10.1108/IMCS-01-2013-0001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MayayiseO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MengWK14,
  author       = {Weizhi Meng and
                  Duncan S. Wong and
                  Lam{-}for Kwok},
  title        = {The effect of adaptive mechanism on behavioural biometric based mobile
                  phone authentication},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {155--166},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-09-2013-0062},
  doi          = {10.1108/IMCS-09-2013-0062},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MengWK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/N14,
  author       = {Sindhuja P. N.},
  title        = {Impact of information security initiatives on supply chain performance:
                  An empirical investigation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {450--473},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-05-2013-0035},
  doi          = {10.1108/IMCS-05-2013-0035},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/N14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/OlemboKSHV14,
  author       = {Maina M. Olembo and
                  Timo Kilian and
                  Simon Stockhardt and
                  Andreas H{\"{u}}lsing and
                  Melanie Volkamer},
  title        = {Developing and testing SCoP - a visual hash scheme},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {382--392},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-11-2013-0082},
  doi          = {10.1108/IMCS-11-2013-0082},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/OlemboKSHV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ParsonsMPBJ14,
  author       = {Kathryn Parsons and
                  Agata McCormac and
                  Malcolm Robert Pattinson and
                  Marcus A. Butavicius and
                  Cate Jerram},
  title        = {A study of information security awareness in Australian government
                  organisations},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {334--345},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-10-2013-0078},
  doi          = {10.1108/IMCS-10-2013-0078},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ParsonsMPBJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PurkaitDS14,
  author       = {Swapan Purkait and
                  Sadhan Kumar De and
                  Damodar Suar},
  title        = {An empirical investigation of the factors that influence Internet
                  user's ability to correctly identify a phishing website},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {194--234},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-05-2013-0032},
  doi          = {10.1108/IMCS-05-2013-0032},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PurkaitDS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ReidN14,
  author       = {Rayne Reid and
                  Johan Van Niekerk},
  title        = {Snakes and ladders for digital natives: information security education
                  for the youth},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {179--190},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-09-2013-0063},
  doi          = {10.1108/IMCS-09-2013-0063},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ReidN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ReidN14a,
  author       = {Rayne Reid and
                  Johan Van Niekerk},
  title        = {Brain-compatible, web-based information security education: a statistical
                  study},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {371--381},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-11-2013-0081},
  doi          = {10.1108/IMCS-11-2013-0081},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ReidN14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RepelS14,
  author       = {Dusan Repel and
                  Ingo Stengel},
  title        = {Grammar-based transformations: attack and defence},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {141--154},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-09-2013-0071},
  doi          = {10.1108/IMCS-09-2013-0071},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RepelS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RigonWSW14,
  author       = {Evandro Alencar Rigon and
                  Carla Merkle Westphall and
                  Daniel Ricardo dos Santos and
                  Carlos Becker Westphall},
  title        = {A cyclical evaluation model of information security maturity},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {265--278},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-04-2013-0025},
  doi          = {10.1108/IMCS-04-2013-0025},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RigonWSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SilicB14,
  author       = {Mario Silic and
                  Andrea Back},
  title        = {Information security: Critical review and future directions for research},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {279--308},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-05-2013-0041},
  doi          = {10.1108/IMCS-05-2013-0041},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SilicB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SommestadHLB14,
  author       = {Teodor Sommestad and
                  Jonas Hallberg and
                  Kristoffer Lundholm and
                  Johan E. Bengtsson},
  title        = {Variables influencing information security policy compliance: {A}
                  systematic review of quantitative studies},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {42--75},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-08-2012-0045},
  doi          = {10.1108/IMCS-08-2012-0045},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/SommestadHLB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Yaokumah14,
  author       = {Winfred Yaokumah},
  title        = {Information security governance implementation within Ghanaian industry
                  sectors: An empirical study},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {235--250},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-06-2013-0044},
  doi          = {10.1108/IMCS-06-2013-0044},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Yaokumah14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ciampa13,
  author       = {Mark Ciampa},
  title        = {A comparison of password feedback mechanisms and their impact on password
                  entropy},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {5},
  pages        = {344--359},
  year         = {2013},
  url          = {https://doi.org/10.1108/IMCS-12-2012-0072},
  doi          = {10.1108/IMCS-12-2012-0072},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Ciampa13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/CuiKS13,
  author       = {Ang Cui and
                  Jatin Kataria and
                  Salvatore J. Stolfo},
  title        = {Revisiting the myth of Cisco {IOS} diversity: recent advances in reliable
                  shellcode design},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {2},
  pages        = {121--138},
  year         = {2013},
  url          = {https://doi.org/10.1108/IMCS-09-2012-0046},
  doi          = {10.1108/IMCS-09-2012-0046},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/CuiKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FrangopoulosEV13,
  author       = {Evangelos D. Frangopoulos and
                  Mariki M. Eloff and
                  Lucas M. Venter},
  title        = {Psychosocial risks: Can their effects on the security of information
                  systems really be ignored?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {1},
  pages        = {53--65},
  year         = {2013},
  url          = {https://doi.org/10.1108/09685221311314428},
  doi          = {10.1108/09685221311314428},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FrangopoulosEV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Gonzalez13,
  author       = {Pablo Carballude Gonz{\'{a}}lez},
  title        = {Fingerprinting Tor},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {2},
  pages        = {73--90},
  year         = {2013},
  url          = {https://doi.org/10.1108/IMCS-01-2013-0004},
  doi          = {10.1108/IMCS-01-2013-0004},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Gonzalez13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Gulenko13,
  author       = {Iwan Gulenko},
  title        = {Social against social engineering: Concept and development of a Facebook
                  application to raise security and risk awareness},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {2},
  pages        = {91--101},
  year         = {2013},
  url          = {https://doi.org/10.1108/IMCS-09-2012-0053},
  doi          = {10.1108/IMCS-09-2012-0053},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Gulenko13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Hajli13,
  author       = {Mahmood Hajli},
  title        = {A research framework for social commerce adoption},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {144--154},
  year         = {2013},
  url          = {https://doi.org/10.1108/IMCS-04-2012-0024},
  doi          = {10.1108/IMCS-04-2012-0024},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Hajli13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/He13,
  author       = {Wu He},
  title        = {A survey of security risks of mobile social media through blog mining
                  and an extensive literature search},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {5},
  pages        = {381--400},
  year         = {2013},
  url          = {https://doi.org/10.1108/IMCS-12-2012-0068},
  doi          = {10.1108/IMCS-12-2012-0068},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/He13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HedstromKK13,
  author       = {Karin Hedstr{\"{o}}m and
                  Fredrik Karlsson and
                  Ella Kolkowska},
  title        = {Social action theory for understanding information security non-compliance
                  in hospitals: The importance of user rationale},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {266--287},
  year         = {2013},
  url          = {https://doi.org/10.1108/IMCS-08-2012-0043},
  doi          = {10.1108/IMCS-08-2012-0043},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HedstromKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HolmE13,
  author       = {Hannes Holm and
                  Mathias Ekstedt},
  title        = {Estimates on the effectiveness of web application firewalls against
                  targeted attacks},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {250--265},
  year         = {2013},
  url          = {https://doi.org/10.1108/IMCS-11-2012-0064},
  doi          = {10.1108/IMCS-11-2012-0064},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HolmE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/IndrinalMS13,
  author       = {Mariah Strella P. Indrinal and
                  Ranyel Bryan L. Maliwanag and
                  Marynyriene I. Silvestre},
  title        = {VoxGrid: a mobile voice verification system},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {2},
  pages        = {110--120},
  year         = {2013},
  url          = {https://doi.org/10.1108/IMCS-09-2012-0048},
  doi          = {10.1108/IMCS-09-2012-0048},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/IndrinalMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JairakP13,
  author       = {Kallaya Jairak and
                  Prasong Praneetpolgrang},
  title        = {Applying {IT} governance balanced scorecard and importance-performance
                  analysis for providing {IT} governance strategy in university},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {228--249},
  year         = {2013},
  url          = {https://doi.org/10.1108/IMCS-08-2012-0036},
  doi          = {10.1108/IMCS-08-2012-0036},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JairakP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KhiabaniIM13,
  author       = {Hamed Khiabani and
                  Norbik Bashah Idris and
                  Jamalul{-}lail Ab Manan},
  title        = {Unified trust establishment by leveraging remote attestation - modeling
                  and analysis},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {5},
  pages        = {360--380},
  year         = {2013},
  url          = {https://doi.org/10.1108/IMCS-11-2012-0062},
  doi          = {10.1108/IMCS-11-2012-0062},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KhiabaniIM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KomatsuTT13,
  author       = {Ayako Komatsu and
                  Daisuke Takagi and
                  Toshihiko Takemura},
  title        = {Human aspects of information security: An empirical study of intentional
                  versus actual behavior},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {1},
  pages        = {5--15},
  year         = {2013},
  url          = {https://doi.org/10.1108/09685221311314383},
  doi          = {10.1108/09685221311314383},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KomatsuTT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KoongMS13,
  author       = {Kai S. Koong and
                  Mohammad I. Merhi and
                  Jun Sun},
  title        = {Push and pull effects of homeland information security incentives},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {155--176},
  year         = {2013},
  url          = {https://doi.org/10.1108/IMCS-04-2012-0022},
  doi          = {10.1108/IMCS-04-2012-0022},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KoongMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Lambrinoudakis13,
  author       = {Costas Lambrinoudakis},
  title        = {Evaluating and enriching information and communication technologies
                  compliance frameworks with regard to privacy},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {177--190},
  year         = {2013},
  url          = {https://doi.org/10.1108/IMCS-09-2012-0051},
  doi          = {10.1108/IMCS-09-2012-0051},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/Lambrinoudakis13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LatBA13,
  author       = {Joshua Arvin S. Lat and
                  Rod Xavier R. Bondoc and
                  Kevin Charles V. Atienza},
  title        = {{SOUL} System: secure online {USB} login system},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {2},
  pages        = {102--109},
  year         = {2013},
  url          = {https://doi.org/10.1108/IMCS-08-2012-0042},
  doi          = {10.1108/IMCS-08-2012-0042},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LatBA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LeviW13,
  author       = {Michael Levi and
                  Matthew Leighton Williams},
  title        = {Multi-agency partnerships in cybercrime reduction: Mapping the {UK}
                  information assurance network cooperation space},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {5},
  pages        = {420--443},
  year         = {2013},
  url          = {https://doi.org/10.1108/IMCS-04-2013-0027},
  doi          = {10.1108/IMCS-04-2013-0027},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/LeviW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MichalopoulosM13,
  author       = {Dimitrios Michalopoulos and
                  Ioannis Mavridis},
  title        = {A method to calculate social networking hazard probability in definite
                  time},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {1},
  pages        = {16--29},
  year         = {2013},
  url          = {https://doi.org/10.1108/09685221311314392},
  doi          = {10.1108/09685221311314392},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/MichalopoulosM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MoeckeV13,
  author       = {Cristian Thiago Moecke and
                  Melanie Volkamer},
  title        = {Usable secure email communications: criteria and evaluation of existing
                  approaches},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {1},
  pages        = {41--52},
  year         = {2013},
  url          = {https://doi.org/10.1108/09685221311314419},
  doi          = {10.1108/09685221311314419},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MoeckeV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PapanikolaouVVIPS13,
  author       = {Alexandros Papanikolaou and
                  Vasileios Vlachos and
                  Andreas Venieris and
                  Christos Ilioudis and
                  Konstantinos Papapanagiotou and
                  Anastasios Stasinopoulos},
  title        = {A framework for teaching network security in academic environments},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {315--338},
  year         = {2013},
  url          = {https://doi.org/10.1108/IMCS-11-2011-0056},
  doi          = {10.1108/IMCS-11-2011-0056},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PapanikolaouVVIPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PathariS13,
  author       = {Vinod Pathari and
                  Rajendra M. Sonar},
  title        = {Deriving an information security assurance indicator at the organizational
                  level},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {5},
  pages        = {401--419},
  year         = {2013},
  url          = {https://doi.org/10.1108/IMCS-02-2013-0011},
  doi          = {10.1108/IMCS-02-2013-0011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PathariS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ShaabanC13,
  author       = {Hussein Shaaban and
                  Marc Conrad},
  title        = {Democracy, culture and information security: a case study in Zanzibar},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {191--201},
  year         = {2013},
  url          = {https://doi.org/10.1108/IMCS-09-2012-0057},
  doi          = {10.1108/IMCS-09-2012-0057},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ShaabanC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Sobh13,
  author       = {Tarek S. Sobh},
  title        = {Anomaly detection based on hybrid artificial immune principles},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {288--314},
  year         = {2013},
  url          = {https://doi.org/10.1108/IMCS-11-2012-0063},
  doi          = {10.1108/IMCS-11-2012-0063},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Sobh13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SommestadH13,
  author       = {Teodor Sommestad and
                  Amund Hunstad},
  title        = {Intrusion detection and the role of the system administrator},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {1},
  pages        = {30--40},
  year         = {2013},
  url          = {https://doi.org/10.1108/09685221311314400},
  doi          = {10.1108/09685221311314400},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SommestadH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TaubenbergerJYN13,
  author       = {Stefan Taubenberger and
                  Jan J{\"{u}}rjens and
                  Yijun Yu and
                  Bashar Nuseibeh},
  title        = {Resolving vulnerability identification errors using security requirements
                  on business process models},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {202--223},
  year         = {2013},
  url          = {https://doi.org/10.1108/IMCS-09-2012-0054},
  doi          = {10.1108/IMCS-09-2012-0054},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TaubenbergerJYN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AnguloFWP12,
  author       = {Julio Angulo and
                  Simone Fischer{-}H{\"{u}}bner and
                  Erik W{\"{a}}stlund and
                  Tobias Pulls},
  title        = {Towards Usable Privacy Policy Display {\&} Management for PrimeLife},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {4--17},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211219155},
  doi          = {10.1108/09685221211219155},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AnguloFWP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DesaiDP12,
  author       = {Mayur S. Desai and
                  Kiran J. Desai and
                  Lonnie D. Phelps},
  title        = {E-commerce policies and customer privacy: a longitudinal study {(2000-2010)}},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {222--244},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211247325},
  doi          = {10.1108/09685221211247325},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DesaiDP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Goldman12,
  author       = {Eric H. Goldman},
  title        = {The effect of acquisition decision making on security posture},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {350--363},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211286520},
  doi          = {10.1108/09685221211286520},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Goldman12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Jarvelainen12,
  author       = {Jonna J{\"{a}}rvel{\"{a}}inen},
  title        = {Information security and business continuity management in interorganizational
                  {IT} relationships},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {332--349},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211286511},
  doi          = {10.1108/09685221211286511},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Jarvelainen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Johnsen12,
  author       = {Stig Ole Johnsen},
  title        = {Resilience at Interfaces - Improvement of Safety and Security in Distributed
                  Control Systems by Web of Influence},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {71--87},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211235607},
  doi          = {10.1108/09685221211235607},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Johnsen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Katos12,
  author       = {Vasilios Katos},
  title        = {An integrated model for online transactions: illuminating the black
                  box},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {184--206},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211247299},
  doi          = {10.1108/09685221211247299},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Katos12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KrugerM12,
  author       = {Cornelius Johannes Kruger and
                  Mavis Noxolo Mama},
  title        = {Incorporating business strategy formulation with identity management
                  strategy formulation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {152--169},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211247271},
  doi          = {10.1108/09685221211247271},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KrugerM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MohamedS12,
  author       = {Norshidah Mohamed and
                  Jasber Kaur A. P. Gian Singh},
  title        = {A Conceptual Framework for Information Technology Governance Effectiveness
                  in Private Organizations},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {88--106},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211235616},
  doi          = {10.1108/09685221211235616},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MohamedS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MontesinoFB12,
  author       = {Raydel Montesino and
                  Stefan Fenz and
                  Walter Baluja},
  title        = {SIEM-based framework for security controls automation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {248--263},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211267639},
  doi          = {10.1108/09685221211267639},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MontesinoFB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PatelQT12,
  author       = {Ahmed Patel and
                  Wei Qi and
                  Mona Taghavi},
  title        = {An Evaluation of a Secure and Trustworthy Mobile Agent-based E-marketplace
                  System},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {123--146},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211235634},
  doi          = {10.1108/09685221211235634},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PatelQT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PathariS12,
  author       = {Vinod Pathari and
                  Rajendra M. Sonar},
  title        = {Identifying linkages between statements in information security policy,
                  procedures and controls},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {264--280},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211267648},
  doi          = {10.1108/09685221211267648},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PathariS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PattinsonJPMB12,
  author       = {Malcolm Robert Pattinson and
                  Cate Jerram and
                  Kathryn Parsons and
                  Agata McCormac and
                  Marcus A. Butavicius},
  title        = {Why Do Some People Manage Phishing Emails Better Than Others?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {18--28},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211219173},
  doi          = {10.1108/09685221211219173},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PattinsonJPMB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PramodLG12,
  author       = {Vandana Pramod and
                  Jinghua Li and
                  Ping Gao},
  title        = {A framework for preventing money laundering in banks},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {170--183},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211247280},
  doi          = {10.1108/09685221211247280},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PramodLG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Purkait12,
  author       = {Swapan Purkait},
  title        = {Phishing counter measures and their effectiveness - literature review},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {382--420},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211286548},
  doi          = {10.1108/09685221211286548},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Purkait12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SadanS12,
  author       = {Zac Sadan and
                  David G. Schwartz},
  title        = {Social Network Analysis for Cluster-Based {IP} Spam Reputation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {281--295},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211267657},
  doi          = {10.1108/09685221211267657},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SadanS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ShengHFDC12,
  author       = {Weiguo Sheng and
                  Gareth Howells and
                  Michael C. Fairhurst and
                  Farzin Deravi and
                  Shengyong Chen},
  title        = {Reliable and secure encryption key generation from fingerprints},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {207--221},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211247307},
  doi          = {10.1108/09685221211247307},
  timestamp    = {Fri, 15 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ShengHFDC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SommestadHE12,
  author       = {Teodor Sommestad and
                  Hannes Holm and
                  Mathias Ekstedt},
  title        = {Estimates of success rates of remote arbitrary code execution attacks},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {107--122},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211235625},
  doi          = {10.1108/09685221211235625},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SommestadHE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Stewart12,
  author       = {Andrew Stewart},
  title        = {Can spending on information security be justified? Evaluating the
                  security spending decision from the perspective of a rational actor},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {312--326},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211267675},
  doi          = {10.1108/09685221211267675},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Stewart12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/StewartL12,
  author       = {Geordie Stewart and
                  David Lacey},
  title        = {Death by a Thousand Facts: Criticising the Technocratic Approach to
                  Information Security Awareness},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {29--38},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211219182},
  doi          = {10.1108/09685221211219182},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/StewartL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TanA12,
  author       = {Margaret Tan and
                  Kathrine Sagala Aguilar},
  title        = {An investigation of students' perception of Bluetooth security},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {364--381},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211286539},
  doi          = {10.1108/09685221211286539},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TanA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ThomsonN12,
  author       = {Kerry{-}Lynn Thomson and
                  Johan Van Niekerk},
  title        = {Combating Information Security Apathy by Encouraging Prosocial Organisational
                  Behaviour},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {39--46},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211219191},
  doi          = {10.1108/09685221211219191},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ThomsonN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Workman12,
  author       = {Michael Workman},
  title        = {Validation of a Biases Model in Strategic Security Decision-Making},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {52--70},
  year         = {2012},
  url          = {https://doi.org/10.1108/09685221211235599},
  doi          = {10.1108/09685221211235599},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Workman12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AbbasMYH11,
  author       = {Haider Abbas and
                  Christer Magnusson and
                  Louise Yngstr{\"{o}}m and
                  Ahmed Hemani},
  title        = {Addressing Dynamic Issues in Information Security Management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {5--24},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111115836},
  doi          = {10.1108/09685221111115836},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AbbasMYH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AggelinosK11,
  author       = {George Aggelinos and
                  Sokratis K. Katsikas},
  title        = {Enhancing {SSADM} with Disaster Recovery Plan activities},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {248--261},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111173067},
  doi          = {10.1108/09685221111173067},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AggelinosK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Beranek11,
  author       = {Ladislav Beranek},
  title        = {Risk Analysis Methodology Used by Several Small and Medium Enterprises
                  in the Czech Republic},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {42--52},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111115854},
  doi          = {10.1108/09685221111115854},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Beranek11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Bhattacharya11,
  author       = {Debasis Bhattacharya},
  title        = {Leadership Styles and Information Security in Small Businesses},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {300--312},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111188593},
  doi          = {10.1108/09685221111188593},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Bhattacharya11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GarrisonN11,
  author       = {Chlotia Posey Garrison and
                  Matoteng Ncube},
  title        = {A Longitudinal Analysis of Data Breaches},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {216--230},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111173049},
  doi          = {10.1108/09685221111173049},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GarrisonN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HagenAJ11,
  author       = {Janne Merete Hagen and
                  Eirik Albrechtsen and
                  Stig Ole Johnsen},
  title        = {The long term effects of information security e-learning on organizational
                  learning},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {140--154},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111153537},
  doi          = {10.1108/09685221111153537},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HagenAJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HallSM11,
  author       = {Jacqueline H. Hall and
                  Shahram Sarkani and
                  Thomas A. Mazzuchi},
  title        = {Impacts of Organizational Capabilities In Information Security},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {155--176},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111153546},
  doi          = {10.1108/09685221111153546},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HallSM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HarneskL11,
  author       = {Dan Harnesk and
                  John Lindstr{\"{o}}m},
  title        = {Shaping Security Behavior through Discipline and Agility: Implications
                  for Information Security Management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {262--276},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111173076},
  doi          = {10.1108/09685221111173076},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HarneskL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HolmSAP11,
  author       = {Hannes Holm and
                  Teodor Sommestad and
                  Jonas Almroth and
                  Mats Persson},
  title        = {A quantitative evaluation of vulnerability scanning},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {231--247},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111173058},
  doi          = {10.1108/09685221111173058},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HolmSAP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KapodistriaMD11,
  author       = {Helen Georgia Kapodistria and
                  Sarandis Mitropoulos and
                  Christos Douligeris},
  title        = {An Advanced Web Attack Detection and Prevention Tool},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {280--299},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111188584},
  doi          = {10.1108/09685221111188584},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KapodistriaMD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LazarTGZ11,
  author       = {Lior Lazar and
                  Omer Tikolsky and
                  Chanan Glezer and
                  Moshe Zviran},
  title        = {Personalized Cognitive Passwords: An Exploratory Assessment},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {25--41},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111115845},
  doi          = {10.1108/09685221111115845},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/LazarTGZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MitropoulosKLS11,
  author       = {Dimitris Mitropoulos and
                  Vassilios Karakoidas and
                  Panos Louridas and
                  Diomidis Spinellis},
  title        = {Countering Code Injection Attacks: {A} Unified Approach},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {177--194},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111153555},
  doi          = {10.1108/09685221111153555},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MitropoulosKLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MonfeltPHY11,
  author       = {Yngve Monfelt and
                  Sofie Pilemalm and
                  Jonas Hallberg and
                  Louise Yngstr{\"{o}}m},
  title        = {The 14 Layered Framework for Including Social and Organisational Aspects
                  in Security Management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {124--133},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111143060},
  doi          = {10.1108/09685221111143060},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MonfeltPHY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PatelQT11,
  author       = {Ahmed Patel and
                  Wei Qi and
                  Mona Taghavi},
  title        = {Design of Secure and Trustworthy Mobile Agent-based E-marketplace
                  System},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {333--352},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111188610},
  doi          = {10.1108/09685221111188610},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PatelQT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ShirtzE11,
  author       = {Dov Shirtz and
                  Yuval Elovici},
  title        = {Optimizing Investment Decisions in Selecting Information Security
                  Remedies},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {95--112},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111143042},
  doi          = {10.1108/09685221111143042},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ShirtzE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SommestadEHA11,
  author       = {Teodor Sommestad and
                  Mathias Ekstedt and
                  Hannes Holm and
                  Muhammad Afzal},
  title        = {Security mistakes in information system deployment projects},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {80--94},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111143033},
  doi          = {10.1108/09685221111143033},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SommestadEHA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SukiRS11,
  author       = {Norazah Mohd Suki and
                  Thurasamy Ramayah and
                  Norbayah Mohd Suki},
  title        = {Understanding Consumer Intention with Respect to Purchase and Use
                  of Pirated Software},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {195--210},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111153564},
  doi          = {10.1108/09685221111153564},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SukiRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/VaishPMDSGC11,
  author       = {Abhishek Vaish and
                  Aditya Prabhakar and
                  Himanshu Mishra and
                  Nupur Dayal and
                  Shishir Kumar Singh and
                  Utkarsh Goel and
                  Natalie Coull},
  title        = {Quantifying Information Dynamics Through New Valuation System},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {313--332},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111188601},
  doi          = {10.1108/09685221111188601},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/VaishPMDSGC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/VlachosMAT11,
  author       = {Vasileios Vlachos and
                  Marilena Minou and
                  Vassilis Assimakopoulos and
                  Androniki Toska},
  title        = {The Landscape of Cybercrime in Greece},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {113--123},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111143051},
  doi          = {10.1108/09685221111143051},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/VlachosMAT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/WillsZ11,
  author       = {Craig E. Wills and
                  Mihajlo Zeljkovic},
  title        = {A Personalized Approach to Web Privacy - Awareness, Attitudes and
                  Actions},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {53--73},
  year         = {2011},
  url          = {https://doi.org/10.1108/09685221111115863},
  doi          = {10.1108/09685221111115863},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/WillsZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Abu-Musa10,
  author       = {Ahmad Abu{-}Musa},
  title        = {Information security governance in Saudi organizations: an empirical
                  study},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {226--276},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011079180},
  doi          = {10.1108/09685221011079180},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Abu-Musa10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Al-AwadiS10,
  author       = {K. Al{-}Awadi and
                  Messaoud Saidani},
  title        = {Justifying the need for a data security management plan for the {UAE}},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {173--184},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011064708},
  doi          = {10.1108/09685221011064708},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Al-AwadiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AsaiH10,
  author       = {Tatsuo Asai and
                  Aline Uwera Hakizabera},
  title        = {Human-Related Problems of Information Security in East African Cross-Cultural
                  Environments},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {328--338},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011095245},
  doi          = {10.1108/09685221011095245},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AsaiH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/CaceresT10,
  author       = {Guillermo Horacio Ramirez Caceres and
                  Yoshimi Teshigawara},
  title        = {Security Guideline Tool for Home Users Based on International Standards},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {101--123},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011048346},
  doi          = {10.1108/09685221011048346},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/CaceresT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChangYP10,
  author       = {Ting{-}Yi Chang and
                  Yu{-}Ju Yang and
                  Chun{-}Cheng Peng},
  title        = {A Personalized Rhythm Click-Based Authentication System},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {72--85},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011048328},
  doi          = {10.1108/09685221011048328},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChangYP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChristodoulakiF10,
  author       = {Meltini Christodoulaki and
                  Paraskevi Fragopoulou},
  title        = {SafeLine: reporting illegal internet content},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {54--65},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011035269},
  doi          = {10.1108/09685221011035269},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChristodoulakiF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FailyF10,
  author       = {Shamal Faily and
                  Ivan Flechais},
  title        = {Designing and Aligning e-Science Security Culture with Design},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {339--349},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011095254},
  doi          = {10.1108/09685221011095254},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FailyF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FutchersS10,
  author       = {Lynn Futcher and
                  Cheryl Schroder and
                  Rossouw von Solms},
  title        = {Information Security Education in South Africa},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {366--374},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011095272},
  doi          = {10.1108/09685221011095272},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FutchersS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GoldsteinPS10,
  author       = {Zvi Goldstein and
                  David Petrie and
                  Yosef Sherif},
  title        = {Finding middle ground management strategy for software development},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {185--197},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011064717},
  doi          = {10.1108/09685221011064717},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GoldsteinPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Goode10,
  author       = {Sigi Goode},
  title        = {Exploring the supply of pirate software for mobile devices: An analysis
                  of software types and piracy groups},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {204--225},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011079171},
  doi          = {10.1108/09685221011079171},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Goode10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Hui10,
  author       = {Wendy Hui},
  title        = {Brand, knowledge, and false sense of security},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {162--172},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011064690},
  doi          = {10.1108/09685221011064690},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Hui10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JaliFD10,
  author       = {Mohd Zalisham Jali and
                  Steven Furnell and
                  Paul Dowland},
  title        = {Assessing image-based authentication techniques in a web-based environment},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {43--53},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011035250},
  doi          = {10.1108/09685221011035250},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JaliFD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KrugerDS10,
  author       = {Hennie A. Kruger and
                  Lynette Drevin and
                  Tjaart Steyn},
  title        = {A Vocabulary Test to Assess Information Security Awareness},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {316--327},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011095236},
  doi          = {10.1108/09685221011095236},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KrugerDS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Lacey10,
  author       = {David Lacey},
  title        = {Understanding and transforming organizational security culture},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {4--13},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011035223},
  doi          = {10.1108/09685221011035223},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Lacey10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PatelQW10,
  author       = {Ahmed Patel and
                  Wei Qi and
                  Christopher Wills},
  title        = {A review and future research directions of secure and trustworthy
                  mobile agent-based e-marketplace systems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {144--161},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011064681},
  doi          = {10.1108/09685221011064681},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PatelQW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PatelQW10a,
  author       = {Ahmed Patel and
                  Qais Qassim and
                  Christopher Wills},
  title        = {A survey of intrusion detection and prevention systems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {277--290},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011079199},
  doi          = {10.1108/09685221011079199},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PatelQW10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PatsosMD10,
  author       = {Dimitrios Patsos and
                  Sarandis Mitropoulos and
                  Christos Douligeris},
  title        = {Expanding topological vulnerability analysis to intrusion detection
                  through the incident response intelligence system},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {291--309},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011079207},
  doi          = {10.1108/09685221011079207},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PatsosMD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PearceZH10,
  author       = {Michael Pearce and
                  Sherali Zeadally and
                  Ray Hunt},
  title        = {Assessing and Improving Authentication Confidence Management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {124--139},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011048355},
  doi          = {10.1108/09685221011048355},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PearceZH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Tsohou10,
  author       = {Aggeliki Tsohou},
  title        = {A Security Standards' Framework to Facilitate Best Practices' Awareness
                  and Conformity},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {350--365},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011095263},
  doi          = {10.1108/09685221011095263},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Tsohou10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/WerlingerMHB10,
  author       = {Rodrigo Werlinger and
                  Kasia Muldner and
                  Kirstie Hawkey and
                  Konstantin Beznosov},
  title        = {Preparation, detection, and analysis: the diagnostic work of {IT}
                  security incident response},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {26--42},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011035241},
  doi          = {10.1108/09685221011035241},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/WerlingerMHB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/WhalenG10,
  author       = {Tara Whalen and
                  Carrie Gates},
  title        = {Watching the watchers: "voluntary monitoring" of infosec employees},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {14--25},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011035232},
  doi          = {10.1108/09685221011035232},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/WhalenG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/YangC10,
  author       = {Seung S. Yang and
                  Hongsik Choi},
  title        = {Vulnerability Analysis and the Practical Implications of a Server-challenge-based
                  One-time Password System},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {86--100},
  year         = {2010},
  url          = {https://doi.org/10.1108/09685221011048337},
  doi          = {10.1108/09685221011048337},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/YangC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Abu-Musa09,
  author       = {Ahmad Abu{-}Musa},
  title        = {Exploring the importance and implementation of {COBIT} processes in
                  Saudi organizations: An empirical study},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {73--95},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910963974},
  doi          = {10.1108/09685220910963974},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Abu-Musa09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ahmed09,
  author       = {Zeeshan Ahmed},
  title        = {Proposing semantic-oriented agent and knowledge base product data
                  management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {360--371},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220911006669},
  doi          = {10.1108/09685220911006669},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Ahmed09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Al-BadiAAM09,
  author       = {Ali H. Al{-}Badi and
                  Rafi Ashrafi and
                  Ali O. Al{-}Majeeni and
                  Pam J. Mayhew},
  title        = {{IT} disaster recovery: Oman and Cyclone Gonu lessons learned},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {114--126},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910963992},
  doi          = {10.1108/09685220910963992},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Al-BadiAAM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BakhshiPF09,
  author       = {Taimur Bakhshi and
                  Maria Papadaki and
                  Steven Furnell},
  title        = {Social engineering: assessing vulnerabilities in practice},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {53--63},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910944768},
  doi          = {10.1108/09685220910944768},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BakhshiPF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BennettS09,
  author       = {David James Bennett and
                  Paul Stephens},
  title        = {A cognitive walkthrough of Autopsy Forensic Browser},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {20--29},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910944731},
  doi          = {10.1108/09685220910944731},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BennettS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChouL09,
  author       = {Tzu{-}Chuan Chou and
                  An{-}Sheng Lee},
  title        = {A process model for customer relational assets creation: {A} case
                  study of online securities trading platform},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {218--233},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910978095},
  doi          = {10.1108/09685220910978095},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChouL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChowH09,
  author       = {Wing S. Chow and
                  Wai On Ha},
  title        = {Determinants of the critical success factor of disaster recovery planning
                  for information systems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {248--275},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910978103},
  doi          = {10.1108/09685220910978103},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChowH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/EfraimidisDNT09,
  author       = {Pavlos S. Efraimidis and
                  George Drosatos and
                  Fotis Nalbadis and
                  Aimilia Tasidou},
  title        = {Towards privacy in personal data management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {311--329},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910993971},
  doi          = {10.1108/09685220910993971},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/EfraimidisDNT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GurungLL09,
  author       = {Anil Gurung and
                  Xin (Robert) Luo and
                  Qinyu Liao},
  title        = {Consumer motivations in taking action against spyware: an empirical
                  investigation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {276--289},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910978112},
  doi          = {10.1108/09685220910978112},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GurungLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HagenA09,
  author       = {Janne Merete Hagen and
                  Eirik Albrechtsen},
  title        = {Effects on employees' information security abilities by e-learning},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {388--407},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220911006687},
  doi          = {10.1108/09685220911006687},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HagenA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HelkalaS09,
  author       = {Kirsi Helkala and
                  Einar Snekkenes},
  title        = {Formalizing the ranking of authentication products},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {30--43},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910944740},
  doi          = {10.1108/09685220910944740},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HelkalaS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ifinedo09,
  author       = {Princely Ifinedo},
  title        = {Information technology security management concerns in global financial
                  services institutions: Is national culture a differentiator?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {372--387},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220911006678},
  doi          = {10.1108/09685220911006678},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Ifinedo09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LeeHL09,
  author       = {Cheng{-}Chi Lee and
                  Min{-}Shiang Hwang and
                  Chih{-}Wei Lin},
  title        = {A new English auction scheme using the bulletin board system},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {408--417},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220911006696},
  doi          = {10.1108/09685220911006696},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LeeHL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RanjanB09,
  author       = {Jayanthi Ranjan and
                  Vishal Bhatnagar},
  title        = {A holistic framework for mCRM - data mining perspective},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {151--165},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910964018},
  doi          = {10.1108/09685220910964018},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RanjanB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RocaGV09,
  author       = {Juan Carlos Roca and
                  Juan Jos{\'{e}} Garc{\'{\i}}a and
                  Juan Jos{\'{e}} de la Vega},
  title        = {The importance of perceived trust, security and privacy in online
                  trading systems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {96--113},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910963983},
  doi          = {10.1108/09685220910963983},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RocaGV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RouibahA09,
  author       = {Kamel Rouibah and
                  Sulaiman Al{-}Rafee},
  title        = {Requirement engineering elicitation methods: {A} Kuwaiti empirical
                  study about familiarity, usage and perceived value},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {192--217},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910978086},
  doi          = {10.1108/09685220910978086},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RouibahA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SalwaniMNC09,
  author       = {Mohamed Intan Salwani and
                  Govindan Marthandan and
                  Mohd Daud Norzaidi and
                  Siong Choy Chong},
  title        = {E-commerce usage and business performance in the Malaysian tourism
                  sector: empirical analysis},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {166--185},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910964027},
  doi          = {10.1108/09685220910964027},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SalwaniMNC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Shropshire09,
  author       = {Jordan Shropshire},
  title        = {A canonical analysis of intentional information security breaches
                  by insiders},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {296--310},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910993962},
  doi          = {10.1108/09685220910993962},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Shropshire09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Smith09,
  author       = {Alan D. Smith},
  title        = {Internet retail banking: {A} competitive analysis in an increasingly
                  financially troubled environment},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {127--150},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910964009},
  doi          = {10.1108/09685220910964009},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Smith09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/StylesT09,
  author       = {Martyn Styles and
                  Theo Tryfonas},
  title        = {Using penetration testing feedback to cultivate an atmosphere of proactive
                  security amongst end-users},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {44--52},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910944759},
  doi          = {10.1108/09685220910944759},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/StylesT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/VincentFA09,
  author       = {Olufunke R. Vincent and
                  Olusegun Folorunso and
                  Ayodele Akinde},
  title        = {On consolidation model in e-bill presentment and payment},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {234--247},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910978121},
  doi          = {10.1108/09685220910978121},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/VincentFA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/WerlingerHB09,
  author       = {Rodrigo Werlinger and
                  Kirstie Hawkey and
                  Konstantin Beznosov},
  title        = {An integrated view of human, organizational, and technological challenges
                  of {IT} security management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {4--19},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910944722},
  doi          = {10.1108/09685220910944722},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/WerlingerHB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Workman09,
  author       = {Michael Workman},
  title        = {How perceptions of justice affect security attitudes: suggestions
                  for practitioners and researchers},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {341--353},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910993999},
  doi          = {10.1108/09685220910993999},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Workman09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ZhangRL09,
  author       = {Jie Zhang and
                  Brian J. Reithel and
                  Han Li},
  title        = {Impact of perceived technical protection on security behaviors},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {330--340},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910993980},
  doi          = {10.1108/09685220910993980},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ZhangRL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BelloneBR08,
  author       = {Jason Bellone and
                  Segolene de Basquiat and
                  Juan Rodriguez},
  title        = {Reaching escape velocity: {A} practiced approach to information security
                  management system implementation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {49--57},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810862742},
  doi          = {10.1108/09685220810862742},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BelloneBR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChenMS08,
  author       = {Charlie C. Chen and
                  B. Dawn Medlin and
                  R. S. Shaw},
  title        = {A cross-cultural investigation of situational information security
                  awareness programs},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {360--376},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810908787},
  doi          = {10.1108/09685220810908787},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChenMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChoiKGW08,
  author       = {Namjoo Choi and
                  Dan Jong Kim and
                  Jahyun Goo and
                  Andrew Whitmore},
  title        = {Knowing is doing: An empirical validation of the relationship between
                  managerial information security awareness and action},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {5},
  pages        = {484--501},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810920558},
  doi          = {10.1108/09685220810920558},
  timestamp    = {Thu, 08 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChoiKGW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChulkovD08,
  author       = {Dmitriy V. Chulkov and
                  Mayur S. Desai},
  title        = {Escalation and premature termination in {MIS} projects: the role of
                  real options},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {324--335},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810908769},
  doi          = {10.1108/09685220810908769},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChulkovD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DesaiE08,
  author       = {Mayur S. Desai and
                  Thomas von der Embse},
  title        = {Managing electronic information: an ethics perspective},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {20--27},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810862724},
  doi          = {10.1108/09685220810862724},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DesaiE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HagenAH08,
  author       = {Janne Merete Hagen and
                  Eirik Albrechtsen and
                  Jan Hovden},
  title        = {Implementation and effectiveness of organizational information security
                  measures},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {377--397},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810908796},
  doi          = {10.1108/09685220810908796},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HagenAH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JohnstonW08,
  author       = {Allen C. Johnston and
                  Merrill Warkentin},
  title        = {Information privacy compliance in the healthcare industry},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {5--19},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810862715},
  doi          = {10.1108/09685220810862715},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/JohnstonW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KatosP08,
  author       = {Vasilios Katos and
                  Ahmed Patel},
  title        = {A partial equilibrium view on security and privacy},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {74--83},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810862760},
  doi          = {10.1108/09685220810862760},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KatosP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Kumbakara08,
  author       = {Narayanan Kumbakara},
  title        = {Managed {IT} services: the role of {IT} standards},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {336--359},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810908778},
  doi          = {10.1108/09685220810908778},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Kumbakara08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LeeS08,
  author       = {Hsu{-}Hui Lee and
                  Mark Stamp},
  title        = {An agent-based privacy-enhancing model},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {305--319},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810893234},
  doi          = {10.1108/09685220810893234},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/LeeS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MaJP08,
  author       = {Qingxiong Ma and
                  Allen C. Johnston and
                  J. Michael Pearson},
  title        = {Information security management objectives and practices: a parsimonious
                  framework},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {251--270},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810893207},
  doi          = {10.1108/09685220810893207},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MaJP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MasrekHT08,
  author       = {Mohamad Noorman Masrek and
                  Norhayati Hussin and
                  Norashimawati Tarmuchi},
  title        = {An exploratory study on systems development methodologies for web-based
                  applications},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {137--149},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810879618},
  doi          = {10.1108/09685220810879618},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/MasrekHT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MasrekKH08,
  author       = {Mohamad Noorman Masrek and
                  Nor Shahriza Abdul Karim and
                  Ramlah Hussein},
  title        = {The effect of organizational and individual characteristics on corporate
                  intranet utilizations},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {89--112},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810879591},
  doi          = {10.1108/09685220810879591},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MasrekKH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MoreiraMBB08,
  author       = {Edson dos Santos Moreira and
                  Luciana Andr{\'{e}}ia Fondazzi Martimiano and
                  Antonio Jos{\'{e}} dos Santos Brand{\~{a}}o and
                  Mauro C{\'{e}}sar Bernardes},
  title        = {Ontologies for information security management and governance},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {150--165},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810879627},
  doi          = {10.1108/09685220810879627},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MoreiraMBB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MouratidisJN08,
  author       = {Haralambos Mouratidis and
                  Hamid Jahankhani and
                  Mathews Z. Nkhoma},
  title        = {Management versus security specialists: an empirical study on security
                  related perceptions},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {187--205},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810879645},
  doi          = {10.1108/09685220810879645},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MouratidisJN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Mutula08,
  author       = {Stephen M. Mutula},
  title        = {Comparison of sub-Saharan Africa's e-government status with developed
                  and transitional nations},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {235--250},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810893199},
  doi          = {10.1108/09685220810893199},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Mutula08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PatelS08,
  author       = {Sandip C. Patel and
                  Pritimoy Sanyal},
  title        = {Securing {SCADA} systems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {398--414},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810908804},
  doi          = {10.1108/09685220810908804},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PatelS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Percin08,
  author       = {Sel{\c{c}}uk Per{\c{c}}in},
  title        = {Fuzzy multi-criteria risk-benefit analysis of business process outsourcing
                  {(BPO)}},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {213--234},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810893180},
  doi          = {10.1108/09685220810893180},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Percin08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SahayR08,
  author       = {B. S. Sahay and
                  Jayanthi Ranjan},
  title        = {Real time business intelligence in supply chain analytics},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {28--48},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810862733},
  doi          = {10.1108/09685220810862733},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SahayR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SekhavatF08,
  author       = {Yoones Asgharzadeh Sekhavat and
                  Mohammad Fathian},
  title        = {Efficient anonymous secure auction schema {(ASAS)} without fully trustworthy
                  auctioneer},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {288--304},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810893225},
  doi          = {10.1108/09685220810893225},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SekhavatF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ThakkarKD08,
  author       = {Jitesh Thakkar and
                  Arun Kanda and
                  S. G. Deshmukh},
  title        = {Interpretive structural modeling {(ISM)} of IT-enablers for Indian
                  manufacturing SMEs},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {113--136},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810879609},
  doi          = {10.1108/09685220810879609},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ThakkarKD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TsohouKKK08,
  author       = {Aggeliki Tsohou and
                  Spyros Kokolakis and
                  Maria Karyda and
                  Evangelos A. Kiountouzis},
  title        = {Process-variance models in information security awareness research},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {271--287},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810893216},
  doi          = {10.1108/09685220810893216},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TsohouKKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/VenkatramanD08,
  author       = {Sitalakshmi Venkatraman and
                  Indika Delpachitra},
  title        = {Biometrics in banking security: a case study},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {415--430},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810908813},
  doi          = {10.1108/09685220810908813},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/VenkatramanD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Williams08,
  author       = {Patricia A. H. Williams},
  title        = {A practical application of {CMM} to medical security capability},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {58--73},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810862751},
  doi          = {10.1108/09685220810862751},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Williams08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/WinjumM08,
  author       = {Eli Winjum and
                  Bj{\o}rn Kjetil M{\o}lmann},
  title        = {A multidimensional approach to multilevel security},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {5},
  pages        = {436--448},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810920521},
  doi          = {10.1108/09685220810920521},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/WinjumM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Workman08,
  author       = {Michael Workman},
  title        = {A test of interventions for security threats from social engineering},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {5},
  pages        = {463--483},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810920549},
  doi          = {10.1108/09685220810920549},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Workman08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/WrayM08,
  author       = {Barry Wray and
                  Richard Mathieu},
  title        = {Evaluating the performance of open source software projects using
                  data envelopment analysis},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {5},
  pages        = {449--462},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810920530},
  doi          = {10.1108/09685220810920530},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/WrayM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ZhouVN08,
  author       = {Lihong Zhou and
                  Ana Vasconcelos and
                  Jos{\'{e}} Miguel Baptista Nunes},
  title        = {Supporting decision making in risk management through an evidence-based
                  information systems project risk checklist},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {166--186},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810879636},
  doi          = {10.1108/09685220810879636},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/ZhouVN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Abu-Musa07,
  author       = {Ahmad A. Abu{-}Musa},
  title        = {Evaluating the security controls of {CAIS} in developing countries:
                  An examination of current research},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {46--63},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710738778},
  doi          = {10.1108/09685220710738778},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Abu-Musa07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Abu-Musa07a,
  author       = {Ahmad A. Abu{-}Musa},
  title        = {Evaluating the security controls of {CAIS} in developing countries:
                  an empirical investigation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {2},
  pages        = {128--148},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710748038},
  doi          = {10.1108/09685220710748038},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Abu-Musa07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Amin07,
  author       = {Hanudin Amin},
  title        = {An analysis of mobile credit card usage intentions},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {260--269},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710817789},
  doi          = {10.1108/09685220710817789},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Amin07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AtkinsonJP07,
  author       = {Shirley Atkinson and
                  Chris A. Johnson and
                  Andrew D. Phippen},
  title        = {Improving protection mechanisms by understanding online risk},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {5},
  pages        = {382--393},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710831125},
  doi          = {10.1108/09685220710831125},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AtkinsonJP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BeznosovB07,
  author       = {Konstantin Beznosov and
                  Olga Beznosova},
  title        = {On the imbalance of the security problem space and its expected consequences},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {5},
  pages        = {420--431},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710831152},
  doi          = {10.1108/09685220710831152},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BeznosovB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ClarkeM07,
  author       = {Nathan L. Clarke and
                  A. R. Mekala},
  title        = {The application of signature recognition to transparent handwriting
                  verification for mobile devices},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {214--225},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710759559},
  doi          = {10.1108/09685220710759559},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ClarkeM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FathelrahamnS07,
  author       = {Adil Fathelrahamn and
                  Mathew Shafaghi},
  title        = {Analyzing bloggers data on software design patterns and applications
                  integration; methodology and implementation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {2},
  pages        = {84--101},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710747994},
  doi          = {10.1108/09685220710747994},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FathelrahamnS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FischerBFF07,
  author       = {Klaus Peter Fischer and
                  Udo Bleimann and
                  Woldemar F. Fuhrmann and
                  Steven Furnell},
  title        = {Analysis of security-relevant semantics of {BPEL} in cross-domain
                  defined business processes},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {2},
  pages        = {116--127},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710748010},
  doi          = {10.1108/09685220710748010},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FischerBFF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FolorunsoVD07,
  author       = {Olusegun Folorunso and
                  Olufunke R. Vincent and
                  B. M. Dansu},
  title        = {Image edge detection: {A} knowledge management technique for visual
                  scene analysis},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {23--32},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710738741},
  doi          = {10.1108/09685220710738741},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FolorunsoVD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Goyal07,
  author       = {D. P. Goyal},
  title        = {Information systems planning practices in Indian public enterprises},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {201--213},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710759540},
  doi          = {10.1108/09685220710759540},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Goyal07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HerzogS07,
  author       = {Almut Herzog and
                  Nahid Shahmehri},
  title        = {Usable set-up of runtime security policies},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {5},
  pages        = {394--407},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710831134},
  doi          = {10.1108/09685220710831134},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HerzogS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ifinedo07,
  author       = {Princely Ifinedo},
  title        = {An empirical study of {ERP} success evaluations by business and {IT}
                  managers},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {270--282},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710817798},
  doi          = {10.1108/09685220710817798},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Ifinedo07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Kini07,
  author       = {Ranjan B. Kini},
  title        = {Vendor availability: a key factor for outsourcing in Chilean {ICT}
                  sector},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {5},
  pages        = {350--361},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710831099},
  doi          = {10.1108/09685220710831099},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Kini07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LancasterYHH07,
  author       = {Sean Lancaster and
                  David C. Yen and
                  Albert H. Huang and
                  Shin{-}Yuan Hung},
  title        = {The selection of instant messaging or e-mail: College students' perspective
                  for computer communication},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {5--22},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710738750},
  doi          = {10.1108/09685220710738750},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LancasterYHH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Lazarides07,
  author       = {Themistokles Lazarides},
  title        = {Comply! Resistance is futile},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {5},
  pages        = {339--349},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710831080},
  doi          = {10.1108/09685220710831080},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Lazarides07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MarquesB07,
  author       = {Oge Marques and
                  Pierre Baillargeon},
  title        = {Design of a multimedia traffic classifier for Snort},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {241--256},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710759577},
  doi          = {10.1108/09685220710759577},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MarquesB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MasrekKH07,
  author       = {Mohamad Noorman Masrek and
                  Nor Shahriza Abdul Karim and
                  Ramlah Hussein},
  title        = {Investigating corporate intranet effectiveness: a conceptual framework},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {168--183},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710759522},
  doi          = {10.1108/09685220710759522},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MasrekKH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MisraKK07,
  author       = {Subhas C. Misra and
                  Vinod Kumar and
                  Uma Kumar},
  title        = {A strategic modeling technique for information security risk assessment},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {64--77},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710738787},
  doi          = {10.1108/09685220710738787},
  timestamp    = {Wed, 04 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MisraKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MitropoulosPD07,
  author       = {Sarandis Mitropoulos and
                  Dimitrios Patsos and
                  Christos Douligeris},
  title        = {Incident response requirements for distributed security information
                  management systems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {226--240},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710759568},
  doi          = {10.1108/09685220710759568},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MitropoulosPD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/NguyenSN07,
  author       = {ThuyUyen H. Nguyen and
                  Joseph S. Sherif and
                  Michael Newby},
  title        = {Strategies for successful {CRM} implementation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {2},
  pages        = {102--115},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710748001},
  doi          = {10.1108/09685220710748001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/NguyenSN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/NohlbergB07,
  author       = {Marcus Nohlberg and
                  Johannes B{\"{a}}ckstr{\"{o}}m},
  title        = {User-centred security applied to the development of a management information
                  system},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {5},
  pages        = {372--381},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710831116},
  doi          = {10.1108/09685220710831116},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/NohlbergB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/OngJC07,
  author       = {Thian Song Ong and
                  Andrew Teoh Beng Jin and
                  Tee Connie},
  title        = {Personalized biometric key using fingerprint biometrics},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {313--328},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710817824},
  doi          = {10.1108/09685220710817824},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/OngJC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PattinsonA07,
  author       = {Malcolm R. Pattinson and
                  Grantley Anderson},
  title        = {How well are information risks being communicated to your computer
                  end-users?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {5},
  pages        = {362--371},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710831107},
  doi          = {10.1108/09685220710831107},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PattinsonA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ratnasingam07,
  author       = {Pauline Ratnasingam},
  title        = {A risk-control framework for e-marketplace participation: the findings
                  of seven cases},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {2},
  pages        = {149--166},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710748029},
  doi          = {10.1108/09685220710748029},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Ratnasingam07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SalehAB07,
  author       = {Mohamed Saad Saleh and
                  Abdullah Alrabiah and
                  Saad Haj Bakry},
  title        = {A {STOPE} model for the investigation of compliance with {ISO} 17799-2005},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {283--294},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710817806},
  doi          = {10.1108/09685220710817806},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SalehAB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SebesS07,
  author       = {E. John Sebes and
                  Mark Stamp},
  title        = {Solvable problems in enterprise digital rights management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {33--45},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710738769},
  doi          = {10.1108/09685220710738769},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SebesS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SveenSRG07,
  author       = {Finn Olav Sveen and
                  Jose M. Sarriegi and
                  Eliot H. Rich and
                  Jose J. Gonzalez},
  title        = {Toward viable information security reporting systems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {5},
  pages        = {408--419},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710831143},
  doi          = {10.1108/09685220710831143},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SveenSRG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TsengN07,
  author       = {Chris Tseng and
                  Patrick Ng},
  title        = {Precisiated information retrieval for {RSS} feeds},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {184--200},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710759531},
  doi          = {10.1108/09685220710759531},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TsengN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/VlachosS07,
  author       = {Vasileios Vlachos and
                  Diomidis Spinellis},
  title        = {A PRoactive malware identification system based on the computer hygiene
                  principles},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {295--312},
  year         = {2007},
  url          = {https://doi.org/10.1108/09685220710817815},
  doi          = {10.1108/09685220710817815},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/VlachosS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AgourramR06,
  author       = {Hafid Agourram and
                  Bill Robson},
  title        = {Defining information systems success in Canada},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {300--311},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610690781},
  doi          = {10.1108/09685220610690781},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AgourramR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Bajgoric06,
  author       = {Nijaz Bajgoric},
  title        = {Information technologies for business continuity: an implementation
                  framework},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {450--466},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610717754},
  doi          = {10.1108/09685220610717754},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Bajgoric06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Brown06,
  author       = {William C. Brown},
  title        = {Vasa."{\textgreater}IT governance, architectural competency, and the
                  Vasa},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {140--154},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610655889},
  doi          = {10.1108/09685220610655889},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Brown06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BrownRH06,
  author       = {William Brown and
                  Mezbahur Rahman and
                  Travis Hacker},
  title        = {Home page usability and credibility: {A} comparison of the fastest
                  growing companies to the Fortune 30 and the implications to {IT} governance},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {252--269},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610670404},
  doi          = {10.1108/09685220610670404},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BrownRH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChangY06,
  author       = {Arthur Jung{-}Ting Chang and
                  Quey{-}Jen Yeh},
  title        = {On security preparations against possible {IS} threats across industries},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {343--360},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610690817},
  doi          = {10.1108/09685220610690817},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChangY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Choo06,
  author       = {Kim{-}Kwang Raymond Choo},
  title        = {Issue report on business adoption of Microsoft Passport},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {218--234},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610670387},
  doi          = {10.1108/09685220610670387},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Choo06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Cong06,
  author       = {Jin Cong},
  title        = {A novel watermarking algorithm for resistant geometric attacks using
                  feature points matching},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {75--98},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610648391},
  doi          = {10.1108/09685220610648391},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Cong06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/CurranM06,
  author       = {Kevin Curran and
                  Sheila McKinney},
  title        = {Scheduled {RSS} feeds for streaming multimedia to the desktop using
                  {RSS} enclosures},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {65--74},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610648382},
  doi          = {10.1108/09685220610648382},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/CurranM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DebarV06,
  author       = {Herv{\'{e}} Debar and
                  Jouni Viinikka},
  title        = {Security information management as an outsourced service},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {417--435},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610707430},
  doi          = {10.1108/09685220610707430},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DebarV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DraganidisM06,
  author       = {Fotis Draganidis and
                  Gregoris Mentzas},
  title        = {Competency based management: a review of systems and approaches},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {51--64},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610648373},
  doi          = {10.1108/09685220610648373},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/DraganidisM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Eigeles06,
  author       = {Dan Eigeles},
  title        = {Intelligent authentication, authorization, and administration {(I3A)}},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {5--23},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610648346},
  doi          = {10.1108/09685220610648346},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Eigeles06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Fitsilis06,
  author       = {Panos Fitsilis},
  title        = {Practices and problems in managing electronic services using SLAs},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {185--195},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610678622},
  doi          = {10.1108/09685220610678622},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Fitsilis06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FolorunsoOS06,
  author       = {Olusegun Folorunso and
                  Shawn Oluwafemi Ogunseye and
                  Sushil K. Sharma},
  title        = {An exploratory study of the critical factors affecting the acceptability
                  of e-learning in Nigerian universities},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {496--505},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610717781},
  doi          = {10.1108/09685220610717781},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FolorunsoOS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GonzalezGL06,
  author       = {Reyes{-}G. Gonzalez and
                  Jose Gasco and
                  Juan Llopis},
  title        = {Information systems managers' view about outsourcing in Spain},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {312--326},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610690790},
  doi          = {10.1108/09685220610690790},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GonzalezGL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GowanMH06,
  author       = {J. Arthur Gowan and
                  Richard G. Mathieu and
                  Mark B. Hey},
  title        = {Earned value management in a data warehouse project},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {37--50},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610648364},
  doi          = {10.1108/09685220610648364},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GowanMH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HongCCT06,
  author       = {Kwo{-}Shing Hong and
                  Yen{-}Ping Chi and
                  Louis R. Chao and
                  Jih{-}Hsing Tang},
  title        = {An empirical study of information security policy on information security
                  elevation in Taiwan},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {104--115},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610655861},
  doi          = {10.1108/09685220610655861},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HongCCT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KarydaMQ06,
  author       = {Maria Karyda and
                  Evangelia Mitrou and
                  Gerald Quirchmayr},
  title        = {A framework for outsourcing {IS/IT} security services},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {402--415},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610707421},
  doi          = {10.1108/09685220610707421},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KarydaMQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KnappMRF06,
  author       = {Kenneth J. Knapp and
                  Thomas E. Marshall and
                  R. Kelly Rainer Jr. and
                  F. Nelson Ford},
  title        = {Information security: management's effect on culture and policy},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {24--36},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610648355},
  doi          = {10.1108/09685220610648355},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KnappMRF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LancasterYK06,
  author       = {Sean Lancaster and
                  David C. Yen and
                  Cheng{-}Yuan Ku},
  title        = {E-supply chain management: an evaluation of current web initiatives},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {167--184},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610678613},
  doi          = {10.1108/09685220610678613},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LancasterYK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LekkasL06,
  author       = {Dimitrios Lekkas and
                  Costas Lambrinoudakis},
  title        = {Outsourcing digital signatures: a solution to key management burden},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {436--449},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610707449},
  doi          = {10.1108/09685220610707449},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LekkasL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LuthyF06,
  author       = {David Luthy and
                  Karen A. Forcht},
  title        = {Laws and regulations affecting information management and frameworks
                  for assessing compliance},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {155--166},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610655898},
  doi          = {10.1108/09685220610655898},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LuthyF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MagklarasFB06,
  author       = {George Magklaras and
                  Steven Furnell and
                  Phillip J. Brooke},
  title        = {Towards an insider threat prediction specification language},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {361--381},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610690826},
  doi          = {10.1108/09685220610690826},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MagklarasFB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MouK06,
  author       = {Richard Mou and
                  Brian Kleiner},
  title        = {Duty of care involving outsourced payroll},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {284--293},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610670422},
  doi          = {10.1108/09685220610670422},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MouK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PapadakiF06,
  author       = {Maria Papadaki and
                  Steven Furnell},
  title        = {Achieving automated intrusion response: a prototype implementation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {235--251},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610670396},
  doi          = {10.1108/09685220610670396},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PapadakiF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PilgermannBV06,
  author       = {Michael Pilgermann and
                  Andrew Blyth and
                  Stilianos Vidalis},
  title        = {Inter-organisational intrusion detection using knowledge grid technology},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {327--342},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610690808},
  doi          = {10.1108/09685220610690808},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PilgermannBV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Rehman06,
  author       = {Sajjad ur Rehman},
  title        = {{IT} applications in Kuwaiti financial companies: an analysis},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {467--484},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610717763},
  doi          = {10.1108/09685220610717763},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Rehman06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Shalhoub06,
  author       = {Zeinab Karake Shalhoub},
  title        = {Trust, privacy, and security in electronic business: the case of the
                  {GCC} countries},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {270--283},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610670413},
  doi          = {10.1108/09685220610670413},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Shalhoub06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SkinnerHC06,
  author       = {Geoff Skinner and
                  Song Han and
                  Elizabeth Chang},
  title        = {An information privacy taxonomy for collaborative environments},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {382--394},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610690835},
  doi          = {10.1108/09685220610690835},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/SkinnerHC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TsohouKKK06,
  author       = {Aggeliki Tsohou and
                  Maria Karyda and
                  Spyros Kokolakis and
                  Evangelos A. Kiountouzis},
  title        = {Formulating information systems risk management strategies through
                  cultural theory},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {198--217},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610670378},
  doi          = {10.1108/09685220610670378},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TsohouKKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ZiaeeFS06,
  author       = {Mohsen Ziaee and
                  Mohammad Fathian and
                  Seyed Jafar Sadjadi},
  title        = {A modular approach to {ERP} system selection: {A} case study},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {485--495},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610717772},
  doi          = {10.1108/09685220610717772},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ZiaeeFS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ZuoP06,
  author       = {Yanjun Zuo and
                  Brajendra Panda},
  title        = {Distributed database damage assessment paradigm},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {116--139},
  year         = {2006},
  url          = {https://doi.org/10.1108/09685220610655870},
  doi          = {10.1108/09685220610655870},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ZuoP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AhmedS05,
  author       = {Fawad Ahmed and
                  Mohammed Yakoob Siyal},
  title        = {A novel approach for regenerating a private key using password, fingerprint
                  and smart card},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {1},
  pages        = {39--54},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510582665},
  doi          = {10.1108/09685220510582665},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AhmedS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Al-AyedFZD05,
  author       = {A. Al{-}Ayed and
                  Steven Furnell and
                  D. Zhao and
                  Paul Dowland},
  title        = {An automated framework for managing security vulnerabilities},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {2},
  pages        = {156--166},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510589334},
  doi          = {10.1108/09685220510589334},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Al-AyedFZD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AlsaidM05,
  author       = {Adil Alsaid and
                  Chris J. Mitchell},
  title        = {Dynamic content attacks on digital signatures},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {4},
  pages        = {328--336},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510614443},
  doi          = {10.1108/09685220510614443},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AlsaidM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BelsisKK05,
  author       = {Petros Belsis and
                  Spyros Kokolakis and
                  Evangelos A. Kiountouzis},
  title        = {Information systems security from a knowledge management perspective},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {3},
  pages        = {189--202},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510602013},
  doi          = {10.1108/09685220510602013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BelsisKK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BlythT05,
  author       = {Andrew Blyth and
                  Paula Thomas},
  title        = {An XML-based architecture for data integration in vulnerability assessments},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {4},
  pages        = {260--273},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510614399},
  doi          = {10.1108/09685220510614399},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BlythT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BrownN05,
  author       = {William Brown and
                  Frank Nasuti},
  title        = {What {ERP} systems can tell us about Sarbanes-Oxley},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {4},
  pages        = {311--327},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510614434},
  doi          = {10.1108/09685220510614434},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BrownN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChouTC05,
  author       = {David C. Chou and
                  Hima Bindu Tripuramallu and
                  Amy Y. Chou},
  title        = {{BI} and {ERP} integration},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {5},
  pages        = {340--349},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510627241},
  doi          = {10.1108/09685220510627241},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChouTC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChulkovD05,
  author       = {Dmitriy V. Chulkov and
                  Mayur S. Desai},
  title        = {Information technology project failures: Applying the bandit problem
                  to evaluate managerial decision making},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {2},
  pages        = {135--143},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510589316},
  doi          = {10.1108/09685220510589316},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChulkovD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/CoetzeeE05,
  author       = {Marijke Coetzee and
                  Jan H. P. Eloff},
  title        = {An access control framework for web services},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {1},
  pages        = {29--38},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510582656},
  doi          = {10.1108/09685220510582656},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/CoetzeeE05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Eigeles05,
  author       = {Dan Eigeles},
  title        = {Intelligent authentication, authorization, and administration {(I3A)}},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {5},
  pages        = {419--434},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510627296},
  doi          = {10.1108/09685220510627296},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Eigeles05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FolorunsoO05,
  author       = {Olusegun Folorunso and
                  Adewale Akintayo Ogunde},
  title        = {Data mining as a technique for knowledge management in business process
                  redesign},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {4},
  pages        = {274--280},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510614407},
  doi          = {10.1108/09685220510614407},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FolorunsoO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GonzalezGL05,
  author       = {Reyes{-}G. Gonzalez and
                  Jose Gasco and
                  Juan Llopis},
  title        = {Information systems outsourcing success factors: a review and some
                  results},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {5},
  pages        = {399--418},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510627287},
  doi          = {10.1108/09685220510627287},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GonzalezGL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Gritzalis05,
  author       = {Stefanos Gritzalis},
  title        = {A good-practice guidance on the use of {PKI} services in the public
                  sector of the European Union member states},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {5},
  pages        = {379--398},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510627278},
  doi          = {10.1108/09685220510627278},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Gritzalis05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GuptaH05,
  author       = {Atul Gupta and
                  Rex Hammond},
  title        = {Information systems security issues and decisions for small businesses:
                  An empirical examination},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {4},
  pages        = {297--310},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510614425},
  doi          = {10.1108/09685220510614425},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GuptaH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KeshR05,
  author       = {Someswar Kesh and
                  M. K. Raja},
  title        = {Development of a qualitative reasoning model for financial forecasting},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {2},
  pages        = {167--179},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510582638},
  doi          = {10.1108/09685220510582638},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KeshR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Lai05,
  author       = {Iat Long Alex Lai},
  title        = {Knowledge management for Chinese medicines: a conceptual model},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {3},
  pages        = {244--255},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510602059},
  doi          = {10.1108/09685220510602059},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Lai05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LuHH05,
  author       = {Hsi{-}Peng Lu and
                  Chin{-}Lung Hsu and
                  Hsiu{-}Ying Hsu},
  title        = {An empirical study of the effect of perceived risk upon intention
                  to use online applications},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {2},
  pages        = {106--120},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510589299},
  doi          = {10.1108/09685220510589299},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LuHH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MarnewickL05,
  author       = {Carl Marnewick and
                  Les Labuschagne},
  title        = {A conceptual model for enterprise resource planning {(ERP)}},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {2},
  pages        = {144--155},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510589325},
  doi          = {10.1108/09685220510589325},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MarnewickL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MazhelisMV05,
  author       = {Oleksiy Mazhelis and
                  Jouni Markkula and
                  Jari Veijalainen},
  title        = {An integrated identity verification system for mobile terminals},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {5},
  pages        = {367--378},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510627269},
  doi          = {10.1108/09685220510627269},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/MazhelisMV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MetaxiotisZNP05,
  author       = {Kostas S. Metaxiotis and
                  Ioannis Zafeiropoulos and
                  Konstantina Nikolinakou and
                  John E. Psarras},
  title        = {Goal directed project management methodology for the support of {ERP}
                  implementation and optimal adaptation procedure},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {1},
  pages        = {55--71},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510582674},
  doi          = {10.1108/09685220510582674},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MetaxiotisZNP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PatiD05,
  author       = {Niranjan Pati and
                  Mayur S. Desai},
  title        = {Conceptualizing strategic issues in information technology outsourcing},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {4},
  pages        = {281--296},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510614416},
  doi          = {10.1108/09685220510614416},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PatiD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RedmanWH05,
  author       = {J. Redman and
                  Matthew J. Warren and
                  William Hutchinson},
  title        = {System survivability: a critical security problem},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {3},
  pages        = {182--188},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510602004},
  doi          = {10.1108/09685220510602004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RedmanWH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RileyK05,
  author       = {Richard A. Riley Jr. and
                  Virginia Franke Kleist},
  title        = {The biometric technologies business case: a systematic approach},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {2},
  pages        = {89--105},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510589280},
  doi          = {10.1108/09685220510589280},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RileyK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ShihW05,
  author       = {Stephen C. Shih and
                  H. Joseph Wen},
  title        = {E-enterprise security management life cycle},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {2},
  pages        = {121--134},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510589307},
  doi          = {10.1108/09685220510589307},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ShihW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Smith05,
  author       = {Alan D. Smith},
  title        = {Exploring radio frequency identification technology and its impact
                  on business systems},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {1},
  pages        = {16--28},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510582647},
  doi          = {10.1108/09685220510582647},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Smith05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SodiyaL05,
  author       = {Adesina S. Sodiya and
                  H. O. D. Longe},
  title        = {An improved two-tiered strategy to intrusion detection},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {3},
  pages        = {235--243},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510602040},
  doi          = {10.1108/09685220510602040},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SodiyaL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SodiyaLA05,
  author       = {Adesina S. Sodiya and
                  H. O. D. Longe and
                  Adio T. Akinwale},
  title        = {Maintaining privacy in anomaly-based intrusion detection systems},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {1},
  pages        = {72--80},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510582683},
  doi          = {10.1108/09685220510582683},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SodiyaLA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/StengelFBS05,
  author       = {Ingo Stengel and
                  Klaus Peter Fischer and
                  Udo Bleimann and
                  Jeanne Stynes},
  title        = {Mitigating the mobile agent malicious host problem by using communication
                  patterns},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {3},
  pages        = {203--211},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510602022},
  doi          = {10.1108/09685220510602022},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/StengelFBS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Stewart05,
  author       = {Andrew Stewart},
  title        = {Information security technologies as a commodity input},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {1},
  pages        = {5--15},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510582629},
  doi          = {10.1108/09685220510582629},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Stewart05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ZafiropoulosMA05,
  author       = {Ioannis Zafeiropoulos and
                  Kostas S. Metaxiotis and
                  Dimitris Askounis},
  title        = {Dynamic risk management system for the modeling, optimal adaptation
                  and implementation of an {ERP} system},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {3},
  pages        = {212--234},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510602031},
  doi          = {10.1108/09685220510602031},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ZafiropoulosMA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ZhouOL05,
  author       = {Jianying Zhou and
                  Jose Antonio Onieva and
                  Javier L{\'{o}}pez},
  title        = {Optimized multi-party certified email protocols},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {5},
  pages        = {350--366},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510627250},
  doi          = {10.1108/09685220510627250},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ZhouOL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BahliB04,
  author       = {Bouchaib Bahli and
                  Younes Benslimane},
  title        = {An exploration of wireless computing risks: Development of a risk
                  taxonomy},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {245--254},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410542606},
  doi          = {10.1108/09685220410542606},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BahliB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Beheshti04,
  author       = {Hooshang M. Beheshti},
  title        = {The impact of {IT} on SMEs in the United States},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {318--327},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410553532},
  doi          = {10.1108/09685220410553532},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Beheshti04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BelhadjaliW04,
  author       = {Moncef Belhadjali and
                  Gary L. Whaley},
  title        = {A data mining approach to neural network training},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {117--124},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410518874},
  doi          = {10.1108/09685220410518874},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BelhadjaliW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BothaS04,
  author       = {Jacques Botha and
                  Rossouw von Solms},
  title        = {A cyclic approach to business continuity planning},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {328--337},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410553541},
  doi          = {10.1108/09685220410553541},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BothaS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChouTY04,
  author       = {David C. Chou and
                  Xin Tan and
                  David C. Yen},
  title        = {Web technology and supply chain management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {338--349},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410553550},
  doi          = {10.1108/09685220410553550},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChouTY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DesaiDO04,
  author       = {Mayur S. Desai and
                  Kiran J. Desai and
                  Lucy Ojode},
  title        = {A global information technology model: business applications in developing
                  economies (case studies)},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {5},
  pages        = {401--410},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410563388},
  doi          = {10.1108/09685220410563388},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DesaiDO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/EmbseDD04,
  author       = {Thomas von der Embse and
                  Mayur S. Desai and
                  Seema Desai},
  title        = {How well are corporate ethics codes and policies applied in the trenches?
                  Key factors and conditions},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {146--153},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410530780},
  doi          = {10.1108/09685220410530780},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/EmbseDD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Foltz04,
  author       = {C. Bryan Foltz},
  title        = {Cyberterrorism, computer crime, and reality},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {154--166},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410530799},
  doi          = {10.1108/09685220410530799},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Foltz04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FurnellPD04,
  author       = {Steven Furnell and
                  I. Papadopoulos and
                  Paul Dowland},
  title        = {A long-term trial of alternative user authentication technologies},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {178--190},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410530816},
  doi          = {10.1108/09685220410530816},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FurnellPD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Gritzalis04,
  author       = {Dimitris Gritzalis},
  title        = {Embedding privacy in {IT} applications development},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {8--26},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410518801},
  doi          = {10.1108/09685220410518801},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Gritzalis04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Gritzalis04a,
  author       = {Stefanos Gritzalis},
  title        = {Enhancing Web privacy and anonymity in the digital era},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {255--287},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410542615},
  doi          = {10.1108/09685220410542615},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Gritzalis04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GrupeJ04,
  author       = {Fritz H. Grupe and
                  Simon Jooste},
  title        = {Genetic algorithms: {A} business perspective},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {288--297},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410542624},
  doi          = {10.1108/09685220410542624},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GrupeJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LimSV04,
  author       = {Billy B. L. Lim and
                  Yan Sun and
                  Joaquin Vila},
  title        = {Incorporating WS-Security into a Web services-based portal},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {206--217},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410542570},
  doi          = {10.1108/09685220410542570},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LimSV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LiuTW04,
  author       = {Jau{-}Yang Liu and
                  Jyh{-}Horng Michael Tarn and
                  H. Joseph Wen},
  title        = {Adopting e-commerce Web site operation modes: The current state of
                  large {US} firms},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {73--90},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410518847},
  doi          = {10.1108/09685220410518847},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LiuTW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Maguire04,
  author       = {Stuart Maguire},
  title        = {Reconciling the system requirements process in changing business environments},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {362--372},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410553578},
  doi          = {10.1108/09685220410553578},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Maguire04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MarisMPNTA04,
  author       = {Kostas Maris and
                  Kostas S. Metaxiotis and
                  G. Pantou and
                  Konstantinos Nikolopoulos and
                  Eleni Tavanidou and
                  Vassilis Assimakopoulos},
  title        = {{D-TIFIS:} a decision support system for options trading},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {45--65},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410518829},
  doi          = {10.1108/09685220410518829},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MarisMPNTA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Metaxiotis04,
  author       = {Kostas S. Metaxiotis},
  title        = {{RECOT:} an expert system for the reduction of environmental cost
                  in the textile industry},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {218--227},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410542589},
  doi          = {10.1108/09685220410542589},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Metaxiotis04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MoulinosIT04,
  author       = {Konstantinos Moulinos and
                  John Iliadis and
                  Vassilis Tsoumas},
  title        = {Towards secure sealing of privacy policies},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {350--361},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410553569},
  doi          = {10.1108/09685220410553569},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MoulinosIT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Petrovic-LazarevicS04,
  author       = {Sonja Petrovic{-}Lazarevic and
                  Amrik S. Sohal},
  title        = {Nature of e-business ethical dilemmas},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {167--177},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410530807},
  doi          = {10.1108/09685220410530807},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Petrovic-LazarevicS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RawatGP04,
  author       = {Sanjay Rawat and
                  Ved Prakash Gulati and
                  Arun K. Pujari},
  title        = {Frequency- and ordering-based similarity measure for host-based intrusion
                  detection},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {5},
  pages        = {411--421},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410563397},
  doi          = {10.1108/09685220410563397},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RawatGP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RaziTS04,
  author       = {Muhammad A. Razi and
                  J. Michael Tarn and
                  Faisal A. Siddiqui},
  title        = {Exploring the failure and success of DotComs},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {228--244},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410542598},
  doi          = {10.1108/09685220410542598},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RaziTS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RehmanM04,
  author       = {Sajjad ur Rehman and
                  Laila Marouf},
  title        = {Human resources for information management operations in Kuwaiti corporate
                  companies},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {191--201},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410530825},
  doi          = {10.1108/09685220410530825},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RehmanM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RuppS04,
  author       = {William T. Rupp and
                  Alan D. Smith},
  title        = {Exploring the impacts of {P2P} networks on the entertainment industry},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {102--116},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410518865},
  doi          = {10.1108/09685220410518865},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RuppS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SodiyaLA04,
  author       = {Adesina S. Sodiya and
                  H. O. D. Longe and
                  Adio T. Akinwale},
  title        = {A new two-tiered strategy to intrusion detection},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {27--44},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410518810},
  doi          = {10.1108/09685220410518810},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SodiyaLA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Srinivasan04,
  author       = {S. Srinivasan},
  title        = {Role of trust in e-business success},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {66--72},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410518838},
  doi          = {10.1108/09685220410518838},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Srinivasan04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TsoumasT04,
  author       = {Vassilis Tsoumas and
                  Theodore Tryfonas},
  title        = {From risk analysis to effective security management: towards an automated
                  approach},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {91--101},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410518856},
  doi          = {10.1108/09685220410518856},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TsoumasT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Xing-fenY04,
  author       = {Xing{-}fen Wang and
                  Yi{-}jun Li},
  title        = {Formal definition and implementation of business-oriented SoD access
                  control policy},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {5},
  pages        = {379--388},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410563351},
  doi          = {10.1108/09685220410563351},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Xing-fenY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ZhaoYC04,
  author       = {Ning Zhao and
                  David C. Yen and
                  I{-}Chiu Chang},
  title        = {Auditing in the e-commerce era},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {5},
  pages        = {389--400},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410563360},
  doi          = {10.1108/09685220410563360},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ZhaoYC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ZorkadisD04,
  author       = {Vasilios Zorkadis and
                  P. Donos},
  title        = {On biometrics-based authentication and identification from a privacy-protection
                  perspective: Deriving privacy-enhancing requirements},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {125--137},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410518883},
  doi          = {10.1108/09685220410518883},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ZorkadisD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AbouzakharM03,
  author       = {Nasser Salem Abouzakhar and
                  Gordon A. Manson},
  title        = {Networks security measures using neuro-fuzzy agents},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {33--38},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310463713},
  doi          = {10.1108/09685220310463713},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AbouzakharM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AljifriPC03,
  author       = {Hassan Aljifri and
                  Alexander Perez{-}Pons and
                  Daniel Collins},
  title        = {Global e-commerce: a framework for understanding and overcoming the
                  trust barrier},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {130--138},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310480417},
  doi          = {10.1108/09685220310480417},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AljifriPC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ArmstrongF03,
  author       = {Helen L. Armstrong and
                  Patrick J. Forde},
  title        = {Internet anonymity practices in computer crime},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {5},
  pages        = {209--215},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310500117},
  doi          = {10.1108/09685220310500117},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ArmstrongF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ClarkeFLR03,
  author       = {Nathan L. Clarke and
                  Steven Furnell and
                  Benn Lines and
                  Paul L. Reynolds},
  title        = {Keystroke dynamics on a mobile handset: a feasibility study},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {161--166},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310489526},
  doi          = {10.1108/09685220310489526},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ClarkeFLR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DesaiRD03,
  author       = {Mayur S. Desai and
                  Thomas C. Richards and
                  Kiran J. Desai},
  title        = {E-commerce policies and customer privacy},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {19--27},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310463696},
  doi          = {10.1108/09685220310463696},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DesaiRD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FocacciMGD03,
  author       = {Luisa Focacci and
                  Robert J. Mockler and
                  Marc E. Gartenfeld and
                  Dorothy G. Dologite},
  title        = {How to choose an {ASP:} selection guidelines},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {67--73},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310468628},
  doi          = {10.1108/09685220310468628},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FocacciMGD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FulfordD03,
  author       = {Heather Fulford and
                  Neil F. Doherty},
  title        = {The application of information security policies in large UK-based
                  organizations: an exploratory investigation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {106--114},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310480381},
  doi          = {10.1108/09685220310480381},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FulfordD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GargCH03,
  author       = {Ashish Garg and
                  Jeffrey Curtis and
                  Hilary Halper},
  title        = {Quantifying the financial impact of {IT} security breaches},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {74--83},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310468646},
  doi          = {10.1108/09685220310468646},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GargCH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Grupe03,
  author       = {Fritz H. Grupe},
  title        = {Information systems professionals and conflict of interest},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {28--32},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310463704},
  doi          = {10.1108/09685220310463704},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Grupe03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HongCCT03,
  author       = {Kwo{-}Shing Hong and
                  Yen{-}Ping Chi and
                  Louis R. Chao and
                  Jih{-}Hsing Tang},
  title        = {An integrated system theory of information security management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {5},
  pages        = {243--248},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310500153},
  doi          = {10.1108/09685220310500153},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HongCCT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MetaxiotisESP03,
  author       = {Kostas S. Metaxiotis and
                  Konstantinos Ergazakis and
                  Emanuel Samouilidis and
                  John E. Psarras},
  title        = {Decision support through knowledge management: the role of the artificial
                  intelligence},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {5},
  pages        = {216--221},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310500126},
  doi          = {10.1108/09685220310500126},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MetaxiotisESP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MetaxiotisPS03,
  author       = {Kostas S. Metaxiotis and
                  John E. Psarras and
                  Emanuel Samouilidis},
  title        = {Integrating fuzzy logic into decision suppport systems: current research
                  and future prospects},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {53--59},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310468592},
  doi          = {10.1108/09685220310468592},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MetaxiotisPS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Moghe03,
  author       = {Vidya Moghe},
  title        = {Privacy management - a new era in the Australian business environment},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {60--66},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310468600},
  doi          = {10.1108/09685220310468600},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Moghe03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/NgL03,
  author       = {Jimmy J. M. Ng and
                  K. X. Li},
  title        = {Implications of {ICT} for knowledge management in globalization},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {167--174},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310489535},
  doi          = {10.1108/09685220310489535},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/NgL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/NikolopoulosMAT03,
  author       = {Konstantinos Nikolopoulos and
                  Kostas S. Metaxiotis and
                  Vassilis Assimakopoulos and
                  Eleni Tavanidou},
  title        = {A first approach to e-forecasting: a survey of forecasting Web services},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {146--152},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310480435},
  doi          = {10.1108/09685220310480435},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/NikolopoulosMAT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ramaswamy03,
  author       = {Raju Ramaswamy},
  title        = {A novel approach to solve {DSL} network data rate problems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {187--194},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310489553},
  doi          = {10.1108/09685220310489553},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Ramaswamy03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SeleznyovP03,
  author       = {Alexandr Seleznyov and
                  Seppo Puuronen},
  title        = {Using continuous user authentication to detect masqueraders},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {139--145},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310480426},
  doi          = {10.1108/09685220310480426},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SeleznyovP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SherifA03,
  author       = {Joseph S. Sherif and
                  Rod Ayers},
  title        = {Intrusion detection: methods and systems. Part {II}},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {5},
  pages        = {222--229},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310500135},
  doi          = {10.1108/09685220310500135},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SherifA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SherifAD03,
  author       = {Joseph S. Sherif and
                  Rod Ayers and
                  Tommy G. Dearmond},
  title        = {Intrusion detection: the art and the practice. Part {I}},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {175--186},
  year         = {2003},
  url          = {https://doi.org/10.1108/10.1108/09685220310489544},
  doi          = {10.1108/10.1108/09685220310489544},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SherifAD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SherifG03,
  author       = {Joseph S. Sherif and
                  David P. Gilliam},
  title        = {Deployment of anti-virus software: a case study},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {5--10},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310463678},
  doi          = {10.1108/09685220310463678},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SherifG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SkoularidouS03,
  author       = {Victoria Skoularidou and
                  Diomidis Spinellis},
  title        = {Security architectures for network clients},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {84--91},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310468664},
  doi          = {10.1108/09685220310468664},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SkoularidouS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Smith03,
  author       = {Alan D. Smith},
  title        = {Exploring potential strategic impacts of XML-related technologies},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {92--100},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310468673},
  doi          = {10.1108/09685220310468673},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Smith03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SmithR03,
  author       = {Alan D. Smith and
                  William T. Rupp},
  title        = {Application service providers: an application of the transaction cost
                  model},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {11--18},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310463687},
  doi          = {10.1108/09685220310463687},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SmithR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TemtimeCS03,
  author       = {Z. T. Temtime and
                  S. V. Chinyoka and
                  J. P. W. Shunda},
  title        = {Toward strategic use of {IT} in SMEs: a developing country perspective},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {5},
  pages        = {230--237},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310500144},
  doi          = {10.1108/09685220310500144},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TemtimeCS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/WarrenH03,
  author       = {Matthew J. Warren and
                  William Hutchinson},
  title        = {A security risk management approach for e-commerce},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {5},
  pages        = {238--242},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310509028},
  doi          = {10.1108/09685220310509028},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/WarrenH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/WolfS03,
  author       = {H. J. A. (Rens) de Wolf and
                  Marcel E. M. Spruit},
  title        = {Stealth tracing: Subliminal Traceroute},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {123--129},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310480408},
  doi          = {10.1108/09685220310480408},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/WolfS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Xenitellis03,
  author       = {Simeon Xenitellis},
  title        = {Identifying security vulnerabilities through input flow tracing and
                  analysis},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {195--199},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310489562},
  doi          = {10.1108/09685220310489562},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Xenitellis03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/YangZ03,
  author       = {Cungang Yang and
                  Chang N. Zhang},
  title        = {An XML-based administration method on role-based access control in
                  the enterprise environment},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {5},
  pages        = {249--257},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310500162},
  doi          = {10.1108/09685220310500162},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/YangZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ZengCY03,
  author       = {Yun E. Zeng and
                  Roger H. L. Chiang and
                  David C. Yen},
  title        = {Enterprise integration with advanced information technologies: {ERP}
                  and data warehousing},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {115--122},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310480390},
  doi          = {10.1108/09685220310480390},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ZengCY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ZengWY03,
  author       = {Yun E. Zeng and
                  H. Joseph Wen and
                  David C. Yen},
  title        = {Customer relationship management {(CRM)} in business-to-business {(B2B)}
                  e-commerce},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {39--44},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310463722},
  doi          = {10.1108/09685220310463722},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ZengWY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AbouzakharM02,
  author       = {Nasser Salem Abouzakhar and
                  Gordon A. Manson},
  title        = {An intelligent approach to prevent distributed systems attacks},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {5},
  pages        = {203--209},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210447505},
  doi          = {10.1108/09685220210447505},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AbouzakharM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BothaS02,
  author       = {Martin Botha and
                  Rossouw von Solms},
  title        = {The utilization of trend analysis in the effective monitoring of information
                  security. Part 2: the model},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {5--11},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210417454},
  doi          = {10.1108/09685220210417454},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BothaS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DesaiRE02,
  author       = {Mayur S. Desai and
                  Thomas C. Richards and
                  Thomas von der Embse},
  title        = {System insecurity - firewalls},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {135--139},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210431890},
  doi          = {10.1108/09685220210431890},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DesaiRE02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FengW02,
  author       = {Feng Hao and
                  Chan Choong Wah},
  title        = {Private key generation from on-line handwritten signatures},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {159--164},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210436949},
  doi          = {10.1108/09685220210436949},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FengW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FranceYWC02,
  author       = {Tim France and
                  Dave Yen and
                  Jyun{-}Cheng Wang and
                  Chia{-}Ming Chang},
  title        = {Integrating search engines with data mining for customer-oriented
                  information search},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {5},
  pages        = {242--254},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210446597},
  doi          = {10.1108/09685220210446597},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FranceYWC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Furnell02,
  author       = {Kevin Fitzgerald},
  title        = {Steven Furnell: Cybercrime - vandalizing the information society (Review)},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {196},
  year         = {2002},
  url          = {https://doi.org/10.1108/imcs.2002.10.4.196.1},
  doi          = {10.1108/IMCS.2002.10.4.196.1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Furnell02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HarrisY02,
  author       = {Austin Jay Harris and
                  David C. Yen},
  title        = {Biometric authentication: assuring access to information},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {12--19},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210417463},
  doi          = {10.1108/09685220210417463},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HarrisY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Higgins02,
  author       = {Huong Ngo Higgins},
  title        = {Auditing disclosure risks of on-line broker-dealers},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {73--76},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210424131},
  doi          = {10.1108/09685220210424131},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Higgins02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/IrakleousFDP02,
  author       = {I. Irakleous and
                  Steven Furnell and
                  Paul Dowland and
                  Maria Papadaki},
  title        = {An experimental comparison of secret-based user authentication technologies},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {100--108},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210431854},
  doi          = {10.1108/09685220210431854},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/IrakleousFDP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JainSV02,
  author       = {Gaurav Jain and
                  Deepali Singh and
                  Shekhar Verma},
  title        = {Service level agreements in {IP} networks},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {171--177},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210436967},
  doi          = {10.1108/09685220210436967},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JainSV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KeshNR02,
  author       = {Someswar Kesh and
                  Sridhar P. Nerur and
                  Sam Ramanujan},
  title        = {Quality of service - technology and implementation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {85--91},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210424168},
  doi          = {10.1108/09685220210424168},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KeshNR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KeshRN02,
  author       = {Someswar Kesh and
                  Sam Ramanujan and
                  Sridhar P. Nerur},
  title        = {A framework for analyzing e-commerce security},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {149--158},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210436930},
  doi          = {10.1108/09685220210436930},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KeshRN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Kini02,
  author       = {Ranjan B. Kini},
  title        = {{IT} in manufacturing for performance: the challenge for Thai manufacturers},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {41--48},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210417508},
  doi          = {10.1108/09685220210417508},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Kini02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KruckGMBF02,
  author       = {S. E. Kruck and
                  Danny Gottovi and
                  Farideh Moghadami and
                  Ralph Broom and
                  Karen A. Forcht},
  title        = {Protecting personal privacy on the Internet},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {77--84},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210424140},
  doi          = {10.1108/09685220210424140},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KruckGMBF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LeeL02,
  author       = {Jintae Lee and
                  Younghwa Lee},
  title        = {A holistic model of computer abuse within organizations},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {57--63},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210424104},
  doi          = {10.1108/09685220210424104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LeeL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LimW02,
  author       = {Billy B. L. Lim and
                  H. Joseph Wen},
  title        = {The impact of next generation {XML}},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {33--40},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210417490},
  doi          = {10.1108/09685220210417490},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LimW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Lunn02,
  author       = {Mark Lunn},
  title        = {Using business models and revenue streams for digital marketplace
                  success},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {20--27},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210417472},
  doi          = {10.1108/09685220210417472},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Lunn02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Maguire02,
  author       = {Stuart Maguire},
  title        = {Identifying risks during information system development: managing
                  the process},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {126--134},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210431881},
  doi          = {10.1108/09685220210431881},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Maguire02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Mamaghani02,
  author       = {Farrokh Mamaghani},
  title        = {Evaluation and selection of an antivirus and content filtering software},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {28--32},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210417481},
  doi          = {10.1108/09685220210417481},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Mamaghani02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MetaxiotisPP02,
  author       = {Kostas S. Metaxiotis and
                  John E. Psarras and
                  Stefanos Papastefanatos},
  title        = {Knowledge and information management in e-learning environments; the
                  user agent architecture},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {165--170},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210436958},
  doi          = {10.1108/09685220210436958},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MetaxiotisPP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ratnasingam02,
  author       = {Pauline Ratnasingam},
  title        = {The importance of technology trust in Web services security},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {5},
  pages        = {255--260},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210447514},
  doi          = {10.1108/09685220210447514},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Ratnasingam02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RodgersYC02,
  author       = {John A. Rodgers and
                  David C. Yen and
                  David C. Chou},
  title        = {Developing e-business; a strategic approach},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {184--192},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210436985},
  doi          = {10.1108/09685220210436985},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RodgersYC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Siponen02,
  author       = {Mikko T. Siponen},
  title        = {Towards maturity of information security maturity criteria: six lessons
                  learned from software maturity criteria},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {5},
  pages        = {210--224},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210446560},
  doi          = {10.1108/09685220210446560},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Siponen02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SmithO02,
  author       = {Alan D. Smith and
                  O. Felix Offodile},
  title        = {Information management of automatic data capture: an overview of technical
                  developments},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {109--118},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210431863},
  doi          = {10.1108/09685220210431863},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SmithO02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SmithR02,
  author       = {Alan D. Smith and
                  William T. Rupp},
  title        = {Application service providers {(ASP):} moving downstream to enhance
                  competitive advantage},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {64--72},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210424113},
  doi          = {10.1108/09685220210424113},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SmithR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SmithR02a,
  author       = {Alan D. Smith and
                  William T. Rupp},
  title        = {Issues in cybersecurity; understanding the potential risks associated
                  with hackers/crackers},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {178--183},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210436976},
  doi          = {10.1108/09685220210436976},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SmithR02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TranA02,
  author       = {Elizabeth Tran and
                  MaryAnne Atkinson},
  title        = {Security of personal data across national borders},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {5},
  pages        = {237--241},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210446588},
  doi          = {10.1108/09685220210446588},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TranA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/VermeulenS02,
  author       = {Clive Vermeulen and
                  Rossouw von Solms},
  title        = {The information security management toolbox - taking the pain out
                  of security management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {119--125},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210431872},
  doi          = {10.1108/09685220210431872},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/VermeulenS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ZhangY02,
  author       = {Chang N. Zhang and
                  Cungang Yang},
  title        = {Information flow analysis on role-based access control model},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {5},
  pages        = {225--236},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210446579},
  doi          = {10.1108/09685220210446579},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ZhangY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ali01,
  author       = {H. Arafat Ali},
  title        = {A new model for monitoring intrusion based on Petri Nets},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {175--182},
  year         = {2001},
  url          = {https://doi.org/10.1108/EUM0000000005807},
  doi          = {10.1108/EUM0000000005807},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Ali01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Badamas01,
  author       = {Muhammed A. Badamas},
  title        = {Mobile computer systems - security considerations},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {134--136},
  year         = {2001},
  url          = {https://doi.org/10.1108/EUM0000000005545},
  doi          = {10.1108/EUM0000000005545},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Badamas01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BothaE01,
  author       = {Reinhardt A. Botha and
                  Jan H. P. Eloff},
  title        = {A framework for access control in workflow systems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {126--133},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110394848},
  doi          = {10.1108/09685220110394848},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/BothaE01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BothaS01,
  author       = {Martin Botha and
                  Rossouw von Solms},
  title        = {The utilization of trend analysis in the effective monitoring of information
                  security. Part 1: the concept},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {5},
  pages        = {237--242},
  year         = {2001},
  url          = {https://doi.org/10.1108/EUM0000000006069},
  doi          = {10.1108/EUM0000000006069},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BothaS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChanK01,
  author       = {Mangtang Chan and
                  Lam{-}for Kwok},
  title        = {Integrating security design into the software development process
                  for e-commerce systems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {112--122},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110394758},
  doi          = {10.1108/09685220110394758},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChanK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChengL01,
  author       = {Eddie W. L. Cheng and
                  Heng Li},
  title        = {Information priority-setting for better resource allocation using
                  analytic hierarchy process {(AHP)}},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {61--70},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110388827},
  doi          = {10.1108/09685220110388827},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ChengL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ClarkCY01,
  author       = {Mary A. Clark and
                  David C. Chou and
                  David C. Yen},
  title        = {Domain names management: a strategy for electronic commerce security},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {5},
  pages        = {225--232},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110408130},
  doi          = {10.1108/09685220110408130},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ClarkCY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Costa01,
  author       = {Christina Costa},
  title        = {Information technology outsourcing in Australia: a literature review},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {5},
  pages        = {213--224},
  year         = {2001},
  url          = {https://doi.org/10.1108/EUM0000000006068},
  doi          = {10.1108/EUM0000000006068},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Costa01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FurnellCD01,
  author       = {Steven Furnell and
                  Pelagia Chiliarchaki and
                  Paul Dowland},
  title        = {Security analysers: administrator assistants or hacker helpers?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {93--101},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110388872},
  doi          = {10.1108/09685220110388872},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FurnellCD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GerberSO01,
  author       = {Mariana Gerber and
                  Rossouw von Solms and
                  Paul L. Overbeek},
  title        = {Formalizing information security requirements},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {32--37},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110366768},
  doi          = {10.1108/09685220110366768},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GerberSO01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GritzalisG01,
  author       = {Stefanos Gritzalis and
                  Dimitris Gritzalis},
  title        = {A digital seal solution for deploying trust on commercial transactions},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {71--79},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110388836},
  doi          = {10.1108/09685220110388836},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GritzalisG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Hurley01,
  author       = {Margaret A. Hurley},
  title        = {{IT} outsourcing - managing the key asset},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {5},
  pages        = {243--249},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110408059},
  doi          = {10.1108/09685220110408059},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Hurley01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HutchinsonW01,
  author       = {William Hutchinson and
                  Matthew J. Warren},
  title        = {Attitudes of Australian information system managers against online
                  attackers},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {106--111},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110394749},
  doi          = {10.1108/09685220110394749},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HutchinsonW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JanbandhuS01,
  author       = {Pawan Kumar Janbandhu and
                  Mohammed Yakoob Siyal},
  title        = {Novel biometric digital signatures for Internet-based applications},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {5},
  pages        = {205--212},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110408022},
  doi          = {10.1108/09685220110408022},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JanbandhuS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KolluruM01,
  author       = {Ramesh Kolluru and
                  Paul Meredith},
  title        = {Security and trust management in supply chains},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {5},
  pages        = {233--236},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110408031},
  doi          = {10.1108/09685220110408031},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KolluruM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LeeYC01,
  author       = {Ching{-}Yun Lee and
                  Yi{-}Shiung Yeh and
                  Deng{-}Jyi Chen},
  title        = {Model calculations to estimate the probability of secret reconstruction
                  in computer environments},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {13--20},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110366722},
  doi          = {10.1108/09685220110366722},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LeeYC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LoukisS01,
  author       = {Euripidis N. Loukis and
                  Diomidis Spinellis},
  title        = {Information systems security in the Greek public sector},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {21--31},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110366740},
  doi          = {10.1108/09685220110366740},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LoukisS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MetaxiotisPA01,
  author       = {Kostas S. Metaxiotis and
                  John E. Psarras and
                  Dimitris Askounis},
  title        = {Building ontologies for production scheduling systems: towards a unified
                  methodology},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {44--51},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110366803},
  doi          = {10.1108/09685220110366803},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MetaxiotisPA01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MetaxiotisPK01,
  author       = {Kostas S. Metaxiotis and
                  John E. Psarras and
                  Konstantinos Karnezis},
  title        = {{NUMASS:} a Web-based nuclear monitoring system},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {154--164},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110400336},
  doi          = {10.1108/09685220110400336},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MetaxiotisPK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/StamoulisGGM01,
  author       = {Dimitrios S. Stamoulis and
                  Dimitris Gouscos and
                  Panagiotis Georgiadis and
                  Drakoulis Martakos},
  title        = {Revisiting public information management for effective e-government
                  services},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {146--153},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110400327},
  doi          = {10.1108/09685220110400327},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/StamoulisGGM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TryfonasKP01,
  author       = {Theodore Tryfonas and
                  Evangelos A. Kiountouzis and
                  Angeliki Poulymenakou},
  title        = {Embedding security practices in contemporary information systems development
                  approaches},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {183--197},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110401254},
  doi          = {10.1108/09685220110401254},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TryfonasKP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Udo01,
  author       = {Godwin J. Udo},
  title        = {Privacy and security concerns as major barriers for e-commerce: a
                  survey study},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {165--174},
  year         = {2001},
  url          = {https://doi.org/10.1108/EUM0000000005808},
  doi          = {10.1108/EUM0000000005808},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Udo01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/WenCH01,
  author       = {H. Joseph Wen and
                  Houn{-}Gee Chen and
                  Hsin{-}Ginn Hwang},
  title        = {E-commerce Web site design: strategies and models},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {5--12},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110366713},
  doi          = {10.1108/09685220110366713},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/WenCH01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/WhiteP01,
  author       = {Gayle Webb White and
                  Sheila J. Pearson},
  title        = {Controlling corporate e-mail, {PC} use and computer security},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {88--92},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110388863},
  doi          = {10.1108/09685220110388863},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/WhiteP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/X01,
  title        = {Say goodbye to the CIO, welcome to the business prophet},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {123--125},
  year         = {2001},
  url          = {https://doi.org/10.1108/EUM0000000005544},
  doi          = {10.1108/EUM0000000005544},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/X01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ye01,
  author       = {Nong Ye},
  title        = {Robust intrusion tolerance in information systems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {38--43},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110366786},
  doi          = {10.1108/09685220110366786},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Ye01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/YenC01,
  author       = {David C. Yen and
                  David C. Chou},
  title        = {Intranets for organizational innovation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {80--87},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110388845},
  doi          = {10.1108/09685220110388845},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/YenC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Attaran00,
  author       = {Mohsen Attaran},
  title        = {Voice recognition software programs: are they right for you?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {42--44},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010312524},
  doi          = {10.1108/09685220010312524},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Attaran00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Attaran00a,
  author       = {Mohsen Attaran},
  title        = {Managing legal liability of the Net: a ten step guide for {IT} managers},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {98--100},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010321335},
  doi          = {10.1108/09685220010321335},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Attaran00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Chow00,
  author       = {Wing S. Chow},
  title        = {Success factors for {IS} disaster recovery planning in Hong Kong},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {80--87},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010321326},
  doi          = {10.1108/09685220010321326},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Chow00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DhillonC00,
  author       = {Gurpreet Dhillon and
                  M{\'{a}}rio M. Caldeira},
  title        = {Interpreting the adoption and use of {EDI} in the Portuguese clothing
                  and textile industry},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {184--188},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010344934},
  doi          = {10.1108/09685220010344934},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DhillonC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FooH00,
  author       = {Schubert Foo and
                  Mark Hepworth},
  title        = {The implementation of an electronic survey tool to help determine
                  the information needs of a knowledge-based organization},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {53--64},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010694008},
  doi          = {10.1108/09685220010694008},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FooH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Forcht00,
  author       = {Karen A. Forcht},
  title        = {Security-related concerns with geographic information systems and
                  geographic mapping},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {5},
  pages        = {218--221},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010353141},
  doi          = {10.1108/09685220010353141},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Forcht00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FurnellD00,
  author       = {Steven Furnell and
                  Paul Dowland},
  title        = {A conceptual architecture for real-time intrusion monitoring},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {65--75},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010321317},
  doi          = {10.1108/09685220010321317},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FurnellD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GritzalisIO00,
  author       = {Stefanos Gritzalis and
                  John Iliadis and
                  Spyros Oikonomopoulos},
  title        = {Distributed component software security issues on deploying a secure
                  electronic marketplace},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {5--13},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010312290},
  doi          = {10.1108/09685220010312290},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GritzalisIO00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HawkinsYC00,
  author       = {Steve Hawkins and
                  David C. Yen and
                  David C. Chou},
  title        = {Awareness and challenges of Internet security},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {131--143},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010372564},
  doi          = {10.1108/09685220010372564},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HawkinsYC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HawkinsYC00a,
  author       = {Steve M. Hawkins and
                  David C. Yen and
                  David C. Chou},
  title        = {Disaster recovery planning: a strategy for data security},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {5},
  pages        = {222--230},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010353150},
  doi          = {10.1108/09685220010353150},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HawkinsYC00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HelmsEM00,
  author       = {Marilyn M. Helms and
                  Lawrence P. Ettkin and
                  Daniel J. Morris},
  title        = {Shielding your company against information compromise},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {117--130},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010339228},
  doi          = {10.1108/09685220010339228},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HelmsEM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JanczewskiP00,
  author       = {Lech J. Janczewski and
                  Victor Portougal},
  title        = {"Need-to-know" principle and fuzzy security clearances modelling},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {5},
  pages        = {210--217},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010356247},
  doi          = {10.1108/09685220010356247},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JanczewskiP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KimO00,
  author       = {Bowon Kim and
                  Heungshik Oh},
  title        = {An exploratory inquiry into the perceived effectiveness of a global
                  information system},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {144--154},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010372573},
  doi          = {10.1108/09685220010372573},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KimO00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Kodama00,
  author       = {Mitsuru Kodama},
  title        = {New regional community creation through video-based information networks
                  - a case study of regional vitalization through the promotion of information
                  technology in Japan},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {87--97},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010324459},
  doi          = {10.1108/09685220010324459},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Kodama00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KokolakisDK00,
  author       = {Spyros Kokolakis and
                  A. J. Demopoulos and
                  Evangelos A. Kiountouzis},
  title        = {The use of business process modelling in information systems security
                  analysis and design},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {107--116},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010339192},
  doi          = {10.1108/09685220010339192},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KokolakisDK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LabuschagneE00,
  author       = {Les Labuschagne and
                  Jan H. P. Eloff},
  title        = {Electronic commerce: the information-security challenge},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {154--157},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010372582},
  doi          = {10.1108/09685220010372582},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LabuschagneE00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Lambrinoudakis00,
  author       = {Costas Lambrinoudakis},
  title        = {Smart card technology for deploying a secure information management
                  framework},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {173--183},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010344925},
  doi          = {10.1108/09685220010344925},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Lambrinoudakis00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LankfordJ00,
  author       = {William M. Lankford and
                  Jack E. Johnson},
  title        = {{EDI} via the Internet},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {27--30},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010312353},
  doi          = {10.1108/09685220010312353},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LankfordJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Maguire00,
  author       = {Stuart Maguire},
  title        = {Towards a "business-led" approach to information systems development},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {5},
  pages        = {230--238},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010353187},
  doi          = {10.1108/09685220010353187},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Maguire00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MetaxiotisS00,
  author       = {Kostas S. Metaxiotis and
                  Emanuel Samouilidis},
  title        = {Expert systems in medicine: academic illusion or real power?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {75--79},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010694017},
  doi          = {10.1108/09685220010694017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MetaxiotisS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MorrisEH00,
  author       = {Daniel J. Morris and
                  Lawrence P. Ettkin and
                  Marilyn M. Helms},
  title        = {Issues in the illegal transference of {US} information technologies},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {164--173},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010344916},
  doi          = {10.1108/09685220010344916},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MorrisEH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PhukanD00,
  author       = {Sanjeev Phukan and
                  Gurpreet Dhillon},
  title        = {Ethics and information technology use: a survey of {US} based SMEs},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {5},
  pages        = {239--243},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010353907},
  doi          = {10.1108/09685220010353907},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PhukanD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RahimRS00,
  author       = {Md. Mahbubur Rahim and
                  Mohd. Noah Abd. Rahman and
                  Afzaal H. Seyal},
  title        = {Software piracy among academics: an empirical study in Brunei Darussalam},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {14--26},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010312326},
  doi          = {10.1108/09685220010312326},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RahimRS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Siponen00,
  author       = {Mikko T. Siponen},
  title        = {A conceptual foundation for organizational information security awareness},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {31--41},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010371394},
  doi          = {10.1108/09685220010371394},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Siponen00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Siponen00a,
  author       = {Mikko T. Siponen},
  title        = {Critical analysis of different approaches to minimizing user-related
                  faults in information systems security: implications for research
                  and practice},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {5},
  pages        = {197--209},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010353178},
  doi          = {10.1108/09685220010353178},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Siponen00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Turega00,
  author       = {Mike Turega},
  title        = {Issues with information dissemination on global networks},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {5},
  pages        = {244--248},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010353169},
  doi          = {10.1108/09685220010353169},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Turega00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Attaran99,
  author       = {Mohsen Attaran},
  title        = {Internet-based business opportunities: buyers beware of scams},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {176--178},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910292682},
  doi          = {10.1108/09685229910292682},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Attaran99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AttaranV99,
  author       = {Mohsen Attaran and
                  Ilja VanLaar},
  title        = {Privacy and security on the Internet: how to secure your personal
                  information and company data},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {241--247},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910292907},
  doi          = {10.1108/09685229910292907},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AttaranV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Catania99,
  author       = {Philip Catania},
  title        = {Year 2000 legal and regulatory environment},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {133--139},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910279434},
  doi          = {10.1108/09685229910279434},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Catania99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Dhillon99,
  author       = {Gurpreet Dhillon},
  title        = {Managing and controlling computer misuse},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {171--175},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910292664},
  doi          = {10.1108/09685229910292664},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Dhillon99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Dinnie99,
  author       = {Garry Dinnie},
  title        = {The Second Annual Global Information Security Survey},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {112--120},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910693812},
  doi          = {10.1108/09685229910693812},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Dinnie99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FooLHL99,
  author       = {Schubert Foo and
                  Peng{-}Chor Leong and
                  Siu Cheung Hui and
                  Shigong Liu},
  title        = {Security considerations in the delivery of Web-based applications:
                  a case study},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {40--50},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910255197},
  doi          = {10.1108/09685229910255197},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FooLHL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FurnellDS99,
  author       = {Steven Furnell and
                  Paul Dowland and
                  Peter W. Sanders},
  title        = {Dissecting the "Hacker Manifesto"},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {69--75},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910265493},
  doi          = {10.1108/09685229910265493},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FurnellDS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HartMT99,
  author       = {Rod Hart and
                  Darren Morgan and
                  Hai Tran},
  title        = {An introduction to automated intrusion detection approaches},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {76--82},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910265501},
  doi          = {10.1108/09685229910265501},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HartMT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Higgins99,
  author       = {Huong Ngo Higgins},
  title        = {Corporate system security: towards an integrated management approach},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {217--222},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910292817},
  doi          = {10.1108/09685229910292817},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Higgins99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JohannessenOO99,
  author       = {Jon{-}Arild Johannessen and
                  Johan Olaisen and
                  Bj{\o}rn Olsen},
  title        = {Strategic use of information technology for increased innovation and
                  performance},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {5--22},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910255133},
  doi          = {10.1108/09685229910255133},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JohannessenOO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Jordan99,
  author       = {Ernest Jordan},
  title        = {{IT} contingency planning: management roles},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {232--238},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910292853},
  doi          = {10.1108/09685229910292853},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Jordan99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KnahlHP99,
  author       = {Martin Hans Knahl and
                  Holger D. Hofmann and
                  Andrew D. Phippen},
  title        = {A distributed component framework for integrated network and systems
                  management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {254--260},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910292916},
  doi          = {10.1108/09685229910292916},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KnahlHP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Kodama99,
  author       = {Mitsuru Kodama},
  title        = {Community management support through community-based information networks},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {140--150},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910279452},
  doi          = {10.1108/09685229910279452},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Kodama99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Kodama99a,
  author       = {Mitsuru Kodama},
  title        = {Strategic business applications and new virtual knowledge-based businesses
                  through community-based information networks},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {186--199},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910292754},
  doi          = {10.1108/09685229910292754},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Kodama99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Kreltszheim99,
  author       = {David Kreltszheim},
  title        = {Identifying the proceeds of electronic money fraud},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {223--231},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910292835},
  doi          = {10.1108/09685229910292835},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Kreltszheim99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KwokL99,
  author       = {Lam{-}for Kwok and
                  Dennis Longley},
  title        = {Information security management and modelling},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {30--40},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910255179},
  doi          = {10.1108/09685229910255179},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KwokL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LiddyS99,
  author       = {Carrie Liddy and
                  Alice Sturgeon},
  title        = {The evolution of certificate model architecture},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {95--100},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910265547},
  doi          = {10.1108/09685229910265547},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LiddyS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MosleyH99,
  author       = {Valerie Mosley and
                  Margaret A. Hurley},
  title        = {{IT} skill retention},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {129--132},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910279425},
  doi          = {10.1108/09685229910279425},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MosleyH99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ng99,
  author       = {Eng Huat Ng},
  title        = {Step-by-step guideline for designing and documenting the navigation
                  structure of multimedia hypertext systems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {88--98},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910370784},
  doi          = {10.1108/09685229910370784},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Ng99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Oddie99,
  author       = {Carolyn Oddie},
  title        = {Copyright protection in the digital age},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {239--240},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910292880},
  doi          = {10.1108/09685229910292880},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Oddie99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PsarrasPM99,
  author       = {John E. Psarras and
                  Athanassios P. Papakonstantinou and
                  Kostas S. Metaxiotis},
  title        = {Towards the integrated monitoring and evaluation system {IMES:} a
                  real power},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {5},
  pages        = {247--254},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910292899},
  doi          = {10.1108/09685229910292899},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PsarrasPM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SmithM99,
  author       = {Brian W. Smith and
                  Andrew J. Morris},
  title        = {Avoiding securities class actions arising from {Y2K} issues},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {178--185},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910292709},
  doi          = {10.1108/09685229910292709},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SmithM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Solms99,
  author       = {Rossouw von Solms},
  title        = {Information security management: why standards are important},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {50--58},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910255223},
  doi          = {10.1108/09685229910255223},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Solms99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SpinellisKG99,
  author       = {Diomidis Spinellis and
                  Spyros Kokolakis and
                  Stefanos Gritzalis},
  title        = {Security requirements, risks and recommendations for small enterprise
                  and home-office environments},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {121--128},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910371071},
  doi          = {10.1108/09685229910371071},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SpinellisKG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Whittaker99,
  author       = {Brenda Whittaker},
  title        = {What went wrong? Unsuccessful information technology projects},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {23--30},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910255160},
  doi          = {10.1108/09685229910255160},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Whittaker99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Wilson99,
  author       = {Stephen Wilson},
  title        = {Digital signatures and the future of documentation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {83--87},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910265510},
  doi          = {10.1108/09685229910265510},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Wilson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Wilson99a,
  author       = {Stephen Wilson},
  title        = {New models for the management of public key infrastructure and root
                  certification authorities},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {166--170},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910292655},
  doi          = {10.1108/09685229910292655},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Wilson99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BarnardS98,
  author       = {Lynette Barnard and
                  Rossouw von Solms},
  title        = {The evaluation and certification of information security against {BS}
                  7799},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {72--77},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810209397},
  doi          = {10.1108/09685229810209397},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BarnardS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BrockwayH98,
  author       = {Douglas Brockway and
                  Margaret A. Hurley},
  title        = {Achieving {IT} success},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {5},
  pages        = {199--204},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810240103},
  doi          = {10.1108/09685229810240103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BrockwayH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/CrammM98,
  author       = {Susan Cramm and
                  Thornton May},
  title        = {Accelerating executive development: hey coach ..},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {5},
  pages        = {196--198},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810240095},
  doi          = {10.1108/09685229810240095},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/CrammM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GrupeHY98,
  author       = {Fritz H. Grupe and
                  James M. Hensley and
                  Jeanne H. Yamamura},
  title        = {Watching systems in action: security at the periphery},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {155--159},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810232418},
  doi          = {10.1108/09685229810232418},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GrupeHY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Hurley98,
  author       = {Margaret A. Hurley},
  title        = {Features and functions overload},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {160--161},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810232427},
  doi          = {10.1108/09685229810232427},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Hurley98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LabuschagneE98,
  author       = {Les Labuschagne and
                  Jan H. P. Eloff},
  title        = {Real-time risk analysis using Java concepts},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {5},
  pages        = {212--217},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810240121},
  doi          = {10.1108/09685229810240121},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LabuschagneE98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Larson98,
  author       = {Kent D. Larson},
  title        = {The role of service level agreements in {IT} service delivery},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {128--132},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810225029},
  doi          = {10.1108/09685229810225029},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Larson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LiddyS98,
  author       = {Carrie Liddy and
                  Alice Sturgeon},
  title        = {Seamless secured transactions},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {21--27},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810207416},
  doi          = {10.1108/09685229810207416},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LiddyS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/May98,
  author       = {Thornton May},
  title        = {Strategic ignorance: the new competitive high ground},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {127--128},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810225010},
  doi          = {10.1108/09685229810225010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/May98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Morwood98,
  author       = {Gregory Morwood},
  title        = {Business continuity: awareness and training programmes},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {28--32},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810207425},
  doi          = {10.1108/09685229810207425},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Morwood98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Moscato98,
  author       = {Donald R. Moscato},
  title        = {Database gateway processor risk analysis using fuzzy logic},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {138--144},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810225047},
  doi          = {10.1108/09685229810225047},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Moscato98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MutsaersZG98,
  author       = {Ernest{-}Jan Mutsaers and
                  Han T. M. van der Zee and
                  Henrik Giertz},
  title        = {The evolution of information technology},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {115--126},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810225001},
  doi          = {10.1108/09685229810225001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MutsaersZG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PortougalJ98,
  author       = {Victor Portougal and
                  Lech J. Janczewski},
  title        = {Industrial information-weight security models},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {5},
  pages        = {205--211},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810240112},
  doi          = {10.1108/09685229810240112},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PortougalJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Puthli98,
  author       = {R. K. R. P. Puthli},
  title        = {{METANET:} a five-year Internet strategy},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {3--14},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810207399},
  doi          = {10.1108/09685229810207399},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Puthli98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ratnasingham98,
  author       = {Pauline Ratnasingham},
  title        = {Internet-based {EDI} trust and security},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {33--39},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810207434},
  doi          = {10.1108/09685229810207434},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Ratnasingham98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ratnasingham98a,
  author       = {Pauline Ratnasingham},
  title        = {Trust in Web-based electronic commerce security},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {162--166},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810227667},
  doi          = {10.1108/09685229810227667},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Ratnasingham98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Schneier98,
  author       = {Bruce Schneier},
  title        = {Security pitfalls in cryptographic design},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {133--137},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810225038},
  doi          = {10.1108/09685229810225038},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Schneier98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Solms98,
  author       = {Rossouw von Solms},
  title        = {Information security management {(1):} why information security is
                  so important},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {174--177},
  year         = {1998},
  url          = {https://doi.org/10.1108/EUM0000000004533},
  doi          = {10.1108/EUM0000000004533},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Solms98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Solms98a,
  author       = {Rossouw von Solms},
  title        = {Information security management {(2):} guidelines to the management
                  of information technology security {(GMITS)}},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {5},
  pages        = {221--223},
  year         = {1998},
  url          = {https://doi.org/10.1108/EUM0000000004542},
  doi          = {10.1108/EUM0000000004542},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Solms98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Solms98b,
  author       = {Rossouw von Solms},
  title        = {Information security management {(3):} the Code of Practice for Information
                  Security Management {(BS} 7799)},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {5},
  pages        = {224--225},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810240158},
  doi          = {10.1108/09685229810240158},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Solms98b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Thompson98,
  author       = {David Thompson},
  title        = {1997 computer crime and security survey},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {78--101},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810209414},
  doi          = {10.1108/09685229810209414},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Thompson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ThomsonS98,
  author       = {M. E. Thomson and
                  Rossouw von Solms},
  title        = {Information security awareness: educating your users effectively},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {167--173},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810227649},
  doi          = {10.1108/09685229810227649},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ThomsonS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Wen98,
  author       = {H. Joseph Wen},
  title        = {From client/server to intranet},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {15--20},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810207407},
  doi          = {10.1108/09685229810207407},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Wen98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Wen98a,
  author       = {H. Joseph Wen},
  title        = {Internet computer virus protection policy},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {66--71},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810209388},
  doi          = {10.1108/09685229810209388},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Wen98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/WenT98,
  author       = {H. Joseph Wen and
                  Jyh{-}Horng Michael Tarn},
  title        = {Internet security: a case study of firewall selection},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {178--184},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810227658},
  doi          = {10.1108/09685229810227658},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/WenT98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Wilson98,
  author       = {Stephen Wilson},
  title        = {Some limitations of web of trust models},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {5},
  pages        = {218--220},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810240130},
  doi          = {10.1108/09685229810240130},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Wilson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Zee98,
  author       = {Han T. M. van der Zee},
  title        = {Rejuvenating the {IT} supply organization},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {55--65},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810209379},
  doi          = {10.1108/09685229810209379},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Zee98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BestM97,
  author       = {Jim Best and
                  Thornton May},
  title        = {Is your infrastructure ticking?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {3--6},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710167962},
  doi          = {10.1108/09685229710167962},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BestM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Brockway97,
  author       = {Douglas Brockway},
  title        = {There's an entranet in your future},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {7--10},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710167971},
  doi          = {10.1108/09685229710167971},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Brockway97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FooL97,
  author       = {Schubert Foo and
                  Ee{-}Peng Lim},
  title        = {Managing World Wide Web publications},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {11--17},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710167980},
  doi          = {10.1108/09685229710167980},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/FooL97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FooLS97,
  author       = {Schubert Foo and
                  Peng{-}Chor Leong and
                  Yee Nam Sng},
  title        = {Improving security in computational electronic mail systems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {102--110},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710175783},
  doi          = {10.1108/09685229710175783},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FooLS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ForchtTUE97,
  author       = {Karen A. Forcht and
                  Daphyne Saunders Thomas and
                  Mark L. Usry and
                  Kelly Egan},
  title        = {Control of the Internet},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {23--28},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710168015},
  doi          = {10.1108/09685229710168015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ForchtTUE97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Gooch97,
  author       = {Jeff Gooch},
  title        = {Managing for demonstrably effective {IT} projects},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {133--137},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710184495},
  doi          = {10.1108/09685229710184495},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Gooch97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Harrington97,
  author       = {Catherine Harrington},
  title        = {Compassion in World Farming: an imaging and text retrieval case},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {51--52},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710182811},
  doi          = {10.1108/09685229710182811},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Harrington97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Higgs97,
  author       = {Ernest Higgs},
  title        = {Health informatics blueprint: business needs},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {58--62},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710182839},
  doi          = {10.1108/09685229710182839},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Higgs97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Hurley97,
  author       = {Margaret A. Hurley},
  title        = {Managing the desktop: research findings},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {53--57},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710182820},
  doi          = {10.1108/09685229710182820},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Hurley97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HurleyH97,
  author       = {Margaret A. Hurley and
                  Rod Harris},
  title        = {Facilitating corporate knowledge: building the data warehouse},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {5},
  pages        = {170--174},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710187230},
  doi          = {10.1108/09685229710187230},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HurleyH97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HurleyS97,
  author       = {Margaret A. Hurley and
                  Folker Schaumann},
  title        = {{KPMG} survey: the {IT} outsourcing decision},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {126--132},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710184486},
  doi          = {10.1108/09685229710184486},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HurleyS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Karakasidis97,
  author       = {Kon Karakasidis},
  title        = {A project planning process for business continuity},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {72--78},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710182857},
  doi          = {10.1108/09685229710182857},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Karakasidis97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Karake97,
  author       = {Zeinab A. Karake},
  title        = {Managing information resources and environmental turbulence},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {93--99},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710175765},
  doi          = {10.1108/09685229710175765},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Karake97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Kwok97,
  author       = {Lam{-}for Kwok},
  title        = {Hypertext information security model for organizations},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {138--148},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710184512},
  doi          = {10.1108/09685229710184512},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Kwok97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LichtensteinS97,
  author       = {Sharman Lichtenstein and
                  Paula M. C. Swatman},
  title        = {Internet acceptable usage policy for organizations},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {5},
  pages        = {182--190},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710367726},
  doi          = {10.1108/09685229710367726},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LichtensteinS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Liddy97,
  author       = {Carrie Liddy},
  title        = {Commercialization of cryptography},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {87--89},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710175738},
  doi          = {10.1108/09685229710175738},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Liddy97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/May97,
  author       = {Thornton May},
  title        = {The death of {ROI:} re-thinking {IT} value measurement},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {90--92},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710175756},
  doi          = {10.1108/09685229710175756},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/May97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Nolan97,
  author       = {Richard L. Nolan},
  title        = {Top-down driven architecture design},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {123--125},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710184468},
  doi          = {10.1108/09685229710184468},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Nolan97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Oliver97,
  author       = {Susan Oliver},
  title        = {A model for the future of electronic commerce},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {5},
  pages        = {166--169},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710187221},
  doi          = {10.1108/09685229710187221},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Oliver97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Orlowski97,
  author       = {Steve Orlowski},
  title        = {Government initiatives in information technology security},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {111--118},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710693102},
  doi          = {10.1108/09685229710693102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Orlowski97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Pattison97,
  author       = {Michael Pattison},
  title        = {Legal implications of doing business on the Internet},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {29--34},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710168024},
  doi          = {10.1108/09685229710168024},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Pattison97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ratnasingham97,
  author       = {Pauline Ratnasingham},
  title        = {{EDI} security: a model of {EDI} risks and associated controls},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {63--71},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710182848},
  doi          = {10.1108/09685229710182848},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Ratnasingham97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Roest97,
  author       = {Pim Roest},
  title        = {The golden rules for implementing the balanced business scorecard},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {5},
  pages        = {163--165},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710187212},
  doi          = {10.1108/09685229710187212},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Roest97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Solms97,
  author       = {Rossouw von Solms},
  title        = {Driving safely on the information superhighway},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {20--22},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710168006},
  doi          = {10.1108/09685229710168006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Solms97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Tarascio97,
  author       = {Everard Tarascio},
  title        = {Business critical messaging},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {149--152},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710184521},
  doi          = {10.1108/09685229710184521},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Tarascio97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Wilson97,
  author       = {Stephen Wilson},
  title        = {Certificates and trust in electronic commerce},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {5},
  pages        = {175--181},
  year         = {1997},
  url          = {https://doi.org/10.1108/EUM0000000004466},
  doi          = {10.1108/EUM0000000004466},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Wilson97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Wood97,
  author       = {Charles Cresson Wood},
  title        = {Part of the foundation for secure systems: separation of duties policy},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {18--19},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710167999},
  doi          = {10.1108/09685229710167999},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Wood97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Wood97a,
  author       = {Charles Cresson Wood},
  title        = {A secure password storage policy},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {79--80},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710182866},
  doi          = {10.1108/09685229710182866},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Wood97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Wood97b,
  author       = {Charles Cresson Wood},
  title        = {Securely handling staff terminations},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {100--101},
  year         = {1997},
  url          = {https://doi.org/10.1108/09685229710175774},
  doi          = {10.1108/09685229710175774},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Wood97b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Abdallah96,
  author       = {Mohamed H. Abdallah},
  title        = {An integrated approach for system evaluation: study results},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {10--19},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610793094},
  doi          = {10.1108/09685229610793094},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Abdallah96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Brockway96,
  author       = {Douglas Brockway},
  title        = {Knowledge technologies and business alignment},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {45--46},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610114213},
  doi          = {10.1108/09685229610114213},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Brockway96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Brookson96,
  author       = {Charles Brookson},
  title        = {Mobile secure telephones},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {7--10},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610793049},
  doi          = {10.1108/09685229610793049},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Brookson96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/CoghlanH96,
  author       = {Liz Coghlan and
                  Margaret A. Hurley},
  title        = {A profile of the information technology executive},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {5--9},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610114150},
  doi          = {10.1108/09685229610114150},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/CoghlanH96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Doddrell96,
  author       = {Gregory R. Doddrell},
  title        = {Extinguishing halons},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {38--42},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610114196},
  doi          = {10.1108/09685229610114196},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Doddrell96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Duffy96,
  author       = {Jan Duffy},
  title        = {Collaborative computing, groupware and knowledge},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {39--41},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610121026},
  doi          = {10.1108/09685229610121026},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Duffy96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Fitzgerald96,
  author       = {Kevin J. Fitzgerald},
  title        = {Corporate policy at Cable {\&} Wireless enhances business efficiency
                  and improves quality of working life},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {5--6},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610793030},
  doi          = {10.1108/09685229610793030},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Fitzgerald96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Fitzgerald96a,
  author       = {Kevin J. Fitzgerald},
  title        = {Data security report},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {14--17},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610793058},
  doi          = {10.1108/09685229610793058},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Fitzgerald96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Forcht96,
  author       = {Karen A. Forcht},
  title        = {Doing business on the Internet: marketing and security aspects},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {3--9},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610130477},
  doi          = {10.1108/09685229610130477},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Forcht96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Frosdick96,
  author       = {Steve Frosdick},
  title        = {Practical management of programme risk: the case of the National Strategy
                  for Police Information Systems for England and Wales},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {5},
  pages        = {24--33},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610153157},
  doi          = {10.1108/09685229610153157},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Frosdick96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Gibson96,
  author       = {Gary Gibson},
  title        = {An introduction to seismology},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {20--25},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610126959},
  doi          = {10.1108/09685229610126959},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Gibson96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HallidayBS96,
  author       = {Sharon Halliday and
                  Karin P. Badenhorst and
                  Rossouw von Solms},
  title        = {A business approach to effective information technology risk analysis
                  and management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {19--31},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610114178},
  doi          = {10.1108/09685229610114178},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HallidayBS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Heinen96,
  author       = {Joseph Heinen},
  title        = {Internet marketing practices},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {5},
  pages        = {7--14},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610153120},
  doi          = {10.1108/09685229610153120},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Heinen96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Heng96,
  author       = {Goh Moh Heng},
  title        = {Developing a suitable business continuity planning methodology},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {11--13},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610121008},
  doi          = {10.1108/09685229610121008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Heng96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Howe96,
  author       = {Randy Howe},
  title        = {Getting beyond the dark side of distributed computing},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {52--53},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610793076},
  doi          = {10.1108/09685229610793076},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Howe96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Kearvell-White96,
  author       = {Brian Kearvell{-}White},
  title        = {KPMG's {UK} Computer Security Review 1994},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {42--51},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610121035},
  doi          = {10.1108/09685229610121035},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Kearvell-White96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Kearvell-White96a,
  author       = {Brian Kearvell{-}White},
  title        = {National {(UK)} Computer Security Survey 1996},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {3--17},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610126931},
  doi          = {10.1108/09685229610126931},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Kearvell-White96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Lichtenstein96,
  author       = {Sharman Lichtenstein},
  title        = {Factors in the selection of a risk assessment method},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {20--25},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610130503},
  doi          = {10.1108/09685229610130503},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Lichtenstein96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Liddy96,
  author       = {Carrie Liddy},
  title        = {Commercial security on the Internet},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {47--49},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610114222},
  doi          = {10.1108/09685229610114222},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Liddy96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Lowrey96,
  author       = {Ross Lowrey},
  title        = {Relating information and value disciplines},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {30--35},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610126968},
  doi          = {10.1108/09685229610126968},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Lowrey96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Maslen96,
  author       = {Colin Maslen},
  title        = {"Testing the plan is more important than the plan itself"},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {26--29},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610793085},
  doi          = {10.1108/09685229610793085},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Maslen96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/May96,
  author       = {Thornton May},
  title        = {The Thornton May Files},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {36--38},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610126977},
  doi          = {10.1108/09685229610126977},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/May96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/May96a,
  author       = {Thornton May},
  title        = {The Thornton May Files},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {36--38},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610793102},
  doi          = {10.1108/09685229610793102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/May96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/May96b,
  author       = {Thornton May},
  title        = {Internet and Intranet: the faces of the wired economy},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {5},
  pages        = {3--6},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610153111},
  doi          = {10.1108/09685229610153111},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/May96b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/McCormick96,
  author       = {John McCormick},
  title        = {Telecommunications deregulation: an Australian perspective},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {39--41},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610126986},
  doi          = {10.1108/09685229610126986},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/McCormick96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/McWilliams96,
  author       = {Brian McWilliams},
  title        = {The value brokers: how to measure client/server payback},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {5},
  pages        = {15--17},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610793111},
  doi          = {10.1108/09685229610793111},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/McWilliams96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ramarapu96,
  author       = {Narender K. Ramarapu},
  title        = {Executive information systems in financial institutions: an introduction},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {5},
  pages        = {18--21},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610153139},
  doi          = {10.1108/09685229610153139},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Ramarapu96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SandersonF96,
  author       = {Ethan Sanderson and
                  Karen A. Forcht},
  title        = {Information security in business environments},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {32--37},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610114187},
  doi          = {10.1108/09685229610114187},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SandersonF96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ShiSS96,
  author       = {Yong Shi and
                  Pamela Specht and
                  Justin Stolen},
  title        = {A consensus ranking for information system requirements},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {10--18},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610114169},
  doi          = {10.1108/09685229610114169},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ShiSS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Sturgeon96,
  author       = {Alice Sturgeon},
  title        = {Telework: threats, risks and solutions},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {27--38},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610121017},
  doi          = {10.1108/09685229610121017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Sturgeon96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Stymiest96,
  author       = {Bev Stymiest},
  title        = {Providing security for Unix networks},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {18--26},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610793067},
  doi          = {10.1108/09685229610793067},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Stymiest96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Wood96,
  author       = {Charles Cresson Wood},
  title        = {Constructing difficult-to-guess passwords},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {43--44},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610114204},
  doi          = {10.1108/09685229610114204},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Wood96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Wood96a,
  author       = {Charles Cresson Wood},
  title        = {A computer emergency response team policy},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {4},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610120991},
  doi          = {10.1108/09685229610120991},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Wood96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Wood96b,
  author       = {Charles Cresson Wood},
  title        = {A policy for sending secret information over communications networks},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {18--19},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610126940},
  doi          = {10.1108/09685229610126940},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Wood96b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Wood96c,
  author       = {Charles Cresson Wood},
  title        = {Information owners, custodians and users},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {34--35},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610130495},
  doi          = {10.1108/09685229610130495},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Wood96c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Wood96d,
  author       = {Charles Cresson Wood},
  title        = {Removal of all unauthorized access paths in production software},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {5},
  pages        = {22--23},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610153148},
  doi          = {10.1108/09685229610153148},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Wood96d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/X96,
  title        = {The Ernst {\&} Young International Information Security Survey
                  1995},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {26--33},
  year         = {1996},
  url          = {https://doi.org/10.1108/09685229610130486},
  doi          = {10.1108/09685229610130486},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/X96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BanerjeeG95,
  author       = {Snehamay Banerjee and
                  Damodar Y. Golhar},
  title        = {Security issues in the {EDI} environment},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {27--33},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510792997},
  doi          = {10.1108/09685229510792997},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BanerjeeG95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Bloombecker95,
  author       = {Jay BloomBecker},
  title        = {Simplifying the state and federal computer crime law maze in the {USA}},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {18--20},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510088232},
  doi          = {10.1108/09685229510088232},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Bloombecker95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Campbell95,
  author       = {John R. Campbell},
  title        = {Real security for local area networks},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {28--29},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510088250},
  doi          = {10.1108/09685229510088250},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Campbell95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Cardinali95,
  author       = {Richard Cardinali},
  title        = {Safeguarding databases: basic concepts revisited},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {30--37},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510147074},
  doi          = {10.1108/09685229510147074},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Cardinali95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Collier95,
  author       = {Graham Collier},
  title        = {Information privacy},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {41--45},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510792979},
  doi          = {10.1108/09685229510792979},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Collier95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Doddrell95,
  author       = {Gregory R. Doddrell},
  title        = {Security environment reviews},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {3--14},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510097250},
  doi          = {10.1108/09685229510097250},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Doddrell95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Doddrell95a,
  author       = {Gregory R. Doddrell},
  title        = {Information security and the Internet},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {15--19},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510123629},
  doi          = {10.1108/09685229510123629},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Doddrell95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/EdwardsC95,
  author       = {Bruce Edwards and
                  John Cooper},
  title        = {Testing the disaster recovery plan},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {21--27},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510088241},
  doi          = {10.1108/09685229510088241},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/EdwardsC95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Fitzgerald95,
  author       = {Kevin J. Fitzgerald},
  title        = {What if you had a flood in your computer room},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {38--40},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510088269},
  doi          = {10.1108/09685229510088269},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Fitzgerald95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Fitzgerald95a,
  author       = {Kevin J. Fitzgerald},
  title        = {Information security baselines},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {8--12},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510088575},
  doi          = {10.1108/09685229510088575},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Fitzgerald95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Fitzgerald95b,
  author       = {Kevin J. Fitzgerald},
  title        = {Establishing an effective continuity strategy},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {20--24},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510092039},
  doi          = {10.1108/09685229510092039},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Fitzgerald95b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Fitzgerald95c,
  author       = {Kevin J. Fitzgerald},
  title        = {Security and data integrity for LANs and WANs},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {27--33},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510097287},
  doi          = {10.1108/09685229510097287},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Fitzgerald95c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Gubbins95,
  author       = {Barry Gubbins},
  title        = {Protecting availability in complex computer environments},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {20--22},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510097269},
  doi          = {10.1108/09685229510097269},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Gubbins95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Irwin95,
  author       = {Elaine Irwin},
  title        = {Software Intelligence introduces a new cross-platform, dient/server
                  security solution},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {7--8},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510088214},
  doi          = {10.1108/09685229510088214},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Irwin95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KlouwenbergKS95,
  author       = {Maaikel Klein Klouwenberg and
                  William J. D. Koo and
                  J. Alphons M. van Schaik},
  title        = {Establishing business strategy with information technology},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {5},
  pages        = {8--20},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510104945},
  doi          = {10.1108/09685229510104945},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KlouwenbergKS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KoH95,
  author       = {Catherine Ko and
                  Margaret A. Hurley},
  title        = {Managing end-user computing},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {3--6},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510092066},
  doi          = {10.1108/09685229510092066},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KoH95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Lee95,
  author       = {Matthew K. O. Lee},
  title        = {Legal control of computer crime in Hong Kong},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {13--19},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510088584},
  doi          = {10.1108/09685229510088584},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Lee95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MathieuW95,
  author       = {Richard G. Mathieu and
                  Robert L. Woodard},
  title        = {Data integrity and the Internet: implications for management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {3--7},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510088566},
  doi          = {10.1108/09685229510088566},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MathieuW95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/May95,
  author       = {Thornton May},
  title        = {The interpersonal computer interregnum},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {25--33},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510092020},
  doi          = {10.1108/09685229510092020},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/May95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/May95a,
  author       = {Thornton May},
  title        = {Chief information officer ABCs},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {5},
  pages        = {23--24},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510104963},
  doi          = {10.1108/09685229510104963},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/May95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MouleG95,
  author       = {Barry Moule and
                  Lina Giavara},
  title        = {Policies, procedures and standards: an approach for implementation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {7--16},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510092057},
  doi          = {10.1108/09685229510092057},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MouleG95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Nolan95,
  author       = {Richard L. Nolan},
  title        = {Improving {IT} quality: the basics to boost service and cut costs},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {5},
  pages        = {3--7},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510104936},
  doi          = {10.1108/09685229510104936},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Nolan95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Norton95,
  author       = {David P. Norton},
  title        = {Managing benefits from information technology},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {5},
  pages        = {29--35},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510793022},
  doi          = {10.1108/09685229510793022},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Norton95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Paradine95,
  author       = {T. J. Paradine},
  title        = {Business interruption insurance: a vital ingredient in your disaster
                  recovery plan},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {9--17},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510088223},
  doi          = {10.1108/09685229510088223},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Paradine95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Smith95,
  author       = {Russell Smith},
  title        = {Business continuity planning and service level agreements},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {17--19},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510092048},
  doi          = {10.1108/09685229510092048},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Smith95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Spurling95,
  author       = {Phil Spurling},
  title        = {Promoting security awareness and commitment},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {20--26},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510792988},
  doi          = {10.1108/09685229510792988},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Spurling95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Whybrow95,
  author       = {Martin Whybrow},
  title        = {Bridging the gaps},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {4--6},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510088205},
  doi          = {10.1108/09685229510088205},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Whybrow95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Wood95,
  author       = {Charles Cresson Wood},
  title        = {The Charles Cresson Wood file},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {23--26},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510097278},
  doi          = {10.1108/09685229510097278},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Wood95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Wood95a,
  author       = {Charles Cresson Wood},
  title        = {Background checks for employees in computer-related positions of trust},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {5},
  pages        = {21--22},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510104954},
  doi          = {10.1108/09685229510104954},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Wood95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/YasinQ95,
  author       = {Mahmoud M. Yasin and
                  John V. Quigley},
  title        = {The utility of information systems views of CEOs and information system
                  executives},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {34--38},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510793004},
  doi          = {10.1108/09685229510793004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/YasinQ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Zerman95,
  author       = {David Zerman},
  title        = {Crisis communication: managing the mass media},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {3},
  number       = {5},
  pages        = {25--28},
  year         = {1995},
  url          = {https://doi.org/10.1108/09685229510793013},
  doi          = {10.1108/09685229510793013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Zerman95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Anderson94,
  author       = {Ross J. Anderson},
  title        = {Whither Cryptography},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {5},
  pages        = {13--20},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410792961},
  doi          = {10.1108/09685229410792961},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Anderson94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BellK94,
  author       = {Graham P. Bell and
                  David Kavanagh},
  title        = {Minimizing Risk in Your Wide Area Network Design},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {26--28},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410066183},
  doi          = {10.1108/09685229410066183},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BellK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Berner94,
  author       = {Philip Berner},
  title        = {Software Auditing Means Better Business},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {32--34},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410068208},
  doi          = {10.1108/09685229410068208},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Berner94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ButlerF94,
  author       = {James R. Butler and
                  Karen A. Forcht},
  title        = {The Clipper Chip and the Price of Security in America},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {5},
  pages        = {9--12},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410072582},
  doi          = {10.1108/09685229410072582},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ButlerF94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Caelli94,
  author       = {William J. Caelli},
  title        = {Security in Open and Distributed Systems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {18--24},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410058759},
  doi          = {10.1108/09685229410058759},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Caelli94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/EbbsR94,
  author       = {Geoffrey Ebbs and
                  Howard Rheingold},
  title        = {Censorship on the Information Highway},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {30--31},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410068244},
  doi          = {10.1108/09685229410068244},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/EbbsR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Edwards94,
  author       = {Bruce Edwards},
  title        = {Developing a Successful Network Disaster Recovery Plan},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {37--42},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410066200},
  doi          = {10.1108/09685229410066200},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Edwards94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Fink94,
  author       = {Dieter Fink},
  title        = {A Security Framework for Information Systems Outsourcing},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {3--8},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410068235},
  doi          = {10.1108/09685229410068235},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Fink94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Fitzgerald94,
  author       = {Kevin J. Fitzgerald},
  title        = {The Importance of a Network Disaster Recovery Plan},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {41--43},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410058786},
  doi          = {10.1108/09685229410058786},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Fitzgerald94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Fitzgerald94a,
  author       = {Kevin J. Fitzgerald},
  title        = {Establishing Security in a Multi-platform, Multi-vendor Enterprise-wide
                  {IT} Environment},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {9--15},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410068226},
  doi          = {10.1108/09685229410068226},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Fitzgerald94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FletcherD94,
  author       = {Keith Fletcher and
                  Mark Donaghy},
  title        = {The Role of Competitor Information Systems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {4--18},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410792952},
  doi          = {10.1108/09685229410792952},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FletcherD94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ForchtO94,
  author       = {Karen A. Forcht and
                  Morey Oare},
  title        = {The Information Highway: The Interstate Highway System for Computer
                  Networks},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {5},
  pages        = {4--8},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410072573},
  doi          = {10.1108/09685229410072573},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ForchtO94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ForchtT94,
  author       = {Karen A. Forcht and
                  Daphyne Saunders Thomas},
  title        = {Information Compilation and Disbursement: Moral, Legal and Ethical
                  Considerations},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {23--28},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410059550},
  doi          = {10.1108/09685229410059550},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ForchtT94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ForchtT94a,
  author       = {Karen A. Forcht and
                  Yuan{-}Wen Aven Tsai},
  title        = {Security and Network Management: Changes in the Way We Work},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {35--41},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410068190},
  doi          = {10.1108/09685229410068190},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ForchtT94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Geary94,
  author       = {James M. Geary},
  title        = {Executive Liability for Computer Crime and How to Prevent It},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {29--31},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410059569},
  doi          = {10.1108/09685229410059569},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Geary94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Gluck94,
  author       = {Fredric B. Gluck},
  title        = {Protection of Electronic Mail and Electronic Messages: Challenges
                  and Solutions},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {28--40},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410058777},
  doi          = {10.1108/09685229410058777},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Gluck94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Hains94,
  author       = {David Hains},
  title        = {Authentication: {A} Prominent Issue for Data Communications},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {25--27},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410058768},
  doi          = {10.1108/09685229410058768},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Hains94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Hains94a,
  author       = {David Hains},
  title        = {{EDI} Security Issues Can Be Overcome},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {46},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410066219},
  doi          = {10.1108/09685229410066219},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Hains94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Johannessen94,
  author       = {Jon{-}Arild Johannessen},
  title        = {Information Technology and Innovation: Identifying Critical Innovation
                  Factors},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {4--9},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410059532},
  doi          = {10.1108/09685229410059532},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Johannessen94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JohannessenK94,
  author       = {Jon{-}Arild Johannessen and
                  Lars Kolvereid},
  title        = {Information Search Behaviour during Business Gestation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {5},
  pages        = {31--41},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410072609},
  doi          = {10.1108/09685229410072609},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JohannessenK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Karake94,
  author       = {Zeinab A. Karake},
  title        = {A Study of Information Technology Structure: Firm Ownership and Managerial
                  Characteristics},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {5},
  pages        = {21--30},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410072591},
  doi          = {10.1108/09685229410072591},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Karake94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Macdonald94,
  author       = {K. Hugh Macdonald},
  title        = {Organisational Transformation and Alignment: Misalignment as an Impediment
                  to Progress in Organisational Development},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {16--29},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410068217},
  doi          = {10.1108/09685229410068217},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Macdonald94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MaduK94,
  author       = {Christian N. Madu and
                  Chu{-}hua Kuei},
  title        = {Optimum Information Technology for Socioeconomic Development},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {4--11},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410058731},
  doi          = {10.1108/09685229410058731},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MaduK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RogersonF94,
  author       = {Simon Rogerson and
                  Christine Fidler},
  title        = {Strategic Information Systems Planning: Its Adoption and Use},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {12--17},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410058740},
  doi          = {10.1108/09685229410058740},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RogersonF94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SouthernM94,
  author       = {G. Southern and
                  Allistair U. Murray},
  title        = {Quality Information Management: The Way to a Better Company Culture},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {32--35},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410059578},
  doi          = {10.1108/09685229410059578},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SouthernM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Weiss94,
  author       = {Kenneth P. Weiss},
  title        = {To Serve and Protect: Reconciling Information Protection with {LAN}
                  Environments},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {19--25},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410792934},
  doi          = {10.1108/09685229410792934},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Weiss94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Weiss94a,
  author       = {Kenneth P. Weiss},
  title        = {New Initiatives which May Erode Your Privacy: Or George Orwell Was
                  Off by Only a Decade},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {43--45},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410792943},
  doi          = {10.1108/09685229410792943},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Weiss94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/White94,
  author       = {Stewart White},
  title        = {The Data Network Disaster Recovery Plan: Considerations and Concerns},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {29--36},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410066192},
  doi          = {10.1108/09685229410066192},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/White94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Zeffane94,
  author       = {Rachid M. Zeffane},
  title        = {Computer Usage and Job Satisfaction: An Empirical Exploration},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {10--22},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410059541},
  doi          = {10.1108/09685229410059541},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Zeffane94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Bakewell93,
  author       = {Kenneth Graham Bartlett Bakewell},
  title        = {Information: The Seventh Management Function?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {2},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310033379},
  doi          = {10.1108/09685229310033379},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Bakewell93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Berner93,
  author       = {Philip Berner},
  title        = {Software Auditing: Effectively Combating the Five Deadly Sins},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {2},
  year         = {1993},
  url          = {https://doi.org/10.1108/EUM0000000001703},
  doi          = {10.1108/EUM0000000001703},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Berner93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BirdBB93,
  author       = {Andrew Bird and
                  Tom Blaney and
                  John Burton},
  title        = {DataComms 2000: {A} Strategic Exploration of a Transforming Industry},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {18--31},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310041901},
  doi          = {10.1108/09685229310041901},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BirdBB93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/EdwardsP93,
  author       = {Chris Edwards and
                  Joe Peppard},
  title        = {A Taxonomy of Executive Information Systems: Let the 4 Cs Penetrate
                  the Fog},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {2},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310033405},
  doi          = {10.1108/09685229310033405},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/EdwardsP93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FidlerRS93,
  author       = {Christine Fidler and
                  Simon Rogerson and
                  Nicola Spiers},
  title        = {Current {IS} Practices within UK-based Organizations},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {2},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310033351},
  doi          = {10.1108/09685229310033351},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FidlerRS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FinkD93,
  author       = {Dieter Fink and
                  Daniel C. Duffy},
  title        = {Security Officers' Attitudes to the Use of Shared Logons},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {19--21},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310026485},
  doi          = {10.1108/09685229310026485},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FinkD93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Fitzgerald93,
  author       = {Kevin J. Fitzgerald},
  title        = {Business Continuity Planning in a Distributed Downsized Environment},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {2},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310033388},
  doi          = {10.1108/09685229310033388},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Fitzgerald93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Fitzgerald93a,
  author       = {Kevin J. Fitzgerald},
  title        = {Risk Analysis: Ten Years On},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {5},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310048328},
  doi          = {10.1108/09685229310048328},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Fitzgerald93a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ForchtBSC93,
  author       = {Karen A. Forcht and
                  Robert G. Brookshire and
                  Scott Paul Stevens and
                  Rodney J. Clarke},
  title        = {Computer Ethics of University Students: An International Exploratory
                  Study},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {5},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310048346},
  doi          = {10.1108/09685229310048346},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ForchtBSC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GabbottS93,
  author       = {Mark Gabbott and
                  Ewan Sutherland},
  title        = {Studying Potential Customers: The Applications of Marketing Information
                  Systems in University Recruitment},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {4},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310045349},
  doi          = {10.1108/09685229310045349},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GabbottS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Gluck93,
  author       = {Fredric B. Gluck},
  title        = {The Open Security Architecture},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {4--11},
  year         = {1993},
  url          = {https://doi.org/10.1108/EUM0000000001704},
  doi          = {10.1108/EUM0000000001704},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Gluck93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HaarS93,
  author       = {Helen van de Haar and
                  Rossouw von Solms},
  title        = {A Tool for Information Security Management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {4--10},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310026467},
  doi          = {10.1108/09685229310026467},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HaarS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Hains93,
  author       = {David Hains},
  title        = {Computer Security as a Liability Control Tool},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {4},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310045321},
  doi          = {10.1108/09685229310045321},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Hains93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Hamilton93,
  author       = {Ross Hamilton},
  title        = {Does {IT} Matter When Companies Merge?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {2},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310033397},
  doi          = {10.1108/09685229310033397},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Hamilton93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JamesC93,
  author       = {H. James and
                  Roger A. Coldwell},
  title        = {Corporate Security: An Australian Ostrich},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {4},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310045303},
  doi          = {10.1108/09685229310045303},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JamesC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JohannessenO93,
  author       = {Jon{-}Arild Johannessen and
                  Johan Olaisen},
  title        = {Information, Communication and Innovation: Identifying Critical Innovation
                  Factors {(CIF)}},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {4},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310045358},
  doi          = {10.1108/09685229310045358},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JohannessenO93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KamayA93,
  author       = {Vic Kamay and
                  Tony Adams},
  title        = {The 1992 Profile of Computer Abuse in Australia: Part 2},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {2},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310033360},
  doi          = {10.1108/09685229310033360},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KamayA93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Kirby93,
  author       = {Justice Michael Kirby},
  title        = {The Human Genome Project: Promise or Problems?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {5},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310048300},
  doi          = {10.1108/09685229310048300},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Kirby93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Kirby93a,
  author       = {Justice Michael Kirby},
  title        = {Legal Aspects of the Human Genome Project: Reflections on the Bilbao
                  Conference},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {5},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310048319},
  doi          = {10.1108/09685229310048319},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Kirby93a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MartinA93,
  author       = {William J. Martin and
                  Michael Armstrong},
  title        = {{STAR} and Economic Regeneration: Some Feedback from Northern Ireland},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {29--38},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310026511},
  doi          = {10.1108/09685229310026511},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MartinA93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Moore93,
  author       = {Pat Williams Moore},
  title        = {{BMS} {CAT} in Action: Electronic/Communications Recovery at the World
                  Trade Centre, New York},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {4},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310045312},
  doi          = {10.1108/09685229310045312},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Moore93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Newman93,
  author       = {Tom Newman},
  title        = {Information Loss Rarely Recovered},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {4},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310045330},
  doi          = {10.1108/09685229310045330},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Newman93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SolmsSC93,
  author       = {Rossouw von Solms and
                  Sebastiaan H. von Solms and
                  William J. Caelli},
  title        = {A Model for Information Security Management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {12--17},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310041893},
  doi          = {10.1108/09685229310041893},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SolmsSC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TaftiN93,
  author       = {Mohammed H. A. Tafti and
                  Ehsan Nikbakht},
  title        = {Neural Networks and Expert Systems: New Horizons in Business Finance
                  Applications},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {22--28},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310026502},
  doi          = {10.1108/09685229310026502},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TaftiN93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Weiss93,
  author       = {Kenneth P. Weiss},
  title        = {Data Integrity and Security: Who's in Charge Here Anyway?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {4},
  year         = {1993},
  url          = {https://doi.org/10.1108/EUM0000000001705},
  doi          = {10.1108/EUM0000000001705},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Weiss93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Wood93,
  author       = {Charles Cresson Wood},
  title        = {Dreams Come True with Password Genie},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {5},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310048337},
  doi          = {10.1108/09685229310048337},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Wood93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/YavasY93,
  author       = {Ugur Yavas and
                  Mahmoud M. Yasin},
  title        = {Computing Environment in an Arabian Gulf Country: An Organizational
                  Perspective},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {11--18},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310026476},
  doi          = {10.1108/09685229310026476},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/YavasY93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics