2024 export record
dblp key:
journals/imcs/AlyamiSNM24 share record
persistent URL:
Areej Alyami , David Sammon , Karen Neville , Carolanne Mahony : Critical success factors for Security Education, Training and Awareness (SETA) programme effectiveness: an empirical comparison of practitioner perspectives. Inf. Comput. Secur. 32 (1 ) : 53-73 (2024 )share record
persistent URL:
Miguel Calvo , Marta Beltrán : Applying the Goal, Question, Metric method to derive tailored dynamic cyber risk metrics. Inf. Comput. Secur. 32 (2 ) : 133-158 (2024 )share record
persistent URL:
Manimay Dev , Debashis Saha : Does e-government development moderate the impact of female labor participation on national cybersecurity maturity? An empirical investigation. Inf. Comput. Secur. 32 (1 ) : 74-92 (2024 )export record
dblp key:
journals/imcs/DornheimZ24 share record
persistent URL:
Peter Dornheim , Rüdiger Zarnekow : Determining cybersecurity culture maturity and deriving verifiable improvement measures. Inf. Comput. Secur. 32 (2 ) : 179-196 (2024 )share record
persistent URL:
Gregory Lyon : Informational inequality: the role of resources and attributes in information security awareness. Inf. Comput. Secur. 32 (2 ) : 197-217 (2024 )export record
dblp key:
journals/imcs/MattordKWB24 share record
persistent URL:
Herbert J. Mattord , Kathleen Kotwica , Michael E. Whitman , Evan Battaglia : Organizational perspectives on converged security operations. Inf. Comput. Secur. 32 (2 ) : 218-235 (2024 )share record
persistent URL:
Martina Neri , Federico Niccolini , Luigi Martino : Organizational cybersecurity readiness in the ICT sector: a quanti-qualitative assessment. Inf. Comput. Secur. 32 (1 ) : 38-52 (2024 )export record
dblp key:
journals/imcs/NikkhahGS24 share record
persistent URL:
Hamid Reza Nikkhah , Varun Grover , Rajiv Sabherwal : Post hoc security and privacy concerns in mobile apps: the moderating roles of mobile apps' features and providers. Inf. Comput. Secur. 32 (1 ) : 1-37 (2024 )share record
persistent URL:
Prasetyo Adi Wibowo Putro , Dana Indra Sensuse , Wahyu Setiawan Setiawan Wibowo : Framework for critical information infrastructure protection in smart government: a case study in Indonesia. Inf. Comput. Secur. 32 (1 ) : 112-129 (2024 )share record
persistent URL:
Zainab Batool Rizvi , Chaudry Bilal Ahmad Khan , Michael O'Sullivan : Analytical hierarchy process model for managing cloud security. Inf. Comput. Secur. 32 (1 ) : 93-111 (2024 )share record
persistent URL:
Eylem Thron , Shamal Faily , Huseyin Dogan , Martin Freer : Human factors and cyber-security risks on the railway - the critical role played by signalling operations. Inf. Comput. Secur. 32 (2 ) : 236-263 (2024 )share record
persistent URL:
Shao-Fang Wen , Basel Katt : Exploring the role of assurance context in system security assurance evaluation: a conceptual model. Inf. Comput. Secur. 32 (2 ) : 159-178 (2024 )2023 export record
dblp key:
journals/imcs/Andersson23 share record
persistent URL:
Simon Andersson : Problems in information classification: insights from practice. Inf. Comput. Secur. 31 (4 ) : 449-462 (2023 )export record
dblp key:
journals/imcs/AngaforYM23 share record
persistent URL:
Giddeon Njamngang Angafor , Iryna Yevseyeva , Leandros Maglaras : Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise. Inf. Comput. Secur. 31 (4 ) : 404-426 (2023 )share record
persistent URL:
Ishtiaq Ahmad Bajwa , Shabir Ahmad , Maqsood Mahmud , Farooq Ahmad Bajwa : The impact of cyberattacks awareness on customers' trust and commitment: an empirical evidence from the Pakistani banking sector. Inf. Comput. Secur. 31 (5 ) : 635-654 (2023 )share record
persistent URL:
Anusha Bhana , Jacques Ophoff : Risk homeostasis and security fatigue: a case study of data specialists. Inf. Comput. Secur. 31 (3 ) : 267-280 (2023 )share record
persistent URL:
Kiara Jordan Butler , Irwin Brown : COVID-19 pandemic-induced organisational cultural shifts and employee information security compliance behaviour: a South African case study. Inf. Comput. Secur. 31 (2 ) : 221-243 (2023 )share record
persistent URL:
Chola Chhetri , Vivian Genaro Motti : Enhancing the design of data-related privacy controls for smart home devices. Inf. Comput. Secur. 31 (3 ) : 368-384 (2023 )export record
dblp key:
journals/imcs/ChowdhuryAT23 share record
persistent URL:
Noman H. Chowdhury , Marc T. P. Adam , Timm Teubner : Rushing for security: a document analysis on the sources and effects of time pressure on organizational cybersecurity. Inf. Comput. Secur. 31 (4 ) : 504-526 (2023 )share record
persistent URL:
Hui Na Chua , Vi Vien Khor , Siew Fan Wong : Examining the effect of different knowledge aspects on information security awareness. Inf. Comput. Secur. 31 (4 ) : 427-448 (2023 )share record
persistent URL:
Nathan L. Clarke , Steven Furnell : Editorial: Human aspects of cyber security. Inf. Comput. Secur. 31 (3 ) : 265-266 (2023 )share record
persistent URL:
N'guessan Yves-Roland Douha , Karen Renaud , Yuzo Taenaka , Youki Kadobayashi : Smart home cybersecurity awareness and behavioral incentives. Inf. Comput. Secur. 31 (5 ) : 545-575 (2023 )share record
persistent URL:
Alain Tambe Ebot : Advance fee fraud scammers' criminal expertise and deceptive strategies: a qualitative case study. Inf. Comput. Secur. 31 (4 ) : 478-503 (2023 )share record
persistent URL:
Adrian Ford , Ameer Al-Nemrat , Seyed Ali Ghorashi , Julia Claire Davidson : The impact of GDPR infringement fines on the market value of firms. Inf. Comput. Secur. 31 (1 ) : 51-64 (2023 )share record
persistent URL:
Anne Fortin , Sylvie Héroux : Limited usefulness of firm-provided cybersecurity information in institutional investors' investment analysis. Inf. Comput. Secur. 31 (1 ) : 108-123 (2023 )share record
persistent URL:
Ruti Gafni , Yair Levy : Experts' feedback on the cybersecurity footprint elements: in pursuit of a quantifiable measure of SMBs' cybersecurity posture. Inf. Comput. Secur. 31 (5 ) : 601-623 (2023 )share record
persistent URL:
Magdalena Glas , Manfred Vielberth , Tobias Reittinger , Fabian Böhm , Günther Pernul : Improving cybersecurity skill development through visual programming. Inf. Comput. Secur. 31 (3 ) : 316-330 (2023 )export record
dblp key:
journals/imcs/GyllenstenTP23 share record
persistent URL:
Kristina Gyllensten , Marianne Törner , Anders Pousette : The impact of psychosocial working conditions on information security behaviour in the nuclear industry. Inf. Comput. Secur. 31 (1 ) : 32-50 (2023 )share record
persistent URL:
Haritha P. H. : Mobile payment service adoption: understanding customers for an application of emerging financial technology. Inf. Comput. Secur. 31 (2 ) : 145-171 (2023 )export record
dblp key:
journals/imcs/KannelonningK23 share record
persistent URL:
Kristian Kannelønning , Sokratis K. Katsikas : A systematic literature review of how cybersecurity-related behavior has been assessed. Inf. Comput. Secur. 31 (4 ) : 463-477 (2023 )