export record
dblp key:
journals/imcs/LindqvistK23 share record
persistent URL:
Gunnar Lindqvist , Joakim Kävrestad : How privacy concerns impact Swedish citizens' willingness to report crimes: a quantitative mobile phone survey. Inf. Comput. Secur. 31 (3 ) : 304-315 (2023 )share record
persistent URL:
Richard G. Mathieu , Alan E. Turovlin : Lost in the middle - a pragmatic approach for ERP managers to prioritize known vulnerabilities by applying classification and regression trees (CART). Inf. Comput. Secur. 31 (5 ) : 655-674 (2023 )share record
persistent URL:
Stephen Mujeye : An analysis of differences in behaviors and practices of security-conscious users and regular users on mobile devices. Inf. Comput. Secur. 31 (5 ) : 624-634 (2023 )export record
dblp key:
journals/imcs/PalanisamyS23 share record
persistent URL:
Ramaraj Palanisamy , Yi Shi : Users' attitude on perceived security of mobile cloud computing: empirical evidence from SME users in China. Inf. Comput. Secur. 31 (1 ) : 65-87 (2023 )share record
persistent URL:
Lily Pharris , Begona Perez-Mira : Preventing social engineering: a phenomenological inquiry. Inf. Comput. Secur. 31 (1 ) : 1-31 (2023 )export record
dblp key:
journals/imcs/RiemenschneiderBB23 share record
persistent URL:
Cynthia K. Riemenschneider , Laurie L. Burney , Saman Bina : The influence of organizational values on employee attitude and information security behavior: the mediating role of psychological capital. Inf. Comput. Secur. 31 (2 ) : 172-198 (2023 )export record
dblp key:
journals/imcs/RostamiKG23 share record
persistent URL:
Elham Rostami , Fredrik Karlsson , Shang Gao : Policy components - a conceptual model for modularizing and tailoring of information security policies. Inf. Comput. Secur. 31 (3 ) : 331-352 (2023 )share record
persistent URL:
Pintu Shah , Anuja Agarwal : Cyber Suraksha: a card game for smartphone security awareness. Inf. Comput. Secur. 31 (5 ) : 576-600 (2023 )share record
persistent URL:
Khalid Shaheen , Ali Hussein Zolait : The impacts of the cyber-trust program on the cybersecurity maturity of government entities in the Kingdom of Bahrain. Inf. Comput. Secur. 31 (5 ) : 529-544 (2023 )export record
dblp key:
journals/imcs/ShanleyJSC23 share record
persistent URL:
Aleatha Shanley , Mike Johnstone , Patryk Szewczyk , Michael Crowley : An exploration of Australian attitudes towards privacy. Inf. Comput. Secur. 31 (3 ) : 353-367 (2023 )export record
dblp key:
journals/imcs/ShojaifarF23 share record
persistent URL:
Alireza Shojaifar , Samuel A. Fricker : Design and evaluation of a self-paced cybersecurity tool. Inf. Comput. Secur. 31 (2 ) : 244-262 (2023 )share record
persistent URL:
Katherine Taken Smith , Lawrence Murphy Smith , Marcus Burger , Erik S. Boyle : Cyber terrorism cases and stock market valuation effects. Inf. Comput. Secur. 31 (4 ) : 385-403 (2023 )export record
dblp key:
journals/imcs/TariqMATM23 share record
persistent URL:
Aamna Tariq , Jawad Manzoor , Muhammad Ammar Aziz , Zain Ul Abideen Tariq , Ammar Masood : Open source SIEM solutions for an enterprise. Inf. Comput. Secur. 31 (1 ) : 88-107 (2023 )export record
dblp key:
journals/imcs/TegethoffSDC23 share record
persistent URL:
Thomas M. Tegethoff , Ricardo Santa , Glaucya Daú , Jimy Cortes : Online security in e-government as an antecedent of cost-effectiveness and quality in business operations. Inf. Comput. Secur. 31 (2 ) : 125-144 (2023 )share record
persistent URL:
Adéle da Veiga : A model for information security culture with creativity and innovation as enablers - refined with an expert panel. Inf. Comput. Secur. 31 (3 ) : 281-303 (2023 )share record
persistent URL:
Tianhao Xu , Prashanth Rajivan : Determining psycholinguistic features of deception in phishing messages. Inf. Comput. Secur. 31 (2 ) : 199-220 (2023 )2022 export record
dblp key:
journals/imcs/AmankwaLK22 share record
persistent URL:
Eric Amankwa , Marianne Loock , Elmarie Kritzinger : The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors. Inf. Comput. Secur. 30 (4 ) : 583-614 (2022 )export record
dblp key:
journals/imcs/Baker-EvelethSE22 share record
persistent URL:
Lori Baker-Eveleth , Robert W. Stone , Daniel M. Eveleth : Understanding social media users' privacy-protection behaviors. Inf. Comput. Secur. 30 (3 ) : 324-345 (2022 )export record
dblp key:
journals/imcs/Bayl-SmithTYW22 share record
persistent URL:
Piers Bayl-Smith , Ronnie Taib , Kun Yu , Mark W. Wiggins : Response to a phishing attack: persuasion and protection motivation in an organizational context. Inf. Comput. Secur. 30 (1 ) : 63-78 (2022 )export record
dblp key:
journals/imcs/BenrhoumaAANB22 share record
persistent URL:
Oussama Benrhouma , Ali Alzahrani , Ahmad B. Alkhodre , Abdallah Namoun , Wasim Ahmad Bhat : To sell, or not to sell: social media data-breach in second-hand Android devices. Inf. Comput. Secur. 30 (1 ) : 117-136 (2022 )export record
dblp key:
journals/imcs/BergquistTG22 share record
persistent URL:
Jan-Halvard Bergquist , Samantha Tinet , Shang Gao : An information classification model for public sector organizations in Sweden: a case study of a Swedish municipality. Inf. Comput. Secur. 30 (2 ) : 153-172 (2022 )export record
dblp key:
journals/imcs/BhadauriaC22 share record
persistent URL:
Vikram S. Bhadauria , Anitha Chennamaneni : Do desire, anxiety and personal innovativeness impact the adoption of IoT devices? Inf. Comput. Secur. 30 (5 ) : 730-750 (2022 )share record
persistent URL:
Bhaveer Bhana , Stephen V. Flowerday : Usability of the login authentication process: passphrases and passwords. Inf. Comput. Secur. 30 (2 ) : 280-305 (2022 )export record
dblp key:
journals/imcs/BongiovanniRBBC22 share record
persistent URL:
Ivano Bongiovanni , Karen Renaud , Humphrey Brydon , Rénette J. Blignaut , Angelo Cavallo : A quantification mechanism for assessing adherence to information security governance guidelines. Inf. Comput. Secur. 30 (4 ) : 517-548 (2022 )share record
persistent URL:
Hao Chen , Mengya Liu , Tu Lyu : Understanding employees' information security-related stress and policy compliance intention: the roles of information security fatigue and psychological capital. Inf. Comput. Secur. 30 (5 ) : 751-770 (2022 )share record
persistent URL:
Sanchari Das , Christena Nippert-Eng , L. Jean Camp : Evaluating user susceptibility to phishing attacks. Inf. Comput. Secur. 30 (1 ) : 1-18 (2022 )export record
dblp key:
journals/imcs/El-KhatibB22 share record
persistent URL:
Rima El-Khatib , Henri Barki : How different rewards tend to influence employee non-compliance with information security policies. Inf. Comput. Secur. 30 (1 ) : 97-116 (2022 )share record
persistent URL:
Ana Faizi , Ali Mohammad Padyab , Andreas Naess : From rationale to lessons learned in the cloud information security risk assessment: a study of organizations in Sweden. Inf. Comput. Secur. 30 (2 ) : 190-205 (2022 )share record
persistent URL:
Ruti Gafni , Tal Pavel : Cyberattacks against the health-care sectors during the COVID-19 pandemic. Inf. Comput. Secur. 30 (1 ) : 137-150 (2022 )share record
persistent URL:
Mohamad Gharib : Toward an architecture to improve privacy and informational self-determination through informed consent. Inf. Comput. Secur. 30 (4 ) : 549-561 (2022 )