export record
dblp key:
journals/imcs/GyllenstenPT22 share record
persistent URL:
Kristina Gyllensten , Anders Pousette , Marianne Törner : Value conflicts and information security - a mixed-methods study in high-risk industry. Inf. Comput. Secur. 30 (3 ) : 346-363 (2022 )export record
dblp key:
journals/imcs/HadzidedicFR22 share record
persistent URL:
Suncica Hadzidedic , Silvia Berenice Fajardo Flores , Belma Ramic-Brkic : User perceptions and use of authentication methods: insights from youth in Mexico and Bosnia and Herzegovina. Inf. Comput. Secur. 30 (4 ) : 615-632 (2022 )share record
persistent URL:
Mark I. Hwang , Susan Helser : Cybersecurity educational games: a theoretical framework. Inf. Comput. Secur. 30 (2 ) : 225-242 (2022 )export record
dblp key:
journals/imcs/JohansenPFJSRZS22 share record
persistent URL:
Johanna Johansen , Tore Pedersen , Simone Fischer-Hübner , Christian Johansen , Gerardo Schneider , Arnold Roosendaal , Harald Zwingelberg , Anders Jakob Sivesind , Josef Noll : A multidisciplinary definition of privacy labels. Inf. Comput. Secur. 30 (3 ) : 452-469 (2022 )export record
dblp key:
journals/imcs/JonesLWNMA22 share record
persistent URL:
Keith S. Jones , Natalie R. Lodinger , Benjamin P. Widlus , Akbar Siami Namin , Emily Maw , Miriam E. Armstrong : How do non experts think about cyber attack consequences? Inf. Comput. Secur. 30 (4 ) : 473-489 (2022 )export record
dblp key:
journals/imcs/KarlssonKAD22 share record
persistent URL:
Martin Karlsson , Fredrik Karlsson , Joachim Åström , Thomas Denk : The effect of perceived organizational culture on employees' information security compliance. Inf. Comput. Secur. 30 (3 ) : 382-401 (2022 )share record
persistent URL:
Marium Khalid , Mehreen Afzal , Waseem Iqbal : A game model design using test bed for Malware analysis training. Inf. Comput. Secur. 30 (4 ) : 633-650 (2022 )export record
dblp key:
journals/imcs/KwatengAT22 share record
persistent URL:
Kwame Owusu Kwateng , Christopher Amanor , Francis Kamewor Tetteh : Enterprise risk management and information technology security in the financial sector. Inf. Comput. Secur. 30 (3 ) : 422-451 (2022 )share record
persistent URL:
Luís Leite , Daniel Rodrigues dos Santos , Fernando Almeida : The impact of general data protection regulation on software engineering practices. Inf. Comput. Secur. 30 (1 ) : 79-96 (2022 )export record
dblp key:
journals/imcs/MalatjiMS22 share record
persistent URL:
Masike Malatji , Annlizé Marnewick , Suné von Solms : Cybersecurity capabilities for critical infrastructure resilience. Inf. Comput. Secur. 30 (2 ) : 255-279 (2022 )export record
dblp key:
journals/imcs/ManoharanKHA22 share record
persistent URL:
Suganthi Manoharan , Norliza Katuk , Syahida Hassan , Rahayu Ahmad : To click or not to click the link: the factors influencing internet banking users' intention in responding to phishing emails. Inf. Comput. Secur. 30 (1 ) : 37-62 (2022 )share record
persistent URL:
Benjamin K. Ngugi , Kuo-Ting Hung , Yuanxiang John Li : Reducing tax identity theft by identifying vulnerability points in the electronic tax filing process. Inf. Comput. Secur. 30 (2 ) : 173-189 (2022 )share record
persistent URL:
Dijana Peras , Renata Mekovec : A conceptualization of the privacy concerns of cloud users. Inf. Comput. Secur. 30 (5 ) : 653-671 (2022 )export record
dblp key:
journals/imcs/RamakrishnanHSP22 share record
persistent URL:
Thiagarajan Ramakrishnan , Dwight M. Hite , Joseph H. Schuessler , Victor R. Prybutok : Work ethic and information security behavior. Inf. Comput. Secur. 30 (3 ) : 364-381 (2022 )export record
dblp key:
journals/imcs/RensburgBS22 share record
persistent URL:
Ebenhaeser Otto Janse van Rensburg , Reinhardt A. Botha , Rossouw von Solms : Utility indicator for emotion detection in a speaker authentication system. Inf. Comput. Secur. 30 (5 ) : 672-686 (2022 )share record
persistent URL:
Mridula Shan , Jeong Yang : Investigating the accessibility and impacts of cybersecurity programs on high-school girls' long-term industry engagement. Inf. Comput. Secur. 30 (3 ) : 309-323 (2022 )share record
persistent URL:
Harrison Stewart : The hindrance of cloud computing acceptance within the financial sectors in Germany. Inf. Comput. Secur. 30 (2 ) : 206-224 (2022 )share record
persistent URL:
Harrison Stewart : A systematic framework to explore the determinants of information security policy development and outcomes. Inf. Comput. Secur. 30 (4 ) : 490-516 (2022 )export record
dblp key:
journals/imcs/StyliosKSC22 share record
persistent URL:
Ioannis Stylios , Spyros Kokolakis , Andreas Skalkos , Sotirios Chatzis : BioGames: a new paradigm and a behavioral biometrics collection tool for research purposes. Inf. Comput. Secur. 30 (2 ) : 243-254 (2022 )export record
dblp key:
journals/imcs/StyliosKTC22 share record
persistent URL:
Ioannis Stylios , Spyros Kokolakis , Olga Thanou , Sotirios Chatzis : Key factors driving the adoption of behavioral biometrics and continuous authentication technology: an empirical research. Inf. Comput. Secur. 30 (4 ) : 562-582 (2022 )export record
dblp key:
journals/imcs/StyliosSKK22 share record
persistent URL:
Ioannis Stylios , Andreas Skalkos , Spyros Kokolakis , Maria Karyda : BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures. Inf. Comput. Secur. 30 (5 ) : 687-704 (2022 )share record
persistent URL:
Katerina Vgena , Angeliki Kitsiou , Christos Kalloniatis : Understanding the role of users' socio-location attributes and their privacy implications on social media. Inf. Comput. Secur. 30 (5 ) : 705-729 (2022 )export record
dblp key:
journals/imcs/Withanaarachchi22 share record
persistent URL:
Amila S. Withanaarachchi , Nisansala Vithana : Female underrepresentation in the cybersecurity workforce - a study on cybersecurity professionals in Sri Lanka. Inf. Comput. Secur. 30 (3 ) : 402-421 (2022 )share record
persistent URL:
Xiaoyun Ye , Myung-Mook Han : An improved feature extraction algorithm for insider threat using hidden Markov model on user behavior detection. Inf. Comput. Secur. 30 (1 ) : 19-36 (2022 )2021 export record
dblp key:
journals/imcs/Al-AmeenCAK21 share record
persistent URL:
Mahdi Nasrullah Al-Ameen , Apoorva Chauhan , M. A. Manazir Ahsan , Huzeyfe Kocabas : A look into user's privacy perceptions and data practices of IoT devices. Inf. Comput. Secur. 29 (4 ) : 573-588 (2021 )export record
dblp key:
journals/imcs/AlotaibiCF21 share record
persistent URL:
Fayez Ghazai Alotaibi , Nathan Luke Clarke , Steven M. Furnell : A novel approach for improving information security management and awareness for home environments. Inf. Comput. Secur. 29 (1 ) : 25-48 (2021 )share record
persistent URL:
Atiya Avery : After the disclosure: measuring the short-term and long-term impacts of data breach disclosures on the financial performance of organizations. Inf. Comput. Secur. 29 (3 ) : 500-525 (2021 )share record
persistent URL:
Nurul Asmui Azmi Md Azmi , Teoh Ai Ping , Ali Vafaei-Zadeh , Haniruzila Hanifah : Predicting information security culture among employees of telecommunication companies in an emerging market. Inf. Comput. Secur. 29 (5 ) : 866-882 (2021 )export record
dblp key:
journals/imcs/BergstromKA21 share record
persistent URL:
Erik Bergström , Fredrik Karlsson , Rose-Mharie Åhlfeldt : Developing an information classification method. Inf. Comput. Secur. 29 (2 ) : 209-239 (2021 )export record
dblp key:
journals/imcs/ChatterjeeGCC21 share record
persistent URL:
Sheshadri Chatterjee , Soumya Kanti Ghosh , Ranjan Chaudhuri , Sumana Chaudhuri : Adoption of AI-integrated CRM system by Indian industry: from security and privacy perspective. Inf. Comput. Secur. 29 (1 ) : 1-24 (2021 )