default search action
Information and Computer Security, Volume 25
Volume 25, Number 1, 2017
- Alessandro Aldini, Jean-Marc Seigneur, Carlos Ballester Lafuente, Xavier Titi, Jonathan Guislain:
Design and validation of a trust-based opportunity-enabled risk management system. 2-25 - Rossouw von Solms, Melanie Willett:
Cloud computing assurance - a review of literature guidance. 26-46 - Hannes Holm, Teodor Sommestad:
So long, and thanks for only using readily available scripts. 47-61 - Nikolaos Polatidis, Christos K. Georgiadis, Elias Pimenidis, Emmanouil Stiakakis:
Privacy-preserving recommendations in context-aware mobile environments. 62-79 - Kristen K. Greene, Yee-Yin Choong:
Must I, can I? I don't understand your ambiguous password rules. 80-99 - Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
Auditing for privacy in threshold PKE e-voting. 100-116
Volume 25, Number 2, 2017
- Lena Yuryna Connolly, Michael Lang, John Gathegi, J. Doug Tygar:
Organisational culture, procedural countermeasures, and employee security behaviour: A qualitative study. 118-136 - Peter Mayer, Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim Vogt:
Productivity vs security: mitigating conflicting goals in organizations. 137-151 - Dirk Snyman, Hennie A. Kruger:
The application of behavioural thresholds to analyse collective behaviour in information security. 152-164 - Jurjen Jansen, Paul van Schaik:
Comparing three models to explain precautionary online behavioural intentions. 165-180 - Malcolm Robert Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Dragana Calic:
Managing information security awareness at an Australian bank: a comparative study. 181-189 - Prashanth Rajivan, Pablo Moriano, Timothy Kelley, L. Jean Camp:
Factors in an end user security expertise instrument. 190-205 - Peter Schaab, Kristian Beckers, Sebastian Pape:
Social engineering defence mechanisms and counteracting training strategies. 206-222
Volume 25, Number 3, 2017
- Jesse Kaukola, Jukka Ruohonen, Antti Tuomisto, Sami Hyrynsalmi, Ville Leppänen:
Tightroping between APT and BCI in small enterprises. 226-239 - Noluxolo Gcaza, Rossouw von Solms, Marthie Grobler, Joey Jansen van Vuuren:
A general morphological analysis: delineating a cyber-security culture. 259-278 - Fredrik Karlsson, Martin Karlsson, Joachim Åström:
Measuring employees' compliance - the importance of value pluralism. 279-299 - Erastus Karanja:
The role of the chief information security officer in the management of IT security. 300-329 - Hao Chen, Wenli Li:
Mobile device users' privacy security assurance behavior: A technology threat avoidance perspective. 330-344 - Adrian Munteanu:
Running the risk IT - more perception and less probabilities in uncertain systems. 345-354
Volume 25, Number 4, 2017
- Nicholas Charles Patterson, Michael Hobbs, Tianqing Zhu:
A cyber-threat analytic model for autonomous detection of virtual property theft. 358-381 - Argha Ray, Anjali Kaushik:
State transgression on electronic expression: is it for real? 382-401 - Rogier Woltjer:
Workarounds and trade-offs in information security - an exploratory study. 402-420 - Salvatore Aurigemma, Thomas Mattson:
Deterrence and punishment experience impacts on ISP compliance attitudes. 421-436 - Jeremiah D. Still, Ashley A. Cain, David Schuster:
Human-centered authentication guidelines. 437-453 - Jacqueline Cope, François Siewe, Feng Chen, Leandros A. Maglaras, Helge Janicke:
On data leakage from non-production systems. 454-474 - Abubakar Garba Bello, David Murray, Jocelyn Armarego:
A systematic approach to investigating how information security and privacy can be achieved in BYOD environments. 475-492
Volume 25, Number 5, 2017
- Harrison Stewart, Jan Jürjens:
Information security management and the human aspect in organizations. 494-534 - Hamed Taherdoost:
Understanding of e-service security dimensions and its effect on quality and intention to use. 535-559 - Joyce Hoese Addae, Michael A. Brown, Xu Sun, Dave Towey, Milena Radenkovic:
Measuring attitude towards personal data for adaptive cybersecurity. 560-579 - Dmitriy V. Chulkov:
Escalation of commitment and information security: theories and implications. 580-592 - Jan-Willem Bullee, Lorena Montoya, Marianne Junger, Pieter H. Hartel:
Spear phishing in organisations explained. 593-613 - Christos Kalloniatis:
Incorporating privacy in the design of cloud-based systems: a conceptual meta-model. 614-633 - Takahiko Kajiyama, Murray E. Jennex, Theophilus B. A. Addo:
To cloud or not to cloud: how risks and threats are affecting cloud adoption decisions. 634-659
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.