default search action
Information and Computer Security, Volume 30
Volume 30, Number 1, 2022
- Sanchari Das, Christena Nippert-Eng, L. Jean Camp:
Evaluating user susceptibility to phishing attacks. 1-18 - Xiaoyun Ye, Myung-Mook Han:
An improved feature extraction algorithm for insider threat using hidden Markov model on user behavior detection. 19-36 - Suganthi Manoharan, Norliza Katuk, Syahida Hassan, Rahayu Ahmad:
To click or not to click the link: the factors influencing internet banking users' intention in responding to phishing emails. 37-62 - Piers Bayl-Smith, Ronnie Taib, Kun Yu, Mark W. Wiggins:
Response to a phishing attack: persuasion and protection motivation in an organizational context. 63-78 - Luís Leite, Daniel Rodrigues dos Santos, Fernando Almeida:
The impact of general data protection regulation on software engineering practices. 79-96 - Rima El-Khatib, Henri Barki:
How different rewards tend to influence employee non-compliance with information security policies. 97-116 - Oussama Benrhouma, Ali Alzahrani, Ahmad B. Alkhodre, Abdallah Namoun, Wasim Ahmad Bhat:
To sell, or not to sell: social media data-breach in second-hand Android devices. 117-136 - Ruti Gafni, Tal Pavel:
Cyberattacks against the health-care sectors during the COVID-19 pandemic. 137-150
Volume 30, Number 2, 2022
- Jan-Halvard Bergquist, Samantha Tinet, Shang Gao:
An information classification model for public sector organizations in Sweden: a case study of a Swedish municipality. 153-172 - Benjamin K. Ngugi, Kuo-Ting Hung, Yuanxiang John Li:
Reducing tax identity theft by identifying vulnerability points in the electronic tax filing process. 173-189 - Ana Faizi, Ali Mohammad Padyab, Andreas Naess:
From rationale to lessons learned in the cloud information security risk assessment: a study of organizations in Sweden. 190-205 - Harrison Stewart:
The hindrance of cloud computing acceptance within the financial sectors in Germany. 206-224 - Mark I. Hwang, Susan Helser:
Cybersecurity educational games: a theoretical framework. 225-242 - Ioannis Stylios, Spyros Kokolakis, Andreas Skalkos, Sotirios Chatzis:
BioGames: a new paradigm and a behavioral biometrics collection tool for research purposes. 243-254 - Masike Malatji, Annlizé Marnewick, Suné von Solms:
Cybersecurity capabilities for critical infrastructure resilience. 255-279 - Bhaveer Bhana, Stephen V. Flowerday:
Usability of the login authentication process: passphrases and passwords. 280-305
Volume 30, Number 3, 2022
- Mridula Shan, Jeong Yang:
Investigating the accessibility and impacts of cybersecurity programs on high-school girls' long-term industry engagement. 309-323 - Lori Baker-Eveleth, Robert W. Stone, Daniel M. Eveleth:
Understanding social media users' privacy-protection behaviors. 324-345 - Kristina Gyllensten, Anders Pousette, Marianne Törner:
Value conflicts and information security - a mixed-methods study in high-risk industry. 346-363 - Thiagarajan Ramakrishnan, Dwight M. Hite, Joseph H. Schuessler, Victor R. Prybutok:
Work ethic and information security behavior. 364-381 - Martin Karlsson, Fredrik Karlsson, Joachim Åström, Thomas Denk:
The effect of perceived organizational culture on employees' information security compliance. 382-401 - Amila S. Withanaarachchi, Nisansala Vithana:
Female underrepresentation in the cybersecurity workforce - a study on cybersecurity professionals in Sri Lanka. 402-421 - Kwame Owusu Kwateng, Christopher Amanor, Francis Kamewor Tetteh:
Enterprise risk management and information technology security in the financial sector. 422-451 - Johanna Johansen, Tore Pedersen, Simone Fischer-Hübner, Christian Johansen, Gerardo Schneider, Arnold Roosendaal, Harald Zwingelberg, Anders Jakob Sivesind, Josef Noll:
A multidisciplinary definition of privacy labels. 452-469
Volume 30, Number 4, 2022
- Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw, Miriam E. Armstrong:
How do non experts think about cyber attack consequences? 473-489 - Harrison Stewart:
A systematic framework to explore the determinants of information security policy development and outcomes. 490-516 - Ivano Bongiovanni, Karen Renaud, Humphrey Brydon, Rénette J. Blignaut, Angelo Cavallo:
A quantification mechanism for assessing adherence to information security governance guidelines. 517-548 - Mohamad Gharib:
Toward an architecture to improve privacy and informational self-determination through informed consent. 549-561 - Ioannis Stylios, Spyros Kokolakis, Olga Thanou, Sotirios Chatzis:
Key factors driving the adoption of behavioral biometrics and continuous authentication technology: an empirical research. 562-582 - Eric Amankwa, Marianne Loock, Elmarie Kritzinger:
The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors. 583-614 - Suncica Hadzidedic, Silvia Berenice Fajardo Flores, Belma Ramic-Brkic:
User perceptions and use of authentication methods: insights from youth in Mexico and Bosnia and Herzegovina. 615-632 - Marium Khalid, Mehreen Afzal, Waseem Iqbal:
A game model design using test bed for Malware analysis training. 633-650
Volume 30, Number 5, 2022
- Dijana Peras, Renata Mekovec:
A conceptualization of the privacy concerns of cloud users. 653-671 - Ebenhaeser Otto Janse van Rensburg, Reinhardt A. Botha, Rossouw von Solms:
Utility indicator for emotion detection in a speaker authentication system. 672-686 - Ioannis Stylios, Andreas Skalkos, Spyros Kokolakis, Maria Karyda:
BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures. 687-704 - Katerina Vgena, Angeliki Kitsiou, Christos Kalloniatis:
Understanding the role of users' socio-location attributes and their privacy implications on social media. 705-729 - Vikram S. Bhadauria, Anitha Chennamaneni:
Do desire, anxiety and personal innovativeness impact the adoption of IoT devices? 730-750 - Hao Chen, Mengya Liu, Tu Lyu:
Understanding employees' information security-related stress and policy compliance intention: the roles of information security fatigue and psychological capital. 751-770
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.