


default search action
Information and Computer Security, Volume 30
Volume 30, Number 1, 2022
- Sanchari Das, Christena Nippert-Eng

, L. Jean Camp:
Evaluating user susceptibility to phishing attacks. 1-18 - Xiaoyun Ye

, Myung-Mook Han:
An improved feature extraction algorithm for insider threat using hidden Markov model on user behavior detection. 19-36 - Suganthi Manoharan, Norliza Katuk

, Syahida Hassan, Rahayu Ahmad
:
To click or not to click the link: the factors influencing internet banking users' intention in responding to phishing emails. 37-62 - Piers Bayl-Smith

, Ronnie Taib
, Kun Yu
, Mark W. Wiggins
:
Response to a phishing attack: persuasion and protection motivation in an organizational context. 63-78 - Luís Leite

, Daniel Rodrigues dos Santos, Fernando Almeida
:
The impact of general data protection regulation on software engineering practices. 79-96 - Rima El-Khatib

, Henri Barki:
How different rewards tend to influence employee non-compliance with information security policies. 97-116 - Oussama Benrhouma

, Ali Alzahrani, Ahmad B. Alkhodre
, Abdallah Namoun
, Wasim Ahmad Bhat
:
To sell, or not to sell: social media data-breach in second-hand Android devices. 117-136 - Ruti Gafni

, Tal Pavel
:
Cyberattacks against the health-care sectors during the COVID-19 pandemic. 137-150
Volume 30, Number 2, 2022
- Jan-Halvard Bergquist, Samantha Tinet, Shang Gao

:
An information classification model for public sector organizations in Sweden: a case study of a Swedish municipality. 153-172 - Benjamin K. Ngugi, Kuo-Ting Hung, Yuanxiang John Li:

Reducing tax identity theft by identifying vulnerability points in the electronic tax filing process. 173-189 - Ana Faizi, Ali Mohammad Padyab, Andreas Naess:

From rationale to lessons learned in the cloud information security risk assessment: a study of organizations in Sweden. 190-205 - Harrison Stewart

:
The hindrance of cloud computing acceptance within the financial sectors in Germany. 206-224 - Mark I. Hwang

, Susan Helser:
Cybersecurity educational games: a theoretical framework. 225-242 - Ioannis Stylios

, Spyros Kokolakis, Andreas Skalkos
, Sotirios Chatzis:
BioGames: a new paradigm and a behavioral biometrics collection tool for research purposes. 243-254 - Masike Malatji

, Annlizé Marnewick, Suné von Solms:
Cybersecurity capabilities for critical infrastructure resilience. 255-279 - Bhaveer Bhana, Stephen V. Flowerday

:
Usability of the login authentication process: passphrases and passwords. 280-305
Volume 30, Number 3, 2022
- Mridula Shan, Jeong Yang

:
Investigating the accessibility and impacts of cybersecurity programs on high-school girls' long-term industry engagement. 309-323 - Lori Baker-Eveleth, Robert W. Stone, Daniel M. Eveleth:

Understanding social media users' privacy-protection behaviors. 324-345 - Kristina Gyllensten, Anders Pousette, Marianne Törner:

Value conflicts and information security - a mixed-methods study in high-risk industry. 346-363 - Thiagarajan Ramakrishnan, Dwight M. Hite, Joseph H. Schuessler, Victor R. Prybutok:

Work ethic and information security behavior. 364-381 - Martin Karlsson

, Fredrik Karlsson
, Joachim Åström, Thomas Denk
:
The effect of perceived organizational culture on employees' information security compliance. 382-401 - Amila S. Withanaarachchi

, Nisansala Vithana:
Female underrepresentation in the cybersecurity workforce - a study on cybersecurity professionals in Sri Lanka. 402-421 - Kwame Owusu Kwateng, Christopher Amanor, Francis Kamewor Tetteh:

Enterprise risk management and information technology security in the financial sector. 422-451 - Johanna Johansen, Tore Pedersen

, Simone Fischer-Hübner, Christian Johansen, Gerardo Schneider, Arnold Roosendaal, Harald Zwingelberg, Anders Jakob Sivesind, Josef Noll:
A multidisciplinary definition of privacy labels. 452-469
Volume 30, Number 4, 2022
- Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw, Miriam E. Armstrong:

How do non experts think about cyber attack consequences? 473-489 - Harrison Stewart

:
A systematic framework to explore the determinants of information security policy development and outcomes. 490-516 - Ivano Bongiovanni

, Karen Renaud
, Humphrey Brydon, Rénette J. Blignaut, Angelo Cavallo:
A quantification mechanism for assessing adherence to information security governance guidelines. 517-548 - Mohamad Gharib

:
Toward an architecture to improve privacy and informational self-determination through informed consent. 549-561 - Ioannis Stylios

, Spyros Kokolakis, Olga Thanou, Sotirios Chatzis:
Key factors driving the adoption of behavioral biometrics and continuous authentication technology: an empirical research. 562-582 - Eric Amankwa

, Marianne Loock, Elmarie Kritzinger:
The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors. 583-614 - Suncica Hadzidedic

, Silvia Berenice Fajardo Flores, Belma Ramic-Brkic
:
User perceptions and use of authentication methods: insights from youth in Mexico and Bosnia and Herzegovina. 615-632 - Marium Khalid, Mehreen Afzal

, Waseem Iqbal
:
A game model design using test bed for Malware analysis training. 633-650
Volume 30, Number 5, 2022
- Dijana Peras

, Renata Mekovec
:
A conceptualization of the privacy concerns of cloud users. 653-671 - Ebenhaeser Otto Janse van Rensburg

, Reinhardt A. Botha
, Rossouw von Solms:
Utility indicator for emotion detection in a speaker authentication system. 672-686 - Ioannis Stylios

, Andreas Skalkos, Spyros Kokolakis, Maria Karyda:
BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures. 687-704 - Katerina Vgena, Angeliki Kitsiou, Christos Kalloniatis:

Understanding the role of users' socio-location attributes and their privacy implications on social media. 705-729 - Vikram S. Bhadauria, Anitha Chennamaneni:

Do desire, anxiety and personal innovativeness impact the adoption of IoT devices? 730-750 - Hao Chen

, Mengya Liu, Tu Lyu:
Understanding employees' information security-related stress and policy compliance intention: the roles of information security fatigue and psychological capital. 751-770

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














