Login / Signup
Inf. Comput. Secur.
Publications
volume 32, number 1, 2024
Areej Alyami
,
David Sammon
,
Karen Neville
,
Carolanne Mahony
Critical success factors for Security Education, Training and Awareness (SETA) programme effectiveness: an empirical comparison of practitioner perspectives.
Inf. Comput. Secur.
32 (1) (2024)
Zainab Batool Rizvi
,
Chaudry Bilal Ahmad Khan
,
Michael O'Sullivan
Analytical hierarchy process model for managing cloud security.
Inf. Comput. Secur.
32 (1) (2024)
Martina Neri
,
Federico Niccolini
,
Luigi Martino
Organizational cybersecurity readiness in the ICT sector: a quanti-qualitative assessment.
Inf. Comput. Secur.
32 (1) (2024)
Manimay Dev
,
Debashis Saha
Does e-government development moderate the impact of female labor participation on national cybersecurity maturity? An empirical investigation.
Inf. Comput. Secur.
32 (1) (2024)
Hamid Reza Nikkhah
,
Varun Grover
,
Rajiv Sabherwal
Post hoc security and privacy concerns in mobile apps: the moderating roles of mobile apps' features and providers.
Inf. Comput. Secur.
32 (1) (2024)
Prasetyo Adi Wibowo Putro
,
Dana Indra Sensuse
,
Wahyu Setiawan Setiawan Wibowo
Framework for critical information infrastructure protection in smart government: a case study in Indonesia.
Inf. Comput. Secur.
32 (1) (2024)
volume 32, number 2, 2024
Herbert J. Mattord
,
Kathleen Kotwica
,
Michael E. Whitman
,
Evan Battaglia
Organizational perspectives on converged security operations.
Inf. Comput. Secur.
32 (2) (2024)
Eylem Thron
,
Shamal Faily
,
Huseyin Dogan
,
Martin Freer
Human factors and cyber-security risks on the railway - the critical role played by signalling operations.
Inf. Comput. Secur.
32 (2) (2024)
Peter Dornheim
,
Rüdiger Zarnekow
Determining cybersecurity culture maturity and deriving verifiable improvement measures.
Inf. Comput. Secur.
32 (2) (2024)
Shao-Fang Wen
,
Basel Katt
Exploring the role of assurance context in system security assurance evaluation: a conceptual model.
Inf. Comput. Secur.
32 (2) (2024)
Miguel Calvo
,
Marta Beltrán
Applying the Goal, Question, Metric method to derive tailored dynamic cyber risk metrics.
Inf. Comput. Secur.
32 (2) (2024)
Gregory Lyon
Informational inequality: the role of resources and attributes in information security awareness.
Inf. Comput. Secur.
32 (2) (2024)
volume 32, number 3, 2024
Andreas Skalkos
,
Aggeliki Tsohou
,
Maria Karyda
,
Spyros Kokolakis
Exploring users' attitude towards privacy-preserving search engines: a protection motivation theory approach.
Inf. Comput. Secur.
32 (3) (2024)
Akmal Mirsadikov
,
Ali Vedadi
,
Kent Marett
Detecting deception in computer-mediated communication: the role of popularity information across media types.
Inf. Comput. Secur.
32 (3) (2024)
Wei-Lee Lim
,
Uma Thevi Munikrishnan
,
Choi-Meng Leong
,
Lee-Chea Hiew
,
Mei-Wei Leong
,
Liu Yang
Do you want a secure e-wallet? Understanding the role of risk and security in e-wallet continuance intention.
Inf. Comput. Secur.
32 (3) (2024)
Keshnee Padayachee
An exploration of dark and light triad personality traits towards situational crime prevention and compliant information security behaviour.
Inf. Comput. Secur.
32 (3) (2024)
Arne Roar Nygård
,
Sokratis K. Katsikas
Ethical hardware reverse engineering for securing the digital supply chain in critical infrastructure.
Inf. Comput. Secur.
32 (3) (2024)
Prakriti Dumaru
,
Ankit Shrestha
,
Rizu Paudel
,
Cassity Haverkamp
,
Maryellen Brunson McClain
,
Mahdi Nasrullah Al-Ameen
"...I have my dad, sister, brother, and mom's password": unveiling users' mental models of security and privacy-preserving tools.
Inf. Comput. Secur.
32 (3) (2024)
Konstantinos Kalodanis
,
Panagiotis Rizomiliotis
,
Dimosthenis Anagnostopoulos
European Artificial Intelligence Act: an AI security approach.
Inf. Comput. Secur.
32 (3) (2024)
volume 31, number 1, 2023
Adrian Ford
,
Ameer Al-Nemrat
,
Seyed Ali Ghorashi
,
Julia Claire Davidson
The impact of GDPR infringement fines on the market value of firms.
Inf. Comput. Secur.
31 (1) (2023)
Aamna Tariq
,
Jawad Manzoor
,
Muhammad Ammar Aziz
,
Zain Ul Abideen Tariq
,
Ammar Masood
Open source SIEM solutions for an enterprise.
Inf. Comput. Secur.
31 (1) (2023)
Ramaraj Palanisamy
,
Yi Shi
Users' attitude on perceived security of mobile cloud computing: empirical evidence from SME users in China.
Inf. Comput. Secur.
31 (1) (2023)
volume 31, number 2, 2023
Cynthia K. Riemenschneider
,
Laurie L. Burney
,
Saman Bina
The influence of organizational values on employee attitude and information security behavior: the mediating role of psychological capital.
Inf. Comput. Secur.
31 (2) (2023)
Thomas M. Tegethoff
,
Ricardo Santa
,
Glaucya Daú
,
Jimy Cortes
Online security in e-government as an antecedent of cost-effectiveness and quality in business operations.
Inf. Comput. Secur.
31 (2) (2023)
Alireza Shojaifar
,
Samuel A. Fricker
Design and evaluation of a self-paced cybersecurity tool.
Inf. Comput. Secur.
31 (2) (2023)
Kiara Jordan Butler
,
Irwin Brown
COVID-19 pandemic-induced organisational cultural shifts and employee information security compliance behaviour: a South African case study.
Inf. Comput. Secur.
31 (2) (2023)
Haritha P. H.
Mobile payment service adoption: understanding customers for an application of emerging financial technology.
Inf. Comput. Secur.
31 (2) (2023)
Tianhao Xu
,
Prashanth Rajivan
Determining psycholinguistic features of deception in phishing messages.
Inf. Comput. Secur.
31 (2) (2023)
volume 31, number 3, 2023
Adéle da Veiga
A model for information security culture with creativity and innovation as enablers - refined with an expert panel.
Inf. Comput. Secur.
31 (3) (2023)
Aleatha Shanley
,
Mike Johnstone
,
Patryk Szewczyk
,
Michael Crowley
An exploration of Australian attitudes towards privacy.
Inf. Comput. Secur.
31 (3) (2023)
Gunnar Lindqvist
,
Joakim Kävrestad
How privacy concerns impact Swedish citizens' willingness to report crimes: a quantitative mobile phone survey.
Inf. Comput. Secur.
31 (3) (2023)
Magdalena Glas
,
Manfred Vielberth
,
Tobias Reittinger
,
Fabian Böhm
,
Günther Pernul
Improving cybersecurity skill development through visual programming.
Inf. Comput. Secur.
31 (3) (2023)
Elham Rostami
,
Fredrik Karlsson
,
Shang Gao
Policy components - a conceptual model for modularizing and tailoring of information security policies.
Inf. Comput. Secur.
31 (3) (2023)
Anusha Bhana
,
Jacques Ophoff
Risk homeostasis and security fatigue: a case study of data specialists.
Inf. Comput. Secur.
31 (3) (2023)
Chola Chhetri
,
Vivian Genaro Motti
Enhancing the design of data-related privacy controls for smart home devices.
Inf. Comput. Secur.
31 (3) (2023)
Nathan L. Clarke
,
Steven Furnell
Editorial: Human aspects of cyber security.
Inf. Comput. Secur.
31 (3) (2023)
volume 31, number 4, 2023
Katherine Taken Smith
,
Lawrence Murphy Smith
,
Marcus Burger
,
Erik S. Boyle
Cyber terrorism cases and stock market valuation effects.
Inf. Comput. Secur.
31 (4) (2023)
Simon Andersson
Problems in information classification: insights from practice.
Inf. Comput. Secur.
31 (4) (2023)
Noman H. Chowdhury
,
Marc T. P. Adam
,
Timm Teubner
Rushing for security: a document analysis on the sources and effects of time pressure on organizational cybersecurity.
Inf. Comput. Secur.
31 (4) (2023)
Giddeon Njamngang Angafor
,
Iryna Yevseyeva
,
Leandros Maglaras
Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise.
Inf. Comput. Secur.
31 (4) (2023)
Kristian Kannelønning
,
Sokratis K. Katsikas
A systematic literature review of how cybersecurity-related behavior has been assessed.
Inf. Comput. Secur.
31 (4) (2023)
Alain Tambe Ebot
Advance fee fraud scammers' criminal expertise and deceptive strategies: a qualitative case study.
Inf. Comput. Secur.
31 (4) (2023)
Hui Na Chua
,
Vi Vien Khor
,
Siew Fan Wong
Examining the effect of different knowledge aspects on information security awareness.
Inf. Comput. Secur.
31 (4) (2023)
volume 31, number 5, 2023
N'guessan Yves-Roland Douha
,
Karen Renaud
,
Yuzo Taenaka
,
Youki Kadobayashi
Smart home cybersecurity awareness and behavioral incentives.
Inf. Comput. Secur.
31 (5) (2023)
Pintu Shah
,
Anuja Agarwal
Cyber Suraksha: a card game for smartphone security awareness.
Inf. Comput. Secur.
31 (5) (2023)
Richard G. Mathieu
,
Alan E. Turovlin
Lost in the middle - a pragmatic approach for ERP managers to prioritize known vulnerabilities by applying classification and regression trees (CART).
Inf. Comput. Secur.
31 (5) (2023)
Stephen Mujeye
An analysis of differences in behaviors and practices of security-conscious users and regular users on mobile devices.
Inf. Comput. Secur.
31 (5) (2023)
Ruti Gafni
,
Yair Levy
Experts' feedback on the cybersecurity footprint elements: in pursuit of a quantifiable measure of SMBs' cybersecurity posture.
Inf. Comput. Secur.
31 (5) (2023)
Khalid Shaheen
,
Ali Hussein Zolait
The impacts of the cyber-trust program on the cybersecurity maturity of government entities in the Kingdom of Bahrain.
Inf. Comput. Secur.
31 (5) (2023)
Ishtiaq Ahmad Bajwa
,
Shabir Ahmad
,
Maqsood Mahmud
,
Farooq Ahmad Bajwa
The impact of cyberattacks awareness on customers' trust and commitment: an empirical evidence from the Pakistani banking sector.
Inf. Comput. Secur.
31 (5) (2023)