default search action
Information and Computer Security, Volume 28
Volume 28, Number 1, 2020
- Malcolm R. Pattinson, Marcus A. Butavicius, Meredith Lillie, Beau Ciccarello, Kathryn Parsons, Dragana Calic, Agata McCormac:
Matching training to individual learning styles improves information security awareness. 1-14 - Nabil Moukafih, Ghizlane Orhanou, Said Elhajji:
Mobile agent-based SIEM for event collection and normalization externalization. 15-34 - Konstantina Vemou, Maria Karyda:
Evaluating privacy impact assessment methods: guidelines and best practice. 35-53 - Hayretdin Bahsi, Ulrik Franke, Even Langfeldt Friberg:
The cyber-insurance market in Norway. 54-67 - Konstantina Vemou, Maria Karyda:
Requirements for private communications over public spheres. 68-96 - Surma Mukhopadhyay, Ramsankar Basak, Darrell Carpenter, Brian J. Reithel:
Patient use of online medical records: an application of technology acceptance framework. 97-115 - Ioannis Paspatis, Aggeliki Tsohou, Spyros Kokolakis:
AppAware: a policy visualization model for mobile applications. 116-132
Volume 28, Number 2, 2020
- Cong Hiep Pham, Linda Brennan, Lukas Parker, Nhat Tram Phan-Le, Irfan Ulhaq, Mathews Zanda Nkhoma, Minh Nhat Nguyen:
Enhancing cyber security behavior: an internal social marketing approach. 133-159 - Ibrahim M. Al-Jabri, Mustafa I. M. Eid, Amer Abed:
The willingness to disclose personal information. 161-181 - Paola Mavriki, Maria Karyda:
Automated data-driven profiling: threats for group privacy. 183-197 - Wafa Bouaynaya:
Cloud computing in SMEs: towards delegation of the CIO role. 199-213 - Elham Rostami, Fredrik Karlsson, Ella Kolkowska:
The hunt for computerized support in information security policy management. 215-259 - Stef Schinagl, Abbas Shahim:
What do we know about information security governance? 261-292 - Pintu Shah, Anuja Agarwal:
Cybersecurity behaviour of smartphone users in India: an empirical analysis. 293-318
Volume 28, Number 3, 2020
- Opeoluwa Ore Akinsanya, Maria Papadaki, Lingfen Sun:
Towards a maturity model for health-care cloud security (M2HCS). 321-345 - Joakim Kävrestad, Johan Zaxmy, Marcus Nohlberg:
Analyzing the usage of character groups and keyboard patterns in password creation. 347-358 - C. Bryan Foltz, Laura Foltz:
Mobile users' information privacy concerns instrument and IoT. 359-371 - Tamir Tsegaye, Stephen Flowerday:
A Clark-Wilson and ANSI role-based access control model. 373-395 - Moufida Sadok, Peter M. Bednar:
Editorial. 397-398 - Adéle da Veiga, Ruthea Vorster, Fudong Li, Nathan L. Clarke, Steven M. Furnell:
Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements. 399-422 - Jake Weidman, Jens Grossklags:
Assessing the current state of information security policies in academic organizations. 423-444 - Sebastian Kurowski:
Response biases in policy compliance research. 445-465 - Moufida Sadok, Steven Alter, Peter M. Bednar:
It is not my job: exploring the disconnect between corporate security policies and actual security practices in SMEs. 467-483
Volume 28, Number 4, 2020
- Rima El-Khatib, Henri Barki:
An activity theory approach to information security non-compliance. 485-501 - Eleni-Laskarina Makri, Zafeiroula Georgiopoulou, Costas Lambrinoudakis:
Utilizing a privacy impact assessment method using metrics in the healthcare sector. 503-529 - Aggeliki Tsohou, Emmanouil Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni, Beatriz Gallego-Nicasio Crespo:
Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform. 531-553 - Rika Butler:
A systematic literature review of the factors affecting smartphone user threat avoidance behaviour. 555-574 - Antonia Michael, Jan H. P. Eloff:
Discovering "Insider IT Sabotage" based on human behaviour. 575-589 - Rajni Goel, Anupam Kumar, James Haddow:
PRISM: a strategic decision framework for cybersecurity risk assessment. 591-625 - Rabii Anass, Assoul Saliha, Khadija Ouazzani Touhami, Ounsa Roudiès:
Information and cyber security maturity models: a systematic literature review. 627-644 - Vasiliki Diamantopoulou, Aggeliki Tsohou, Maria Karyda:
From ISO/IEC27001: 2013 and ISO/IEC27002: 2013 to GDPR compliance controls. 645-662
Volume 28, Number 5, 2020
- Zafeiroula Georgiopoulou, Eleni-Laskarina Makri, Costas Lambrinoudakis:
GDPR compliance: proposed technical and organizational measures for cloud provider. 665-680 - Muhamad Khairulnizam Zaini, Mohamad Noorman Masrek, Mad Khir Johari Abdullah Sani:
The impact of information security management practices on organisational agility. 681-700 - Joakim Kävrestad, Markus Lennartsson, Marcus Birath, Marcus Nohlberg:
Constructing secure and memorable passwords. 701-717 - Esther Dzidzah, Kwame Owusu Kwateng, Benjamin Kofi Asante:
Security behaviour of mobile financial service users. 719-741 - Isaac Wiafe, Felix Nti Koranteng, Abigail Wiafe, Emmanuel Nyarko Obeng, Winfred Yaokumah:
The role of norms in information security policy compliance. 743-761 - Mhamed Zineddine:
A novel trust model for fog computing using fuzzy neural networks and weighted weakest link. 763-800 - Jan-Willem Bullee, Marianne Junger:
How effective are social engineering interventions? A meta-analysis. 801-830
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.