


default search action
Information and Computer Security, Volume 23
Volume 23, Number 1, 2015
- Steven Furnell:

Editorial. - Yan Sun, Ian Davidson:

Influential factors of online fraud occurrence in retailing banking sectors from a global prospective: An empirical study of individual customers in the UK and China. 3-19 - Kent Marett:

Checking the manipulation checks in information security research. 20-30 - Ahmed Ahmim

, Nacira Ghoualmi-Zine
:
A new hierarchical intrusion detection system based on a binary tree of classifiers. 31-57 - Phillip J. Brooke, Richard F. Paige:

User-visible cryptography in email and web scenarios. 58-72 - Eugene Ferry, John O'Raw, Kevin Curran

:
Security evaluation of the OAuth 2.0 framework. 73-101 - Hasan M. Al-Mukahal, Khaled A. Alshare:

An examination of factors that influence the number of information security policy violations in Qatari organizations. 102-118
Volume 23, Number 2, 2015
- Sushma Mishra:

Organizational objectives for information security governance: a value focused assessment. 122-144 - Yung-Shen Yen:

Managing perceived risk for customer retention in e-commerce: The role of switching costs. 145-160 - Li-Hsing Ho, Ming-Tsai Hsu, Tieh-Min Yen:

Identifying core control items of information security management and improvement strategies by applying fuzzy DEMATEL. 161-177 - Waldo Rocha Flores, Hannes Holm

, Marcus Nohlberg, Mathias Ekstedt:
Investigating personal determinants of phishing and the effect of national culture. 178-199 - Teodor Sommestad, Henrik Karlzén, Jonas Hallberg:

The sufficiency of the theory of planned behavior for explaining information security policy compliance. 200-217 - Maryam Shahpasand, Mehdi Shajari, Seyed Alireza Hashemi Golpaygani, Hoda Ghavamipoor:

A comprehensive security control selection model for inter-dependent organizational assets structure. 218-242
Volume 23, Number 3, 2015
- Fredrik Karlsson

, Joachim Åström, Martin Karlsson
:
Information security culture - state-of-the-art review between 2000 and 2013. 246-285 - Ioannis Tsimperidis

, Vasilios Katos
, Nathan L. Clarke
:
Language-independent gender identification through keystroke analysis. 286-301 - Ruth Østgaard Skotnes:

Management commitment and awareness creation - ICT safety and security in electric power supply network companies. 302-316 - Randy Borum, John Felker, Sean Kern, Kristen Dennesen, Tonya Feyes:

Strategic cyber intelligence. 317-332 - Swapan Purkait:

Examining the effectiveness of phishing filters against DNS based phishing attacks. 333-346 - Muhammad Adnan

, Mike Just
, Lynne Baillie
, Hilmi Günes Kayacik:
Investigating the work practices of network security professionals. 347-367
Volume 23, Number 4, 2015
- André Lötter, Lynn Futcher:

A framework to assist email users in the identification of phishing attacks. 370-381 - Thomas Hughes-Roberts:

Privacy as a secondary goal problem: an experiment examining control. 382-393 - Matina Tsavli, Pavlos S. Efraimidis, Vasilios Katos, Lilian Mitrou:

Reengineering the user: privacy concerns about personal data on smartphones. 394-405 - Bukelwa Ngoqo, Stephen V. Flowerday

:
Exploring the relationship between student mobile information security awareness and behavioural intent. 406-420 - Martin J. Butler, Rika Butler:

Investigating the possibility to use differentiated authentication based on risk profiling to secure online banking. 421-434 - Shamal Faily:

Engaging stakeholders during late stage security design with assumption personas. 435-446
Volume 23, Number 5, 2015
- Himanshu Srivastava, Shashikala Tapaswi:

Logical acquisition and analysis of data from android mobile devices. 450-475 - Sindhuja P. N.

, Anand S. Kunnathur:
Information security in supply chains: a management control perspective. 476-496 - Alain Forget, Sonia Chiasson, Robert Biddle:

User-centred authentication feature framework. 497-515 - Teodor Sommestad, Fredrik Sandström:

An empirical test of the accuracy of an attack graph analysis tool. 516-531 - Abdulrahman Alqahtani:

Towards a framework for the potential cyber-terrorist threat to critical national infrastructure: A quantitative study. 532-569 - Mario Silic, Andrea Back, Dario Silic:

Taxonomy of technological risks of open source software in the enterprise adoption context. 570-583

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














