


Остановите войну!
for scientists:


default search action
Information and Computer Security, Volume 25
Volume 25, Number 1, 2017
- Alessandro Aldini
, Jean-Marc Seigneur, Carlos Ballester Lafuente, Xavier Titi, Jonathan Guislain:
Design and validation of a trust-based opportunity-enabled risk management system. 2-25 - Rossouw von Solms, Melanie Willett:
Cloud computing assurance - a review of literature guidance. 26-46 - Hannes Holm, Teodor Sommestad:
So long, and thanks for only using readily available scripts. 47-61 - Nikolaos Polatidis
, Christos K. Georgiadis
, Elias Pimenidis, Emmanouil Stiakakis:
Privacy-preserving recommendations in context-aware mobile environments. 62-79 - Kristen K. Greene, Yee-Yin Choong:
Must I, can I? I don't understand your ambiguous password rules. 80-99 - Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
:
Auditing for privacy in threshold PKE e-voting. 100-116
Volume 25, Number 2, 2017
- Lena Yuryna Connolly
, Michael Lang
, John Gathegi, J. Doug Tygar:
Organisational culture, procedural countermeasures, and employee security behaviour: A qualitative study. 118-136 - Peter Mayer
, Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim Vogt:
Productivity vs security: mitigating conflicting goals in organizations. 137-151 - Dirk Snyman
, Hennie A. Kruger:
The application of behavioural thresholds to analyse collective behaviour in information security. 152-164 - Jurjen Jansen, Paul van Schaik:
Comparing three models to explain precautionary online behavioural intentions. 165-180 - Malcolm Robert Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Dragana Calic:
Managing information security awareness at an Australian bank: a comparative study. 181-189 - Prashanth Rajivan, Pablo Moriano
, Timothy Kelley, L. Jean Camp:
Factors in an end user security expertise instrument. 190-205 - Peter Schaab, Kristian Beckers, Sebastian Pape
:
Social engineering defence mechanisms and counteracting training strategies. 206-222
Volume 25, Number 3, 2017
- Jesse Kaukola, Jukka Ruohonen
, Antti Tuomisto
, Sami Hyrynsalmi
, Ville Leppänen
:
Tightroping between APT and BCI in small enterprises. 226-239 - Noluxolo Gcaza, Rossouw von Solms, Marthie Grobler
, Joey Jansen van Vuuren:
A general morphological analysis: delineating a cyber-security culture. 259-278 - Fredrik Karlsson, Martin Karlsson, Joachim Åström:
Measuring employees' compliance - the importance of value pluralism. 279-299 - Erastus Karanja:
The role of the chief information security officer in the management of IT security. 300-329 - Hao Chen
, Wenli Li:
Mobile device users' privacy security assurance behavior: A technology threat avoidance perspective. 330-344 - Adrian Munteanu
:
Running the risk IT - more perception and less probabilities in uncertain systems. 345-354
Volume 25, Number 4, 2017
- Nicholas Charles Patterson
, Michael Hobbs, Tianqing Zhu:
A cyber-threat analytic model for autonomous detection of virtual property theft. 358-381 - Argha Ray, Anjali Kaushik:
State transgression on electronic expression: is it for real? 382-401 - Rogier Woltjer
:
Workarounds and trade-offs in information security - an exploratory study. 402-420 - Salvatore Aurigemma, Thomas Mattson:
Deterrence and punishment experience impacts on ISP compliance attitudes. 421-436 - Jeremiah D. Still
, Ashley A. Cain, David Schuster:
Human-centered authentication guidelines. 437-453 - Jacqueline Cope, François Siewe, Feng Chen, Leandros A. Maglaras
, Helge Janicke
:
On data leakage from non-production systems. 454-474 - Abubakar Garba Bello, David Murray
, Jocelyn Armarego:
A systematic approach to investigating how information security and privacy can be achieved in BYOD environments. 475-492
Volume 25, Number 5, 2017
- Harrison Stewart
, Jan Jürjens:
Information security management and the human aspect in organizations. 494-534 - Hamed Taherdoost
:
Understanding of e-service security dimensions and its effect on quality and intention to use. 535-559 - Joyce Hoese Addae, Michael A. Brown, Xu Sun
, Dave Towey, Milena Radenkovic
:
Measuring attitude towards personal data for adaptive cybersecurity. 560-579 - Dmitriy V. Chulkov
:
Escalation of commitment and information security: theories and implications. 580-592 - Jan-Willem Bullee
, Lorena Montoya
, Marianne Junger, Pieter H. Hartel:
Spear phishing in organisations explained. 593-613 - Christos Kalloniatis:
Incorporating privacy in the design of cloud-based systems: a conceptual meta-model. 614-633 - Takahiko Kajiyama, Murray E. Jennex
, Theophilus B. A. Addo:
To cloud or not to cloud: how risks and threats are affecting cloud adoption decisions. 634-659

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.