


default search action
Information and Computer Security, Volume 26
Volume 26, Number 1, 2018
- Basie von Solms, Rossouw von Solms:

Cybersecurity and information security - what goes where? 2-9 - Mathew Nicho

:
A process model for implementing information systems security governance. 10-38 - Andrew Stewart

:
A utilitarian re-examination of enterprise-scale information security management. 39-57 - Rashmi Anand, Sanjay Medhavi, Vivek Soni

, Charru Malhotra, D. K. Banwet:
Transforming information security governance in India (A SAP-LAP based case study of security, IT policy and e-governance). 58-90 - Harrison Stewart

, Jan Jürjens:
Data security and consumer trust in FinTech innovation in Germany. 109-128 - Anuar Nawawi, Ahmad Saiful Azlin Puteh Salin

:
Employee fraud and misconduct: empirical evidence from a telecommunication company. 129-144
Volume 26, Number 2, 2018
- Fredrik Karlsson

, Ella Kolkowska, Marianne Törner:
Guest editorial. 146-149 - Zhiling Tu, Yufei Yuan, Norm Archer, Catherine E. Connelly:

Strategic value alignment for information security management: a critical success factor analysis. 150-170 - Miranda Kajtazi, Hasan Cavusoglu

, Izak Benbasat, Darek M. Haftor
:
Escalation of commitment as an antecedent to noncompliance with information security policy. 171-193 - Kane Smith, Gurpreet Dhillon

, Karin Hedström
:
Reconciling value-based objectives for security and identity management. 194-212 - Martin Karlsson

, Thomas Denk
, Joachim Åström:
Perceptions of organizational culture and value conflicts in information security management. 213-229 - Ali Alper Yayla, Yu Lei:

Information security policies and value conflict in multinational companies. 230-245 - Joakim Berndtsson, Peter Johansson, Martin Karlsson

:
Value conflicts and non-compliance: Attitudes to whistleblowing in Swedish organisations. 246-258
Volume 26, Number 3, 2018
- Steven Furnell, Nathan L. Clarke

:
Guest editorial. 262-263 - Jurjen Jansen, Paul van Schaik:

Persuading end users to act cautiously online: a fear appeals study on phishing. 264-276 - Agata McCormac, Dragana Calic, Kathryn Parsons, Marcus A. Butavicius, Malcolm Robert Pattinson, Meredith Lillie:

The effect of resilience and job stress on information security awareness. 277-289 - Dirk Snyman

, Hennie A. Kruger
, Wayne D. Kearney:
I shall, we shall, and all others will: paradoxical information security behaviour. 290-305 - Manal Abdullah Alohali

, Nathan L. Clarke
, Fudong Li
, Steven Furnell:
Identifying and predicting the factors affecting end-users' risk-taking behavior. 306-326 - Debi Ashenden

:
In their own words: employee attitudes towards information security. 327-337 - Adéle da Veiga

:
An information privacy culture instrument to measure consumer privacy expectations and confidence. 338-364 - Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage:

Security questions education: exploring gamified features and functionalities. 365-378
Volume 26, Number 4, 2018
- Vasiliki Diamantopoulou, Haralambos Mouratidis:

Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology. 382-400 - Alain Claude Tambe Ebot:

Using stage theorizing to make anti-phishing recommendations more effective. 401-419 - Eric Amankwa

, Marianne Loock, Elmarie Kritzinger
:
Establishing information security policy compliance culture in organizations. 420-436 - Majed Alshammari, Andrew Simpson

:
A model-based approach to support privacy compliance. 437-453 - Simon N. Foley, Vivien M. Rooney:

A grounded theory approach to security policy elicitation. 454-471 - Nikolaos Argyropoulos, Konstantinos Angelopoulos, Haralambos Mouratidis, Andrew Fish

:
Risk-aware decision support with constrained goal models. 472-490 - Natalia G. Miloslavskaya

:
Designing blockchain-based SIEM 3.0 system. 491-512
Volume 26, Number 5, 2018
- Rika Butler, Martin J. Butler

:
Assessing the information quality of phishing-related content on financial institutions' websites. 514-532 - Teodor Sommestad:

Work-related groups and information security policy compliance. 533-550 - Stefan Fenz

, Thomas Neubauer:
Ontology-based information security compliance determination and control selection on the example of ISO 27002. 551-567 - Zakarya A. Alzamil:

Information security practice in Saudi Arabia: case study on Saudi organizations. 568-583 - Adéle da Veiga

:
An approach to information security culture change combining ADKAR and the ISCA questionnaire to aid transition to the desired culture. 584-612 - Gunikhan Sonowal

, K. S. Kuppusamy:
MMSPhiD: a phoneme based phishing verification model for persons with visual impairments. 613-636 - Samuel Tweneboah-Koduah, Francis Atsu, William J. Buchanan

:
Impact of cyberattacks on stock performance: a comparative study. 637-652

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














