


default search action
Information and Computer Security, Volume 28
Volume 28, Number 1, 2020
- Malcolm R. Pattinson, Marcus A. Butavicius, Meredith Lillie, Beau Ciccarello, Kathryn Parsons, Dragana Calic, Agata McCormac:

Matching training to individual learning styles improves information security awareness. 1-14 - Nabil Moukafih

, Ghizlane Orhanou, Said Elhajji:
Mobile agent-based SIEM for event collection and normalization externalization. 15-34 - Konstantina Vemou, Maria Karyda:

Evaluating privacy impact assessment methods: guidelines and best practice. 35-53 - Hayretdin Bahsi

, Ulrik Franke, Even Langfeldt Friberg
:
The cyber-insurance market in Norway. 54-67 - Konstantina Vemou, Maria Karyda:

Requirements for private communications over public spheres. 68-96 - Surma Mukhopadhyay, Ramsankar Basak, Darrell Carpenter, Brian J. Reithel:

Patient use of online medical records: an application of technology acceptance framework. 97-115 - Ioannis Paspatis, Aggeliki Tsohou, Spyros Kokolakis:

AppAware: a policy visualization model for mobile applications. 116-132
Volume 28, Number 2, 2020
- Cong Hiep Pham

, Linda Brennan, Lukas Parker
, Nhat Tram Phan-Le
, Irfan Ulhaq
, Mathews Zanda Nkhoma, Minh Nhat Nguyen:
Enhancing cyber security behavior: an internal social marketing approach. 133-159 - Ibrahim M. Al-Jabri

, Mustafa I. M. Eid, Amer Abed:
The willingness to disclose personal information. 161-181 - Paola Mavriki, Maria Karyda:

Automated data-driven profiling: threats for group privacy. 183-197 - Wafa Bouaynaya

:
Cloud computing in SMEs: towards delegation of the CIO role. 199-213 - Elham Rostami, Fredrik Karlsson

, Ella Kolkowska:
The hunt for computerized support in information security policy management. 215-259 - Stef Schinagl

, Abbas Shahim:
What do we know about information security governance? 261-292 - Pintu Shah

, Anuja Agarwal
:
Cybersecurity behaviour of smartphone users in India: an empirical analysis. 293-318
Volume 28, Number 3, 2020
- Opeoluwa Ore Akinsanya, Maria Papadaki

, Lingfen Sun
:
Towards a maturity model for health-care cloud security (M2HCS). 321-345 - Joakim Kävrestad, Johan Zaxmy, Marcus Nohlberg:

Analyzing the usage of character groups and keyboard patterns in password creation. 347-358 - C. Bryan Foltz, Laura Foltz:

Mobile users' information privacy concerns instrument and IoT. 359-371 - Tamir Tsegaye

, Stephen Flowerday:
A Clark-Wilson and ANSI role-based access control model. 373-395 - Moufida Sadok

, Peter M. Bednar
:
Editorial. 397-398 - Adéle da Veiga, Ruthea Vorster, Fudong Li

, Nathan L. Clarke
, Steven M. Furnell:
Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements. 399-422 - Jake Weidman, Jens Grossklags:

Assessing the current state of information security policies in academic organizations. 423-444 - Sebastian Kurowski:

Response biases in policy compliance research. 445-465 - Moufida Sadok

, Steven Alter, Peter M. Bednar
:
It is not my job: exploring the disconnect between corporate security policies and actual security practices in SMEs. 467-483
Volume 28, Number 4, 2020
- Rima El-Khatib

, Henri Barki:
An activity theory approach to information security non-compliance. 485-501 - Eleni-Laskarina Makri

, Zafeiroula Georgiopoulou, Costas Lambrinoudakis
:
Utilizing a privacy impact assessment method using metrics in the healthcare sector. 503-529 - Aggeliki Tsohou, Emmanouil Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras

, Michalis Pavlidis
, Julien Debussche, Marco Rotoloni, Beatriz Gallego-Nicasio Crespo:
Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform. 531-553 - Rika Butler:

A systematic literature review of the factors affecting smartphone user threat avoidance behaviour. 555-574 - Antonia Michael, Jan H. P. Eloff:

Discovering "Insider IT Sabotage" based on human behaviour. 575-589 - Rajni Goel

, Anupam Kumar, James Haddow:
PRISM: a strategic decision framework for cybersecurity risk assessment. 591-625 - Rabii Anass

, Assoul Saliha
, Khadija Ouazzani Touhami, Ounsa Roudiès:
Information and cyber security maturity models: a systematic literature review. 627-644 - Vasiliki Diamantopoulou, Aggeliki Tsohou, Maria Karyda:

From ISO/IEC27001: 2013 and ISO/IEC27002: 2013 to GDPR compliance controls. 645-662
Volume 28, Number 5, 2020
- Zafeiroula Georgiopoulou, Eleni-Laskarina Makri

, Costas Lambrinoudakis
:
GDPR compliance: proposed technical and organizational measures for cloud provider. 665-680 - Muhamad Khairulnizam Zaini

, Mohamad Noorman Masrek
, Mad Khir Johari Abdullah Sani:
The impact of information security management practices on organisational agility. 681-700 - Joakim Kävrestad, Markus Lennartsson, Marcus Birath

, Marcus Nohlberg:
Constructing secure and memorable passwords. 701-717 - Esther Dzidzah, Kwame Owusu Kwateng, Benjamin Kofi Asante:

Security behaviour of mobile financial service users. 719-741 - Isaac Wiafe, Felix Nti Koranteng, Abigail Wiafe

, Emmanuel Nyarko Obeng, Winfred Yaokumah:
The role of norms in information security policy compliance. 743-761 - Mhamed Zineddine:

A novel trust model for fog computing using fuzzy neural networks and weighted weakest link. 763-800 - Jan-Willem Bullee

, Marianne Junger:
How effective are social engineering interventions? A meta-analysis. 801-830

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














