Stop the war!
Остановите войну!
for scientists:
default search action
Information and Computer Security, Volume 32
Volume 32, Number 1, 2024
- Hamid Reza Nikkhah, Varun Grover, Rajiv Sabherwal:
Post hoc security and privacy concerns in mobile apps: the moderating roles of mobile apps' features and providers. 1-37 - Martina Neri, Federico Niccolini, Luigi Martino:
Organizational cybersecurity readiness in the ICT sector: a quanti-qualitative assessment. 38-52 - Areej Alyami, David Sammon, Karen Neville, Carolanne Mahony:
Critical success factors for Security Education, Training and Awareness (SETA) programme effectiveness: an empirical comparison of practitioner perspectives. 53-73 - Manimay Dev, Debashis Saha:
Does e-government development moderate the impact of female labor participation on national cybersecurity maturity? An empirical investigation. 74-92 - Zainab Batool Rizvi, Chaudry Bilal Ahmad Khan, Michael O'Sullivan:
Analytical hierarchy process model for managing cloud security. 93-111 - Prasetyo Adi Wibowo Putro, Dana Indra Sensuse, Wahyu Setiawan Setiawan Wibowo:
Framework for critical information infrastructure protection in smart government: a case study in Indonesia. 112-129
Volume 32, Number 2, 2024
- Miguel Calvo, Marta Beltrán:
Applying the Goal, Question, Metric method to derive tailored dynamic cyber risk metrics. 133-158 - Shao-Fang Wen, Basel Katt:
Exploring the role of assurance context in system security assurance evaluation: a conceptual model. 159-178 - Peter Dornheim, Rüdiger Zarnekow:
Determining cybersecurity culture maturity and deriving verifiable improvement measures. 179-196 - Gregory Lyon:
Informational inequality: the role of resources and attributes in information security awareness. 197-217 - Herbert J. Mattord, Kathleen Kotwica, Michael E. Whitman, Evan Battaglia:
Organizational perspectives on converged security operations. 218-235 - Eylem Thron, Shamal Faily, Huseyin Dogan, Martin Freer:
Human factors and cyber-security risks on the railway - the critical role played by signalling operations. 236-263
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.