


default search action
Information and Computer Security, Volume 33
Volume 33, Number 1, 2025
- Fredrik Karlsson, Shang Gao

:
Guest editorial: New frontiers in information security management. 1-4 - Mari Aarland:

Cybersecurity in digital supply chains in the procurement process: introducing the digital supply chain management framework. 5-24 - Marcus Gerdin:

Validating and extending the unified model of information security policy compliance. 25-48 - Hassan Jamil

, Tanveer A. Zia
, Tahmid Nayeem, Monica T. Whitty
, Steven D'Alessandro:
Human-centric cyber security: Applying protection motivation theory to analyse micro business owners' security behaviours. 49-76 - Thai Pham, Farkhondeh Hassandoust:

Information security policy effectiveness: a managerial perspective of the financial industry in Vietnam. 77-95 - Tugçe Karayel, Bahadir Aktas, Adem Akbiyik:

Human factors in remote work: examining cyber hygiene practices. 96-116 - Xiaoguang Tian

:
Unraveling the dynamics of password manager adoption: a deeper dive into critical factors. 117-139
Volume 33, Number 2, 2025
- Joakim Kävrestad, Felicia Burvall, Marcus Nohlberg:

A taxonomy of factors that contribute to organizational Cybersecurity Awareness (CSA). 141-160 - Garret Murray, Malin Falkeling, Shang Gao

:
Trends and challenges in research into the human aspects of ransomware: a systematic mapping study. 161-195 - Michael J. Rooney, Yair Levy, Wei Li, Ajoy Kumar:

Comparing experts' and users' perspectives on the use of password workarounds and the risk of data breaches. 196-222 - Gregor Petric, Spela Orehek:

Expressing opinions about information security in an organization: the spiral of silence theory perspective. 223-241 - Kristiina Ahola, Marcus A. Butavicius, Agata McCormac, Daniel Sturman:

Hey "CSIRI", should I report this? Investigating the factors that influence employees to report cyber security incidents in the workplace. 242-266 - Keith S. Jones, McKenna K. Tornblad, Miriam E. Armstrong, Jinwoo Choi, Akbar Siami Namin:

The effects of persuasion principles on perceived honesty during shoulder surfing attacks. 267-283
Volume 33, Number 3, 2025
- Publisher's note. 285-286

- Luzuko Tekeni, Reinhardt A. Botha

:
Understanding the factors that motivate South African home fibre users to protect their home networking devices: a protection motivation theory. 287-308 - Martina Neri

, Elisabetta Benevento, Alessandro Stefanini, Davide Aloini, Federico Niccolini, Annalaura Carducci, Ileana Federigi, Gianluca Dini:
Understanding information security awareness: evidence from the public healthcare sector. 309-319 - Israa Abuelezz, Mahmoud Barhamgi, Armstrong Nhlabatsi, Khaled Md. Khan, Raian Ali

:
How demographic and appearance cues of a potential social engineer influence trust perception and risk-taking among targets? 320-343 - Cláudia Ascenção, Henrique Teixeira

, João Gonçalves, Fernando Almeida
:
Large-scale agile security practices in software engineering. 344-361 - Ahmed Ali Otoom

, Issa Atoum
, Heba Al-Harahsheh, Mahmoud Mohammad Aljawarneh, Mohammed N. Al-Refai, Mahmoud Baklizi:
A collaborative cybersecurity framework for higher education. 362-389 - Berhanu Aebissa

, Gurpreet Dhillon, Million Meshesha
:
Information security policy compliance: a replication study in Ethiopia. 408-426 - Apostolos Xenakis, Vasileios Vlachos, Pedro Juan Roig, Salvador Alcaraz:

Addressing the necessity of cybersecurity literacy: the case of ETTCS CyberTeach project. 427-451

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














