


default search action
Information and Computer Security, Volume 27
Volume 27, Number 1, 2019
- Mutlaq Jalimid Alotaibi, Steven Furnell, Nathan L. Clarke
:
A framework for reporting and dealing with end-user security policy compliance. 2-25 - Mohamed Abdelhamid, Victoria Kisekka, Spyridon Samonas:
Mitigating e-services avoidance: the role of government cybersecurity preparedness. 26-46 - Qais Saif Qassim
, Norziana Jamil
, Maslina Daud, Ahmed Patel, Norhamadi Ja'affar:
A review of security assessment methodologies in industrial control systems. 47-61 - Vinayak Agrawal
, Shashikala Tapaswi:
Forensic analysis of Google Allo messenger on Android platform. 62-80 - Mohd Aizuddin Zainal Abidin, Anuar Nawawi, Ahmad Saiful Azlin Puteh Salin
:
Customer data security and theft: a Malaysian organization's experience. 81-100 - Melissa Carlton, Yair Levy
, Michelle M. Ramim
:
Mitigating cyber attacks through the measurement of non-IT professionals' cybersecurity skills. 101-121 - Salvatore Aurigemma, Thomas Mattson:
Effect of long-term orientation on voluntary security actions. 122-142
Volume 27, Number 2, 2019
- Frans Nel, Lynette Drevin:
Key elements of an information security culture in organisations. 146-164 - Zauwiyah Ahmad, Thian Song Ong
, Tze Hui Liew, Mariati Norhashim:
Security monitoring and information security assurance behaviour among employees. 165-188 - David Lewis Coss, Gurpreet Dhillon
:
Cloud privacy objectives a value based approach. 189-220 - Suliman A. Alsuhibany
, Muna Almushyti, Noorah Alghasham, Fatimah Alkhudhayr:
The impact of using different keyboards on free-text keystroke dynamics authentication for Arabic language. 221-232 - Masike Malatji
, Suné von Solms, Annlizé Marnewick:
Socio-technical systems cybersecurity framework. 233-272 - Nikolaos Serketzis
, Vasilios Katos, Christos Ilioudis
, Dimitrios A. Baltatzis, George J. Pangalos:
Actionable threat intelligence for digital forensics readiness. 273-291 - Omerah Yousuf, Roohie Naaz Mir:
A survey on the Internet of Things security. 292-323
Volume 27, Number 3, 2019
- Ioanna Topa, Maria Karyda:
From theory to practice: guidelines for enhancing information security management. 326-342 - Mark Glenn Evans, Ying He
, Iryna Yevseyeva, Helge Janicke
:
Published incidents and their proportions of human error. 343-357 - Erik Bergström
, Martin Lundgren, Åsa Ericson:
Revisiting information security risk management challenges: a practice perspective. 358-372 - Adenekan Dedeke, Katherine Masterson:
Contrasting cybersecurity implementation frameworks (CIF) from three countries. 373-392 - Maria Bada, Jason R. C. Nurse:
Developing cybersecurity education and awareness programmes for small- and medium-sized enterprises (SMEs). 393-410 - Peace Kumah, Winfred Yaokumah
, Eric Saviour Aryee Okai:
A conceptual model and empirical assessment of HR security risk management. 411-433 - Abdul Wahid Mir, Ramachandran Ramkumar Ketti:
Security gaps assessment of smart grid based SCADA systems. 434-452 - Joakim Kävrestad, Fredrik Eriksson, Marcus Nohlberg:
Understanding passwords - a taxonomy of password creation strategies. 453-467 - Nancy K. Lankton, Charles T. Stivason, Anil Gurung
:
Information protection behaviors: morality and organizational criticality. 468-488
Volume 27, Number 4, 2019
- Leigh A. Mutchler:
Response awareness and instructional self-efficacy: influences on intent. - Inger Anne Tøndel, Martin Gilje Jaatun, Daniela Soares Cruzes, Laurie A. Williams:
Collaborative security risk estimation in agile software development. - Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm Sindre:
An experimental evaluation of bow-tie analysis for security. - Estée van der Walt, Jan H. P. Eloff:
Identity deception detection: requirements and a model. - Jacqueline M. Archibald, Karen Renaud
:
Refining the PoinTER "human firewall" pentesting framework.
Volume 27, Number 5, 2019
- Lamya Abdullah, Juan Quintero:
Sealed computation: a mechanism to support privacy-aware trustworthy cloud service. - Verena Zimmermann, Nina Gerber
, Peter Mayer
, Marius Kleboth, Alexandra von Preuschen, Konstantin Schmidt:
Keep on rating - on the systematic rating and comparison of authentication schemes. - Andrew M'manga
, Shamal Faily, John McAlaney, Chris Williams, Youki Kadobayashi, Daisuke Miyamoto:
A normative decision-making model for cyber security. - Erik Framner, Simone Fischer-Hübner, Thomas Lorünser
, Ala Sarah Alaqra, John Sören Pettersson:
Making secret sharing based cloud storage usable. - Rena Lavranou, Aggeliki Tsohou:
Developing and validating a common body of knowledge for information privacy. - Oleksii Osliak, Andrea Saracino
, Fabio Martinelli:
A scheme for the sticky policy representation supporting secure cyber-threat intelligence analysis and sharing. - Vasiliki Diamantopoulou, Haralambos Mouratidis:
Practical evaluation of a reference architecture for the management of privacy level agreements.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.