default search action
Information and Computer Security, Volume 26
Volume 26, Number 1, 2018
- Basie von Solms, Rossouw von Solms:
Cybersecurity and information security - what goes where? 2-9 - Mathew Nicho:
A process model for implementing information systems security governance. 10-38 - Andrew Stewart:
A utilitarian re-examination of enterprise-scale information security management. 39-57 - Rashmi Anand, Sanjay Medhavi, Vivek Soni, Charru Malhotra, D. K. Banwet:
Transforming information security governance in India (A SAP-LAP based case study of security, IT policy and e-governance). 58-90 - Harrison Stewart, Jan Jürjens:
Data security and consumer trust in FinTech innovation in Germany. 109-128 - Anuar Nawawi, Ahmad Saiful Azlin Puteh Salin:
Employee fraud and misconduct: empirical evidence from a telecommunication company. 129-144
Volume 26, Number 2, 2018
- Fredrik Karlsson, Ella Kolkowska, Marianne Törner:
Guest editorial. 146-149 - Zhiling Tu, Yufei Yuan, Norm Archer, Catherine E. Connelly:
Strategic value alignment for information security management: a critical success factor analysis. 150-170 - Miranda Kajtazi, Hasan Cavusoglu, Izak Benbasat, Darek M. Haftor:
Escalation of commitment as an antecedent to noncompliance with information security policy. 171-193 - Kane Smith, Gurpreet Dhillon, Karin Hedström:
Reconciling value-based objectives for security and identity management. 194-212 - Martin Karlsson, Thomas Denk, Joachim Åström:
Perceptions of organizational culture and value conflicts in information security management. 213-229 - Ali Alper Yayla, Yu Lei:
Information security policies and value conflict in multinational companies. 230-245 - Joakim Berndtsson, Peter Johansson, Martin Karlsson:
Value conflicts and non-compliance: Attitudes to whistleblowing in Swedish organisations. 246-258
Volume 26, Number 3, 2018
- Steven Furnell, Nathan L. Clarke:
Guest editorial. 262-263 - Jurjen Jansen, Paul van Schaik:
Persuading end users to act cautiously online: a fear appeals study on phishing. 264-276 - Agata McCormac, Dragana Calic, Kathryn Parsons, Marcus A. Butavicius, Malcolm Robert Pattinson, Meredith Lillie:
The effect of resilience and job stress on information security awareness. 277-289 - Dirk Snyman, Hennie A. Kruger, Wayne D. Kearney:
I shall, we shall, and all others will: paradoxical information security behaviour. 290-305 - Manal Alohali, Nathan L. Clarke, Fudong Li, Steven Furnell:
Identifying and predicting the factors affecting end-users' risk-taking behavior. 306-326 - Debi Ashenden:
In their own words: employee attitudes towards information security. 327-337 - Adéle da Veiga:
An information privacy culture instrument to measure consumer privacy expectations and confidence. 338-364 - Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage:
Security questions education: exploring gamified features and functionalities. 365-378
Volume 26, Number 4, 2018
- Vasiliki Diamantopoulou, Haralambos Mouratidis:
Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology. 382-400 - Alain Claude Tambe Ebot:
Using stage theorizing to make anti-phishing recommendations more effective. 401-419 - Eric Amankwa, Marianne Loock, Elmarie Kritzinger:
Establishing information security policy compliance culture in organizations. 420-436 - Majed Alshammari, Andrew Simpson:
A model-based approach to support privacy compliance. 437-453 - Simon N. Foley, Vivien M. Rooney:
A grounded theory approach to security policy elicitation. 454-471 - Nikolaos Argyropoulos, Konstantinos Angelopoulos, Haralambos Mouratidis, Andrew Fish:
Risk-aware decision support with constrained goal models. 472-490 - Natalia G. Miloslavskaya:
Designing blockchain-based SIEM 3.0 system. 491-512
Volume 26, Number 5, 2018
- Rika Butler, Martin J. Butler:
Assessing the information quality of phishing-related content on financial institutions' websites. 514-532 - Teodor Sommestad:
Work-related groups and information security policy compliance. 533-550 - Stefan Fenz, Thomas Neubauer:
Ontology-based information security compliance determination and control selection on the example of ISO 27002. 551-567 - Zakarya A. Alzamil:
Information security practice in Saudi Arabia: case study on Saudi organizations. 568-583 - Adéle da Veiga:
An approach to information security culture change combining ADKAR and the ISCA questionnaire to aid transition to the desired culture. 584-612 - Gunikhan Sonowal, K. S. Kuppusamy:
MMSPhiD: a phoneme based phishing verification model for persons with visual impairments. 613-636 - Samuel Tweneboah-Koduah, Francis Atsu, William J. Buchanan:
Impact of cyberattacks on stock performance: a comparative study. 637-652
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.