- Ken Zi Lim, Hui-Na Chua, Siew Fan Wong. Examining the factors leading to URL fact-checking behavior among internet users. Inf. Manag. Comput. Security, 33(5):719-743, 2025.
- Marcus Dansarie, Marcus Nohlberg. User adoption of TETRA mobile radio communication networks: an information security perspective. Inf. Manag. Comput. Security, 33(5):766-784, 2025.
- Hongjiang Xu. Users' perceptions of managerial measurements for cloud computing's cybersecurity - importance-performance analysis. Inf. Manag. Comput. Security, 33(4):590-612, 2025.
- Berhanu Aebissa, Gurpreet Dhillon, Million Meshesha. Information security policy compliance: a replication study in Ethiopia. Inf. Manag. Comput. Security, 33(3):408-426, 2025.
- Joakim Kävrestad, Felicia Burvall, Marcus Nohlberg. A taxonomy of factors that contribute to organizational Cybersecurity Awareness (CSA). Inf. Manag. Comput. Security, 33(2):141-160, 2025.
- Christian Matt Graham. AI skills in cybersecurity: global job trends analysis. Inf. Manag. Comput. Security, 33(5):673-689, 2025.
- Michael J. Rooney, Yair Levy, Wei Li 0025, Ajoy Kumar. Comparing experts' and users' perspectives on the use of password workarounds and the risk of data breaches. Inf. Manag. Comput. Security, 33(2):196-222, 2025.
- Jaime C. Auton, Daniel Sturman. Persuasion under pressure: the influence of persuasion principles and time constraints on phishing email susceptibility. Inf. Manag. Comput. Security, 33(5):845-859, 2025.
- Kemal Elciyar. Users' privacy behaviors in response to WhatsApp policy changes. Inf. Manag. Comput. Security, 33(4):573-589, 2025.
- Ahmed Ali Otoom, Issa Atoum, Heba Al-Harahsheh, Mahmoud Mohammad Aljawarneh, Mohammed N. Al-Refai, Mahmoud Baklizi. A collaborative cybersecurity framework for higher education. Inf. Manag. Comput. Security, 33(3):362-389, 2025.