- Joakim Kävrestad, Felicia Burvall, Marcus Nohlberg. A taxonomy of factors that contribute to organizational Cybersecurity Awareness (CSA). Inf. Manag. Comput. Security, 33(2):141-160, 2025.
- Michael J. Rooney, Yair Levy, Wei Li 0025, Ajoy Kumar. Comparing experts' and users' perspectives on the use of password workarounds and the risk of data breaches. Inf. Manag. Comput. Security, 33(2):196-222, 2025.
- Mari Aarland. Cybersecurity in digital supply chains in the procurement process: introducing the digital supply chain management framework. Inf. Manag. Comput. Security, 33(1):5-24, 2025.
- Xiaoguang Tian. Unraveling the dynamics of password manager adoption: a deeper dive into critical factors. Inf. Manag. Comput. Security, 33(1):117-139, 2025.
- Marcus Gerdin. Validating and extending the unified model of information security policy compliance. Inf. Manag. Comput. Security, 33(1):25-48, 2025.
- Fredrik Karlsson 0001, Shang Gao 0002. Guest editorial: New frontiers in information security management. Inf. Manag. Comput. Security, 33(1):1-4, 2025.
- Thai Pham, Farkhondeh Hassandoust. Information security policy effectiveness: a managerial perspective of the financial industry in Vietnam. Inf. Manag. Comput. Security, 33(1):77-95, 2025.
- Kristiina Ahola, Marcus A. Butavicius, Agata McCormac, Daniel Sturman. Hey "CSIRI", should I report this? Investigating the factors that influence employees to report cyber security incidents in the workplace. Inf. Manag. Comput. Security, 33(2):242-266, 2025.
- Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty, Steven D'Alessandro. Human-centric cyber security: Applying protection motivation theory to analyse micro business owners' security behaviours. Inf. Manag. Comput. Security, 33(1):49-76, 2025.
- Gregor Petric, Spela Orehek. Expressing opinions about information security in an organization: the spiral of silence theory perspective. Inf. Manag. Comput. Security, 33(2):223-241, 2025.